Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Austin Airport Tracks Cell Phones To Measure Security Line Wait

postbigbang Re:Not sure about this one (157 comments)

Think about it. They already know who you are unless you anonymously purchased a "drop" phone. With either GPS or LBS, they know where the phone's been. It was with you, likely. You fell asleep where you live, so that's your address, resolved to about 1m most places. There's a MAC address on the phone, very difficult to spoof. There are two more IDs on the phone, one as your EIMI or equiv, and other that's buried in a firmware-reachable mem location.

You drove by the sniffing cell towers on your way into the airport. If WiFi was on, it sniffed that, too. Up against a database linking users to cell, another easily done link says: whoa there, Chuck, you're on the no-way-Jose list. We're going to ask you to step into our office after we get the nekkid picture of you.

Yeah, I'm giving them too much credit, partly in humor. Such a scenario isn't outside of the realm of real possibility. Why use so much technology when you can mark ropes? Next they'll be weighing passengers with rugs made out of load cells so they can balance plane weights before you ever get to the bankrupt pizza maker on the next concourse.

13 hours ago
top

Austin Airport Tracks Cell Phones To Measure Security Line Wait

postbigbang Re:Not sure about this one (157 comments)

Um, the line goes to here, so about X. If the line goes to there, ummm, y.

They just wanna check your MAC address to ensure you're not on the NoFly list so that they can handle your incarceration discretely.

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

postbigbang Re:And this is why Linux will never win the deskto (547 comments)

More of a problem is finding 32-bit distros with updated apps that don't trigger CVE issues. Dusty Linux distros are almost as dangerous, as, dare I say it, old Windows releases.

3 days ago
top

Confidence Shaken In Open Source Security Idealism

postbigbang Re:I don't buy it (265 comments)

Try an energy link and go check CVEs using the string openssh for starters. Kernel? No. All the crap in the back? Oh, yeah.

about two weeks ago
top

Confidence Shaken In Open Source Security Idealism

postbigbang Re:I don't buy it (265 comments)

Some kids will become good and responsible coders, but not all kids. Some will be artists, musicians, mechanics, farmers, etc., and for the rest of the world that doesn't code, a heavy responsibility is placed on the FOSS community to do code reviews.

People don't compile at all. They download binaries, and they don't know the difference between an MD5, a SHA-x and a hole in the ground. Binaries therefore need special protection. Open Source doesn't mean anyone's actually looking at the code, and there needs to be peer review on critical components given with distros, but this isn't guaranteed to happen. Instead, there's an incredible bloat of stuff that we HOPE is good. An actual process might be better. What kind? Something more than Linus yelling at you.

about two weeks ago
top

Password Security: Why the Horse Battery Staple Is Not Correct

postbigbang Re:Oh great (547 comments)

I would agree with you, but we need to train them first so as to avoid the problems associated with the usual tech support issues. There are many that could easily qualify, including token devices, session-based tokens, even anonymized public keys. Many choices.

But businesses don't want the overhead, and no one seems to get punished except----> users when the info is breached or misused in any way. Nobody seems to get punished.

about two weeks ago
top

Password Security: Why the Horse Battery Staple Is Not Correct

postbigbang Re:Oh great (547 comments)

"Locks keep your friends out; your enemies have pick tools".

You can make anything up you want, but changing them frequently is the key to killing their usefulness when there are bulk thefts of passwords. These things go undetected for months. If you'd changed already, you're good-- unless the crack gets the deltas, too, which is unlikely.

Stupid passwords will still be stupid, but no use to go to incredible lengths unless your keys are extremely valuable-- then go to a Yubikey or another secondary auth. Key age is probably more critical than its ability to be dictionary attacked, IMHO.

about two weeks ago
top

Dubai Police To Use Google Glass For Facial Recognition

postbigbang Re: Enforce (122 comments)

Liberty exists rarely, anywhere.

about two weeks ago
top

Dubai Police To Use Google Glass For Facial Recognition

postbigbang Re:Enforce (122 comments)

You see, it might be Dubai, but the software will be perfected there, and it will migrate elsewhere. Slowly, it becomes acceptable in a conventional sense. Then it becomes "the norm".

