Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Good feedback! (Score 1) 87

Bricking insecure devices has a nice upshot - the cost of a returned device isn't just the profit - because all of the handling and
coping has to be done (so far) by a human, the actual _cost_ to the distributor or manufacturer of a failed device is often the
loss of profit on the whole minimum order quantity to the distributor - the whole crate.

That's why if you get a DOA item from Amazon, they often don't even want it back, they send you another on your word of
honor- not because they're so nice, but because (absent evidence of fraud) IT'S CHEAPER TO JUST SEND ANOTHER

But just because it's cheaper, doesn't make it nonzero. Every bricked device replaced under warranty costs $$ and every
device that fails, in warranty or out, costs reputation. How much would you pay for an iPhone if the battery stopped
holding charge after between three days and six months of use?

Bottom line: it's damn expensive to adequately secure an already-damn-expensive IoT light bulb. And as BrickerBot
expands (and no doubt improves, just as the original chemotherapy drugs were improved) the cost to make a secure
IoT device is going to skyrocket.

Which may effectively doom IoT for consumers. Industrial IoT is a different game with different rules and the most
important is that airgapping is feasible.

Comment Two reasons- Training and Reliability (Score 1) 368

There are two reasons to NOT change the software - or at least the view seen by the users:

1) Training - learning an application represents a significant investment in time and mental energy. Making a significant change in the interface (or worse, the actual workflow) means relearning the app, sometimes from worse-than-scratch because you already know what's wrong! So, if you have to relearn, you can relearn another app that doesn't have the feature and workflow churn.

2) Reliability - adding code adds bugs. Code that once worked fine now doesn't. This again forces users to consider if it's time to learn another application and workflow simply to get away from the bugs.

Comment Re:I don't even know my passwords (Score 2) 652

Using 2FA authentication won't work to stop them.

They ALREADY ask you to allow inspection of electronics. If you refuse to give them the password, expect to not get your phone, laptop, or tablet back till you either give them the password or they image the whole thing for NSA's "enhanced decryption".

Comment Okay, what's the business model then? (Score 4, Insightful) 234

Which leaves us with the interesting question of LastPass's business model.

1) Advertising? Knowing every site you visit - AND YOUR PASSWORD?

2) "We have a benefactor". Yeah. Except that maybe that benefactor is the NSA. Or is it the GRU? Or is it the MSS (China's NSA)?

No matter how I slice it, I can't figure out an angle that isn't kinda creepy.

Comment Re:Is the implication that fresh water is bad? (Score 1) 159

Submerging plants in drinking water reservoirs is doubleplusbad. Not because of the carbon emissions, but because the rotting plants will give the water a bad taste for fifty years or so.

When the state of Massachusetts built the Quabbin reservoir in the 1930's, they did their level best to take out all of the wood and plants that would rot; clearcutting the forests, relocating, demolishing and carting, or burning farm buildings in place. Only the stone foundations remained. They even removed the railroad ties of rail lines. The result was a reservoir that is still the major reservoir of Boston to this day.

Comment Yet another reason why Adblocking and Scriptblocki (Score 4, Insightful) 96

Yet another reason why adblockers and scriptblockers are essential.

Not just because ads chew up your pay-by-the-byte bandwidth, but because they are actively serving up malware.

Sorry, all you ad-supported sites... find another business model. Your current methods are dying a very painful death.

Submission + - ORWL Open and secure computer Not So Open.

Dr. Crash writes: ORWL (the open-sourced physically secure computer) crowdsourced on CrowdSupply has revealed their licensing model.... which isn't closed, but not much better.
* Schematics only "rendered" — as PDF, impeding mechanized analysis for holes. "Source" (i.e. Cadence files) requires an NDA
* PCB layouts are available only as Gerber files. "Source" (i.e. Allegra files) again requires an NDA
* Mechanical CAD files and BIOS: Only via NDA.
Is it just me, or does it strike other readers that for a computer that's supposed to be open-sourced and inspectable, releasing only the equivalent of "assembly code" (PDFs of the schematic, Gerber files) and requiring an NDA for the BIOS and mechanical security just doesn't cut it? in particular, revealing only the PDF'ed schematics and the Gerbers make it essentially impossible to improve the device, and without the BIOS being inspectable, the security of the whole system is completely compromised.

Read the release info yourself at:

Comment Don't bother - even if your password is strong.... (Score 1) 210

Unless there's money involved, I don't bother with a strong password.

Why? Because even if my password protocol and tradecraft are bulletproof, most sites aren't. Sites get
compromised so often that even a good password will fall in a year or two. Or your password _manager_ gets

So... why bother? Start with "Password#1!" (which almost all sites will accept as "strong" and
when (not if, when) that compromises, move to "Password#2". And so forth.

Okay.... don't use the word "password". Use "Starbucks#1". Or "Galactica#!".

Other than a very few sites worthy of _trying_ to protect (your bank and maybe your primary email) one password
shared across all sites is more than adequate because compromise is inevitable. Make the cost of
compromise as close to nil as possible; that's the optimal behavior. I mean, who cares if your brownie
recipe gets trashed?

And never, ever store a password that can be turned into money on anything more connected than a
post-it note in your wallet next to your Benjamins.

Comment bloody stupid (Score 2) 97

There is no way to spoof a fingerprint sensor with a 3D printer. It would take extremely precise printing, far better than any 3D printer the local cops are like to have and a very precise fingerprint. And a sensor that has no ability to note discrepancy with living tissue. So I am claiming complete bullshit pretense of far more powers than cops have.

Heck, I have to recalibrate my iThing fingerprint patterns every month or so to get it to recognize the real thing.

Comment Bullshit (Score 1) 148

They are only trying to protect rent seeking schemes that almost exclusively benefit labels and studios and not actual creators. The goal is to maximize access and further creative while rewarding creators. Anything short of that is simply not good enough and introduces too many negatives including limiting how much benefit we can get from our technology and criminalizing everyone who may attempt to fully utilize the abilities of the technology.

Slashdot Top Deals

The amount of time between slipping on the peel and landing on the pavement is precisely 1 bananosecond.