Become a fan of Slashdot on Facebook


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Re: Hiding of recording abilities is crucial (Score 1) 134

Juist because it is not clear to you what is allowed or not does not make it unclear for the people making the decisions.
This is like so much under civil law: An arbitrary, idiosyncratic decision that does not provide any real insight into how the next decision about a similar example should be made.
And how is case law or if you aim more for criminal law different?

Why you hint VOIP Apps could or should fall under the "not allowed" category is beyond me. Especially as the rules are made for devices, not for Apps.

Are laptops with microphones allowed to use WiFi or not?
As soon as you find one that can be remotely triggered to activate the microphone and convinced to sent the voice to you, I would assume yes. (And yes I know about laptops where bugs like this exist and that some experts claim every laptop/computer with camera can be easily hacked to do that.)

The problem with the Doll is probably not that it offers the ability per se, but that it is hackable and furthermore that it was probably disguised as an A) and now was found to be a B)

I mean a Doll that clearly claims to be baby phone via the mobile App, would probably have no issues at all: provided it follows simple security standards e.g.

But why do you care? I don't ;D pffft.

Comment Re: Hiding of recording abilities is crucial (Score 1) 134

This is factually wrong. This doll doesn't work like that,
The argument in the article is: the doll works like that. It gets activated by someone else and then sends the audio that it captures to that one else.

phone can capture audio and transmit it to another phone even more easily than this doll can.
No it can't. No idea what is so difficult to grasp. My phone can not use BT to activate the microphone on your phone and convince it to sent all audio it picks up to my phone via BT. For that to happen you would need to have an malicious App on your phone and BT activate, and I need to be the one knowing about it and how to exploit it. And you can't do the same trick with my phone neither, I have no such App, and BT is deactivated ...

Why did it approve this doll for sale in the first place?
It is most likely not approved because the "voice transition" feature to unknown malicious partners was not "known" and hence the vendor/manufactor did not even ask for a license. Or, it is approved, but then again the same argument holds: it was unknown at time of approval that it easy can be convinced to transfer voice to devices that are not paired upfront ... or whatever.

and in particular that it is "NOT A COMMUNICATION DEVICE" is silly. Talking is one form of communication.
Well, with nitpicking you don't win arguments, you only make you either look silly (very silly) or make you enemies.
My elaboration was about "communication via radio waves between two devices" That is actually pretty clear.
That the Doll talks to children and "understands" simple phrases and hence is "communicating" with the child has obviously nothing to do with radio waves, telecommunication etc.

You still have not explained why the doll is considered a hidden surveillance device, but a phone in your pocket or a smart TV is not.
And why should I explain that? I explained very clearly the laws divide devices in group A) and group B). I don't care which device is in which group.

A phone is a phone is a phone. Plain and simple. It is not looked at and some one asks: uh, can that be used as a hidden spy device? The law simply defines: the phone is ok.

Facepalm. Why are you nitpicking over something stupid like this?

Car analogy
Car with a driver with a proper license and insurance: ok.
Self driving car: not ok

Uber analogy
Driver with a commercial person transport permit: ok
Driver without such a permit: not ok

Rifles analogy
Rifle with only limited automatic fire: ok
Rifle with unlimited automatic fire: not ok

Your question is simply silly.

As far as I have seen, this doll only transmits audio to an attacker if the attacker exploits a bug in the Bluetooth interface to run malicious software on the doll.
No, he is running the standard software on the Doll ...
The doll is attackable, hence its license, if it ever had any, is void as the BNetzA argued in their press notice.
The same would happen with your phone or smartTV ... a no brainer. So why do you raise them as example?

Any device with a microphone and a radio can have the same kind of behavior due to software bugs.
Of course it can. Facepalm.
And when it happens AND GETS DISCOVERED the BNetzA will place such a device from category A) into category B)

As soon as the bugs are fixed the device can be put back into the other category.

What are you arguing about? Having laws and arbitrarily ignoring them just: because ...????????? I mean you are asking the people working at the BNetzA to neglect their duty. They can be sued for that. Why not let them do their duty?

