Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Facial Regonition (Score 1) 103

I entered the US yesterday YYZ-DEN without showing any credential. I went in the global entry line, a camera took my photo and I went on my way.
If you sign up for that, that's fine. I did. It's convenient to skip the passport line and I travel often.

I still print my boarding pass every time. If I'm returning from a trip so don't have access to a printer, I'll get the machine or the staff to print one at the airport.
I'm as techy as they come, but phones are not reliable and I'm not relying on them for a boarding pass.
I also doubt that airlines have the technical competence to do facial recognition reliably. The global entry people manage it but they have a smaller set of faces and opt-in.

Comment 10 Years ago. (Score 2) 83

To quote a senior person within a western intelligence agency, "If the things happening on the internet were happening in the physical world, it would be a shooting war".

That was 10 years ago. It hasn't got better since. Quite the opposite.

It's naive to go around thinking there isn't a number of groups of governments engaging in a protracted and coordinated cyber war. The criminals are at it too and there is much overlap between the two.

Comment Re:Cadence is a good company... (Score 1) 21

>My understanding was Lip left the board because he strongly disagreed with what Gelsinger was doing.

Gelsinger wanted an integrated company - design and manufacturing.
Lots of other people wanted to separate manufacturing from design. Design wanted to separate IP from full chip design.

I've worked in Cadence and I've worked in Intel. My sentiments are with the separators. The factories need to learn how to provide a good foundry service. The IP groups need to sell their IPs on the open market and compete like any other. The full chip design groups need to make compelling products and use the fabs that work best for them. The integrated model meant Intel was slowed down by the weakest part of the business. A 3X risk.

My assumption is that Lip is going to open the path to splitting the company and that is why he was chosen. The separators have taken over the building.

This is all supposition. I don't work there any more.

   

Comment Re:Huh? (Score 1) 129

Since I had a hand in the design of the security protocols of 802.11, 802.16 and Bluetooth

No, you didn't.
Fuck off, now.

Read the 802.11 spec and the 802.16 spec and you will see my name there in the list of contributors. It was several years of my career working on wireless communication protocols followed by several years solving the problems with randomness in those protocols.

The verbiage was on a slide presentation where the 'security' company were claiming they found a back door with remote access. They did not. I saw the headline, read the slides, then it took a couple of days for to dig in and work out it was just normal vendor HCI commands.

So their verbiage wasted a lot of people's time.
 

Comment Re:Huh? (Score 1) 129

The published attack is not an attack via the radio interface.
If it were, then it would be a big problem for anyone.

Since I had a hand in the design of the security protocols of 802.11, 802.16 and Bluetooth, I'm familiar with how a vendor might put in a backdoor on the wireless side. A competent one could do it without it being easy to detect. It's a good thing I didn't put a backdoor in the products I've been involved in.

Comment Re:Huh? (Score 1) 129

>And you think someone needs to be connected to the same network as you to interact with the lower layers?

No. I think that is a prerequisite. You have to break a bunch of other things too. In the case of my network, that would be home-assistant, which probably has holes but I make it more difficult than a default install.

Then you would need to use residence on HA to mess with the code on the attached devices which would be easy because HA updates firmware on the devices all the time.

A resourceful hacker (i.e. they are getting paid to do it) could engineer the second two steps. The first step is the hardest because it's designed to be hard.
 

Comment Re:"unknown unknowns" (Score 1) 85

When I was designing circuits boards for a living, I had a rock solid estimation algorithm for a board from concept to deliverable product.

6 months. Regardless of the size and complexity of the board.

This takes into account that most of the time will be spent waiting on manufacturing for prototype turnaround.

You can do it quicker if you don't have a customer or certifications or need a production quality product, but we were a consulting design house.

Comment Re:Translation (Score 4, Interesting) 51

Prove it.

Look back to past back door behaviour (Dual EC DRBG for instance) - they attack the RNGs through standards first.

For the 140-2 era, look at the CRNGT
For the 140-3 era (I.E. Today) look the frankly odd and highly suspect SP800-90A DFs. The guy at NIST in pure political speech said "there were too many cooks making that broth" meaning the NSA were all over it.
For entropy extraction, look how the 90B non IID tests over-estimate the entropy when there is very low entropy from the source. Cross correlate that with the very low entropy claimed in Apples ESV submissions for the RNG in all their current products.
Watch as the government stood back and made no attempts to address the brain dead approach to entropy extraction and entropy estimation in the Linux kernel, following the well known principle of not trying to stop the enemy when they are making a mistake.

The back doors are there to be seen if you care to look. They go for the RNGs first, because if they can bork the RNG, the rest of the cryptosystem fails.

Slashdot Top Deals

"Ask not what A Group of Employees can do for you. But ask what can All Employees do for A Group of Employees." -- Mike Dennison

Working...