A thousand cuts..... then a million.

about two weeks ago
top

Dubai Police To Use Google Glass For Facial Recognition

postbigbang Re:Enforce (122 comments)

Already here. One more intake method.

about two weeks ago
top

Dubai Police To Use Google Glass For Facial Recognition

postbigbang Re:Enforce (122 comments)

Depends on the jurisdiction and the procedures used THERE. How many stories about languishing in jails do you need to become reviled at the concept?

about two weeks ago
top

Dubai Police To Use Google Glass For Facial Recognition

postbigbang Re:Enforce (122 comments)

You forgot to mention the necessary sense of walking around: liberty. Even if you're a "positive", what of due process? Will you land in a jail, await a long process? How and who guarantees that you'll be then excluded if you're falsely positive? It's a slippery slope. Google has opened a Pandora's box of paranoia.

Will people stop traveling in fear of false-positives? Where are governments permitted to gnaw on their citizenry, privacy death by a thousand cuts?

about two weeks ago
top

Fork of Systemd Leads To Lightweight Uselessd

postbigbang Re:kill -1 (469 comments)

Oh, the persecution complex, a martyr for ostensible blindness in capitalism maybe?

Victimized recently?

about a month ago
top

Fork of Systemd Leads To Lightweight Uselessd

postbigbang Re:kill -1 (469 comments)

None of this is tough, and there is no science fiction, and the post cites oh, 10 CVEs in four years. My underwear has more than 10 CVEs in the past four years.

So maimed are these Tea Party software sweatshirt-wearing jokers that they're taking their bruised asses into BSD, and any place, anyplace but Linux.

No, they don't tell you about any of the actual features, they just cite covering their system's butts cause they can't kill -1. You can still hobby, still futz, still cobble with Linux. And you can run huge multi-core systems with very complex (o)virting, docker, ad infinitum while you learned a few new dependencies.

Those that compare all this to WIndows 9 know neither Linux or WIndows to make such an abrupt comparison. Adoption? It's not science fiction folks. It has similarities to how Solaris has evolved, and you can take a look at Solaris for some of the roots about WHY systemd. Go ahead and initd if you want. Nobody's stopping you. RH, Deb, etc, didn't pick this because it was stupid, or because they're part of a herd. All of them have strong egos, and they picked systemd because it's so NOT 1986.

about a month ago
top

Ask Slashdot: Remote Support For Disconnected, Computer-Illiterate Relatives

postbigbang Re:Dial up can still access gmail (334 comments)

For other reasons, I'd recommend against.

1) why raise a red flag (sorry for the pun)

2) gmail reads all your stuff and sells the keywords to the highest/best bidder, so your privacy is zippo

3) yes, a good POP3 provider can also reel-in mail from other accounts and become a personal email center.

4) most of the spam I get desiring replies uses gmail, so training them not to respond to gmail users might be tough; they need training in general and you need to do that first and foremost before making decisions about what method you want to use.

5) two-factor authentication is likely beyond their capacity to understand. I'd make this one really simple. Use an auto-updating Linux (like Mint), then setup a menu with few choices. Nothing Windows, and if you send a Mac, be sure it can be supported in their locale.

about a month ago
top

School Installs Biometric Fingerprint System For Cafeteria

postbigbang Re:Not about ease, about authority (231 comments)

But there's no fingerprint, not picture, nothing to feed to big data some place. There must be control. Having a child outside of the system means an aberration. We must have no aberration. All must be tracked. There might be as much as $2.20 in theft! Imagine-- not eating those nutritious lunches, packed with carbs and "brain food"!

I've been fond of "up the system". Fingerprints. Yeesh.

about a month ago
top

Under the Apple Hype Machine, Amazon Drops Fire Phone Price To 99 Cents

postbigbang Re:It's a Fire Sale (134 comments)

And worse, Amazon pimps the Fire Sale Phone with that all time, well-loved and respected AT&T-- champion of all that is holy and moral in telephony.

about a month and a half ago
top

When Customer Dissatisfaction Is a Tech Business Model

postbigbang Re:Fleeing abusive companies? (257 comments)

The incentive to find the boundaries of what kills your clientele and what just makes them gnash their teeth but return is becoming a science of profitable intolerance.

Bribed legislatures have trashed consumer protection laws or made them ignore updating them. It's almost like large organizations have voting rights. But nobody cards them at the polls if the campaign contributions are fat enough.

about 2 months ago
top

Kevlar Protects Cables From Sharks, Experts Look For Protection From Shark Week

postbigbang Does fiber containing photons have current? (103 comments)

Is this just static building up along the lining, or is there actual photonic/electrical conversion going on?

about 2 months ago
top

Ask Slashdot: Can Tech Help Monitor or Mitigate a Mine-Flooded Ecosystem?

postbigbang Re:The plans of mice and men (123 comments)

There's a sufficient amount of "shit happens" that isn't benign neglect, rather the pernicious pursuit of profits without examining consequences, and they're huge.

