×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Launching 2015: a New Certificate Authority To Encrypt the Entire Web

robmv Re:quick question (210 comments)

Public Key pinning is a small first step in the right direction, I think the problem is the first connection with the site, hopefuly something with DNSSEC could be added to help more

about a week ago
top

Facebook Planning Office Version To Rival LinkedIn, Google

robmv Blocked on proxies (91 comments)

Yea sure, business will want to unblock Facebook on their proxies just because you have a "For Work" version. It will not happen.

about a week ago
top

New NXP SoC Gives Android Its Apple Pay

robmv Re:So Android DOESN'T have an Apple Pay equivalent (122 comments)

In my understanding of the Android docs and this blog, yes it can have one, Google Wallet use the harware secure element on supported devices. Recent Android releases added APIs too, for applications to emulate cards without access to the secure element, pure CPU based implementations, less secure but still an option.

about three weeks ago
top

IBM Pays GlobalFoundries $1.5 Billion To Shed Its Chip Division

robmv Re:Need to remove the M from IBM (84 comments)

I propose IBAR, International Business Apple Reseller

about a month ago
top

iOS Trojan Targets Hong Kong Protestors

robmv Re:Advanced? Requires a Jailbreak & manual ins (72 comments)

Until someone use one of those remote vulnerabilities that were used previously to jailbreak phones for malware (I remember one that did the jailbreak with just visiting a web page). We are talking about China here, so if this is some kind of government sponsored attack, they probably already have unreported security bugs at their disposal. It is true that iPhone security has being enhanced with every release, but at the same time code size has increased, so It must be something in ther to do more damage with enough resources

about 2 months ago
top

Google To Require As Many As 20 of Its Apps Preinstalled On Android Devices

robmv Re:Disabled (427 comments)

Because firmware updates become difficult, instead of binary differences between releases, you need a full fledged package manager and dependecy resolution to update the phone

about 2 months ago
top

iOS 8 Review

robmv Re:Extensions are interesting (216 comments)

The skype bug was not a skype bug, but one on some qualcomm camera driver that locked up using a lot of CPU, It had nothing to do with Android multitasking APIs

about 2 months ago
top

Google Hangouts Gets Google Voice Integration And Free VoIP Calls

robmv inum (162 comments)

Google, stop chaging people that uses inum, those are SIP endpoints so it is wrong to charge money for a connection that is direct between SIP user agents, if not, don't complain about the lack of Net neutrality. You are giving advantage to people on your own IP network (Hangouts users) that those outside that want to communicate with Hangouts users.

Search rates for "International Networks - Voxbone" at their calling rate list

about 2 months ago
top

Apple Announces Smartwatch, Bigger iPhones, Mobile Payments

robmv Re:One day battery life in Apple Watch too? (730 comments)

If I am out of my home for a night I should be able to use my watch the next day until I get home, without the need to carry another charger with me, 3 days Is something I want as a minimum

about 3 months ago
top

Is It Time To Split Linux Distros In Two?

robmv Re:systemd is for desktops? (282 comments)

One of them, logind Manage user sessions with all the tools used with server processes. I for one welcome this.

about 3 months ago
top

Akamai Warns: Linux Systems Infiltrated and Controlled In a DDoS Botnet

robmv Re:JAVA (230 comments)

Should a Linux kernel privilege scalation bugs be called a C vulnerability? no, those are bugs on code that use a particular language. If you say that the bug was found on the embeeed XML parser or any other library that is part of the Java Runtime, I would say yes, but this time no

about 3 months ago
top

Mozilla To Support Public Key Pinning In Firefox 32

robmv Re:Wreak havoc on corporate networks, SSL observat (90 comments)

The default is:

  1. Allow User MITM (pinning not enforced if the trust anchor is a user inserted CA, default)

So CAs inserted by the corporate networks will be allowed, only verified for CAs shipped by Mozilla

about 3 months ago
top

How Red Hat Can Recapture Developer Interest

robmv Re:Redhat is Great (232 comments)

I wish more people were sued to use a Linux distro

about 3 months ago
top

How Red Hat Can Recapture Developer Interest

robmv Re:Dump SELinux and systemd, make it easier (232 comments)

SELinux is another leyer of security people should learn. Is it difficult the first time you use it? true, but that doesn't mean it isn't useful.

Every time someone says that SELinux should be disabled, instead of learining how to use it, I remember the days when Windows changed from FAT to NTFS, and people said "disable NTFS, format FAT, filesystem permissions are difficult" :)

about 3 months ago
top

Oracle Hasn't Killed Java -- But There's Still Time

robmv Re:Troll (371 comments)

For once we beat Debian packaging then

# yum list java-1.8.0-openjdk
Loaded plugins: langpacks, refresh-packagekit, remove-with-leaves, show-leaves
Installed Packages
java-1.8.0-openjdk.x86_64 ... ...

about 4 months ago
top

"BadUSB" Exploit Makes Devices Turn "Evil"

robmv Re:Simple (205 comments)

Input this code I show you on screen with this virtual keyboard, and the OS filter everu other input event from that device that is not targeted to that keyboard, validate the input and accept or reject the device, annoying I know, but not impossible to protect

about 4 months ago
top

"BadUSB" Exploit Makes Devices Turn "Evil"

robmv Old attack (205 comments)

This kind of attack is not new, the new part are the examples of generic devices with hacked firmware to do that. This can be solved easily requesting user autorization before activating any USB device type, for example, before telling the system that there is a new USB network device, ask the user for confirmation. The trick is with input devices, where the new device could be replacing a broken one (keyboard or mouse), the confirmation can be done requesting the user to type a code displayed on screen or using the mouse to use a on screen keyboard in order to accept the input device for general usage. The other problem is with devices permanently attached, assume that any attached device at boot time is trusted, If someone replaced your USB device when you weren't present other more awful things couls have been done.

about 4 months ago
top

Normal Humans Effectively Excluded From Developing Software

robmv Re:Cry Me A River (608 comments)

The Internet was done so well that most people think of it as a natural resource like the Pacific Ocean, rather than something that was man-made. When was the last time a technology with a scale like that was so error-free? The Web, in comparison, is a joke. The Web was done by amateurs

Alan Kay

http://www.drdobbs.com/archite...

about 5 months ago

Submissions

robmv hasn't submitted any stories.

Journals

robmv has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?