Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission + - Pokemon Go Has Full Access To Your Google Account Data (techcrunch.com)

An anonymous reader writes: If you're an iPhone user and have installed Pokemon Go, you may have noticed that the app grants itself full access to your Google account. It can read your email, location history, documents and pretty much every else associated with your Google account. (You can check to see for yourself here.) Given the nature of the game, it's understandable for it to request a lot of permissions, as it needs your precise location, ability to access the camera and motion sensors, read and write the SD card, and charge you money when you run out of Pokeballs or eggs. But full access to your Google account is pushing it, even if Niantic or Nintendo has no malicious intentions. If you're concerned about these permissions, you can always sign-up using a Pokemon Trainer account, assuming the servers are permitting.
Iphone

Submission + - Apple Acknowledges Major iPhone 5 Camera Flaw 1

An anonymous reader writes: Many iPhone 5 users are complaining that its camera is adding a purple flare to their photos. Speculation is that it's caused by the new sapphire lens cover that Apple touted as "thinner and more durable than standard glass with the ability to provide crystal clear images." Apple's response to those who've complained? "You're using it wrong."

Submission + - SHA-3 winner announced (nist.gov)

An anonymous reader writes: National Institute of Standards and Technology (NIST) has just announced the winner of the SHA-3 competition: Keccak, created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconductors.

“Keccak has the added advantage of not being vulnerable in the same ways SHA-2 might be,” says NIST computer security expert Tim Polk. “An attack that could work on SHA-2 most likely would not work on Keccak because the two algorithms are designed so differently.”

For Joan Daemen it must be a "two in a row" feeling, since he also is one of the authors of AES.

Security

Submission + - Graphics Cards: The Future of Online Authentication? (threatpost.com)

Gunkerty Jeb writes: Researchers working on the "physically unclonable functions found in standard PC components (PUFFIN) project" announced last week that widely used graphics processors could be the next step in online authentication. The project seeks to find uniquely identifiable characteristics of hardware in common computers, mobile devices, laptops and consumer electronics.

The researchers realized that apparently identical graphics processors are actually different in subtle, unforgeable ways. A piece of software developed by the researchers is capable of discerning these fine differences. The order of magnitude of these differences is so minute, in fact, that manufacturing equipment is incapable of manipulating or replicating them. Thus, the fine-grained manufacturing differences can act as a sort of a key to reliably distinguish each of the processors from one another.

The implication of this discovery is that such differences can be used as physically unclonable features to securely link the graphics cards, and by extension, the computers in which they reside and the persons using them, to specific online accounts.

Government

In Argentina, Law Against Plagiarism Plagiarized 165

An anonymous reader writes "An Argentinian politician who introduced a law to send plagiarists to jail for three to eight years appears to have plagiarized the explanation of his bill directly from Wikipedia. The bulk of his explanation is three paragraphs that are taken, verbatim, from Wikipedia, without acknowledgment."
Apple

Submission + - Apple to buy ARM? (thisislondon.co.uk)

gyrogeerloose writes: An article in the London Evening Standard claims that Apple has made an $8 billion offer to acquire ARM Holdings. For those few Slashdotters who don't already know, ARM makes the processor chips that power Apple's iPad, iPhone and iPod Touch. However, ARM processors are also used by other manufacturers, including Palm and, perhaps most significantly, companies building Android phones. This explains why Apple might be willing to spend so much on the deal--almost 20% of it's cash reserves. Being able to control who gets to use the processors (and, more importantly, who doesn't) would give Apple a huge advantage over it's competitors.

Slashdot Top Deals

The typical page layout program is nothing more than an electronic light table for cutting and pasting documents.

Working...