Comment Re:Base load (Score 1) 191

You are unfortunately mistaken. I understand thermodynamics very well.

So the only two rules/laws that you could remotely abuse and declare universal are:
a) entropy increases over time
b) the energy of a closed system is constant

Both laws are not suited to describe anything of relevance in a pumped storage plant. So if someone claims, as my parent: "Laws of thermodynamics dictate that efficiency of a pumped storage can never exceed X%" then he is wrong. The next best sentence than usually is: friction. And: friction is not part of the realm of thermodynamics, it belongs to mechanics. Just for your interest.
b) would not apply because the system is not closed, not even the combined energy of two pools that never get refilled by rain etc. describe a "constant energy" (or even closed) system.
a) true, but not relevant as translated into this problem it only would mean: wait till the end of the universe and all water will be in the lower basin. In other words: the so universal everywhere valid law: is pointless in this case. Hence: it is obviously not as universal as people like you claim.
Wow, that was so easy again.

I already gave you the layman's summary about TLOTD, and more no one who is not working in the topic needs ever in his life: "as soon as a form of energy is converted into heat, it is extremely difficult/impossible to convert it back into another energy form."
And: that has nothing to do with the theoretical or practical limits of thousands of topics in engineering and or physics. E.g. "photo electric effect", or electric engine, or charging a capacitor or transmitting electric power over a cable ... or for that matter: sending a probe to Jupiter.

The book seems interesting, though. Perhaps I buy it anyway.

Comment Re: Hiding of recording abilities is crucial (Score 1) 134

I did not say or meant to say that the law makes. I tried to explain what the law is.

The law divides devices that use radio waves for transmission of voice into two big groups:
A) allowed, partly with restrictions, like requiring a license e.g. for VHF radios on boats
B) not allowed

As the law right now is, the interpretation of "Die Bundesnetzargentur" is: such devices fall into category B. The mentioned agency is the agency that grants licenses for A) if the person passes the tests (in case a license is needed, as for naval short range radio certificate (SRC) ). It is somewhat equivalent to the US FCC and NCTA.

To get the parliament to change the law for such a trivial case, especially when every member will be aware about the bugs that allow the eavesdropping: is basically zero.

Comment Re: Hiding of recording abilities is crucial (Score 1) 134


you are either the stupids nitpicker I have ever heard of or simply don't want to grasp it.
This doll is no more capable of picking up my phone's microphone input than your phone is
Facepalm, no one said this. However my phone is able to pick up what you are talking if the Doll sends it to my phone ... and that was the point.

What you say about our phones is irrelevant anyway, but I give you a hint: a phone is a device that is PURPOSELY designed to allow wire less COMMUNICATION via radio waves. It has a FCC number e.g. and gets in EVERY COUNTRY where it is sold an APROVEL, or can't be sold.

That doll is SUPPOSED to be a DOLL and NOTHING MORE. The Bluetooth chip involved might require an FCC number, too. No idea. The doll is NOT A COMMUNICATION DEVICE. Correct?

However the doll can be ABUSED as a COMMUNICATION DEVICE. That is illegal on several ends first the owners don't know it, secondly it has not the required LICENCE as a COMMUNICATION DEVICE.

To make it half way legal and your point halfway correct, the Doll needs at least a license/ist own FCC number to be legaly used in "consented communications". Every BABY PHONE has such a license. Why not the Doll???

And then finally, why you don't want to grasp the fact about the secret spying, is beyond me. It is ILLEGAL to OWN devices that have the sole PURPOSE to be used for EVESDROPPING for everyone except LAW ENFORCEMENT (under order of a judge!)

This all has nothing to do with the question if the Doll had a build in mobile phone, uses Bluetooth, uses Wifi or is an UHF radio. The simple fact that it is transmitting voice is the start of the legal problem chain.

And instead of arguing wether the german agencay that pointed out that those devices are illegal is right or wrong, I would suggest to check your own laws regarding that first.

