Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Google Warning Gmail Users About State-Sponsored Attacks

madbavarian Google thinks texting is secure??? (69 comments)

Google's security people aren't thinking straight. They believe there is state sponsored hacking and they then recommend their silly phone pin nonsense ("two factor authentication")? Did they think that the phone channel was secure? They don't believe someone could watch them send the PIN over a text message? If they really cared about security they'd ween people off of passwords and only use computer generated RSA/DSA keys. I believe that browsers already allow client certificates for setting up https connections. Using computer generated and invoked keys would solve the phishing and guessing attacks. The keys would have a high enough search space that guessing would be impossible. The connections would be authenticated in a way that wouldn't expose the private key itself, so phishing wouldn't work. 1) the google server key would be checked in a secure crypto manner and a MITM attack wouldn't be possible. 2) the user's key would be checked in they standard public key crypto manner also, which wouldn't expose the private key in the process of authentication. Crap, I know practically nothing about crypto and can punch holes in Googles stuff. They don't think the equivalent of some evil country's NSA could do much better?ï

more than 2 years ago

Smaller SIM Format Standardized

madbavarian Why not microsd compatible format? (83 comments)

I never understand these "standards" bodies. Why didn't they just go with a microsd card format and as a bonus one could stick a microsd card in there for more storage if one was using wifi and didn't need cell coverage.

more than 2 years ago

Japanese Researchers Transmit 3Gbps Using Terahertz Frequencies

madbavarian Naked scanner from your terahertz wifi card? (134 comments)

If terahertz wifi cards become generally available, how long before we see articles about people repurposing the hardware to do terahertz reflective imagery like the security guys already do for looking through walls to spot people in a room or look through cloths to see "weapons"?

more than 2 years ago

ESL — a CRT-Based Replacement For CFL Lights Without the Mercury

madbavarian fail: 30 lumens per watt (348 comments)

Their ads claim that it has similar efficiency to a CFL, but that is far from true for the CFL's one finds at Home Depot or similar.

The company's VU1 is 600 Lumens and uses 19.5 watts. (ref: ) This comes out to 30 Lumens per watt.

A typical under $4 CFL from home depot puts out 1500 Lumens using 23 watts for 65 Lumens per watt or more than twice as much light for the same input power. (ref: )

more than 2 years ago

Superpoke Players Sue Google

madbavarian Wear and Tear (160 comments)

Google needs to add wear and tear to the clothes so that as time goes on they look rattier and rattier. After a few months the clothes finally develop holes and fall off on their own accord. After all the clothes have disintegrated they can shut down the servers. ;-) It is sure to be cheaper than paying out 5 megabucks.

more than 2 years ago

Secure Syslog Replacement Proposed

madbavarian Re:I don't know... (248 comments)

Not being able to grep the logs would suck. It would break every hack script I have for checking things in the logs.

Furthermore, I'm not sure what problem the binary file with crypto signing would solve vs. just also logging to a secure log machine. Syslog already allows one to duplicate the logging to any number of off-machine syslog daemons.

For figuring out how a breaking was done woudln't it be better to just log all IP traffic (say with "tcpdump -w ...") on a dedicated logging machine and perhaps have a pruning mechanism that trims any TCP stream to a few megabytes. That way large file transfers wouldn't fill up the logging disk unnecessarily. Add to that some off-machine logging built into sshd or perhaps the pty driver and one can get a pretty good picture of how any breakin was done.

about 2 years ago

1 MW Cold Fusion Plant Supposedly To Come Online

madbavarian geothermal? (828 comments)

Is this plant built where one can extract some geothermal energy from the ground? 1 MegaWatt isn't all that much to scam. The only problem would be getting rid of all the sulfur and mercury that comes up with the steam without anyone noticing.

more than 2 years ago

Ziff Davis Secretly Paying Sites To Track Users

madbavarian two words (53 comments)

chromium + ghostery

about 3 years ago

Purported FBI Report Calls Anonymous a National Security Threat

madbavarian In other news (159 comments)

The groups trying to enforce security in government systems are no doubt smiling.

It is sad how the TLA's in charge of security standards are regularly ignored. Maybe these embarrassing break-ins will give them the power to force other government agencies to take security a bit more seriously.

about 3 years ago

Why We Don't Need Gigabit Networks (Yet)

madbavarian fast shared networks (359 comments)

Shared networks work best if they are unsaturated. Having a very fast network is a simple way to achieve that without having to sweat bullets over how to enforce fairness in the sharing algorithms.

about 3 years ago

Linux Foundation, Sites Down To Fix Security Breach

madbavarian ssh keys compromised? (101 comments)

"you should consider the passwords and SSH keys that you have used on these sites compromised."

