Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:If it ain't broke... (Score 2) 206

So, here's what happens:

As a product improves, it gathers users. This is a mark of continuing success.

Features are added, and users rejoyce.

At some point, the product plateaus. There are no new users coming in, and people start getting nervous.

A UI designer is introduced to the product.

"There's a whole market of learning-disabled children and moderately senile elderly folks we've been ignoring this whole time! They get confused by all of this rich functionality. Burn it to the ground!"

... and they do. They onboard a bunch of users who were formerly confused by features like "close all tabs," while their core fanbase deserts the product. But that fact doesn't become known for some time.

Rinse, repeat. Bitter much? Nah.

Comment Re:Liability (Score 3, Insightful) 445

That's it.

A lot of people don't realize that click-through agreements are mostly unenforceable because they're almost all one-sided contracts.

When you purchase a product, it's your to use. This right is enshrined in all kinds of law in both the US and Canada.

So "click OK to agree to the EULA/contract" is attempting to impose restriction without commensurate compensation. You already have the right to use the software, regardless of whether or not you click OK, so the EULA is not providing you any compensation. That makes it invalid, except when tied to services that you don't own.

But I'd be happy to see a new law introduced (in Canada, at least) that explicitly outlaws EULAs for everything non-service related, and severe restrictions on service agreements as well.

Hell, make onerous service contract agreements themselves taxable assets.

Comment Re:Flamebait opinion piece, not news. (Score 1) 214

"Why not both?"

Because we live in nations under the rule of law, we can impose reasonable restriction on those who seek to profit from our vast array of shared resources and capital.

The right to own and repair ones' property shall not be infringed. John Deere shall not impose upon owners, and will honour warranty obligations as required by law. Competitors shall be allowed to thrive, and service all hardware and software.

If after all of that consumer protection you still have a problem with John Deere, then you can take your business elsewhere.

But the two options are not mutually exclusive.

Comment Maps reaching a tipping point (Score 1) 50

Great news, but I suspect we won't have long to enjoy it. Every time a Google product reaches a rich level of functionality, it's scrapped and replaced with a useless, feature robbed, confusing new beta with a horrendous UI.

Short of a distance measuring tool and a few other odds and ends, Maps is finally approaching the functionality it had 3 years ago, and I bet all kinds of "usability experts" are just itching to scrap it.

Comment What type of attack? (Score 1) 151

What type of attack is being mitigated against and how does the risk of failure of the encryption solution compare to that of the attack vector? There are many ways encryption can fail, including loss of keys or too much exposure to the passwords for these keys.

For example, are we talking about hardware theft or software based intrusion?

For hardware theft, then you would probably want to find a solution where no one needs to know the keys, but it is part of the local infrastructure. This would mean that once hardware is taken out of said infrastructure then it can't access the keys it needs to make sense of the data. Just like anything there are still scenarios where this could fail or be a hinderance.

For software there are so many variables and use cases, I am not going to try to list them, but remember there are both internal vectors of attack and external vectors of attack. Sometimes the hardest one to defend against is social engineering.

Comment One of them.. (Score 1) 143

While I generally run the latest stable AOSP/CM/LineageOS build available for my devices from the day I buy them, I don't routinely use a secure lock screen.

It may sound risky, but I'm one of those all-eggs-in-one-basket types. I keep my birth certificate and SIN card in my wallet, and I keep my phone unlocked. Neither leave my side, ever. Not for a second. Not anywhere.

If I check my coat, my wallet and phone stay with me. If I'm asked to check my phone, I leave the venue and write a negative review. Every time I stand up, I tap my pockets (subtly) - cell phone, keys, wallet. Check!

Because the cost of losing control over my wallet or phone is so high, I take no chances, and to date, have never had it happen. Knock wood, right? :)

Same goes for other items we tend to lose; I buy wickedly overpriced but quality pens, scarves, hats, gloves, etc., so that they're always on the back of my mind.

That said, if I'm at a party or bar, or out camping, I do throw on at least a pin lock.

Slashdot Top Deals

Chemist who falls in acid is absorbed in work.

Working...