E.g. start with:
Wow, you need a license to operate a powerfull radio transmitter. In Germany you unfortunatly need basically for EVERY apparatus that does transmissions a license. Either the one producing the device. or the owner, or both.

I guess as soon as the software bugs are weeded out the doll simply counts as sophisticated baby phone, and all is fine. So what is your proble?

Sorry for the random capitalization of singel words, but this is IE under Win 10, it is autocorrecting bullshit and I can not see all mistakes (because the whole text is red)

Comment Re: Hiding of recording abilities is crucial (Score 1) 134


if you think I don't write coherent, then let me ask 2 question:

a) did you even read the summary?
b) did you read the article?

My phone can not be used as mobile radio to pick up your phones microphone input and transfer that microfone input as "wireless signals" that happen to be BT and then play them back as audio on my phone.

If I gift you such a doll, and you think "what a silly gift" and put it on your desk: I can spy on you. Such spying and using such devices for spying is illegal. It is exactly the same thing as if I hand you nice looking stone with a "bug" inside. That it uses Bluetooth in this particular context is irrelevant, every "wireless transfer method" would fal under the same argumentation. Was that now coherent enough?

Sorry, I only try to explain, and really grasp what you want to know. Obviously you have done neither a) nor b) above and just sidejumped into the discussion.

Comment Re: Hiding of recording abilities is crucial (Score 1) 134

The point it is using Bluetooth.

So it is a "wireless communication device".

I did not check the law, as there was no real case in court. It was only a "recommendation" by the agency that gives licenses to radio operators and telecommunications etc.

Look at it from this point of view: it is illegal to place a "bug" into your rooms for private persons, regardless if relatives etc. And this doll comes Close to a bug.

Comment Re:Good ol' days (Score 1) 120

Ofc, there are different calling conventions.
Usually C pushes arguments from left to right onto the stack and the caller cleans up the stack (because of variable argument lists), in Pascal arguments get pushed from right to left and the called procedure/fuction cleans up the stack.

Interfacing with C you usually do via so called 'units'. Units have an interface section and an implementation section. In the interface section you define functions/procedures and call also define if they are written in a different language (Assembly, C, Fortran), unfortunately there is no standard how to do that exactly. (Implementation section would be empty and you have to link with the relevant C library, ofc.)

Most C compilers also used to support 'extern PASCAL' or 'extern FORTRAN' keywords/declarations. But again I think there is no standard for that.

Comment Re:Two options (Score 1) 84

Answering to both poste.

Scrum 'by the book' suggests 6 week long sprints.
Most teams do 2 or 3 weeks. One week makes only in the rarest cases sense.

In a Scrum project you test inside of the sprint. But we don't have alpha and beta testing.
While a sprint result should be shipable, it is not necessarily shipped. E.g. a big online game with half yearly updates might still be developped with a few sprints and then testd and bug fixed.

Most projects I was involved in are done with Scrum. We allways had a completely tested Sprint result, each sprint. Usually the result was accepted in the sprint review, due to a manual demonstration. Often there where testers who tested after the feature was done: during the sprint.

A sprint can not be declared finished unless, a feature is DONE. How you define done is up to the team and the organization.

Some might define done without thouroughful testing ...

My teams don't.

Comment Re:== vs =, | vs ||, variable/pointer dereference (Score 1) 84

they don't plan and test their work,
All agile methods emphasize testing. All emphasize to have well educated people, which means they have a plan in thier mind and don't need to sketch plans on the board first.
So, you probably never have worked in an agile team ...

Comment Re: Hiding of recording abilities is crucial (Score 1) 134

Frankly, outlawing this seems like a boneheaded decision.
Frankly, not understanding how "the law" works is a pretty bonehead attitude.

The law is clear. What do you expect the judge to do? Say: "well, lets make an exception, because it is just a doll!"?

It does not change the fact that the doll obviously can be used by third parties to hack into and listen to conversations in the house of the doll owner.

Slashdot Top Deals

You might have mail.