How the heck can ssh keys compromised by this breakin? Doesn't the site just have access to the developer's public key? With a sufficiently large ssh key (say 1k or 2k) how is anyone going to derive the ssh private key from the public key? The fact that if is effectively impossible is supposed to be the whole point of public key encryption.

about 3 years ago

New Technique For Making JPEG Images Copy-Evident

madbavarian Re:social problem, technical solution (139 comments)

How long before browsers automatically low-pass filter these broken jpegs? If not, then the browser is going to have a hard time resizing the jpeg if this high frequency noise is so large in amplitude that it causes clipping in the jpeg calculations.

more than 3 years ago

Amazon EC2 Enables Cheap Brute-Force Attacks

madbavarian stop using non-random passwords (212 comments)

People need to stop using non-random passwords for WPA2-PSK. This attack sounds like a dictionary attack, because there is no way at only 400k passwords per second that he could map more than a minuscule fraction of the 2^256 key keyspace. We are talking 1e77 potential passwords. At 400k/sec that only amounts to 1e13 passwords per year. It will still take 1e64 years to break. Since the universe is only ~1.5e10 years old, I think we are safe enough from a true brute force attack.

Of course that assumes people do turn off WEP and WPA1 and all the WPA1 crap in WPA2 (like turning off TKIP and only allowing CCMP).

more than 3 years ago

Spoofed White House Card Dupes Many Gov't Employees, Steals Data

madbavarian Where is the NSA in all of this? (173 comments)

This incident underscores how little influence the NSA really has when it comes up against lobbyists and morally-corrupt senators trying to ingratiate themselves to the same lobbyists. It is shameful that this country has a group that is very, very good at analyzing security issues yet it isn't allowed force use of a secure operating system within the government.

more than 3 years ago

G2 Detects When Rooted and Reinstalls Stock OS

madbavarian Re:It's not open source (406 comments)

If you could actually AFFORD the phone you buy a unlocked one.. Google tried to sell you one, none of you cheap bastards bought one.

The G2 is also available for $500 from T-Mobile free and clear with no contract. It will be interesting to see what justification T-Mobile comes out with for locking down the bootloader on the G2 when it is bought outright like this.

more than 3 years ago

Obama Highlights IPv6 Issue

madbavarian Re:NAT (442 comments)

What is needed is a compelling reason for people to get out from under NAT. Most people are so used to the Microsoft way of doing things with their desktop computer being so functionless that they can only work in conjunction with a remote server to do anything of significance. They can't host their own web pages, they can't get email delivered directly to their computer, they can't make a voice call directly to another computer etc. There are tons of application that could be written if everything was on the net directly. Anyone for syncing all their computers (files, bookmarks, etc?) without having to copy them via a remotely located server? We need to start writing these applications and tell the people hiding behind NAT boxes that they are SOL till they get themselves real, routable addresses.

more than 3 years ago

HP Backs Memristor Mass Production

madbavarian Re:Haven't heard of this one (116 comments)

Hynix just feels bad about being too young and missing the Bubble Memory Revolution.

about 4 years ago

'Leap Seconds' May Be Eliminated From UTC

madbavarian Re:Do it right the first time (470 comments)

GPS's don't use UTC for the simple reason that using a discontinuous time system at the low-level is insane. The Russian GLONASS does have leap seconds, and every time a leap second get applied the system has hiccups (as expected). The GPS system simply keeps its own true seconds-since-the-GPS-epoch counter and never steps this for leap seconds. Adding the leap seconds is left for the display routines in the individual end-user GPS devices.

As I see it, it really doesn't matter what UTC does as long as computers implement the low-level (internal) timekeeping correctly. If un*x/linux were to have a true seconds-since-the-epoch counter in the kernel with no leap seconds then time difference calculations would be trivial. Each program wouldn't have to have special (and probably largely untested) logic to deal with the time discontinuity around leap second time. Leap seconds (just like daylight-savings-time/normal-time) could be added by the display routines that map seconds-since-the-epoch into a human readable time. There is no need to muck up the low-level timekeeping for these oddities. Only programs that print out the time would need to even know that a leap second occurred, and in most cases that would all be done by the library routines.

Dan Bernstein first tried to get this low-level stuff straightened out, but folks largely didn't care to fix the problem because POSIX essentially mandated one do things in the more complicated fashion.

about 4 years ago

Mobile 'Remote Wipe' Thwarts Secret Service

madbavarian Re:Remote wipe requires remote signal, yes? (383 comments)

You are assuming the powering down or removing of the SIM doesn't wipe the decryption key. If I were designing a more secure cell phone that's what I'd do. I'd keep the key on an internet server and send it to the phone after it powers up. If the phone got stolen / confiscated I'd send a wipe command that wiped the key from the phone if the power were still on, and simultaneously wiped the key from the server.

more than 4 years ago

Major 'Net Players Mulling IPv6 Whitelist

madbavarian Re:Why do they need a whitelist (158 comments)

The question then becomes, why is some isolated ipv6-capable router not sending an ipv6 "host unreachable" message to the host that is attempting the off-site ipv6 connection attempt? Wouldn't a correctly written application see this "host unreachable" and then try an ipv4 connection?

more than 4 years ago


madbavarian hasn't submitted any stories.


madbavarian has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>