Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Is Apple being compensated? (Score 5, Interesting) 239

Would you have preferred if I had written "Apple does not actually need a backdoor per se in order toto perform the actions mentioned in the article?" My point was that what law enforcement is asking does not require a backdoor, since a lot of posters seem to think it implies there must be one. Furthermore, security researchers can and do look and see how all the signing keys etc are structured on running systems even without source code access. Is there a chance there is still something hidden, sure, but there is also a chance someone snuck a root exploit into an innocuous looking commit in an important open source project. Source code access generally does lead to more trustworthy code, but it isn't so black and white as you claim. In the end we depend on people to validate what we use, and just having the source available is not in and of itself validation.

As for the rest of the your comments, you simply don't know what you are talking about, but you would if you had actually read the PDF I linked. First off, rewriting the bootloader via JTAG is not an option on a lot of SoC's and embedded devices once they have had some of their internal fuses blown. From the PDF:

"When an iOS device is turned on, its application processor immediately executes code from read-only memory known as the Boot ROM. This immutable code is laid down during chip fabrication, and is implicitly trusted. The Boot ROM code contains the Apple Root CA public key, which is used to verify that the Low-Level Bootloader (LLB) is signed by Apple before allowing it to load."

So the stuff in flash might be rewritable, but it won't be executed unless it is signed. Reading the raw flash is also completely useless, because all data written to it is AES encrypted via a DMA engine in the SoC that uses various different keys, but all of them are tied to or derived from values fused into the processor and not readable via software or JTAG (they are routed directly to the DMA block and never exposed). That means the brute force needs to be attempted on the SoC in that particular iPhone, or you need to drastically increase the search space. A suitably advanced attacker code probably also obtain the SoC keys by decapping the chip, dying it, and looking at the fuses with a scanning electron microscope, but I generally don't worry about an attacker with sorts of resources; they would probably just beat my PIN out of me...

Comment Re:Is Apple being compensated? (Score 5, Interesting) 239

Apple does not have a backdoor per se. But Apple does have the device signing key and can thus completely compromise the chain of trust. The only thing stopping you from compromising a phone with a 4 digit passcode in seconds by brute forcing it is the fact that software rate limits attempts, and the option to have it delete its intermediary keys after 10 bad attempts. If you have the ability to load an arbitrary kernel it is trivial to bypass both of these, but only Apple has that capability, at least on devices without jailbreaks that can be executed them while locked.

If you want to make sure your data is secure then use a full password and not a PIN, which will make Apple's ability to run code moot since brute forcing it will not be practical any more. You can look at https://acg6415.wikispaces.com/file/view/iOS_Security_May12.pdf/343490814/iOS_Security_May12.pdf for more info on the actual architecture.

Comment Re:article is BS (Score 1) 430

Influenza causes only a small minority of all deaths in the U.S., even among senior citizens,

36,000 die of complications from the flu annually in the US. That's very nearly as many as die from car accidents.

It is entirely accurate to say flu deaths are a minority of all deaths. According to the CDC in 2006 there were 56,326 deaths from Influenza and Pneumonia, out of a total of 2,426,264 deaths. If we assume all of those 56,326 deaths were from the flu, that is a grand total of 2.3% of all deaths from the flu. If the number is actually 36,000 (which sounds reasonable once you factor out Pneumonia) then it is only ~1.5%.

Of course that has nothing to do with the accuracy of the story, but lets not jump on the parts where we actually have reasonable data.

Comment Re:Erlang Anyone? Anyone? (Score 1) 342

Erlang is very cool, but it is not designed to replace C. In fact, it is designed to handle some bits of the higher level concurrency stuff and call out to C "drivers" for level work. Apparently Ericsson's switch code has almost as much C/C++ code as Erlang code. GCD addresses concurrency in problem spaces Erlang is completely inappropriate for, just like Erlang plays in spaces that GCD is not appropriate for. They are different tools for different jobs.

Comment Re:Wrong data in article? (Score 3, Informative) 156

No, what the actual situation is is that a block consists of some number of pages (currently on the flash used in SSDs it tends to be 128). The pages can be written individually, but only sequentially (so, write page 1, then page 2, then page 3), and the pages cannot be erased individually, you need to erase the whole block.

The consequence of this is that when the FS says "Write this data to LBA 1000" the SSD cannot overwrite the existing page it is stored without erasing its block, so instead it find somewhere else to store it, and in its internal tables it marks the old page as invalid. Later when the GC is sweeping blocks for consolidation the number of valid pages is one of the criteria it uses to figure out what to do. If a block has very few valid pages and has been completely filled then those pages will probably be copied to another block that is mostly valid and the block the data was originally in will be erased.

Comment Re:Filesystem info (Score 5, Informative) 156

There is an extensions that was recently added to ATA, the TRIM command. The TRIM command allows an OS to specify a blocks data is no longer useful and the drive should dispose of it. No productions support it, but several beta firmwares do. There are also patches for the Linux kernel that adds support to the black layer along with appropriate support to most filesystems. Windows 7 also has support for it.

