Mar. 11th, 2012

thewayne: (Cyranose)
They're applying strong crypto and logging to the voice stack, not much detail as to whether the data on the phone is encrypted which I think would be fairly trivial. They're also discussion about Germany encrypting other smart phone OS's. It'd be cool if the software were released to the public, but that'd totally screw law enforcement and CALEA.

http://www.h-online.com/security/news/item/NSA-German-government-using-Android-for-secure-phones-1466294.html
thewayne: (Default)
He's a small operation, just him and his wife, and he says the problem is that the Android version of his game, Battleheart, accounts for 5% of their revenue but 20% of his support/development time.

Apparently his problem is common more among game developers than business app/utility developers. He's having to tweak shaders and installation programs to support the various graphics chips and such which aren't as much of an issue in other types of apps. This is something that I recognized a long time ago that would be an issue, and it epitomizes the difference in support between Windows and Mac operating systems. Windows lets anyone create hardware for their OS, Mac controls it tightly. Windows has an all but infinite array of hardware combinations they have to support, Mac much more finite.

Which is a better path to take? It really depends on your needs and which end of the board table you're on.

http://www.electronista.com/articles/12/03/10/mika.mobile.says.android.money.losing.platform/

http://games.slashdot.org/story/12/03/10/2226214/battleheart-developer-drops-android-as-unsustainable
thewayne: (Default)
Wow. Dude was working as staff at a security conference next door to the RSA conference. Professionally he works as a penetration tester, and he decided to see what he could get away with.

And he got away with everything.

Not only did he get in to the conference and attend some sessions, he got in to the vendor hall before it opened.

http://www.csoonline.com/article/print/701040

http://it.slashdot.org/story/12/02/28/2147247/how-to-sneak-in-to-a-security-conference
thewayne: (Default)
Basically if the domain is registered in an extension that is under U.S. control, such as .com, it can be seized regardless of where it operates from.

http://www.wired.com/threatlevel/2012/03/feds-seize-foreign-sites/

August 2025

S M T W T F S
     12
34 56789
10111213141516
17181920212223
24252627282930
31      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Aug. 14th, 2025 03:42 pm
Powered by Dreamwidth Studios