9 posts • joined 12 Mar 2010
Now I know what the rest of the articles on El Reg seem like to "normal" people.
The anonymous replies seem to miss the point. Other platforms have had a spate of bugs which allow anyone to pick up a handset and bypass the lock screen, giving them somewhere between "full" and "pretty substantial" access to the device with no prior access or action required.
This flaw requires an attacker to persuade a user to install software and then, later, physically access the device and take advantage of the lock-screen bypass software they've installed. Doesn't seem in quite the same class to me?? As others have said, if you're in a position to be able to persuade the target to install software you could just persuade them to install software to access the data / feature you're interested in and forget about having to physically retrieve the handset later.
I'm not sure it counts as Raymond's airtight hatchway because it sounds like a local privilege escalation.
Re: Allow me to reciprocate
All done here, with the exception of Exchange, which is still the only software I can find with decent calendaring and push support. Looking forward to your views.
Layer 4 connections per-second-per-Watt = Layer 4 connections per Joule.
"1,046 requests per second per watt"
"1,046 requests per Joule"?
The title is required, and must contain letters and/or digits.
"Thompson is right to prostate himself in front of his customers"
Care to proof-read that??
"... Opteron was delayed for six months because of an error in a table lookaside buffer (TLB) on the chips..."
Thanks for trying to explain the TLA, but it's actually a transaction lookaside buffer.
But you don't need to read all of it.
That would be a million in any language.
- Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
- China building SUPERSONIC SUBMARINE that travels in a BUBBLE
- Review Raspberry Pi B+: PHWOAR, get a load of those pins
- That 8TB Seagate MONSTER? It's HERE... (You'll have to squint, 'cos there are no specs)
- Review Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?