FTDI Reportedly Bricking Devices Using Competitors’ Chips.

janoc writes It seems that chipmaker FTDI has started an outright war on cloners of their popular USB bridge chips. At first the clones stopped working with the official drivers, and now they are being intentionally bricked, rendering the device useless. The problem? These chips are incredibly popular and used in many consumer products. Are you sure yours doesn’t contain a counterfeit one before you plug it in? Hackaday says, “It’s very hard to tell the difference between the real and fake versions by looking at the package, but a look at the silicon reveals vast differences. The new driver for the FT232 exploits these differences, reprogramming it so it won’t work with existing drivers. It’s a bold strategy to cut down on silicon counterfeiters on the part of FTDI. A reasonable company would go after the manufacturers of fake chips, not the consumers who are most likely unaware they have a fake chip.” Read more of this story at Slashdot.

Continue reading here:
FTDI Reportedly Bricking Devices Using Competitors’ Chips.

How to make your own bootable OS X 10.10 Yosemite USB install drive

Even in the download-only era, it’s easy to make yourself offline OS X install media. Andrew Cunningham It was 2009 when Apple last released a new operating system on physical media . Things have proceeded remarkably smoothly since version 10.7 switched to download-only installers, but there are still good reasons to want an old, reliable USB stick. For instance, if you find yourself doing multiple installs, a USB drive may be faster than multiple downloads (especially if you use a USB 3.0 drive). Or maybe you need a recovery disk for older Macs that don’t support the Internet Recovery feature. Whatever the reason, you’re in luck, because it’s not hard to make one. As with last year , there are two ways to get it done. There’s the super easy way with the graphical user interface and the only slightly less easy way that requires some light Terminal use. Here’s what you need to get started. A Mac, duh. We’ve created Yosemite USB from both Mavericks and Yosemite, but your experience with other versions may vary. An 8GB or larger USB flash drive or an 8GB or larger partition on some other kind of external drive. For newer Macs, use a USB 3.0 drive—it makes things significantly faster. The OS X 10.10 Yosemite installer from the Mac App Store in your Applications folder. The installer will delete itself when you install the operating system, but it can be re-downloaded if necessary. If you want a GUI, you need the latest version of  Diskmaker X  app—we wrote this article based on version 4 beta 2, but if a “final” version is released alongside Yosemite we’ll update the article. This app is free to download, but  the creator accepts donations  if you want to support his efforts. An administrator account on the Mac you’re using to create the disk. The easy way Diskmaker X remains the easiest, most user-friendly way to get this done. Andrew Cunningham Once you’ve obtained all of the necessary materials, connect the USB drive to your Mac and run the Diskmaker X app. The app will offer to make installers for OS X 10.8, 10.9, and 10.10, but we’re only interested in Yosemite today. Read 6 remaining paragraphs | Comments

More:
How to make your own bootable OS X 10.10 Yosemite USB install drive

Details of iOS and Android Device Encryption

swillden writes: There’s been a lot of discussion of what, exactly, is meant by the Apple announcement about iOS8 device encryption, and the subsequent announcement by Google that Android L will enable encryption by default. Two security researchers tackled these questions in blog posts: Matthew Green tackled iOS encryption, concluding that the change really boils down to applying the existing iOS encryption methods to more data. He also reviews the iOS approach, which uses Apple’s “Secure Enclave” chip as the basis for the encryption and guesses at how it is that Apple can say it’s unable to decrypt the devices. He concludes, with some clarification from a commenter, that Apple really can’t (unless you use a weak password which can be brute-forced, and even then it’s hard). Nikolay Elenkov looks into the preview release of Android “L.” He finds that not only has Google turned encryption on by default, but appears to have incorporated hardware-based security as well, to make it impossible (or at least much more difficult) to perform brute force password searches off-device. Read more of this story at Slashdot.

View the original here:
Details of iOS and Android Device Encryption

L.A. TV Stations Free Up Some Spectrum For Wireless Broadband

alphadogg (971356) writes An effort to free up some of the airwaves used by TV broadcasts and make them available for wireless broadband took a big step forward this week in the U.S. Two TV stations in Los Angeles, KLCS and KCET, have agreed to share a single frequency to deliver their programming freeing up a channel that can be auctioned off to wireless carriers next year. The change, which the Federal Communications Commission calls “repackaging, ” is possible because digital TV broadcasts don’t need the full 6MHz of broadcast spectrum that was used for analog TV. Read more of this story at Slashdot.

