Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment The most interesting part (Score 3, Interesting) 87

From the FAQ: "TPM 2.0 is intended to be usable for a very broad range of platforms from embedded systems to mobile devices to PCs to servers." In other words, TCG is not dead but actively pushing TPMs to new platforms.

A use case: in case of theft, the permanent storage of your device can be protected against reading the flash memory (of course, assuming your device is locked in the first place) in the same fashion as Bitlocker works on PCs. The secret key with which your corporate data is encrypted can be stored in the TPM bound to a password and/or PCRs. (Assuming, of course, that the TPM itself is not hacked using physical attacks (DPA, etc.). But at least, it raises the bar for the average thief.)

Microsoft

Submission + - Now that it's here, is there a place for Windows RT? (arstechnica.com)

concealment writes: "This is a point that takes a while to sink in. Does Windows RT support multiple users? Yes, because Windows 8 does. Does Windows RT support Flash in Internet Explorer 10? Yes, because Windows 8 does. Can Windows RT run Internet Explorer 10 on the desktop as well as in Metro? Yes, because Windows 8 can. Does Windows RT have the same bundled applications, like Mail, Video, Music, Weather, and so on? Yes, because Windows 8 does. Does Windows RT support Bluetooth mice and keyboards, USB hubs? Yes, because Windows 8 does. As a general rule, if Windows 8 has a feature Windows RT has the same feature.

This is not to say that getting Windows running on ARM was a trivial undertaking. Typical ARM SoCs don't use PCI for their integrated peripherals or ATA for their mass storage, and so Windows had to be modified to not require PCI and to support booting from MMC storage. But those changes are now part of core Windows; Windows 8 systems built around Intel's Clover Trail platform will also use MMC."

Encryption

Submission + - How a Google Headhunter's E-Mail Unraveled a Massive Net Security Hole (wired.com)

concealment writes: "The problem lay with the DKIM key (DomainKeys Identified Mail) Google used for its google.com e-mails. DKIM involves a cryptographic key that domains use to sign e-mail originating from them – or passing through them – to validate to a recipient that the header information on an e-mail is correct and that the correspondence indeed came from the stated domain. When e-mail arrives at its destination, the receiving server can look up the public key through the sender’s DNS records and verify the validity of the signature.

Harris wasn’t interested in the job at Google, but he decided to crack the key and send an e-mail to Google founders Brin and Page, as each other, just to show them that he was onto their game."

Comment Re:Gridlocked with No Way to Prime the Pump (Score 2) 438

You seem to equate inflation with government printing money. By doing that, you miss out on a large source of inflation in economies, namely, banks loaning out more money than they possess (at a rate capped by the central bank) and thus creating money.

These loans do not benefit "those closest to the government" but go straight into the economy. Some of these loans will increase wealth (e.g., successful startups), while others will not, causing inflation.

There is nothing wrong with a stable, low inflation level. Your savings will not be obliterated if the interest paid by the bank on your savings is higher than the inflation level.

Announcements

Knuth Plans 'Earthshaking Announcement' Wednesday 701

I Don't Believe in Imaginary Property writes "Donald Knuth is planning to make an 'earthshaking announcement' on Wednesday, at TeX's 32nd Anniversary Celebration, on the final day of the TUG 2010 Conference. Unfortunately, nobody seems to know what it is. So far speculation ranges from proving P!=NP, to a new volume of The Art of Computer Programming, to his retirement. Maybe Duke Nukem Forever has been ported to MMIX?" Let the speculation begin.

Comment it's not the problem of forgetting 1 password... (Score 1) 388

The biggest problem is the large ammount of different services which all want their own random password.

I've got more than 20 different passwords for all kinds of services. In the beginning it wasn't all that hard to remember 5 different passwords. But it starts to get difficult when you're starting to confuse passwords from one service with another. I don't know about everyone else, but I don't reuse my passwords; it's just as bad as using a weak password.

There should be some central auth service which just uses 1 password, and then verifies to another service you are really that person you claim you are...

Slashdot Top Deals

Never make anything simple and efficient when a way can be found to make it complex and wonderful.

Working...