Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment I tried eero, they sucked (Score 4, Interesting) 30

I bought eero since I was excited to fix my hard-to-cable apartment problems. They advertised on their front page "never reboot your router again!".

When I got them they failed to work well, and cabling the back-haul led to even worse performance. When you log into the support system, the first suggestion is "reboot your eero".

Great work, guys. So I returned it and got Plume and it kicks way more arse.

FWIW, eero doesn't say any more that you'll never reboot your router again, but it's still the first item in the trouble shooting guide. I'm not sure I've ever had to reboot any Plume nodes.

Comment Re:Bitcoin has been rather dull and stable... (Score 5, Interesting) 180

I read this as "dull" referring to, very little trading volume:

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fdata.bitcoinity.org%2Fma...

ie. nobody cares unless it's going up. If there was a decent trading volume when it was stable, that would be an excellent thing for bitcoin. That's not what's been going on.

Comment Re:Secure enclave. (Score 1) 179

Does it though? Other than Apple's marketing what do you know about how the T2 chip works that satisfies you of this?

Have you read the security guidelines for the T2?

https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.apple.com%2Fmac%2Fdocs...

So it is impossible to simply inform the user that the device has been tampered with?

If you read my original post in this thread, I'm specifically asking for proposals how to do that. In all my security work I don't know how to do this. You seem to know it can be done, so please, do share. Or go out there and build a better product and make mint. I'd love for someone to demonstrate how it can be done, but proof by assertion isn't.

Comment Re:Secure enclave. (Score 3) 179

I'd have no problem with something like a boot warning of unauthorized repairs, but prohibiting owners from fixing their own fucking equipment stinks.

Do you have a proposal for how to separate these two? What's to stop a malicious change from masking this boot warning? The security point of the T2 chip is well documented by Apple. The conspiracy theories are the same for the iPhone, though. Bottom line: You can't make a secure system if you allow random modifications. The tiny market share of people who are going to tweak their devices isn't worth forsaking real security for everyone else.

Comment Re:Not quite accurate... (Score 1) 256

"Someone With an iMac, iPhone, iPad AND WIRED HEADPHONES Might Soon Need Three Different Headphone Adapters"

You're almost there... they have to have wired headphones, and want to attach them with a wire. There's plenty of wire to bluetooth converters out there. That's one converter to keep the same headphones.

Slashdot Top Deals

Byte your tongue.

Working...