Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:4K waste of time (Score 1) 49

I'd love if my switch could do 4k, I've got a Sony 4k projector and a large acoustically transparent screen. Our Xbox One X looks amazing, the PS3 still looks great, but the Switch feels quite dated. Targeting 4k for the easier output means we should be able to get a true/sustained 1080p output, a massive improvement. E.g. Breath of the Wild was only pushing 900p when plugged in and would chug in certain points, I'd love to revisit it at 1080p and a sustained 30FPS (if 60FPS isn't possible).

Comment Re:I wonder... (Score 4, Informative) 391

From the source's source:

> One metric ton of remdesivir is sufficient API to manufacture 900,000 courses of treatment, without allowance for any losses during formulation.

They don't account for losses, and estimates are around 12% of inputs make it to outputs: https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.acsh.org%2Fnews%2F2020...

Comment Re:e-cigarrettes arent tobacco (Score 4, Insightful) 246

> for nicotine, there is no "good" range, and it is far more addictive.

Are you sure about that? From what I've read, there's a potentiating effect of the nicotine caused by MAOIs in tobacco. Further, I have a very hard time finding studies about the health effects of nicotine that isn't from tobacco (smoked, chewed, or otherwise ingested). The health effects of nicotine sans tobacco seem akin to those of caffeine.

Comment Also in the US the good hackers are often legit (Score 1) 263

There are plenty of companies that pay good money for red team exercises, and even have their own red teams (Microsoft has a very highly rated one for example). So if breaking in to systems and networks is what interests you, you can do it legitimately, make good money doing it, and even get sponsored training doing it. SANS has a whole track of courses for red team training.

Thing is, you don't get called a hacker in popular media when you do that since the term "hacker" is used to mean someone breaking the law with computer related things. You are an Information Assurance/Information Security professional. Your skills are the same as what they call a hacker, even your methods, the difference is you have been hired.

Now combine that with the fact that the US has more functional law enforcement than Russia and does at least make some attempt to squash cyber crime and is it any surprise we don't see as many in the US?

Comment Re: How do you intercept the e-mail? (Score 1) 79

Password resets don't send plain text passwords. They send a link that can be used to reset the password, a link with a short life generally.

That aside you think it is easy to pay off someone at Google to access e-mail? Try it. What you'd discover is that first most people are fairly moral, you may not be, but most are but second that places like Google have some pretty series security controls in place. A random employee can't just go and access someone's mail. I don't mean they aren't allowed to, I mean there are controls in place to keep them from doing so. Such a thing is monitored and requires authorization. You'd need to compromise more than one person, and that's pretty hard, certainly more than a "mild challenge". Particularly given that your target it a password reset for some random person's account.

You seem to be applying 20 year old thinking to the modern IA landscape. Yes, back in the 90s it might have been easier to compromise someone at the local ISP that had all of 10 people working at it and no security controls at all to get in to the mail server. Well part of the changing world and the "cloud" nature of modern services is that's not your target anymore. By and large mail is hosted by big providers, who have some of the best blue and red teams in the business working for them. They are hard targets.

While e-mailed password reset links are not the best way of doing security, they are plenty good enough for the value of what they are protecting. The resources required to compromise such a thing are way in excess of the value you'd gain. So people aren't going to try.

Comment Re:How do you intercept the e-mail? (Score 1) 79

Well first off forgive me if I don't believe your "I'm such a l33t haxor" stories without a bit of proof. I have encountered more than a few people in my career who have supposedly done all kinds of nifty shit, yet have trouble doing even the most basic IA related tasks.

Second, things have gotten more secure than since the Internet started. Source routing is something blocked on almost all networks, switches have replaced hubs (and switches are hardened against things like ARP poisoning now), most systems and networks have stateful firewalls sitting on them, and so on. What worked in 1995 is not very likely to work today.

However the biggest of all is as I noted in my first post: E-mail is generally encrypted between provider and person today. The biggest e-mail platforms, Gmail, Office 365, etc do encryption to the endpoint. When you check Gmail, be it via web browser or your phone, Google encrypts the session with TLS and your browser/app decrypts it. That means any data theft on the target's network or the ISP is out, it is encrypted.

So you are then left with the e-mail host, the company sending the mail, and maybe the transit providers supposing those companies don't encrypt e-mail between them (which they often do). If you really think you can hit Google, well then let's hear how that would go. Lay out the theoretical framework for how you'd get in to their systems to be able to monitor data in transit.

So no, sorry, this isn't an easy task to accomplish. You'd be far more likely to succeed in attacking the target's computer (as ever) in which case crypto doesn't matter since it is decrypted on their system. Of course neither would a reset e-mail since you could just capture the passwords directly.

