Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re: Wait....... (Score 2) 82

Erm, you can refuse to give Signal access to your contacts and it will still work. I just tried it.

You will see phone numbers instead of names, and starting a new conversation is a bit tricky, just like when you don't give WhatsApp your contacts. But it works.

Facebook Messenger doesn't need your phone contacts because it operates on the basis of Facebook contacts and Facebook already has all your Facebook contacts.

Comment Re:Why is this a surprise? (Score 1) 91

Facebook may be evil, but I don't understand why we blame Facebook for this "exploit".

The user grants Website X permission to use their Facebook data. Website X obtains that data. Website X subsequently runs a malicious script on their own website which harvests that data.

Wouldn't this be, like, the fault of Website X?

Comment Re: Summary not very helpful, here's my attempt. (Score 1) 120

EXACTLY. The summary is horrible. It made it sound like Google invented a novel technique that makes the KPTI/Variant 3 (Meltdown) mitigation slowdown "negligible". But actually the blog post simply says:

  • They invented a technique called Retpoline that mitigates Variant 2, with negligible performance impact; and
  • When testing KPTI/Variant 3 (Meltdown) mitigation on their own workflows, they found the performance impact negligible.

Comment Re:Edge pitches so funny it hurts (Score 1) 152

FTP pretty much died as mainstream when NAT routers became ubiquitous. Switching from active (PORT) to passive (PASV) ftp on the client side only worked until the FTP servers themselves were also behind a NAT.

If both sides are behind a NAT, HTTP wouldn't work either (without the serious reconfiguration they you mentioned), no?

Comment Re:Terrible headline (Score 1) 162

You can't really compare this to desktop OSes like Windows or Mac OS.
The security model there is different. All "apps" you run on them are implicitly trusted; there is no security barrier between apps.

You don't need to fake a Gmail login prompt on Windows because you can simply read the memory of the browser or Gmail app and it will gladly give the memory contents including the password to you (if it still has it).

In iOS, each app is supposed to be isolated from each other and from the OS so this is a big(ger) deal.

Comment Re:Not noticing?? That's bad (Score 4, Insightful) 196

When the break-in first came to light, lots of people criticized Equifax, but a vocal minority said something along the lines of "No system is absolutely secure. We don't know if the hackers used a zero-day vulnerability against Equifax. They could have followed all the security best practices and still be hacked."

My response was "If the past is any guide, every time a major company was hacked, it was eventually traced to vulnerabilities in outdated software that should have been patched months ago. I am going to assume this is the same."

Turns out I was right. Companies never learn.

Comment Re:An error (Score 4, Informative) 142

I believe it was an error. Although HTC does deserve part of the blame.
You see, the "stock keyboard" was actually a third-party app, which is ad-supported by default.
The HTC version is supposed to be a special ad-free version, but somehow during the latest update the app developers pushed the ad-supported version to HTC devices as well.

If anything, this demonstrates the dangers of bundling apps that you don't directly control.
And who's to say the ad-free version doesn't still track the user or collect personal information? If it wants it could collect all your passwords too!
It was really poor judgement on HTC's part to use such an app for a sensitive component like the stock keyboard.

Slashdot Top Deals

Your code should be more efficient!

Working...