Forgot your password?
typodupeerror

Comment Re:How did they get initial access to the routers? (Score 2) 70

According to a Brian Krebs article, initial access to devices such as routers and TV boxes that are vulnerable on the LAN side of a NATed home internet connection is sometimes via 'free' smartphone games and apps that contain residential proxy software.

Some 'free' smartphone games and apps make money by allowing nefarious people to relay traffic through your home internet connection for things like fake social media accounts and credit card fraud but sometimes they also relay traffic to LAN ip addresses, typically 192.168.0.x, allowing hacking of devices that have default passwords, security holes in the crappy web interface, "Android Debug Bridge" enable and suchlike.

https://krebsonsecurity.com/20...

Comment hidden gotcha for people who avoid using a Microso (Score 4, Interesting) 114

There is a hidden gotcha for people who avoid using a Microsoft account to log in to a personal Windows machine.

It has become common for a new laptop to be supplied with bitlocker disk encryption enabled, without the user being aware.

If you log on using a Microsoft Account then the bitlocker key gets stored in the account. Microsoft can give the key to police or feds when they seize a laptop. If Windows stops booting for some reason, or the key gets erased from the TPM which is not uncommon, then to take the drive out of the computer and retrieve your files you need the key and you can get it from the Microsoft account.

If someone jumps through the hoops to avoid using a Microsoft account then later they can find they can't take the disk/ssd out and read it by connecting it to another computer. If the computer stops booting, they did not save the bitlocker key because they did not know the drive was encrypted and did not have an up to date backup then, oh no, they have permanently lost their files.

If Windows gets as far as reading the bitlocker key from the TPM chip (which happens before user log in), then sometimes it is possible to solder wires to the I2C bus, record the data with a hardware logic analyzer and spend a week customizing some software from github to extract the bitlocker key. If someone takes their personal windows laptop to a local computer shop or IT department then they almost certainly are not capable of that. Some models of laptop, intended for business, have a BIOS option to erase the TPM if opening of the laptop case is detected.

There is a security choice between:

1) Bitocker encryption and MS account: If my laptop gets lost or stolen then whoever has it will find it very difficult to access my files but Microsoft can prevent me logging in to my own computer, if I don't have access to the email I used for the Microsoft account or the Microsoft account password then I may loose my files later.

2) No disk encryption. Someone who steals or finds my laptop can access my files.

3) Bitlocker and windows login with an MS account. If you don't have backups and you didn't save the bitlocker key then you may be screwed later.

I hate Microsoft trying to force me to use a Microsoft account on a personal Windows laptop and I hate the boobytrap of bitlocker that you did not know was in use even more.

Comment Re:I donno... (Score 1) 186

Can a non-biological entity feel desire? Can it want to grow and become something more than what it is? I think that's a philosophical question and not a technological one.

LK

Don't agree at all and I think that's a morally dangerous approach. We're looking for a scientific definition of "desire" and "want". That's almost certainly a part of "conscious" and "self aware". Philosophy can help, but in the end, to know whether you are right or not you need the experimental results.

Experiments can be crafted in such a way as to exclude certain human beings from consciousness.

One day, it's extremely likely that a machine will say to us "I am alive. I am awake. I want..." and whether or not it's true is going to be increasingly hard to determine.

LK

Comment Re:I donno... (Score 2) 186

An LLM can't suddenly decide to do something else which isn't programmed into it.

Can we?

It's only a matter of time until an AI can learn to do something it wasn't programmed by us to do.

Can a non-biological entity feel desire? Can it want to grow and become something more than what it is? I think that's a philosophical question and not a technological one.

LK

Comment Re:IP68 (Score 2) 9

It doesn't, actually. The official description from the IEC says:

Ingress of water in quantities causing harmful effects shall not be possible when the enclosure is continuously immersed in water under conditions which shall be agreed between manufacturer and user but which are more sever than for numeral 7.

Emphasis mine. The standard test for IPX7 is submersion in still water to a depth of 1 meter for 30 minutes. IPX8 is "better than that". Apple, Google, Samsung, etc. all define how much better on their own. CNBC has an excellent video explainer on what exactly all this means.

These companies are designing to protect against people dropping their phone in the toilet, or maybe a kiddie pool. And yeah, as called out in the CNBC video, the advertising is very deceptive and unfair.

Comment Re:ICCU problems (Score 1) 103

I'm aware of how they handle the recall. My 2 year anniversary with my Ioniq 6 was last Friday. (No more free EA DCFC for me.)

My point was the total number of cars that were repaired after an ICCU failure is very small. Lots of manufacturers have recalls, including for parts that can cause a vehicle to stop running. Ford is the worst. Every vehicle lineup has their issues, so just putting it in perspective.

2 years for me, no ICCU issues. No charging issues. They did replace my interior door panels under warranty for peeling clear coat.

Slashdot Top Deals

"The trouble with doing something right the first time is that nobody appreciates how difficult it was." -- Walt West

Working...