Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:Illegal search applies here (Score 1) 202

Excellent post, just a couple of comments.

A previous administration attempted to force asylum seekers to wait their turn for a hearing outside the country.

Which is really, really stupid. It just makes them some other country's problem, and no other country should be willing to put up with it.

First, it's interesting that Nikkos said "a previous administration", without naming it. It was, of course, Trump 1.0.

Second, international treaties on refugees don't require a country to accept every refugee and there are multiple examples where nations have made agreements that modify which county must handle asylum claims. For example, the US-Canada Safe Third Country agreement specifies that asylum seekers must make their asylum claim in whichever country they arrive in first. If the US and Mexico had a similar agreement, then refugees could not enter from Mexico at all. Trump tried to get Mexico to sign a Safe Third Country agreement, but Mexico refused -- and it probably would have been invalid anyway, since Mexico might not satisfy the requirements of a "safe" country under the US law that authorizes the signing of Safe Third Country agreements.

Instead, Trump signed the "Migrant Protection Protocols" agreement with Mexico, which was the "remain in place" agreement. You said that no other country should be willing to put up with it, but Mexico did formally agree to it, though only to avoid tariffs. Of course, Mexico has declined to renew the protocols in Trump 2.0 (though Trump announced they had, which Mexican President Claudia Sheinbaum immediately denied -- Trump's habit of unilaterally announcing that an agreement has been reached obviously doesn't really work).

Anyway, there are lots of reasons why countries might agree to various limitations on asylum processes to manage refugee volumes, and these agreements are often perfectly valid under international and national law. Trump, of course, doesn't care about legality, or humanity, only what he can get away with.

Privacy

Manufacturer Remotely Bricks Smart Vacuum After Its Owner Blocked It From Collecting Data (tomshardware.com) 123

"An engineer got curious about how his iLife A11 smart vacuum worked and monitored the network traffic coming from the device," writes Tom's Hardware.

"That's when he noticed it was constantly sending logs and telemetry data to the manufacturer — something he hadn't consented to." The user, Harishankar, decided to block the telemetry servers' IP addresses on his network, while keeping the firmware and OTA servers open. While his smart gadget worked for a while, it just refused to turn on soon after... He sent it to the service center multiple times, wherein the technicians would turn it on and see nothing wrong with the vacuum. When they returned it to him, it would work for a few days and then fail to boot again... [H]e decided to disassemble the thing to determine what killed it and to see if he could get it working again...

[He discovered] a GD32F103 microcontroller to manage its plethora of sensors, including Lidar, gyroscopes, and encoders. He created PCB connectors and wrote Python scripts to control them with a computer, presumably to test each piece individually and identify what went wrong. From there, he built a Raspberry Pi joystick to manually drive the vacuum, proving that there was nothing wrong with the hardware. From this, he looked at its software and operating system, and that's where he discovered the dark truth: his smart vacuum was a security nightmare and a black hole for his personal data.

First of all, it's Android Debug Bridge, which gives him full root access to the vacuum, wasn't protected by any kind of password or encryption. The manufacturer added a makeshift security protocol by omitting a crucial file, which caused it to disconnect soon after booting, but Harishankar easily bypassed it. He then discovered that it used Google Cartographer to build a live 3D map of his home. This isn't unusual, by far. After all, it's a smart vacuum, and it needs that data to navigate around his home. However, the concerning thing is that it was sending off all this data to the manufacturer's server. It makes sense for the device to send this data to the manufacturer, as its onboard SoC is nowhere near powerful enough to process all that data. However, it seems that iLife did not clear this with its customers.

Furthermore, the engineer made one disturbing discovery — deep in the logs of his non-functioning smart vacuum, he found a command with a timestamp that matched exactly the time the gadget stopped working. This was clearly a kill command, and after he reversed it and rebooted the appliance, it roared back to life.

Thanks to long-time Slashdot reader registrations_suck for sharing the article.

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

Errr no, their claim is completely accurate. ADB is just not a viable way to do anything for 99.9% of people. It's a complex developer tool that the vast majority of mobile users are simply not capable of using. There's no such thing as single click install, as you even have pointed out with the hoops you have to go through. That is enough to turn many people off, before considering that not every developers wants to go through the hassle of packaging their apps in this way.

