Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Exactly who would buy Chrome? (Score 4, Insightful) 144

Outside of any potential technical difficulties of selling Chrome (code base, licensing, patents, etc. Presumably Chrome as a 'brand' would also be packaged, and so on) just who do they expect would *buy* it? And who gets to set the price?

One also suspects that if foreign companies attempted to buy Chrome, there would be protests/lawsuits/whatever.

Or rather, if someone bought Chrome, how would the purchaser expect to make money with Chrome? Charge for it? Or do... exactly what Google is doing now? And if there is no way to make a profit from the purchase, why would anyone be interested in buying Chrome?

Submission + - Scientists At Fermilab Close In On Fifth Force of Nature (bbc.com)

An anonymous reader writes: Scientists near Chicago say they may be getting closer to discovering the existence of a new force of nature. They have found more evidence that sub-atomic particles, called muons, are not behaving in the way predicted by the current theory of sub-atomic physics. Scientists believe that an unknown force could be acting on the muons. More data will be needed to confirm these results, but if they are verified, it could mark the beginning of a revolution in physics.

All of the forces we experience every day can be reduced to just four categories: gravity, electromagnetism, the strong force and the weak force. These four fundamental forces govern how all the objects and particles in the Universe interact with each other. The findings have been made at a US particle accelerator facility called Fermilab. They build on results announced in 2021 in which the Fermilab team first suggested the possibility of a fifth force of nature. Since then, the research team has gathered more data and reduced the uncertainty of their measurements by a factor of two, according to Dr Brendan Casey, a senior scientist at Fermilab. "We're really probing new territory. We're determining the (measurements) at a better precision than it has ever been seen before."

In an experiment with the catchy name 'g minus two (g-2)' the researchers accelerate the sub-atomic particles called muons around a 50-foot-diameter ring, where they are circulated about 1,000 times at nearly the speed of light. The researchers found that they might be behaving in a way that can't be explained by the current theory, which is called the Standard Model, because of the influence of a new force of nature. Although the evidence is strong, the Fermilab team hasn't yet got conclusive proof. They had hoped to have it by now, but uncertainties in what the standard model says the amount of wobbling in muons should be, has increased, because of developments in theoretical physics. In essence, the goal posts have been moved for the experimental physicists. The researchers believe that they will have the data they need, and that the theoretical uncertainty will have narrowed in two years' time sufficiently for them to get their goal. That said, a rival team at Europe's Large Hadron Collider (LHC) are hoping to get there first.

Submission + - How Teen Hackers Exploited Security Weaknesses In World's Biggest Companies (cnn.com)

An anonymous reader writes: A group of teenage hackers managed to breach some of the world’s biggest tech firms last year by exploiting systemic security weaknesses in US telecom carriers and the business supply chain, a US government review of the incidents has found, in what is a cautionary tale for America’s critical infrastructure. The Department of Homeland Security-led review of the hacks, which was shared exclusively with CNN, determined US regulators should penalize telecom firms with lax security practices and Congress should consider funding programs to steer American youth away from cybercrime. The investigation of the hacks – which hit companies like Microsoft and Samsung – found that, in general, it was far too easy for the cybercriminals to intercept text messages that corporate employees use to log into systems. [...]

“It is highly concerning that a loose band of hackers, including a number of teenagers, was able to consistently break into the best-defended companies in the world,” Homeland Security Secretary Alejandro Mayorkas told CNN in an interview, adding: “We are seeing a rise in juvenile cybercrime.” After a series of high-profile cyberattacks marked his first four months in office, President Joe Biden established the DHS-led Cyber Safety Review Board in 2021 to study the root causes of major hacking incidents and inform policy on how to prevent the next big cyberattack. Staffed by senior US cybersecurity officials and executives at major technology firms like Google, the board does not have regulatory authority, but its recommendations could shape legislation in Congress and future directives from federal agencies. [...]

The board’s first review, released in July 2022, concluded that it could take a decade to eradicate a vulnerability in software used by thousands of corporations and government agencies worldwide. The second review, to be released Thursday, focused on a band of young criminal hackers based in the United Kingdom and Brazil that last year launched a series of attacks on Microsoft, Uber, Samsung and identity management firm Okta, among others. The audacious hacks were often followed by extortion demands and taunts by hackers who seemed to be out for publicity as much as they were for money. The hacking group, known as Lapsus$, alarmed US officials because they were able to embarrass major tech firms with robust security programs. “If richly resourced cybersecurity programs were so easily breached by a loosely organized threat actor group, which included several juveniles, how can organizations expect their programs to perform against well-resourced cybercrime syndicates and nation-state actors?” the Cyber Safety Review Board’s new report states.

Comment So, GDPR enforcement? (Score 0) 82

If the EU is going to force the situation so people can install software on their phones from anywhere, that would imply people could install software which is not GDPR compliant.

