Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Submission + - Twitter censors #DNCLeaks trending topic and hashtag (hashtags.org)

bongey writes: Twitter censored the 2nd trending topic DNCLeaks hashtag. The trending hashtag #DNCLeaks was climbing over 90k tweets when it disappeared from the trending topics. It was replaced with PraisinTheAsian(17k) and TheWalkingDead(38k). https://www.hashtags.org/analy... https://www.hashtags.org/analy...
https://www.hashtags.org/analy...

Submission + - The science behind the world's simplest, controllable, flying machine (robohub.org)

Kassandra Perlongo writes: Researchers at the Institute for Dynamic Systems and Control at ETH Zurich have created a flying machine that only has a single moving part, the rotating propeller, but can still fully control its position in space. Pretty neat!

Unfortunately there's no practical applications for the technology just yet other than it looks cool. Next up: refining the control strategy to allow the Monospinnner to recover from a larger range of initial conditions.

Submission + - Apple asks the FBI: How hard did you really try to hack into the iPhone? (bgr.com)

An anonymous reader writes: one of the more interesting aspects of Apple’s recently filed motion to vacate argues that the FBI may not have tried all possible avenues to hack into the shooter’s iPhone 5c.

In a section titled, “The Government Has Not Demonstrated Apple’s Assistance Was Necessary To Effectuating The Warrant”, Apple argues that there’s no evidence to suggest that the FBI sought assistance from other agencies (read: the NSA, the CIA) when it came to unlocking the iPhone in question.

"Moreover, the government has not made any showing that it sought or received technical assistance from other federal agencies with expertise in digital forensics," Apple argues, "which assistance might obviate the need to conscript Apple to create the back door it now seeks."

It’s an interesting argument that was even brought up, albeit quickly, during yesterday’s congressional hearing on mobile device encryption and the balance between American security and privacy.

Submission + - Clinton Defenders: Relax, 'Beyond Top Secret' Intel Was 'Innocuous' (nbcnews.com)

RoccamOccam writes: The classified material included in the latest batch of Hillary Clinton emails flagged by an internal watchdog involved discussions of CIA drone strikes, which are among the worst kept secrets in Washington, senior U.S. officials briefed on the matter tell NBC News.

As pointed out here, Mrs. Clinton at first stated that no classified material of any sort passed through her server, then wrongly claimed that she's never personally sent or received such information, then falsely asserted that none of the material was classified at the time. Now that the Inspector General has determined that Clinton's vulnerable bootleg server also contained beyond top secret intelligence, some of her defenders appear to be shifting tactics. Rather than denying the classification level or the existence of the emails, they're stating that the subject matter of the SAP-level emails in question was "innocuous".

Submission + - Top Democratic senator will seek legislation to 'pierce' through encryption (dailydot.com)

Patrick O'Neill writes: Sen. Dianne Feinstein (D-Calif.) will seek legislation requiring the ability to "pierce" through encryption to allow American law enforcement to read protected communications with a court order. She told the Senate Judiciary committee on Wednesday that she would seek a bill that would give police armed with a warrant based on probable cause the ability to read encrypted data. "I have concern about a PlayStation that my grandchildren might use," she said, "and a predator getting on the other end, and talking to them, and it's all encrypted. I think there really is reason to have the ability, with a court order, to be able to get into that."

Submission + - Chris Anderson: Drone "Jackassery" Must Stop (roboticstrends.com)

stowie writes: As co-founder and CEO of 3D Robotics, Chris Anderson knows a thing or two about drones. And he knows a few bad apples will ruin the hobby. Anderson says the “mass jackassery” is hurting the industry.

“[It’s] bad and it’s going to get worse. And if we don’t do something about it, no one’s been killed yet, but someone’s going to do something really stupid.”
Anderson says the answer is geo-fencing software that keeps drones away from restricted areas.

“One of the ironies of this drone age is that because we’ve made drones so easy to fly, the process of learning to fly and all the safety and responsibility lessons that come with it are now no longer required.”

Comment Where to start... (Score 1) 1

The headline mentions SMS, but that isn't involved or even mentioned anywhere in the article. Their POC program sent an SMS through a third-party server.

The "researchers" are trying to sell a competitor to the built in Keychain.
Their proof of concept showed them using an unlocked keychain to add the new key. This lowers the threshold to access the keychain, because it is already unlocked. Keychain Access is buried in the Utility folder that most non-savvy users have no idea that it even exists, so they would be very unlikely to unlock the keychain in this way.

Their malicious app had to be installed around the gatekeeper system. By default the gatekeeper blocks anything that isn't secured with a trusted certificate. It would have to be turned off to install.

In short, this requires a series of dumb actions by the user, most of which are not shown in the POC video.

When you unlock a bunch of doors and invite the thief in for tea, you may find your silver missing.

Submission + - How to Build Beautiful Enclosures from FR4 -- aka PCBs (hackaday.com)

szczys writes: For decades Voja Antonic has been perfecting his technique of building enclosures form FR4, which is the substance used to make most printed circuit boards.

He shared his method in this amazing post which includes a bunch of illustrations he made to showcase the tips and tricks that make this method work. Building enclosures out of FR4 has been done for a long time, but I've never seen a guide that walks you through everything needed to achieve this level of quality.

Comment Re: Linux sales figures (Score 1) 132

Certain Steam games have followed me from Windows, to OS X and now Linux. This is a significant extra value and very convenient and I really hope that Valve manages to get a significant portion of the gamer crowd to switch. For me it's simple, if the game does not run in linux, I won't play it. Wine and emulators like DosBox are thankfully available to play some #oldwarez and the occasional game of SCII.

Slashdot Top Deals

Nearly every complex solution to a programming problem that I have looked at carefully has turned out to be wrong. -- Brent Welch

Working...