There is a lot of confusion about this on the OCZ boards, with people thinking GC somehow magically obviates the needs for TRIM. As you pointed out the GC doesn't know what is data and what is not with respect to deleted files in the FS. I wrote a blog post (with pictures and everything) explaining this just a few days ago

Comment The actual text (Score 5, Informative) 650

The linked article is rather sensationalized, the summary even more so

Here's the actual text. It's from Microsoft's own SEC filings, in the "Contingencies" section of the notes, not from the EU - this is Microsoft's opinion of what the European Commission might require, not something from the Comission itsself.

While computer users and OEMs are already free to run any Web browsing software on Windows, the Commission is considering ordering Microsoft and OEMs to obligate users to choose a particular browser when setting up a new PC. Such a remedy might include a requirement that OEMs distribute multiple browsers on new Windows-based PCs. We may also be required to disable certain unspecified Internet Explorer software code if a user chooses a competing browser.

Note, in particular, no mention of specific other browsers.

Businesses

Recourse For Poor Customer Service? 593

eleventypie writes "I am in the Army and currently stationed in Afghanistan. Recently I found myself without a laptop so I decided to build a studio 17 from Dell. I designed/customized my laptop on 2008-09-17 and placed my order, which totaled approximately $1,700. The laptop was built and apparently shipped on 2008-09-28. Given my APO address, I know mail can sometimes take a little while to get here, though 7-10 days is normal. Dell said to give my laptop 6-8 business days and occasionally, it might take as much as 4-6 weeks. So on 2008-11-12 I sent another email to Dell informing them I still had not received my laptop. One person said to give it more time, while another person responded to my message telling me to send my address again and they would send me a replacement. So I sent my address immediately and never got a response. It is now the 30th of November and I still have no laptop and Dell seems to have quit responding to my emails. This is very frustrating being out $1,700 and not having a laptop to talk to my friends and family and do school work. Phone calls aren't easy so calling them is pretty much out of the question. Any advice on what I can or should do at this point to get the computer I ordered or get my money back?"
Privacy

iPhone Takes Screenshots of Everything You Do 225

The_AV8R writes "Jonathan Zdziarski showed that every time you press the Home button on your iPhone, a screen capture is taken in order to produce a visual effect. This image is then cached and later deleted. Zdziarski says that there have been cases of law enforcement looking up sex offenders' old data and checking recovered screenshots." This revelation occurred in the midst of a webcast on iPhone forensics, demonstrating how to bypass the iPhone's password security (not trivial, but doable). Video from the talk is not online yet but is promised soon over at O'Reilly.
Technology

'Innovation In a Flash' Is a Myth 163

An anonymous reader writes "A New York Times article spells out what most of us probably already knew: real innovation takes lots of time and hard work to come to fruition. The article looks at the origins of new ideas, and attempts to dispel the myth that 'Eureka' moments create change. Comments author Scott Berkun, 'To focus on the magic moments is to miss the point. The goal isn't the magic moment: it's the end result of a useful innovation. Everything results from accretion. I didn't invent the English language. I have to use a language that someone else created in order to talk to you. So the process by which something is created is always incremental. It always involves using stuff that other people have made.'"

Comment Re:The Culture (Score 1) 625

I agree that the minds are playful, emotional, moral (and often likeable) beings. I would not attribute any sort of malice to them (as a whole, at least). I kind of thought though that the point though was that what you say appears to be true (and, again I don't doubt that Banks' Culture would be a most pleasant place to live), but that, really, underneath it all, the minds love the humans in the same way as a human loves a dog. Many humans would lay down their lives for dogs, but dogs really have no control over their own existence. In a more exaggerated way, a human can do anything it wants in the Culture, but in the end, has no real 'control'. In a similar way to how a dog could not hope to change social policy, for example, decisions made by minds can change things, decisions made by humans can not. Banks skilfully portrays this without actually noting this point at-all, except in passing (the most obvious examples are things like extreme sports where there's actually no risk because a mind will save you if you do anything life-threatening, but I'm pretty sure there's more subtle stuff in there too ).

I also thought, although I'd be less forthright about defending this, that humans (and AIs like drones) were not allowed to know everything in the society, and there was the undercurrent of control - that the Culture was not really the free-wheeling anarchistic society the humans living in it perceived it to be (most had no idea of the existence of Special Cuircumstances, for example).

Maybe I need to read the books again - it's been few years.

Comment Re:Pricing is the big hurdle (Score 1) 365

I am pretty certain you can get a downloaded copy of the .AZW to store on your own system, since that is the mechanism for loading books if you are not in an area it gets cell coverage. From the documentation it appears you can also copy the books off the device. They will only work on a device registered to you, but if you want to keep the bits instead of depending on Amazon there does not appear to be any impediment to doing that.

As always, RTFM.

Spain Outlaws P2P File-Sharing 432

Section_Ei8ht writes "Spanish Congress has made it a civil offense to download anything via p2p networks, and a criminal offense for ISP's to allow users to file-share, even if the use is fair. There is also to be a tax on all forms of blank media, including flash memory drives. I guess the move towards distributing films legally via BitTorrent is a no go in Spain." Here is our coverage of the tax portion of this law.

Slashdot Top Deals

The cost of living hasn't affected its popularity.

Working...