Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Cool (Score 5, Interesting) 115

The prior codec HEVC is the key example here. Many of its patent holders had basically reasonable demands, similar to h.264 which was super successful.. But some fraction of the patent holders held out, and in fact have not to this day said what they would charge. For example, perhaps they will charge a penny per minute for all content distributed. They will not say, and so this patent threat hangs over anyone using HEVC. Predictably, this has greatly hindered the adoption of HEVC.

This crazy dysfunction of the patent-fee driven HEVC motivated the creation of https://aomedia.org/ and the royalty free (to be litigated, but I'm guessing it remains free) AV1 codec. If you are in favor of free and open tech, AV1 is for you. Thus far its trajectory is good, but we'll need to see hardware support for decode and then encode in 2021 and 2022 to seal the deal.

HEVC is a great example of a corrupt process leading to a huge wast of human effort instead of actually solving the problem.

Submission + - JPEG XL - Free and open next gen image format

icknay writes: JPEG XL looks very promising as a next gen replacement for JPEG, PNG and GIF.. JPEG was incredibly successful by solving a real problem with a free and open format. Other formats have tried to replace it, notably HEIF which will never by universal due to its patent licensing. JPEG XL combines all the modern features, replacing JPEG PNG and GIF and has free and open licensing. The linked slides from Jon Sneyers review the many other attempts at replacing JPEG plus the obligatory XKCD standards joke.

Comment Re:U2F FTW! (Score 1) 59

I was too glib and you are correct.

As you say, U2F is extremely secure, including against ordinary MITM attacks, but it is not air-tight.

The main case it does not protect against is if this is malware on the user's machine, tampering with their web pages after U2F has made the login. If you are worried about that case, maybe get a chromebook (which works with U2F).

Comment U2F FTW! (Score 3, Insightful) 59

The liFIDO / U2F systems (aka the little usb/wireless tokens) were not compromised by this attack! Yay technical security advance!

We really could use less all-over-the-map branding for U2F .. is called FIDO, FIDO2, Atlas? In fact many times it's called "Yubikey" which is pretty wrong.

What's great about U2F is that the user can be directed to the phishing, site and click the login button on the token and .. nothing bad happens. The system does not depend on the user for vigilance.

Comment U2F FTW (Score 4, Interesting) 84

One big problem with 2FA is that they can phished. U2F is the neat solution in this space (I'm not not affiliated with them, just impressed with it). It's a little hardware key that...

-not fooled by phishing
-each site just gets a big random number at registration, so no user tracking from U2F
-integrates SSL to resist MITM
-it's a free standard and the devices are cheap
-Chrome supports it, Firefox is now in beta. Microsoft has made noises about support.
Apple is .... Apple is a no-show thus far.

U2F https://en.wikipedia.org/wiki/...
FAQ: https://medium.com/@nparlante/...

Comment Phone vs. Phone Number (Score 1) 76

Just to clarify, the problem here is the phone number linked SMS, which customer-service can be badgered into changing. 2FA that stores the secret on the phone are not susceptible to this, with Google Authenticator/TOTP being the most prominent example.

When you upgrade your phone, it all switches around: SMS 2FA convenient just keeps working since it goes with the number, but TOTP is now kind of a pain since you have to set it up again.

The U2F standard gets my vote as the nifty solution to this password madness. I wrote a U2F FAQ: https://medium.com/@nparlante/...

Comment U2F to the rescue! (Score 4, Informative) 127

If you really want it locked down, U2F (2FA device standard) is the way to go. Currently only supported by technically leading sites: google, facebook, github, but jeez it's such a huge improvement over passwords or password managers. One neat side effect of U2F is that with it in place, the password can be super simple, since with U2F the password is not very important. See the U2F FAQ: https://medium.com/@nparlante/...

Comment Re:Re-what? (Score 1) 139

"Chip-and-pin is no more secure than magswipes, it contains the same data"

Just a point of fact: the above is 100% false. The EMV transaction includes some info, but less than the full magstripe, so it cannot be used to make a "Target" style fake magstripe card. This is why all the Target style breaches have been in the pre-EMV USA.

