Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Game Dev here. (Score 2) 104

Luckily they closed off Russian keys from being used by anyone but Russians.

And that's why, as a Russian, I need keys to exist. After the ruble crash happened, Valve decided to region-lock activation of gifts from Russian accounts. And I have many friends outside the geofence.

As a result, I have to use sources outside Steam to gift games to those friends (Humble, GMG, direct sales).

Comment Re:What is Spotify? Help a brother out (Score 4, Informative) 67

You pay a monthly fee for technically not pirating music (while the artists only get fractions of a cent), as long as you're paying and the country you're in is blessed by licensing agreements.

If you don't pay, you can't cache music for offline use and it inserts ads (but still can listen to it).

Comment Re:I actually liked this feature (Score 2) 190

Well, if you don't secure the WiFi, you're broadcasting all your packets in plain text.

Don't look at WPA2 as access control only, it's also providing channel encryption.

Guest networks (isolated from the main one) are a nice idea but they should be secured anyway for the sake of the guests.

Comment Re:Always browse torrent sites with Javascript off (Score 1) 202

Mine did give me a warning yesterday. It's probable that the rule was quickly retracted.

Note that it wasn't a malware warning - it was a "DECEPTIVE SITE" warning, the ruleset against fake download buttons. Possibly targeting the "Anonymous download!" deceptive ads under magnet links.

It may be in line with Google's recently proclaimed war on fake download buttons.

Comment Re:Not A Broken Encryption. Learn To Language. (Score 4, Informative) 28

While true that it doesn't break the encryption algorithm itself - such things are rare.

But one can argue it breaks an implementation of an algorithm. Which, arguably, doesn't "exist physically" either, it's still a bunch of bytes.

However, there are software countermeasures to some side channel attacks (like constant-time calculations), so question is whether such mitigation is possible here. Looking at the article - that's exactly what's lacking with some software.

Notable quote:
> The OpenSSL's developers notified us that "hardware side-channel attacks are not in OpenSSL's threat model"

Slashdot Top Deals

In space, no one can hear you fart.

Working...