Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Advertising I won't block. (Score 1) 707

How to make advertising I won't block:

It can't have any movement (graphics, video, the frames, etc), it can't make any sound, it can't appear over, or obscure any content, it can't obscure or interfere with page navigation, and it can't take over 15% of my total screen real-estate regardless of device.

I won't block ads that conform to these rules.

Comment Re:This makes me want to run out and get a Blackbe (Score 1) 137

<quote>Blackberries are still being made? Rather, are they still being sold?? I thought that they had a historical hold on corporate world -- and I thought that even that was pretty much gone</quote>

Yep, they used to have a stranglehold on the corporate world, mostly because the executives always had Blackberries (and absolutely loved them) and IT refused to support anything else.

Then the execs all got iOS devices and ditched their blackberries and told IT to support iOS devices (or look for a new job). Now iOS holds a huge part of the corporate world that Blackberry will never get back. That market is gone from Blackberry, forever - they just don't have it in them to make a superior device.

Saw exactly this thing happen at my office. Once the big cheeses got iPhones, it was game over for Blackberry. And having a BYOD policy/project so the company didn't need to buy people phones was great from a budget standpoint.

Comment Re:Surprised? (Score 5, Insightful) 424

You are absolutely, 100% correct. It was painfully obvious watching the behind the scenes footage that Lucas had been surrounded by a platoon of "Yes Men", rather than people who would give him honest feedback.

And here's the thing, I think that Lucas did have some really great ideas, but he also had some terrible ones. And without the filter to remove the terrible ones, you got a mashed-up mess.

Comment Maybe it's time to just teach it in school... (Score 1) 406

If the whole safety briefing section is just covered in a standard school course "Safety for Air Travel", then we could probably dispense with the safety briefing altogether (not like it's changed much, if at all in the last couple of decades).

-Know where the exits are and the shortest way to get to them
-Know where the safety equipment is, and basic usage
-Keep your seatbelt on unless moving around, even if the light is off.

Comment Re:If your encryption is secure, the key is the se (Score 1) 170

Use a key that's distributed and at least partially redundant. For example, break the key into 20 sections, and allow decryption with a minimum of at least 11 of those sections present.

Distribute the key sections to geographically diverse, trusted people, in different countries with different governments, with the instructions to keep them somewhere safe, and on a certain date (ie: Jan 1, 2020) publish them online in a known location.

Sure, some people might be jerks, or accidentally publish ahead of time (or not at all), but assuming that (in this case) 55% of the keys are available, the file can be unlocked. Of course, you could change the number of key sections required based on how critical secrecy is vs. security, etc.

Comment Re:Cell phones must stop broadcasting MAC addresse (Score 1) 189

Is there any particular reason that MAC addresses need to be (typically) hard-coded to the device? I know it's occasionally handy on physical networks for addressing specific devices for admin reasons, but on portable, wireless connections, seems like more trouble than it's worth.

Why not just have an option to let the device randomly roll a new MAC each time it connects? If it's already in use (highly unlikely), just roll a new one.

(note: I know you can authorize access to specific MAC addresses through many routers/switches/base stations, but it's flimsy security at best as many adapters can have their MACs changed through software).

Comment Re:Gotta love those mistakes... (Score 1) 165

I suspect that they issue the plates under a different jurisdiction, the same way that if you had plates from another state or country, there could be an overlap in the plate numbers.

One plate for the public, another for politicians - after all, they do seem to live in their own little world.

Comment Macs are already a lot safer... (Score 1) 282

Here's the thing that annoys me - Apple *already* has this technology for all Mac computers built after 2011.

There's no way to override the firmware password on newer Macs - you used to be able to do all sorts of tricks like removing a memory module, or manually accessing the NVRAM parameters. Now owners need to press the "secret keypress" (or bring to an Apple authorized retailer), read an encrypted keycode off of the monitor (probably based on the current password and the hardware ID of that particular system), go into the Apple store and prove you're the owner, and Apple Employees contact Apple HQ to generate an unlock USB key for you.

It would be exceedingly simple for them to implement the same thing in phones. Phone locked? Need to bring to an Apple store to prove ownership before unlocking (probably also wipe the filesystem encryption key, so the phone's contents are not revealed). Make it check the lock status in firmware as part of the bootloader so even a manual DFU needs to unlock first to prevent smarter thieves from just re-flashing the phone (come to think of it, with the new firmware security and signed blobs, this should already be possible - if a phone is reported stolen, simply refuse to sign a firmware-blob for reflash).

A "half-way" position would be to allow the phone to unlock if you connect it to a computer you've synced with.

To encourage people to use the lock (who typically don't like unlocking every 15 min or whatever), have a minimum requirement to enter the password once whenever the phone starts, so while someone may still steal your phone, if it's ever turned-off, battery runs out, or is reset, it requires the unlock code be entered.

Slashdot Top Deals

When the bosses talk about improving productivity, they are never talking about themselves.