Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:So, limited resources are limited (Score 1) 28

Same management style that Steve Jobs had when they were developing the Lisa & IIe. That is how the iMac came around from the development cycle and life cycle of the computers since they did not want to "clone" their macs into PowerPC's. It takes time, work, effort and compassion to cultivate a winning team. The very steps to create one are the same steps that can destroy one. Furthermore, where are all the GPU's/APU's they used for data mining the block? You can use them in array with PCI-Passthru and utilize the extra resources tho you would need a controller that can handle the thruput. We did the same thing with Quattro's; it'd be interesting to learn if they're using virtualized resources (hyperthreading will cause some cycles to "lag"). That's probably why they fail to meet the researchers demands. https://www.businessinsider.co...

Submission + - Ask Slashdot: Disable web-assembly to reduce browser-based abuse?

Tablizer writes: This Github bloglet by Steve Springett suggests disabling WASM (Web Assembly) in browsers for security purposes unless you need it often, and includes commands for switching it off in the common browsers. WASM potentially has some of the same risks that Java Applets and Flash did. What's Slashdotters view of this?

Browsers should have a way to easily disable it, including whitelisting. For example, if you need it for specific gaming site, you can whitelist just that site and not have WASM exposed for other sites.

Submission + - A New Attack Can Unmask Anonymous Users on Any Major Browser (wired.com)

An anonymous reader writes: [R]esearchers from the New Jersey Institute of Technology are warning this week about a novel technique attackers could use to de-anonymize website visitors and potentially connect the dots on many components of targets’ digital lives. The findings (PDF), which NJIT researchers will present at the Usenix Security Symposium in Boston next month, show how an attacker who tricks someone into loading a malicious website can determine whether that visitor controls a particular public identifier, like an email address or social media account, thus linking the visitor to a piece of potentially personal data.

When you visit a website, the page can capture your IP address, but this doesn’t necessarily give the site owner enough information to individually identify you. Instead, the hack analyzes subtle features of a potential target’s browser activity to determine whether they are logged into an account for an array of services, from YouTube and Dropbox to Twitter, Facebook, TikTok, and more. Plus the attacks work against every major browser, including the anonymity-focused Tor Browser. “If you’re an average internet user, you may not think too much about your privacy when you visit a random website,” says Reza Curtmola, one of the study authors and a computer science professor at NJIT. “But there are certain categories of internet users who may be more significantly impacted by this, like people who organize and participate in political protest, journalists, and people who network with fellow members of their minority group. And what makes these types of attacks dangerous is they’re very stealthy. You just visit the website and you have no idea that you’ve been exposed.”

How this de-anonymization attack works is difficult to explain but relatively easy to grasp once you have the gist. Someone carrying out the attack needs a few things to get started: a website they control, a list of accounts tied to people they want to identify as having visited that site, and content posted to the platforms of the accounts on their target list that either allows the targeted accounts to view that content or blocks them from viewing it—the attack works both ways. Next, the attacker embeds the aforementioned content on the malicious website. Then they wait to see who clicks. If anyone on the targeted list visits the site, the attackers will know who they are by analyzing which users can (or cannot) view the embedded content. [...] Complicated as it may sound, the researchers warn that it would be simple to carry out once attackers have done the prep work. It would only take a couple of seconds to potentially unmask each visitor to the malicious site—and it would be virtually impossible for an unsuspecting user to detect the hack. The researchers developed a browser extension that can thwart such attacks, and it is available for Chrome and Firefox. But they note that it may impact performance and isn’t available for all browsers.

Comment Re:Overheard (Score 4, Interesting) 23

I've lived thru this more than once now; in fact this will be round number ... lots. I worked and lived thru the AOL Time Warner merger, and the Microsoft NBC merger, the ... segments of the market determine work-cost flow. It is a simple as that, to as what drives layoffs and hiring of employees. There is a considerable shift and change even within non-traditional markets: Discord vs Telegram vs Teams vs .... just like ICQ, AIM, ... Trillian. In fact I would argue that the adoption of GovTech formerly #Web3 is what is driving market competition and it is what has reinjected some life & capital to once ailing sectors. Discord was made for gamers but found some adoption from users that left Slack, Skype, and Teams that were looking for a product that could support them during their transition to Crypto & NFT.

Comment Re:South Park (Score 0) 18

There are a lot of reasons for this kind of activity: There's a lot of market pressure from competing regions for materials, goods, and services. There's significant pressure on the DeFi space regarding FinTech with some stability in NFT's. "ENS" from the looks keeps shifting position from a cursory search; I gave up a lot of knowledge of blockchain so that Web3 "GovTech" could survive. I call it Governance Tech since it encompasses all the technologies and supporting infrastructure that make up the Web3/DeFi/FinTech space. I would like to focus more on Crypto than Geospatial Political Engineering. It also seems that a large majority of people are targeting me and possibly others in this field and that it is leading to more than decoupling from society, it is causing destabilization thru the world both in Tangible & Digital Spheres. They're leveraging Ukraine as a reason, but I believe it is just a proxy, and the part that is disheartening is that low information voters (at times just like myself-using what experience I have, the knowledge I've accumulated, and public information without further access to any information) are left misunderstanding our needs as a nation and as a global partner. We're not independent planets in the exo-sphere where each planet has a totalitarian regime that follows protocol and policy from a single concerted effort; we are a menagerie of nations all competing and sometimes warring with each other. Such as is the need for the Critical Infrastructure Bill - it is fascinating that people would shoot themselves in the foot for political grandstanding-I guess that marks the difference between political leaders & politicians.

Comment Treasure Trove of Data on Chinese Dissidents. (Score 1) 39

Seems like that would be a valuable data set to have from China considering they own petabytes of data on American and American allies' citizens. We could extrapolate the dimensionality of their security services and determine if any of those same metrics are used here at home on "American Dissidents / Patriots". I bet you we'd even find evidence of spies on there. ~Of all the ah f*ck it ...

Comment Gamer or Information Warfare? (Score 1) 85

IT, OSINT, & Gamers. Remember Gamer Gate: - How many IiA's and Ghosts in the Machine? - How many gamers also work in intelligence as 'analysts' with Secret or TS Clearance and got their hands on development work (skunkworks) they shouldn't have and it was released into the public domain? Someone said "...who needs spies?" We do. They're the professionals. Or so I heard a story like that.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...