Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Account Recovery (Score 2) 103

Google no longer supports non-security questions for account recovery.

FTFY. Security questions are a joke. The answers are almost always easy for an attacker with a little bit of information about you to find, and a lot of the time the legitimate user can't remember them. Moreover, those two traits are strongly correlated: the harder it is for an attacker to find the answers, the more likely it is that the user won't be able to find them either.

Everyone should stop using them.

Comment Re:Reason (Score 1) 103

Google doesn't actually want your phone number for security. Google wants your phone number so that they can link the account in their database to other information that contains your phone number.

The number is to make account recovery possible in the event you've forgotten your password. The assumption is that attackers won't have access to your phone. That assumption is violated if your telco will transfer your number to the attacker's phone, of course.

If you prefer not to give your phone number to Google, don't. Just turn on two-factor auth using a non phone number-based auth method, either the Authenticator app or (better yet) a security key, or both. Then download and print out some backup 2FA codes and keep them somewhere safe. Google won't have your phone number and you won't be vulnerable to mistakes by dumb telco customer service reps.

Submission + - Wired says Google's Pixel is the best phone on the market

swillden writes: The reviews on Google's Pixel phones are coming in, and they're overwhelmingly positive. Most call them the best Android phones available, and at least one says they're the best phones available, period.

Wired's reviewer says he used to recommend the iPhone to people, but now he says "You should get a Pixel." The Verge, says "these are easily the best Android phones you can buy." The Wall Street Journal calls the Pixel "the Android iPhone you've been waiting for." ComputerWorld says "It's Android at its best."

AndroidPolice is more restrained, calling it "A very good phone by Google." The NY Times broke from the rest, saying "the Pixel is, relatively speaking, mediocre", but I'm a little skeptical of a reviewer who can't figure out how to use a rear-mounted fingerprint scanner without using both hands. It makes me wonder if he's actually held one.

Comment Re: Irony (Score 1) 86

They obviously know, but are legally forbidden from commenting.


I think people often forget that corporations are about the furthest thing possible from monolithic. It's entirely possible for one organization within a corporation to receive a request that is within its own ability and authority and to handle it without bothering to tell anyone else, or with only brief consultations with legal, who may not have kept any records. Given government secrecy requests/demands, that possibility grows even more likely. Further, corporations aren't static. They're constantly reorganized and even without reorgs people move around a lot, and even leave the company. There are some records of what people and organizations do, but they're usually scattered and almost never comprehensive.

It's entirely possible that they did something like this, that the system was installed and later removed, and that the only people who know about it have left the company or aren't speaking up because they were told at the time that they could never speak about it, and that the organization that was responsible for doing it and/or undoing it no longer even exists. It's possible that Yahoo's leadership's only option for finding out whether it happened is to scan old email to see if anyone discussed it via email (which may not have happened; see "government secrecy requests/demands") or to look in system configuration changleogs to find out if the system was ever deployed (and it may have been hidden under an innocuous-sounding name)... or to ask the government if the request was ever made.

Of course, my supposition here depends on a culture of cooperation with the government. I don't know if that existed at Yahoo. I think most of the major tech corporations at this point have a strong bias towards NON-cooperation, which would cause any request like this to go immediately to legal who would immediately notify the relevant C-level execs. But I have worked for corporations where the scenario I describe is totally plausible.

Comment Re:Warrant canary (Score 1) 22

I was expecting a Warrant canary. e.g. something to say they have not yet been been given secret orders by the NSA/CIA to install a backdoor for spying on users.

Like Apple used to have. Is there some reason Google cannot do that?

I think their absence of an existing Warrant Canary speaks volumes. (That is - they've already been issued such an order or warrant.)

Google's head lawyer, David Drummond, has explicitly said that Google has done no such thing. Of course, if the government could order him to lie, then that doesn't mean anything. But if the government could order corporations to lie, then it could order them to publish a false warrant canary statement.

Comment Re: I hope Apple Pay will die (Score 1) 283

I'm sorry but that's just not true. The two systems are vastly different in implementation. Google are acting as a financial intermediary for every transaction through use of a "virtual credit card" which is what is on your phone and what the vendors see (they never see your actual cards as they are only on Google'a servers). As a result, Google have access and knowledge of every detail of every transaction you make using their system. This aligns with their panopticon business model. By effectively acting as a middleman financial institution they don't need any agreement with banks etc. Every transaction you make actually becomes two 1. Google pays vendor, 2. Google charges your bank.

