Forgot your password?
typodupeerror

Comment Re:Can free ICQ clients use ICQ servers, reloaded (Score 1) 29

Same discussion as 30 years ago with open source clones of messaging apps such as ICQ. The open source client pretends, on those days through reverse engineering, to be the official client. Ultimately, it was okay then, because it was beneficial for the operators to have a larger network of users who can talk to each other. Does this dynamic apply here?

I'd have gone with "Every web browser is Mozilla", personally, but yes.

If you're using a user agent for any sort of security purpose, you're not just doing security wrong; you're doing security so wrong that somebody is going to write an entire book as a postmortem about your company.

Moreover, if your service can't handle the traffic of a mere thousands of clients (four-digit QPS) hitting it at once, you have much bigger problems than security. I forgot how to count that low a long time ago.

Finally, the elephant in this room is that those "unauthorized" clients are YOUR USERS. They are people who bought YOUR HARDWARE and want to use it with your service. Basically, you're flipping off your paying customers. That's the fastest, easiest way to ensure that you don't have any of those anymore.

Comment Re:Stop purchasing Bambu products (Score 2) 29

Threats of lawsuits (especially to open source products, which do not have deep pockets) are the new corporate approach to what would appear to be appropriate reverse engineering. The only way forward, if you disagree, is to refuse to purchase any Bambu products.

Already done. When I was choosing what 3D printer to buy to replace my aging Snapmaker A350 last year, I read about Bambu's questionable commitment to openness, and decided to buy a Creality printer (K2 Plus with CFS) instead. Over the year that followed, I bought a Creality Hi with CFS as a second printer, plus two additional CFS units, a filament dryer, a spare Creality tool kit (since the Hi doesn't come with one), and more than half a grand worth of filament.

I've personally spent well close to $3,700 on Creality products in the last year (not counting third-party filament and the DXC2 extruder upgrade) precisely because Bambu comes across as being a bunch of litigious a**holes who are trying to lock down their products and prevent users from being able to modify the hardware that they bought.

As far as I'm concerned, they've dug their grave in the 3D printer market. Stick a fork in it. They're done.

Comment Re:Are they even trying anymore? (Score 1) 43

The sticky note under the keyboard or in a desk drawer is actually pretty secure. Most attacks are remote, they've no way to read that note. The social-engineering attacks don't target people who'd go to your desk either, they either target you directly (you already know your password) or support people who don't need to know your password to give them access.

Comment Re:Second sourcing, multiple suppliers, etc. (Score 2) 25

How great is it that Trump requires Apple to do business with Intel

Intel is one of the top three semiconductor manufacturers in the world. If a company wants to practice the sound engineering principle of second sourcing they are a top choice.

It's a good idea in principle. If Intel can actually catch up. Otherwise, it will be like the cellular modems, where Apple second-sourced from Intel, and the product was crap, so some devices had noticeably degraded performance compared with the ones that contained Qualcomm radios.

Please, please, please let it be Apple's main processors.

TSMC has a high volume process lead over Intel. Apple will probably use Intel for older CPUs going into lower end machines and devices.

Except that they would have to presumably reengineer the old silicon for Intel's process, which kind of defeats the purpose of reusing old designs to save money, I would think.

Plus, CPUs are not the only chips that Apple needs. Not all chips need the latest process.

I think you're on the right track with that one. Apple uses a lot of CPUs that aren't the main CPU. For example, every current MacBook Pro has a T2 security chip that handles encryption. The next generation of that could be designed to be manufacturable on multiple processes; it is currently built on a 16nm process.

Apple also uses CPUs in things like the Apple Watch, where absolute performance isn't as much of a factor as temperature and power consumption. I'm pretty sure Intel is already able to make chips in volume that beat the 4nm process that they use for those.

Comment Are they even trying anymore? (Score 1) 43

I have to ask, are these platforms even trying to secure their systems anymore? Because I keep seeing of more and more of these breaches, involving more and more platforms, and the attacks are less and less sophisticated. I hear companies talk and talk about security, yet their day-to-day practices require their employees and contractors to violate practically every good security practice and treat the red flags of an attack as normal company practice instead.

Occam's Razor no longer applies, because at this level malice and incompetence are indistinguishable.

Comment Re:Should be easy to find the users (Score 1) 135

Think about it .. the US landed C-130s, and a bunch of other aircraft including helicopters deep in their territory --- hung out for like 45 minutes and left. They couldn't track noisy ass helicopters and you're telling me they can find a phase array antenna Starlink? Most units of which, I can pretty much guarantee, are owned by government-connected people. And btw, they can be solar powered and planted some distance away from whoever owns it.

If the U.S. can do that, they can put drones in the air and create a Starlink-based swarm network providing free Wi-Fi to everyone, replacing the hardware as it gets shot down. Nobody has to have the Starlink hardware if it is a few hundred feet up — complete anonymity and complete destruction of the government's Internet blackout.

Comment Re:Ban paying ransoms (Score 2) 22

because countries that have outlawed paying ransoms to kidnappers have broken the kidnapping industry?

this doesn't work, it just makes more people criminals.

But corporations are not people. Corporations exist at the mercy and whims of the state. And corporations have to tell who they paid money and for what.

If you make it illegal for corporations to pay ransoms to the tune of "If you get caught, your corporate charter is revoked," it won't make more people criminals; it will make it nearly impossible for corporations to pay ransoms without the corporation ceasing to exist, which would make paying the ransom entirely moot.

But for it to work, the cost of getting caught and the odds of getting caught would both have to be high enough to exceed the cost of throwing out all the affected equipment and rebuilding from off-site backups (or starting over from scratch). Otherwise, they'll just pay the ransom.

Comment This isn't new with genAI (Score 1) 82

This isn't really a new result, nor tied to genAI. Machine-learning models have a long track record of being able to identify medical problems better than humans based on records. Not really a surprise, the problem is essentially one of pattern matching and machine learning is _really_ good at extracting patterns from large volumes of data and then matching new data against those patterns. I wouldn't apply genAI to the problem, though, the established ML systems do a better job using fewer resources.

Slashdot Top Deals

Your mode of life will be changed to ASCII.

Working...