Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Reading the entire article helps (Score 1) 153

'Not designed to be government-proof'

Apple has disclosed little about how iMessage works, but a partial analysis sheds some light on the protocol. Matthew Green, a cryptographer and research professor at Johns Hopkins University, wrote last summer that because iMessage has "lots of moving parts," there are plenty of places where things could go wrong. Green said that Apple "may be able to substantially undercut the security of the protocol" -- by, perhaps, taking advantage of its position during the creation of the secure channel to copy a duplicate set of messages for law enforcement.

Comment If I only had a crystal ball... (Score 1) 736

Unfortunately, one does not know the exact running time "a priori" - it varies widely with different hardware configurations, network congestion, hard drive speeds and is therefore often easier to measure than to predict.

The progress bar has always been a "best effort" guess as to the amount of time remaining, I think they have gotten a lot more accurate over the years - but perfection is a long way off I suspect.

Comment Re:hmmmm (Score 2) 164

Not necessarily. Sometimes social engineering takes advantage of people's assumptions. If you wear a printer servicing uniform and people assume that you're there to fix a printer, are you lying or deceiving them? I'd posit that their assumptions are incorrect and you're not deceiving them unless you're challenged and you start lying.

Bullshit, of course you're deceiving them. You cannot expect normal human beings to question all their assumptions 24/7. Every time you blinked you'd have to prove to yourself that the whole universe hadn't just been switched off and then instantaneously recreated itself.

True story, I once walked into an Apple store wearing a blue shirt.
As luck would have it - it looked pretty damn close to the blue shirts that all the "Geniuses" were wearing that day.
Once inside the store, I was bombarded by a constant stream of people asking me technical questions - which it just so happens that I'm good at answering! ^_^

I didn't deliberately choose to wear a blue shirt that day - it was just the luck of the draw.
Did I deceive anyone in this case??

Social engineering can take on many forms.

Comment Re:A Netbook (Score 1) 416

An OLD (skewl) notebook that has a real serial DB-9 connector for all those serial management console ports.

Or failing that, a brand name DB-9 to USB adapter (don't mess with the cheap ones, the good ones are not that much more $$)

Comment Re:And a normal locksmith will also charge (Score 5, Informative) 132

I believe its geek appeal is derived from the fact that a software hack utilized to break the locks, rather than a physical set of lock picks.

There is also a sub-text about the social responsibility and obligation that manufacturers have to patch security holes found in their devices in a timely manner I suspect as well.

Slashdot Top Deals

An adequate bootstrap is a contradiction in terms.

Working...