That's also before you consider ADB can't actually install an app that updates itself, congrats, you've now just pissed off a whole world of power users too who don't want to deal with it either.

I once had an interesting conversation with an Android OEM. I sat down with them to discuss what security issues they'd like to see the Android security team work on. They asked me "When are you going to fix the USB hole?". I didn't know what they meant and asked for clarification. They explained that in some parts of the world, notably India and China, there were "free" charging stations set up in bus stops, train stations and other public areas. These charging stations allow the public to charge their phones, for free! There's just one catch. On a sign above the charging station there's a set of instructions that tells users how to go about activating the charging. The sign tells them to go into the Settings app, then "About Phone", then scroll down to the build number, tap it seven times, then... it walks them through enabling ADB and accepting the key of the "charging station" computer, which would then proceed to install malware -- and to start charging.

Huge numbers of people used these charging stations every day, to the point that the biggest problem users had (besides the malware) was that they were always occupied. No one had a problem with "activating" charging for their device.

90% of people are capable of following a list of instructions. 100% of people are capable of either following a list of instructions or getting someone nearby to do it for them.

Anyway, this OEM wanted us to disable ADB entirely, or allow them to, because their users were doing it, getting loaded up with malware, and then blaming the OEM for making a crappy phone. I, of course, told them that we were not going to disable ADB and we were not going to remove the compliance requirement that forces them to support ADB.

Unfortunately, the current change still doesn't fix the "USB hole", but it does offer a way to rate-limit malware installation via downloadables.

Anyway, if you really think your users can't follow instructions, or can't get someone else to do it for them, you can always just register for a developer account. As long as you don't distribute malware, people will be able to sideload your APKs without using ADB. If the $25 is too much for you, maybe share the cost with some buddies, or get one of the limited accounts, though your APKs will only be installable on a small number of devices. Except, of course, by people who can follow instructions, or get someone else to.

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

This is about control, 100%.

Oh, actually, I missed the most obvious flaw in this argument: The verification doesn't give Google any significant control! It does give them the real-world identities of registered developers, yes, but then what? It doesn't do anything to require registered developer to use the Play store or comply with any Play policies other than one: Don't distribute malware.

The real purpose here is malware rate-limiting. Right now, malware authors can pump out huge numbers of apps with small variations to defeat identification. Google may identify one malicious app and warn all of the user that have it installed, but the malware author has thrown out a hundred variations of that app and Google only twigged to one. What ID verification does is require the developer to tie each app to a unique government-issued ID. In countries where you can't just go get a hundred government IDs, this means teams of malware authors can make approximately one malicious APK per team member. In countries where they can go get a hundred unique government IDs per person (because the government is actively cooperating or because they have a cousin in the ID office) it doesn't help so much, but Google can then start working with the governments to crack down.

I don't know if you noticed in the announcement, but this program is starting in a small number of countries, with the cooperation of and at the request of the governments who are trying to defend their populace against waves of malware. This isn't an accident.

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

How many cases of Malware in F-Droid do you know and how many in the Play Store?

How many apps in F-Droid vs how many in the Play store?

Actually, though, your comment and my off-the-cuff response both miss the real difference which is why malware authors would choose to use F-Droid to distribute their apps. They'd have to publish source, which would be a disadvantage in the competitive world of malware authoring, and publishing source code would also make it easy for their malicious code to be identified. It makes a lot more sense for them to publish via downloadable sideloads or -- even better, if they can manage it -- in the Play store.

From a security perspective, it makes sense to treat F-Droid differently from random downloadable sideloads... but how is the Android OS supposed to tell the difference? The Android mechanism for establishing APK trust is signatures. So... F-Droid could arrange with Google to get the platform to trust APKs signed by F-Droid, which would make F-Droid work fine. And, actually, there's no need for Google to go through any complicated process to set that up: F-Droid can simply register as a developer and sign the APKs it distributes. Done. Of course, if F-Droid ever screws up and does distribute malware, it could result in all of their apps being evicted from Android device, but since F-Droid is a zero-malware platform, that's not a problem, right?

