Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment If only you could turn it off (Score 1) 14

Google puts the app on your phone wether you want it or not. You need to go to Google to find instructions on how to turn it off ( not on the phone, by default you are opted in). The disclaimer basically states don't use it for anything important as it may be wrong. And when you finally work out how to disable it, your phone begs to turn it back on. While Microsoft had lowered the bar with Recall, there is no good reason to make it so effing difficult to opt out. Makes you wonder why they age forcing people to use it.

Comment Re: looks like drinkypoo is just a troll (Score 1) 214

Hey drinkypoo - you seem to be just another troll. It's somewhat ironic - you are clearly one of the people who have contributed to the enshitiffication of social media and helped create the very problem that triggered this response. Your arguments are either irrelevant or senseless - maybe you should have spent more time in class paying attention rather than snapchatting girls with low self esteem. You should remember this : Australians care more for their children. Once they are responsible adults they can choose to step into the social media cesspool, but as long as they are minors they deserve protection and the chance to grow. Go away

Submission + - Behind the Scenes - Have I Been Pwned ?? (abc.net.au)

slincolne writes: Recently the Australian Broadcasting Corporation (ABC) posted an article on what happens behind the scenes at Have I Been Pwned (https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.abc.net.au%2Fnews%2F2023-09-23%2Fcybersecurity-troy-hunt-have-i-been-pwned-fighting-data-breaches%2F102803748) — well worth a read !

Comment Re:You don't think the SBF's being monitored? (Score 4, Interesting) 35

But SBF is a moron. He did not get rich because he was clever, but because people are greedy.

He could have had an amazing business, but his arrogance on controlling everything caused his downfall.

He gave his business opponent the means to destroy him

He has completely ruined his parents reputation, and may very well take them down with him

He's looking at spending the rest of his life in prison

There will be one or more three letter agencies helping the various Agencies to lock him up forever. If anyone makes the point that his services may have been used for money laundering or assisting terrorists then everyone will be involved - FBI, CIA, NSA, etc.

VPN"s are not magic - they don't provide protection against on-host malware or other cyber-security tools. Who owns the VPN? Lots of luck buying an encrypted satellite connection with the name 'Sam Bankman-Fried' - his name and face is too well known. Don't ascribe to genius that which can be explained by good luck.

Comment You don't think the SBF's being monitored? (Score 2) 35

Blocking SBF from Internet access would be a smart thing

Letting him have access and wire-tapping his systems could be an even smarter thing.

Given the massive amount of money involved I'd leave the door open for him to transfer funds out, record everything he does as evidence, and freeze the funds the moment they convert to cash.

Comment Nothing new here - this issue pre-dates AIS (Score 1) 92

I gave a paper on this at an international conference on Vessel Monitoring Systems back in the 90's.

The POC was demonstrated on a piece of commercial equipment (no names - given the time that has passed it would not be fair) where the device internally used a 3rd party GPS module rather than a solution integrated into the main PCB. It was trivial to unscrew the lid, tap into this connection and manipulate/substitute the legitimate NMEA data with a modified version. This resulted in my backyard clothesline becoming a commercial fishing vessel several hundred kilometres inshore.

The security of any tracking solution is only as good as the level of trust you have in the installation of the monitoring technology. If the AIS system takes its GPS input data from another system then the attack is even simpler. If you rely on the vessel owner to install and not tamper with the tracking equipment, you need a good field inspection regime to detect such activity and sufficiently strong deterrents to stop people from trying this.

In the 90's there was test equipment available which could simulate the GPS constellation and supply whatever co-ordinates you wanted via RF. These days GNU radio would probably make it even cheaper.

If Windward have or are developing an AI solution to correlate AIS data with near-realtime satellite data they could be on a winner here. It may not necessarily identify who the bad actors are, but it would definitely help identify those vessels which are reporting accurately, and would be a fantastic tool for resource management, law enforcement, and general naval traffic to manage the risks that this kind of behaviour creates. It would be a nice little earner :-)

Comment Exploit demo assumes attacker has root access (Score 1) 14

(Yes - I know this is Slashdot but) but the demo video is worth watching. A key point about this is the they assume the attacker already has root access to the server.

So I think we are beyond something as simple as segregating the management plane form the Internet, more along the line that someone else already owns your servers.

Slashdot Top Deals

The universe is an island, surrounded by whatever it is that surrounds universes.

Working...