Your information is out of date.

What you say was the mechanism that Google Wallet used, in its second version. The evolution of Google's NFC payment system went as follows:

1. The initial release used a secure element (essentially a smart card chip) and installed your actual credit card information in the SE, using the standardized EMV solution straight up. (EMV is EuroPay/Mastercard/Visa, a consortium that creates payment standards). Initially only Chase cards were supported because this approach requires support from the issuer.

In this version Google was not a middleman.

2. Due to banks being very slow to get on board with SE-based NFC payments, and due to lots of opposition from carriers (who wanted to become the new payments infrastructure, see ISIS/SoftPay), Google abandoned the SE-based solution and invented something called Host Card Emulation (HCE). In this model, your actual credit card information was kept off the phone entirely, stored only in Google's servers. A proxy card was used to make payments at the point of sale, using pre-computed single-use cryptographic tokens computed on the server and stored on the phone. The proxy card allowed Google Wallet to support any and all credit and debit cards -- in theory any payment mechanism that Google's back-end payment infrastructure could support.

In this version Google acted as a middleman, as you say.

3. AndroidPay deployed after ApplePay and uses a payment architecture very similar to ApplePay, called "network tokenization". The idea is that the interchange networks can produce cryptographic credentials which can be validated by the network, which then passes the validated transaction back to the card issuer. This means that the issuing banks have dramatically less work to do to support NFC payments than in the original EMV-specified model (the one used by Google Wallet). Network tokenization was under development when Google Pay deployed initially, but far from ready to go. Apple waited until it was before launching, and as soon as it was available Google shifted to it as well. They still work somewhat differently, in that Apple uses long-lived multi-use tokens stored in the secure enclave, while Google uses short-lived, single-use tokens stored in Android, and encrypted with a key kept only in RAM and re-downloaded after each reboot.

In this version Google is no longer a middleman.

I expect that a future iteration of AndroidPay will shift to using tokens stored in the Trusted Execution Environment (TEE), discarding the RAM-only key, but that will have to wait until all of the devices using AndroidPay have the TEE with the necessary software.

Submission + - Google Says Black, Hispanic Children Like CS 1.5x-1.7x More Than White Kids 2

theodp writes: Based on a sample of interviews with 1,672 students in grades 7-12, Google says its research with Gallup shows that "Black and Hispanic students are more likely than their white counterparts to be interested in learning CS". In fact, Google says it found "Black students are 1.5 times and Hispanic students are 1.7 times as likely as white students to be interested in learning CS." In response, Google has joined Microsoft, Apple, Amazon, and others to call for more K-12 CS cowbell. A just-released K–12 Computer Science Framework (pdf, 339 pgs.), which cites some of the same Google & Gallup reports President Obama drew factoids from ("Nine out of ten parents want it [CS] taught at their children’s schools") to justify his $4.2B CS For All budget request, even calls for "pair programming" lessons for the pre-Kindergartner set. "At the pre-K level," reads a chapter on Computer Science in Early Childhood Education, teachers can help facilitate pair programming among two children with the same "My turn"/"Your turn" flashcards to designate driver/navigator roles as well as encourage children to engage in collaboration and communication skills to foster peer-to-peer scaffolding. Educators can provide more support and scaffolding by engaging in child/teacher pair programming."

Comment Re:It's actually worse than you think (Score 1) 65

On the other hand, I agree that there needs to be a rule requiring officers to turn the cameras on -- but I don't think that arrests without the camera on should be invalid. Police have been making valid arrests without cameras for a long time.

Over time, that may take care of itself. When judges and juries become accustomed to always having footage of the arrest, often from multiple angles, they may begin to consciously or unconsciously discount the officer's statements if not supported by video evidence.

Also, unless they have a very specific reason to turn it off, most cops will realize they're better off having it on because the fact that they're not recording doesn't mean someone *else* isn't, and that someone else may well produce carefully selected out-of-context footage that shows the officer in a bad light. In various articles I've read from around the US, police on the street are overwhelmingly in favor of body cameras. They feel like the cameras do more to protect them than to harm them.