Comment Re:Aren't these already compromised cards? (Score 1) 269

You are half right and half wrong.

1. For the "card present" case, like swiping or using your Google Wallet or Apple Pay in person, the BANK pays for the fraud (so long as the merchant has the right equipment, saves the signatures etc. etc. .. not hard).

2. For the "card not present" case, like I go to the merchant web site, type in my number etc. etc.. If there's fraud in that case, the MERCHANT eats the cost.

What this tells you is that for card-present case, the banks have a pretty good tech stack, so they are not super worried, and they lose very little money (i.e. they are able to decline the bad purchases before they go through). The card not present, case is much more iffy, and the banks shift the costs onto the merchant, and the merchant can make up their own policies about which transactions are worth the risk.

Comment Re:Man In The Browser Attack (Score 1) 121

Ah, thanks. From a quick read of the doc, it is focused on the MITM case. My read of the quote below is that the MITB case is, in fact, not solved. +1 for being honest and transparent. Still, it's progress for one common class of attacks (like say your government feeding you a fake gmail page). It would probably be better in their docs if they used the "MITB" terminology (hey, it has its own wikipedia page!) to be super clear about what is and is not solved. Ultimately, the MITB solution dongle will probably need a little display on it, as outlined above.

9. Client Malware Interactions with U2F Devices As long as U2F devices can be accessed directly from user space on the client OS, it is possible for malware to create a keypair using a fake origin and exercise the U2F device. The U2F device will not be able to distinguish 'good' client software from 'bad' client software. On a similar note, it is possible for malware to relay requests from Client machine #1 to a U2F device attached to client machine #2 if the malware is running on both machines. This is conceptually no different from a shared communication channel between the Client machine (in this case #1) and the U2F device (which happens to be on machine #2). It is not in scope to protect against this situation. Protection against malware becomes more possible if the U2F client is built into the OS system layer as opposed to running in user space. The OS can obtain exclusive access to U2F devices and enforce methods to ensure origin matches.

Comment Re:Man In The Browser Attack (Score 1) 121

Well I watched some low-content video, and it mentions the MITM case (I called it MITB, but whatever). However, there was zero actual information. I guess one way it could work is that the key and google.com have a shared secret, and this is used to bring up a channel between google and the key, and that channel can be secure even if the bad guy controls the browser. But then how is the browser UI resistant against the MITB attack, since obviously the browser is running outside of the key, and outside the keygoogle secure channel. I'm quite curious what they've done there. Hey Google -- let's have the reassuring video for the normals. But put in 10 more hours to publish the 2 page whitepaper on how this thing actually works against MITB the slashdot/hackernews folks please.

Comment Man In The Browser Attack (Score 3, Interesting) 121

It's great the Google is trying to advance this. The attack to worry about is "Man In the Browser" MITB http://en.wikipedia.org/wiki/M...

MITB is the difficult case, and the way that bank accounts get emptied. The bad guy has malware on the victim computer, and the malware puts up web pages, and of course it can just lie about the url bar. So then the bad guy puts up the fake bank web site, and the victim type in the 2-factor code or whatever, and now the bad guy has it. Obviously Google knows about the MITB case. Does this thing have some sort of MITB mitigation? I'm guessing it does something. Hey Google, what do you say?

The classical solution to MITB is that the little key has its own display, so it can show "Confirm transfer $4500 to account 3456" - showing the correct info to the "victim" even if their laptop is compromised. Basically, keeping the usb key itself from getting malware is feasible, while keeping the laptop or whatever clean is not.

Comment Sys Comp Design - Cirguit Gear (Score 1) 172

Check out the circuit-gear units. The new "mini" is just $99 http://www.syscompdesign.com/C... I have the previous generation unit. I've enjoyed it for just hacking around, and it's great for demos, since the computer it's hooked up to can be projected. The GUI software for it is open-source, so that's neat.

Slashdot Top Deals

Almost anything derogatory you could say about today's software design would be accurate. -- K.E. Iverson

Working...