Jail is forensic. This poster needs solutions. Are there filtration methodologies available? Ways of mitigating the pollutants? Something learned from tech fab by products that can help solve the problem? PHBs are now after the fact. Cool heads and geek examinations are what's needed. My advice: find a recovery methodology financed by the sale of assets or Crown Lands so as to rapidly build the infrastructure necessary to stanch the flow. How? With what? Good questions.

about 2 months ago

Submissions

top

Does anyone make an photo de-duplicator for Linux? Something that reads EXIF?

postbigbang postbigbang writes  |  about 9 months ago

postbigbang (761081) writes "Imagine having thousands of images on disparate machines. many are dupes, even among the disparate machines. It's impossible to delete all the dupes manually and create a singular, accurate photo image base? Is there an app out there that can scan a file system, perhaps a target sub-folder system, and suck in the images-- WITHOUT creating duplicates? Perhaps by reading EXIF info or hashes? I have eleven file systems saved, and the task of eliminating dupes seems impossible."
top

WSJ rumors that VMware will buy Novell

postbigbang postbigbang writes  |  more than 4 years ago

postbigbang (761081) writes "Steven J Vaughn-Nichols speculates on the WSJ piece that speculates VMware may be buying Novell's Linux assets (along with other core Novell assets). Will Big Red be Big Dead? Will SUSE be used as a fighting tool against Windows platforms? Will ex-Microsoft throne pretender Paul Maritz use Novell's Directory Services to sling against Microsoft? Discuss."
Link to Original Source
top

Acer Founder: Apple's iPad and iPhone are Viruses

postbigbang postbigbang writes  |  more than 4 years ago

postbigbang (761081) writes "Stan Shih, founder of Acer, is apparently unhappy with Apple's iPad and iPhone success, and calls these products a virus. Acer, it should be noted, is the #2 maker of PCs in the world. Stan believes that Apple can be "isolated" so that companies will become "immune". Is this the ultimate sour grapes?"
Link to Original Source
top

Jury finds Novell owns Unix Copyrights; SCO Loses!

postbigbang postbigbang writes  |  more than 4 years ago

postbigbang (761081) writes "Novell won its jury decision as defendant in the SCO Slander of Title charge against its ownership of Unix copyrights, and ostensibly, intellectual property. It was a fairly short trial, and it leaves SCO nearing Chapter 7 despite an influx of funds. They have few assets, and if they appeal, it'll be against the results of a laborious discovery process, severe rulings by the trial judge largely against Novell, and will cost them still another fortune they don't have. Cheers and champagne corks for FOSS and especially Linux users-- and the famous and tenacious Pamela Jones, who documented it all."
Link to Original Source
top

US House Bill prohibits government file sharing

postbigbang postbigbang writes  |  more than 4 years ago

postbigbang (761081) writes "HR4098 attempts to prohibit file sharing software on government and contractor computers or 'telework' home computers used by these employees. Another RIAA/MPAA muscle play on government machines? Is the HR afraid of illegally shared copies of Celine Dion MP3s on government systems?"
Link to Original Source
top

postbigbang postbigbang writes  |  about 8 years ago

postbigbang (761081) writes "Ray Noorda, controversial head of numerous investments in the computer industry died at age 82, according to http://www.sltrib.com/ci_4465776 .
Noorda once pressured National Semiconductor to lower the price of Ethernet cards, then took on Bill Gates, buying the keys to Unix and then giving them away, then many software packages to fight Microsoft's Word and Office with WordPerfect, Quattro Pro, and others. When the world went to the IP protocols, Novell's IPX protocol set was arguably more prevalent than IP at the time. And then the Internet train departed, and Novell's strategies weren't ready — and Gates had (if now viewed frighteningly) a plan.

Noorda's investments in many companies, and his training academy for future execs in IT, also showed the supportive Mormon side of Noorda and the companies he spawned. Arguably, he's the father of the LAN more than any other business exec in the industry today. Many captains of industry, including Google's Eric Schmidt, owes their boot camp to Noorda."

Journals

postbigbang has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?