Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Verizon's Accidental Mea Culpa

emil Level 3 - start pulling cards (390 comments)

Find locations where you will hurt Verizon customers, and cut the cables. Do so publicly. Precondition repair on upgrades of Verizon's network as you direct. If Verizon doesn't want network neutrality, then punish their customers.

about a week ago
top

Avast Buys 20 Used Phones, Recovers 40,000 Deleted Photos

emil GNU shred on the device file. (231 comments)

Although the factory reset option hands the request off to the recovery partition after a reboot, so clockworkmod or the equivalent would be responsible for making this happen.

about two weeks ago
top

Avast Buys 20 Used Phones, Recovers 40,000 Deleted Photos

emil Google is playing a very dangerous game. (231 comments)

If Google is suddenly perceived as untrustworthy, there will be great market pressure for Android without Play, or any other Google products. For Google's balance sheet, I hope they have not been foolish.

about two weeks ago
top

Avast Buys 20 Used Phones, Recovers 40,000 Deleted Photos

emil Android already does? (231 comments)

  • Settings / Security / Encrypt Phone - I've never used it, but I am assuming it encrypts everything under /data.
  • I understand that a format of /data is what happens behind the factory reset option. Using GNU shred on the device file for this filesystem might prevent any recovery.

about two weeks ago
top

Qualcomm Takes Down 100+ GitHub Repositories With DMCA Notice

emil A tale of two phones. (349 comments)

Here is my phone. Notice that it has been dumped, it has 768mb of ram, and a 1ghz CPU.

Compare that to the Samsung Fascinate, a very similar phone that is still supported despite having less ram.

What you can see is a developer bias: Qualcomm technology is (already) preferentially terminated.

For myself, I need to start buying Samsung, and I need to make sure that it has as little Qualcomm technology in it as possible.

about three weeks ago
top

Qualcomm Takes Down 100+ GitHub Repositories With DMCA Notice

emil Dump MORE Snapdragon? (349 comments)

Does Cyanogenmod need even more encouragement to dump Qualcomm processors? Odd that the Nook Color is still supported, when many faster Qualcomm chips have been shown the door.

I already have to run an unofficial release of Cyanogenmod on my vivow. Now what is the likelyhood that I'm going to get a Towelroot patch when you are nuking the source repositories?

I still won't buy Motorola products because of their past behavior. Am I about to add Qualcomm to that list?

about three weeks ago
top

Big Telecom: Terms Set For Sprint To Buy T-Mobile For $32B

emil Umm no (158 comments)

The combined T-Sprint will have to maintain both CDMA and GSM networks for some time. I hope that the tower hardware costs have dropped and dual CDMA/GSM hardware is available. I bet there will also be significant frequency waste.

Both carriers are dragging along a wagonload of MVNOs, so customers of several other companies will see migration impacts.

Verizon is dumping CDMA for their own customers, but keeping it for the MVNOs. This will become more problematic, as Android is dropping support for CDMA, so everything on the Sprint side is going to get a bad case of bitrot.

about 1 month ago
top

Apple Says Many Users 'Bought an Android Phone By Mistake'

emil Consider Swype (711 comments)

Because a Cyanogenmod user was able to monitor this application, it was discovered that Swype was requesting location data several thousand times per day.

The vendor responded with a reasonable explanation.

In any case, if you run an Apple device, you will never know if your vendor begins doing such things, either for innocuous reasons, or otherwise.

p.s. You can now buy phones loaded with Cyanogenmod as the native OS.

about 2 months ago
top

Red Dwarfs Could Sterilize Alien Worlds of Life

emil Except... (76 comments)

...that such a planet would likely be tidally locked, with one side always facing the star. There would be extreme differences of temperature between the night and day sides, and life might only be sustainable in the never-moving twilight region, depending upon atmosphere convection.

about 2 months ago
top

Apple Says Many Users 'Bought an Android Phone By Mistake'

emil Android phones are also more secure. (711 comments)

And this conclusion has been peer reviewed. With Cyanogenmod, you even get a line-item veto (privacy guard).

Malicious software has appeared in the iTunes store. Android, in contrast, displays everything that an application will need to access so that users can decide themselves whether to go ahead with an installation.

To compare these two security models, Han and co-workers identified 1,300 popular applications that work identically on both iOS and Android. These applications, such as Facebook, often access code libraries on smartphones called security-sensitive application programing interfaces (SS-APIs), which provide private user data or grant control over devices such as the camera.

The researchers found that 73% of iOS applications, especially advertising and analytical code, consistently accessed more SS-APIs than their counterparts on Android. Additionally, the SS-APIs invoked by iOS tended to be those providing access to sensitive resources such as user contacts.

The results imply that by allowing users to control permissions, Android may be better at preventing stealthy applications from getting hold of private information. Notably, Android also intentionally avoids using SS-APIs if non-security-sensitive APIs can be used to achieve the same functions.

about 2 months ago
top

WikiLeaks: NSA Recording All Telephone Calls In Afghanistan

emil Not so. (241 comments)

The whole of the nightmare in the middle east right now is the fault of the united states.

The British Mandate and the Balfour Declaration had far more influence upon the nationalities, peoples, and borders of the Middle East than did any influence of the United States.

about 2 months ago
top

What qualifications should the 'driver' of a fully autonomous car need?

emil Can you debug in single user mode? (301 comments)

If not, sorry, you can't drive this car.

"Unix is user friendly - it's just picky about it's friends."

about 2 months ago
top

OpenRISC Gains Atomic Operations and Multicore Support

emil OpenSPARC? (77 comments)

Is this free to implement?

about 2 months ago
top

Oklahoma Botched an Execution With Untested Lethal Injection Drugs

emil The solution. (1198 comments)

The state should not have the power to sentence an individual to death, but death should be available to those who would choose it.

