Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



District Attorney Critiques Gizmodo Emails In iPhone 4 Prototype Case

prxp First post! (155 comments)

What about that for "juvenile"!

more than 2 years ago

CyanogenMod Ports Android To HP TouchPad

prxp Isn't the guy's name only Cyanogen? (86 comments)

Isn't CyanogenMod the name of the mod and not the auhtor's? It should be "Cyanogen has ported..."

more than 2 years ago

Google ReCAPTCHA Cracked

prxp Re:Google reCAPTCHA cracked... again (211 comments)

Really old news. The guy's paper is dated 2009. It might be possible that Google hasn't act on it yet, but it is the same thing from one year ago. Sensationalism mode detected!

more than 3 years ago

IBM Supercomputer Cooled With Hot Water

prxp In soviet Russia... (89 comments) water cools you!

more than 4 years ago

ATM Vendors Threaten, Stop Research Presentation

prxp Slides are sanitized (134 comments)

According to TFA:

Even though this is not the first time that ATM vendors prevented a security researcher to publicly disclose findings about flaws in their devices at a conference, this instance is really surprising, since Chiesa held this same presentation at a couple of security conferences already, and the slides he employed are also available online.

The thing is these slides are sanitized, the details of the ATM attack were removed.

Does anybody know where to find a non-sanitized version?

more than 4 years ago

Singapore Firm Claims Patent Breach By Virtually All Websites

prxp Re:Patented A href? (481 comments)

Dude, I hold a patent on "Mental structures to generate ideas". You're all screwed!

more than 6 years ago



Brazilian Governmet will monitor Whatsapp Messages to counter recent riots

prxp prxp writes  |  about a year ago

prxp (1023979) writes "Recent riots in Brazil have taken the Brazilian Government completely by surprise, since most of its intelligence personnel have been assingned to work on the security of Fifa's Confederations Cup, according to "O Estado de São Paulo" (Google translation), one of Brazil's major newspapers. This is particularly ironic, since protesting against the way Fifa has managed Confederations Cup in Brazil accompanied with overspending by the brazilian Government is in the heart of these riots. Because of that, ABIN (the brazilian equivalent to CIA) "has assembled a last minute operation to monitor the Internet" where intelligence officials have been tasked to monitor protesters' every move "though Facebook, Twitter, Instagram, and WhatsApp" in order to "antecipate intineraries and size of riots" among other intel. The legality of such action is unknown, since Brazilian laws prohibit this kind of wiretapping."

Open Letter to the InfoSec Community - Help Brazilian Security Researchers

prxp prxp writes  |  about 2 years ago

prxp writes "Brazil is a wonderful country that has many problems. When it comes to information security, many will recognize that Brazil has good and bad examples. We have no cybercrime law in Brazil and it is close to a consensus that we need one. It has been more than 10 years that our Congress is trying to pass laws on this regard with no success. This unsuccessful path is due mostly to a lack of proximity between politicians and the Brazilian information security community and internet freedom activists. Usually lawyers and law enforcement agents are the ones to provide the theoretical support for building these law proposals that end up facxing strong opposition from society for not seeing their true interests being held (e.g. Azeredo cybercrime law proposal, known as “AI5 Digital”). This political standoff between cybercrime law proposals and society rebellion has been broken last May/2012 when a well cherished Brazilian actress had her email account breached, leaking many intimate pictures depicting her nude body. That was the case of actress Carolina Dieckmann and because of her popularity Brazilian Congress has been pushed into action (and society into passive acceptance) to pass any cybercrime law, no matter how incorrect it was. Because of that Congress has been pushing forward without the due transparency and discussion a new cybercrime law proposal altering Brazilian Federal Penal Code in order to include the definition for the crime of breaching computer security. This proposal has already been approved by Brazilian House of Representatives under the code PL2793/2011 (, sent to and already approved by Brazilian Senate under the code PLC35/2012 (, and sent back to the House for final approval. This letter is a cry for help to the international community to help us Brazilians change this law proposal, for it has been advancing inexplicably fast, already reaching its last legislative stage in less than six months (being voted definitely next November 6th 2012) and when passed into law it will criminalize the building and dissemination of any tool, computer software or hardware, that might be used as means of breaching computer security, no matter who uses it or if it will be used at all. You read it right: simply writing PoC’s, sniffers, scanners, payloads, etc; giving talks about them, selling them or simply giving them away will be a crime in Brazil after this law is in effect. Please, read on, it is important that you do."
Link to Original Source

McAfee has its own website vulnerable to attacks

prxp prxp writes  |  more than 3 years ago

prxp writes "Today, as every ordinary Monday, I went to my e-mail box and checked messages from the security community in Full-Disclosure. As usual I came across an advisory pointing out some web security vulnerabilities that differently from usual certainly had my attention. I could say the post called my attention for its organization (not so common among web vuln disclosers), or because it included not only one but a myriad of different vulnerabilities, or maybe because these vulnerabilities included some unusual (and potentially dangerous) stuff like server side source code disclosure, or even because these vulnerabilities were not patched by the the vendor even after 15 full days it was informed about them. But no, those were not the reasons I had my eyes rolling. The thing that really got me is that all of this is not about any vendor, it is about Mcafee, a vendor well known by its anti-virus software but also by its web security service McAfee Secure. This service provides customers with the label “Verified by McAfee Secure” so they can put in their website as a mark of safety. According to McAfee: “The McAfee SECURE trustmark only appears when the website has passed our intensive, daily security scan. We test for possible personal information access, links to dangerous sites, phishing, and other online dangers.” In other words, the presence of this label means that the website is not vulnerable to the exact same vulnerabilities McAfee currently has."
Link to Original Source

iPhone SIM-Unlock done (for a fee)!

prxp prxp writes  |  about 7 years ago

prxp writes "Engadget is running a story on a company named that has been able to SIM-unlock the iPhone via software. The team is planning on selling the solution for a small (?) fee. According to the story the unlock is legitimately and works even after you fully restore your iPhone. Although Engadget is claiming "they're officially the first to break Apple's SIM locks on the iPhone", earlier this week George Hotz, a 17-year old former member of the iPhone Development Team, has also been able to SIM-unlock the iPhone, but his technique was hardware based and too complicated for the non-expert. It seems the race is over now. Who came first after all?"
Link to Original Source

First Fully Unlocked Iphone done via Hardware Hack

prxp prxp writes  |  more than 7 years ago

prxp writes "One of the iPhone Dev Team Members, GeoHot, has successfully unlocked the iPhone for use with any carrier's SIM card. According to GeoHot's web site: "The current method involves taking apart your phone and doing some complicated soldering, with a high probablity of a bricked phone. Although after the phone is unlocked all the hardware can be removed. We hope to find a software unlock very soon." GeoHot also uploaded a video in you tube showing his unlocked iPhone. Though this might seen quite unbelievable at the moment since several Scams about unlocked iPhones are flying around, GeoHot has a very good reputation on these matters which could be attested by the Dev Team's forum members."
Link to Original Source


prxp has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>