Comment Re:Who would have thought? (Score 1) 61

I know of several times that the US govt paid for data, but the data wasn't exactly private data, and the purchase wasn't secret. They may also have done it with private data, or have kept their purchase secret, but I don't know about those cases. And it may well depend on which arm of the federal government you are dealing with.

What, you mean like above-board purchase of GIS mapping data or such? What we're talking about is purchase of information about people that would normally require a court order to compel. There's a common belief that companies have been selling user data to government agencies as a secret profit center, but I can't find any example. We know that telcos were giving them huge amounts of data, but there doesn't seem to have been any fee for it.

Comment Re:What happens, when a gag order is violated? (Score 1) 61

Third, it's safe to assume Google tracks revisions to their pages, so yes, they would soon know who made the 'mistake'. Also, a letter like this should be shared with extremely few people within the company, so it shouldn't be hard to follow the chain until suspicious activity is found. Punishment for this sort of mishandling would be limited to a fine, however, so the FBI would go after Google's deep pockets rather than try to pin the crime on an individual. The employee should be safe from criminal charges, though not, presumably, from Google discipline.

Also, it's very likely that the set of people with access to the letter and the set of people with access to the systems to publish the letter are disjoint.

Comment Re:No, it's not time. (Score 1) 183

I've watched most users with multi-touch devices. They almost NEVER use the features. Why? Because pointing and pressing is so goddamned easy.

Get with the times. the most I see people use multi-touch is pinch/spread to zoom. Rarely do I even find a use for more than that.

You've never seen a use for two-finger scrolling on a laptop trackpad? Really? You actually prefer to move the pointer over to the scroll bar and click-and-drag it?

Comment Re:"Better" or just "Different"? (Score 1) 113

I can understand that most folks can't figure out how to use actual full-text search. But for those of us who actually do know and realize it's generally the most efficient and fastest way to find precisely tailored results

I'm not convinced that this is the case. Actual full-text search is great when you're looking for something which will match very few pages, which is true only if the precise set of terms being searched for is rare, either because some of the terms are rare, or because their particular combination is rare. If neither of those are true, then what you really need is a search engine that can understand the context of your query, and give you that. And that is precisely what Google is evolving towards.

The way we learned to search back in the mid-90s is no longer effective, and not just because search engines now suck. It's because the web is so much bigger than it was then, and has so much duplication of content. Search engines have evolved to try to deal with that, but if you continue just giving them keyword lists you don't give them the context they need to do a better job. This is why Google's recommendation -- even for highly technical queries -- is to type out a full English sentence, in the form of a question, including all of the conjunctions, articles, etc. that used to be completely ignored by search engines. That way the search engine can use the structure of the question to give it additional clues about what it is that you're looking for.

I can't think of any examples right now, but I've seen this in my own searches, that simple keyword lists -- even when I try to apply various operators, or quote things -- are far less likely to find me the obscure results that I'm looking for than if I just type out my question in pretty much exactly the way I'd pose it to a human. That's what Google recommends that you do, it's what the search engine is optimized for, and it works quite well. Better, IMO, than circa-2000 search engines managed with verbatim searches.

Comment Re:Feral or nurtured (Score 1) 76

I can see that this has application in some areas, but to be a good member of society shouldn't we want certain aspects of co-existence, values and social behaviour to come from rules, rather than each person or computer coming too its own conclusion about co-operating?

Sure we do, and we learn those rules rather than having them programmed into us. Machines can do the same. Actually, that will probably make machine-learned rules align better with human-learned rules, because our rules tend to be fuzzy around the edges while programmed rules are crisp. Some humans undergo special training to teach them how to apply absolute, non-fuzzy, rules. Machines could do the same... or we could probably use a combination of learned behavior and programming to achieve a similar result more easily.

Comment Terrible headline (Score 1) 200

It didn't take him 11 hours of trying to randomly get it to work, it took 11 hours of complex system integration effort to make something do something it didn't already do. Duh. I spent at least that much time on enabling remote control of my garage door from my Android phone. That doesn't mean it takes me hours to close or open my door from my phone; it takes seconds, at most. But making it work took hours... so that I could do it in seconds from my phone.

Hmm. Clearly I need to figure out how to integrate with Google Assistant so I can do it by voice...

Slashdot Top Deals

Unix is the worst operating system; except for all others. -- Berry Kercheval