Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment "It's secure because I said so." (Score 2) 24

The first rule of security is usually "don't make your own". In other words, use existing, tested, verified, trusted code, protocols, and processes. Now if your INTENT is to roll your own, you really do need a lot of peer review. Even if you have a Ph.D in cyber-security and secure coding, you really still need others to take a look at it to see if you missed something. Because EVERYBODY misses something. The attack surface is just too broad to catch every subtle thing on the first run though.

And if some 3rd party hops in and IMMEDIATELY finds a hole (without the benefit of the source to look through) it's virtually guaranteed to have a lot more holes in it just waiting to be zero-day'd.

Comment Boo. (Score 1) 52

Nothing like CarFax.
CarFax doesn't store any data on the car, it's not needed. If the complete picture requires external data sources, all the device needs is a unique identifier, which it already has.

Sounds like they want to store errors or other things that happen on device, probably to reject warranty claims. Case opened? Unauthorised operating system installed? Hardware components changed, then changed back again?

Slashdot Top Deals

"The way of the world is to praise dead saints and prosecute live ones." -- Nathaniel Howe

Working...