Our government should not kill. A maximum sentence of life in prison is all the force that it should be able to employ against any individual.

If a person sentenced to life does not wish to continue the sentence, then they should have the option to request an end to it. After suitable mental evaluation, and assuming they are resolute, they should have what they seek.

This brings morality and transparency into the process. This is the right thing to do.

about 3 months ago
top

How Concrete Contributed To the Downfall of the Roman Empire

emil You're actually not going far enough. (384 comments)

I think that I remember reading in Livy that Rome was to last 1,300 years - 100 years for each eagle seen in a ceremony for Romulus. The Western empire continued for a time after the split that was sufficient to satisfy the prophesy.

about 3 months ago
top

HP Server Killer Firmware Update On the Loose

emil Proliant Nightmare (100 comments)

I deployed a DL380p Gen8 last year, and it gave me heart failure.

Under Red Hat, I needed to change the IP address, so I modified the file /etc/sysconfig/network-scripts/ifcfg-eth0 then did a "service network restart"

Alas, the box did not come up on the new IP. Got to the console which was blank and unresponsive. Power cycled, and the RAID array was GONE (and let's just say this was EXTREMELY inconvenient timing).

Support was able to walk us through some BIOS disk recovery that (thankfully) worked. But I'll never change the IP address on a Proliant without a full reboot.

about 3 months ago
top

Not Just a Cleanup Any More: LibreSSL Project Announced

emil I can't say that I understand systemd... (360 comments)

...but it seems to be a key player in Project Atomic.

This seems to be Red Hat's analog of Solaris "Zones" which let you give root to someone you don't trust in an isolated sandbox on your system. It appears to go further than zones in that you can exchange these sandbox images, with all of their installed software, with other systems. This lets you virtualize without running multiple kernels, yeilding a tremendous savings of memory. The additional assertion is that 3rd party software sales will be of these complete sandbox images, not an RPM/tarfile.

I will have a bit of studying to do for Red Hat 7. These are compelling new features, seemingly well worth the initial bugs.

p.s. just don't pass debug to grub.

about 3 months ago
top

Linus Torvalds Suspends Key Linux Developer

emil Dear Red Hat... (641 comments)

...How about you crank out one of those custom patches to add a "systemd-" prefix to all of the systemd-specific kernel parameters, then bundle it into the SRPM?

Warmest regards... an Oracle Linux user.

about 4 months ago

Submissions

top

Obama Protects Whistleblowers?

emil emil writes  |  about a year ago

emil (695) writes "It appears that Obama's webmasters have been busy removing his platform documents and campaign promises. The following text has been deleted:

Protect Whistleblowers: Often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure that federal agencies expedite the process for reviewing whistleblower claims and whistleblowers have full access to courts and due process.

He promises not to kill them anyway."

top

Oracle Linux 32-bit: Unsafe at any speed

emil emil writes  |  about a year ago

emil (695) writes "Oracle Linux presents a compelling OS: performance-focused, timely, easily dis/enabled support, free/cheaper than RedHat. Central is the UEK, a hot-rod kernel used by Oracle for benchmarking, installed as GRUB's default. But Oracle does not mention the COMPLETE LACK OF SUPPORT for the 32-bit version — so when the 32-bit UEK has left a smoking hole in your filesystem beyond all hope of fsck, support's response will be "too bad, thanks for playing!"
Bottom line: install at your own risk, and purge the 32-bit UEK for stability."
top

Operation Last Resort-Anonymous takes revenge for Swartz

emil emil writes  |  about a year and a half ago

emil writes "Late evening Friday, January 25, U.S. Sentencing Commission website (http://www.ussc.gov) was hacked and encryped government files distributed by Anonymous, which threatens to release decryption passwords should the government not comply with demands for legal reforms. Anonymous cited the recent suicide of hacktivist Aaron Swartz as a "line that has been crossed" in the retaliatory defacement. Anonymous has not specified exactly what files they have obtained. The various files were named after Supreme Court judges. At a regular interval commencing today, Anonymous will choose one media outlet and supply them with heavily redacted partial contents. Anonymous called the launch of it new campaign a "warhead."

http://www.youtube.com/watch?feature=player_embedded&v=WaPni5O2YyI#!"

Link to Original Source
top

Climategate Whitewash?

emil emil writes  |  more than 3 years ago

emil (695) writes "There appears to be some rumor or preliminary indication that the researchers behind Climategate have not been entirely vindicated, based on an interview with PSU's Eugene Wahl:

'The key point is that the Penn State investigators never interviewed a principal who was able to confirm or deny a key charge against “Hockey Stick” lead author of “Hide the Decline” infamy Michael Mann. This individual has now been interviewed, and what he told federal investigators has indicted Mann and Penn State.

The inspector general’s report specifically reveals Penn State’s wagon-circlers to have been at best comically negligent/inept in allowing Mann to not answer the damning charge they were tasked with examining: did he delete or ask others to delete records? At worst, they were complicit in the cover-up.'"

Link to Original Source
top

emil emil writes  |  more than 7 years ago

emil (695) writes "Theo de Raadt has leveled harsh criticism at Red Hat for supporting closed hardware & drivers on the One Laptop per Child (OLPC) project. Red Hat, not content with the negative publicity of their continued used of SSH without contributing one dime of support to OpenBSD, has now made a dark deal with Marvel Technology to ship an ugly, obfuscated driver. Let's hear it for Red Hat."

Journals

emil has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...