Comment How do you intercept the e-mail? (Score 1) 79

I know there's this idea that anything not encrypted is super vulnerable but really, then about what you are saying: How to you mount such an attack? Suppose that someone requests an account reset from Amazon and it is going to their Gmail account. Where do you propose to intercept the message? You think you can realistically hack in to the servers or network at either company? If not there you'd have to get in to one of the tier-1 transit providers. These are some pretty hard targets. Other than that the only thing you could target is the lines themselves. Of course it is a bit difficult to physically tap fiber, in a conduit, and is a bit conspicuous.

It is far less feasible to intercept plain text traffic than many geeks make it out to be. It is not impossible, a state actor can do it, or the ISPs themselves of course. But for J. Random Hacker? Pretty close to impossible. Particularly if you are talking e-mail which these days is normally only plain text between providers, and is sent encrypted to the end user. Getting to tap that traffic would be very difficult, and I'd argue someone that did would ahve higher value targets than a password reset e-mail.

Comment Re:Oh, Jon Katz (Score 3, Informative) 171

Not that I read many blogs, but my memory of him is that he was worst than most bloggers. Heck, Slashdot itself was (is) basically a blog. The other contributors back then were far, far better.

Katz always seemed to be some guy from the outside of a subculture who tried to be seen as an expert in it by declaring strongly held opinions. Bad enough, but the opinions were usually ingratiating, patronizing, and/or wrong.

Even Michael Sims wasn't as bad!

Comment Where I live your car is listed (Score 2) 277

It probably varies state to state but in AZ, your car is listed on your insurance. While the liability insurance is for you operating a vehicle, and applies even if you drive another car, your car is still listed on your insurance paperwork. It also helps determine the rate. If you have a high performance car, you are going to pay higher liability insurance than someone with an econobox.

So if you found a car driving around, and couldn't find a record for its insurance, good chance the owner is uninsured. It is possible that they are and just neglected to add this particular car (though that could mean the policy wouldn't cover them, which would make them effectively uninsured) but more likely they don't have insurance.

Not saying I support this spy cam crap (particularly since a private company is running and as with speed cameras they'll try to game it) but it would be something where if you run a car's plate and it comes back as not in the system 99%+ of the time it is being driven by an uninsured driver.

Comment Those aren't "real" giga/tera (Score 4, Insightful) 548

Look the metric prefixes up: Giga, tera, etc are base 10. Giga means 10^9, not 2^30. They always have, they predated widespread base 2 usage. The standard SI prefixes are for base 10 as that's one of the big ideas behind the SI system is using base 10 for all units.

Now there are base-2 prefixes that have been introduced, those are Gibi, tebi and so on. If you want to talk base 2 orders of magnitude, you use those.

However using regular base-10 SI prefixes makes sense since basically everythign else in our computers uses that. When a processor says 3GHz it means 3 billion cycles per second, not 3,221,225,472. When a network is "gigabit" it means 10^9 bits per second, not 2^30. When we say DVDs are sampled at 48kHz we mean 48,000Hz not 49,152Hz. It makes sense to display our storage likewise. About the only area where the base-2 prefixes make sense is RAM, since it is actually sold along base-2 boundaries.

Comment I get annoyed as hell with shit like this (Score 1) 548

There are lots of things in the world with stupid names that are not accurate tot heir actual traits for various reasons. However when it specifies a given item then it makes sens to KEEP USING IT rather than to try and change things and screw people up.

An area you see this all the time in is ammunition. Many, many bullets have names that don't match their actual size. For example .380 auto isn't .380 caliber. The bullet is .355, the case is .373. So no matter which measurement you are using, it is wrong. However the round is called .380 auto, so we keep calling it that because people know what it is.

Comment Using a data diode, and careful controls (Score 4, Interesting) 237

If you really care about isolation, like the kind we are talking about for SIPRnet and so on then you need to use data diodes and controls.

A data diode is a hardware device that only allows transfers in one direction. That way you can make sure that when you are bringing data in to the network, no egress can happen, and such. They are very specialty, and very expensive.

However more important than that is proper controls. That means policies and procedures that are followed rigorously. You have to make sure that people are extremely careful with how data is moved from one network to another and what data is moved. You need a process that specifies things like who can decide data to be moved, who approves it, who reviews it, how this is all done and so on.

If this is really important, well don't try to do it yourself based on some posts on Slashdot, you need to hire some experts. You also need to spend lots of time in the design and planning stages, you need to careful consider and document how everything will be set up and all the controls in place.

Slashdot Top Deals

"Open the pod bay doors, HAL." -- Dave Bowman, 2001

Working...