So, how would the EU expect to enforce the GDPR? Why wouldn't 'free' versions (or cloned knock-offs) of software (that incidentally harvest all personal information) start showing up for downloads hosted in places outside the reach of the EU?

Comment Unrealistic Scheduling (Score 2) 209

> Following their designation, gatekeepers will have six months to comply with the requirements in the DMA, at the latest by March 6, 2024.

Six months? Really? To engage in major software changes to some government whims? From start to finish with some sort of certified compliance and without accidentally violating some other regulations/accounting/business contracts in the process?

Comment Decentralized utopia version 421.68 (Score 3, Informative) 27

It sounds like this group is trying to re-invent https://solidproject.org/

From: https://en.wikipedia.org/wiki/...
Solid [1] is a web decentralization project led by Sir Tim Berners-Lee, the inventor of the World Wide Web, developed collaboratively at the Massachusetts Institute of Technology (MIT). The project "aims to radically change the way Web applications work today, resulting in true data ownership as well as improved privacy"[2] by developing a platform for linked-data applications that are completely decentralized and fully under users' control rather than controlled by other entities. The ultimate goal of Solid is to allow users to have full control of their own data, including access control and storage location. To that end, Tim Berners-Lee formed a company called Inrupt to help build a commercial ecosystem to fuel Solid.

Comment The first app from a third party app store... (Score 3, Interesting) 69

The very first app from a third party app store will be an application that turns the phone itself into an app store, so the user can 'share' everything to other phones over WiFi/BlueTooth.

The second app will be a combination app store and onion routing network so that groups of phones can join together in ad hoc onion routing networks -- every high school, college, etc. will end up with a floating ad hoc onion cloud that is over WiFi or other local networks so the students can share apps/movies/music with each other without being easily traced.

Comment The Gift that keeps on Giving (Score 5, Informative) 60

One aspect of this vulnerability is that the attacker does not need to have opened or connected directly to the vulnerable Java program. The Java program just has to be exposed to an exploit string from *some* source such that the program logs it with a vulnerable version of log4j. At which point the program opens its own outbound connection to the exploit server. (The port number can be specified to 80 or 443 so it looks like outbound HTTP or HTTPS traffic, so just blocking outbound connections to LDAP default ports won't save you.)

So I have moderate expectations that there will be a burst of systems exploited at the end of the month when automated billing/accounting/auditing/etc. systems start processing this month's data for the end of month or end of year reporting. It will be something like the software which drives the business bulk mailing label printer or something -- some minor Java utility that has nothing at all to do with the network -- somewhere in the processing chain which will dutifully try to execute the exploit.

Comment An Idiot Savant's Idiot (Score 5, Interesting) 39

I am curious if the example referred to where the system apparently reproduced an entire chunk of code with command and copyright notice was the system actually cutting and pasting, or if it has simply 'learned' that those text items were 'supposed' to be there from processing other code.

In either case, if it is not actually applying any understanding of the code, then this is a glorified, automated, cut-and-paste coding system -- which means if the source material is poisoned with errors, security holes, or backdoors, then the system is just going to cut-and-paste the problems into what is generated.

Comment Somewhat interesting. (Score 2) 76

It's easy to see all the things wrong with the modern Internet, and how the reality of most peoples' experience online doesn't align with the dreams of its early creators.

That's a somewhat presumptuous statement in implications -- that the dreams of the early creators are the correct ones for the modern Internet. Perhaps they are, perhaps they aren't. If this is just going to be a "You young folks should listen to your elders and do things the way we intended! You should follow our dreams, not yours!", that's going to be fairly weak sauce. (Proof by authority.)

It's entirely possible that the reason why 'all the things wrong with the modern Internet' happened is because the original dreams weren't necessarily good or practical ideas. It ought to start with a critique of those first to establish whether or not in hindsight all those 'original dreams' were a good idea -- whether or not all the 'wrong' things that happened were in spite of, or because of those dreams, then it can argue about "Getting it right" rather than waving a cane and shouting "You kids get off my lawn!"

Comment And this is surprising? (Score 1) 96

It's generally held that once an attacker has physical access to a device, the device is going to be cracked. So this is not a real surprise.

It would be more interesting to see data on the cost/effort/time it takes for police to do so based on phone model, and also to plot how the cost/effort/time changes from year to year. (That is, how fast after a brand new phone is released does the situation go from "There's no tool available to break into this new model", to "We have a 90% chance of getting into the phone in a week", to "Give me five minutes to open this up.")

This is also going to be an interesting suspect pressure argument-- law enforcement will claim, "See? We can already unlock it, so why don't you make it easier for everyone and unlock your phone for us?" to try to convince people to voluntarily unlock their phones.

Slashdot Top Deals

To see a need and wait to be asked, is to already refuse.

Working...