Comment Re:Ok Elon (Score 4, Interesting) 110

I'm running FSD v13.2.9 and waiting for v14.x to be released, which is coming hopefully soon-ish. I'm not in major rush though for reasons you'll see below.

I just got the v14 upgrade a few days ago, and it's a mixed bag. On the plus side, it now handles parking, as in I give it a destination, it drives me there, goes into the parking lot, picks out a spot and parks in it, all with zero human input or intervention. On the negative side, I think v14 needs a little more compute horsepower than my 2025 Model S has. I used to have a 2020, with previous-gen computer, and as FSD got more capable it actually degraded a bit, becoming indecisive and occasionally "stuttering". With the new car that went away entirely. I was very impressed. With v14, in the new car, it's began to get indecisive and stutter again. Not often, but it happens. I think this is a result of the model not being able to complete its processing quickly enough, because it doesn't have enough compute.

I'm hopeful that they can refine and optimize v14, though, to fix that problem. Other than that, and the fact that on the country roads where I live it always wants to drive too slow (the roads are small, but the speed limit is 45 and everyone drives 50-55, while the car is clearly not comfortable going over 35-40), it's extremely good.

Comment Re:Consciousness (Score 1) 248

Let me clarify. I mean consciousness as experience.

Experience is just a feedback loop. Stuff happens externally, triggering computation and generation of explanations, then the events are stored in memory -- including the memory of the explanations. Then, later explanatory computation (reflection / introspection) uses those memories and creates additional memories. These layers of reflective/introspective computation constitute the experience of consciousness, but there's really nothing special about it. It's just cycles of self-referential computation.

I'm pretty confident that as our AI models begin to run more continuously as agents rather than episodically as task-focused systems, and as they gain better ability to reason about and generate explanations of their own previous "thoughts", they'll reach a point where we'll have to call them conscious or at least admit that we can't distinguish what they do from what we do.

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

This is not for security. This is about control, 100%.

If it's about control, why is Google leaving ADB installation open? That undermines their control. Unverified limited distribution accounts also undermine their control. Why isn't Google just doing what Apple does, and requiring a verified developer account before you can do anything at all?

I'm curious how you interpret these decisions within your "100% about control" theory.

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

"The point of the system is to make it hard for malware authors to distribute malware" Gonna stop you right there. Google can't even keep malware out of its own curated Play Store.

So... your argument is that if Google isn't 100% successful at keeping malware out of the Play Store, they aren't doing the job at all? You think identifying malware at scale is easy? I used to work on Android security and know a lot of people on the anti-malware team. It's incredibly difficult, especially since it's a continual cat-and-mouse game with malware developers who do all sorts of things to obfuscate what their code does. Google has hundreds of talented engineers focused on this problem, but there are tens of thousands of people producing malware; it's big business and there's a lot of money in it.

As the announcement said, Google finds that 50X as many malware installations on Android devices are from sideloading. You really don't think it makes sense for Google to try to reduce that?

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

Stop spreading FUD. This verification requirement affects ADB installs too

From Google's FAQ

Will Android Debug Bridge (ADB) install work without registration? As a developer, you are free to install apps without verification with ADB. This is designed to support developers' need to develop, test apps that are not intended or not yet ready to distribute to the wider consumer population.

Obviously, ADB can't distinguish the cases of (a) an app developer who just wrote an app using ADB to install an APK on their device for testing and (b) any random person using ADB to install an APK on their device for whatever reason they like. This means that random people can use ADB to install APKs from unverified developers.

FYI: This system would be worthless if it didn't scan ADB installed apps, because the whole point is to mandate Google's approval for app installs.

Well, if that were the point of the system, you'd be right, but it's not. The point of the system is to make it hard for malware authors to distribute malware to large numbers of users without getting quickly shut down. This system doesn't "scan apps" at all... Android just won't install downloaded APKs that don't have a Google-provided signature on them, but it will install ADB-installed APKs without a Google-provided signature because app developers need to be able to build and test apps without having to send every version off to a Google server for signing.

Slashdot Top Deals

Klein bottle for rent -- inquire within.

Working...