Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re: Wait....... (Score 2) 82

Erm, you can refuse to give Signal access to your contacts and it will still work. I just tried it.

You will see phone numbers instead of names, and starting a new conversation is a bit tricky, just like when you don't give WhatsApp your contacts. But it works.

Facebook Messenger doesn't need your phone contacts because it operates on the basis of Facebook contacts and Facebook already has all your Facebook contacts.

Comment Re:Why is this a surprise? (Score 1) 91

Facebook may be evil, but I don't understand why we blame Facebook for this "exploit".

The user grants Website X permission to use their Facebook data. Website X obtains that data. Website X subsequently runs a malicious script on their own website which harvests that data.

Wouldn't this be, like, the fault of Website X?

Network

1.1.1.1: Cloudflare's New DNS Attracting 'Gigabits Per Second' of Rubbish (zdnet.com) 136

An anonymous reader quotes a report from ZDNet: Cloudflare's new speed and privacy enhancing domain name system (DNS) servers, launched on Sunday, are also part of an experiment being conducted in partnership with the Asia Pacific Network Information Center (APNIC). The experiment aims to understand how DNS can be improved in terms of performance, security, and privacy. "We are now critically reliant on the integrity of the DNS, yet the details of the way it operates still remains largely opaque," wrote APNIC's chief scientist Geoff Huston in a blog post. "We are aware that the DNS has been used to generate malicious denial of service attacks, and we are keen to understand if there are simple and widely deployable measures that can be taken to mitigate such attacks. The DNS relies on caching to operate efficiently and quickly, but we are still unsure as to how well caching actually performs. We are also unclear how much of the DNS is related to end user or application requirements for name resolution, and how much is related to the DNS chattering to itself."

The Cloudflare-APNIC experiment uses two IPv4 address ranges, 1.1.1/24 and 1.0.0/24, which have been reserved for research use. Cloudflare's new DNS uses two addresses within those ranges, 1.1.1.1 and 1.0.0.1. These address ranges were originally configured as "dark traffic addresses", and some years ago APNIC partnered with Google to analyze the unsolicited traffic directed at them. There was a lot of it. "Our initial work with it certainly showed it to be an unusually strong attractor for bad traffic. At the time we stopped doing it with Google, it was over 50 gigabits per second. Quite frankly, few folk can handle that much noise," Huston told ZDNet on Wednesday. By putting Cloudflare's DNS on these research addresses, APNIC gets to see the noise as well as the DNS traffic -- or at least "a certain factored amount" of it -- for research purposes.

Comment Re: Summary not very helpful, here's my attempt. (Score 1) 120

EXACTLY. The summary is horrible. It made it sound like Google invented a novel technique that makes the KPTI/Variant 3 (Meltdown) mitigation slowdown "negligible". But actually the blog post simply says:

  • They invented a technique called Retpoline that mitigates Variant 2, with negligible performance impact; and
  • When testing KPTI/Variant 3 (Meltdown) mitigation on their own workflows, they found the performance impact negligible.

Comment Re:Edge pitches so funny it hurts (Score 1) 152

FTP pretty much died as mainstream when NAT routers became ubiquitous. Switching from active (PORT) to passive (PASV) ftp on the client side only worked until the FTP servers themselves were also behind a NAT.

If both sides are behind a NAT, HTTP wouldn't work either (without the serious reconfiguration they you mentioned), no?

Comment Re:Terrible headline (Score 1) 162

You can't really compare this to desktop OSes like Windows or Mac OS.
The security model there is different. All "apps" you run on them are implicitly trusted; there is no security barrier between apps.

You don't need to fake a Gmail login prompt on Windows because you can simply read the memory of the browser or Gmail app and it will gladly give the memory contents including the password to you (if it still has it).

In iOS, each app is supposed to be isolated from each other and from the OS so this is a big(ger) deal.

Comment Re:Not noticing?? That's bad (Score 4, Insightful) 196

When the break-in first came to light, lots of people criticized Equifax, but a vocal minority said something along the lines of "No system is absolutely secure. We don't know if the hackers used a zero-day vulnerability against Equifax. They could have followed all the security best practices and still be hacked."

My response was "If the past is any guide, every time a major company was hacked, it was eventually traced to vulnerabilities in outdated software that should have been patched months ago. I am going to assume this is the same."

Turns out I was right. Companies never learn.

Comment Re:An error (Score 4, Informative) 142

I believe it was an error. Although HTC does deserve part of the blame.
You see, the "stock keyboard" was actually a third-party app, which is ad-supported by default.
The HTC version is supposed to be a special ad-free version, but somehow during the latest update the app developers pushed the ad-supported version to HTC devices as well.

If anything, this demonstrates the dangers of bundling apps that you don't directly control.
And who's to say the ad-free version doesn't still track the user or collect personal information? If it wants it could collect all your passwords too!
It was really poor judgement on HTC's part to use such an app for a sensitive component like the stock keyboard.

Slashdot Top Deals

FORTRAN rots the brain. -- John McQuillin

Working...