Read More:
L.A. TV Stations Free Up Some Spectrum For Wireless Broadband

Kingston and PNY Caught Bait-and-Switching Cheaper Components After Good Reviews

An anonymous reader writes Over the past few months, we’ve seen a disturbing trend from first Kingston, and now PNY. Manufacturers are launching SSDs with one hardware specification, and then quietly changing the hardware configuration after reviews have gone out. The impacts have been somewhat different, but in both cases, unhappy customers are loudly complaining that they’ve been cheated, tricked into paying for a drive they otherwise wouldn’t have purchased. Read more of this story at Slashdot.

Read more here:
Kingston and PNY Caught Bait-and-Switching Cheaper Components After Good Reviews

Endurance Experiment Writes One Petabyte To Six Consumer SSDs

crookedvulture (1866146) writes “Last year, we kicked off an SSD endurance experiment to see how much data could be written to six consumer drives. One petabyte later, half of them are still going. Their performance hasn’t really suffered, either. The casualties slowed down a little toward the very end, and they died in different ways. The Intel 335 Series and Kingston HyperX 3K provided plenty of warning of their imminent demise, though both still ended up completely unresponsive at the very end. The Samsung 840 Series, which uses more fragile TLC NAND, perished unexpectedly. It also suffered a rash of cell failures and multiple bouts of uncorrectable errors during its life. While the sample size is far too small to draw any definitive conclusions, all six SSDs exceeded their rated lifespans by hundreds of terabytes. The fact that all of them wrote over 700TB is a testament to the endurance of modern SSDs.” Read more of this story at Slashdot.

See more here:
Endurance Experiment Writes One Petabyte To Six Consumer SSDs

Nest Recalls All 440K Protect Smoke Alarms, But Will Have them Back On The Market In ‘Weeks’

 Google’s Nest has recalled all 440, 000 Protect smoke alarms sold over fears that the alert will fail to sound due to a false triggering of the “Wave” feature, which disables the sound with a gesture. The recall was detailed on the US Consumer Product Safety Commission website this morning. Though the report states that “about” 440K units will be recalled, it… Read More

View post:
Nest Recalls All 440K Protect Smoke Alarms, But Will Have them Back On The Market In ‘Weeks’

Google Announces "Classroom"

theodp (442580) writes “Meet your new ‘Room Mom’, kids! On Tuesday, Google announced a preview of Classroom, a new, free tool in the Google Apps for Education suite. From the announcement: ‘With Classroom, you’ll be able to: [1] Create and collect assignments: Classroom weaves together Google Docs, Drive and Gmail to help teachers create and collect assignments paperlessly. They can quickly see who has or hasn’t completed the work, and provide direct, real-time feedback to individual students. [2] Improve class communications: Teachers can make announcements, ask questions and comment with students in real time—improving communication inside and outside of class. [3] Stay organized: Classroom automatically creates Drive folders for each assignment and for each student. Students can easily see what’s due on their Assignments page.’ Addressing privacy concerns, Google reassures teachers, ‘We know that protecting your students’ privacy is critical. Like the rest of our Apps for Education services, Classroom contains no ads, never uses your content or student data for advertising purposes, and is free for schools.’ After the recent torpedoing of Bill Gates’ $100M inBloom initiative, Google might want to have a privacy pitch ready for parents, too!” Read more of this story at Slashdot.

See the original post:
Google Announces "Classroom"

Intentional Backdoor In Consumer Routers Found

New submitter janoc (699997) writes about a backdoor that was fixed only not “Eloi Vanderbeken from Synacktiv has identified an intentional backdoor in a module by Sercomm used by major router manufacturers (Cisco, Linksys, Netgear, etc.). The backdoor was ostensibly fixed — by obfuscating it and making it harder to access. The original report (PDF). And yeah, there is an exploit available …” Rather than actually closing the backdoor, they just altered it so that the service was not enabled until you knocked the portal with a specially crafted Ethernet packet. Quoting Ars Technica: “The nature of the change, which leverages the same code as was used in the old firmware to provide administrative access over the concealed port, suggests that the backdoor is an intentional feature of the firmware … Because of the format of the packets—raw Ethernet packets, not Internet Protocol packets—they would need to be sent from within the local wireless LAN, or from the Internet service provider’s equipment. But they could be sent out from an ISP as a broadcast, essentially re-opening the backdoor on any customer’s router that had been patched.” Read more of this story at Slashdot.

View original post here:
Intentional Backdoor In Consumer Routers Found