Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Submission + - Intel Unveils 'Breakthrough' 49 Qubit Quantum Computer (extremetech.com) 1

cold fjord writes: Extremetech reports, "At CES 2018 this week, Intel’s CEO . . .declared the company’s new 49-qubit quantum computer represented a step towards “quantum supremacy.” A 49 qubit system is a major advance for Intel, which just demonstrated a 17-qubit system two months ago. Intel’s working with the Netherlands-based Qutech on this project, and expanding the number of qubits is key to creating quantum computers that can deliver real-world results. . . . “Qubits are tremendously fragile: Any noise or unintended observation of them can cause data loss. This fragility requires them to operate at about 20 millikelvin – 250 times colder than deep space.” This is also why we won’t be seeing quantum computers in anyone’s house at any point."

Submission + - ReactOS 0.4.7 Released (reactos.org)

jeditobe writes: OS News reports that the latest version of ReactOS has been released:
"ReactOS 0.4.7 has been released, and it contains a ton of fixes, improvements, and new features. Judging by the screenshots, ReactOS 0.4.7 can run Opera, Firefox, and Mozilla all at once, which is good news for those among us who want to use ReactOS on a more daily basis. There's also a new application manager which, as the name implies, makes it easier to install and uninstall applications, similar to how package managers on Linux work. On a lower level, ReactOS can now deal with Ext2, Ext3, Ext4, BtrFS, ReiserFS, FFS, and NFS partitions."
General notes, tests, and changelog for the release can be found at their respective links. A less technical community changelog for ReactOS 0.4.7 is also available. ISO images are ready at the ReactOS Download page.

Submission + - 24 Cores and The Mouse Won't Move: Engineer Diagnoses Win10 Bug

ewhac writes: Bruce Dawson recently posted a deep-dive into an annoyance that Windows 10 was inflicting on him — namely, every time he built Chrome, his extremely beefy 24-core (48-thread) rig would begin stuttering, with the mouse frequently becoming stuck for a little over one second. This would be unsurprising if all cores were pegged at 100%, but overall CPU usage was barely hitting 50%. So he started digging out the debugging tools and doing performance traces on Windows itself. He eventually discovered that the function NtGdiCloseProcess(), responsible for Windows process exit and teardown, appears to serialize through a single lock, each pass through taking about 200S each. So if you have a job that creates and destroys a lot of processes very quickly (like building a large application such as Chrome), you're going to get hit in the face with this. Moreover, the problem gets worse the more cores you have. The issue apparently doesn't exist in Windows 7. Microsoft has been informed of the issue and they are allegedly investigating.

Submission + - Aaron Swartz eBook Watermarking Has Been Cracked 2

jenningsthecat writes: From Hackaday comes news that the collected writings of Aaron Swartz, released as a watermarked eBook by publishing company Verso Books, has had its watermarking scheme cracked by The Institute for Biblio-Immunology, who also published a guide for removing the BooXtream watermarks.

The writings of Aaron Swartz, with DRM applied? Oh, the irony. Still, at least the DRM employed doesn't restrict a user from reading the book on any and all capable devices, so it's not a very intrusive form of DRM. But I somehow doubt that Mr. Swartz would take any comfort from that, and I bet the fact that companies are profiting from DRM'd copies of his writing has him spinning in his grave. I wonder if his family will have anything to say about this...

Comment Re:The elephant in the room (Score 1) 417

> You can't just install a root cert over the network. It requires machine admin approval, which is implicit if you've joined a NT domain [..]

You said "implicit" and I think that's the key word here. I'm imagining the user clicked on "join NT domain" and I imagine there were no warnings that this is a very dangerous thing to do. It's perfectly conceivable that people will do this without realising how dangerous it is.

In essence, you give up control of your laptop and say to the NT domain "do what you will". In this case, it involved installing the school's root CA, but it could equally install trojan software or other activity to compromise the security of laptop.

Joining an NT domain is, perhaps, the right thing to do under some circumstances; however, it should come with a hefty warning that you must completely trust the admins of this NT domain and that the future security of the laptop is dependent on this trust.

My impression is that no such warning was issued; this is the elephant.

Comment Re: Root CA is Only for Your School's Apps (Score 2) 417

In theory at least, Verisign would never issue a certificate for "amazon.com" to the school --- at least, they try very hard not to. Verisigns business is based on people trusting them to vet who they give certificates to. If they gave an "amazon.com" certificate to a school then they would be out of business pretty quickly. There are examples of CAs going out of business for exactly this reason: no longer being trustworthy.

The point here is that, when using the school's WIFI, your browser will receive a certificate signed by the school's CA saying it's "amazon.com". A normal off-the-street laptop would scream blue murder at this point (or should) as something fishy is going on. A "school administered" laptop would simply accept the certificate and show the web-page.

Comment Re: Root CA is Only for Your School's Apps (Score 1) 417

I think you need to review you understanding of X.509. If your client trusts a Certificate Authority then it trusts certificates issued by that CA. This allows anyone who can intercept the network traffic to conduct Man In The Middle attacks. Read up on it on Wikipedia.

This is not limited to the school website.

If what is reported is true then this isn't limited to the school's website and it is a big deal.

Comment Not a defence (Score 1) 417

No, this explanation doesn't pass muster.

If you can't allow secure web-browsing then don't allow it.

There is no excuse for breaking the security system used for online banking.

Apart from any moral issues, consider the liability if someone else gets hold of your private key and empties everyone's bank accounts.

Comment The elephant in the room (Score 1) 417

All the comments I've read so far have been on whether or not the school is morally right in deploying a Man-In-The-Middle attack. While an interesting question, for me this is missed the big point: which OS/Web-browser is so insecure that it accepts a root certificate from the network like this?

When a Web-browser or OS accepts a new Certificate Authority certificate there is an tacit acceptance of trust: you trust that whoever holds the corresponding private key will behave responsibly --- given online banking is secured via the same security infrastructure, that's some level of trust! There's no reasonable way this can happen automatically: you, personally, must indicate that you trust the CA involved. This normally this happens transitively: by installing Firefox, or using your OS you trust the people to have selected trust-worthy CAs.

While people can point to this as another nail in the SSL/TLS coffin, it doesn't help when software is so broken like this. Any Web-browser or OS that accepts a new Root CA (either automatically or without warning the user exactly how dangerous is accepting it) is so broken that you should immediately stop using it for any secure interactions.

Open Source

NVIDIA Open-Sources 3D Driver For Tegra SoCs 54

An anonymous reader writes "Linux developers are now working on open-source 3D support for NVIDIA's Tegra in cooperation with NVIDIA and months after the company published open-source 2D driver code. There are early patches for the Linux kernel along with a Gallium3D driver. The Tegra Gallium3D driver isn't too far along yet but is enough to run Wayland with Weston."
Security

Anonymous Releases 90,000 Military E-Mail Accounts 319

jjp9999 writes "Anonymous Operations posted 90,000 military email addresses and passwords to the Pirate Bay on July 11, in what they're calling 'Military Meltdown Monday.' They obtained the emails while hacking government contracting and consulting firm Booz Allen Hamilton. They hinted at other information obtained during the breach, which they describe as 'maps and keys for various other treasure chests buried on the islands of government agencies, federal contractors and shady whitehat companies.' The breach comes just days after Anonymous hacked government contractor IRC Federal. Both breaches are linked to the new AntiSec movement, which LulzSec joined forces with shortly before disbanding."

Slashdot Top Deals

They laughed at Einstein. They laughed at the Wright Brothers. But they also laughed at Bozo the Clown. -- Carl Sagan

Working...