Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment losing technical chops with age (Score 1) 255

... While my father was technical in his day...post stroke, he's not quite as fast as he used to be...mom was never technical.

I identify with your father. I am a young 78 years of age and have not had a stroke. Even so, I am not as fast as I used to be. Time was, I could write PDP-11 assembler with both hands. Today I plod along with Python. I hope when I get old my son, who is much cleverer than I ever was, will be as kind to me as you are to your parents.

Comment Re:I absolutely do not get why this is an issue... (Score 1) 103

The entire problem is basically lazy programmers who want to pretend unix time is utc and let someone else deal with the problems*. It isn't. Changing to leap minutes actually makes this problem worse because it is even easier to ignore. Also the it being too easy to ignore is genuinely getting worse even with leap seconds. The idea was that there would be a leap second around once every 1-3 years, so everyone would deal with them regularly and it would be no big deal. But the Earth's rotation unexpectedly stopped slowing down, and then in 2020, started speeding up. (see this plot where the jumps are leap seconds) So there was no leap second between 1999 and 2006 and there hasn't been one since 2017 and there is unlikely to be one soon. There is actually discussion of whether we will need a negative leap second. That is in the spec, but has never been used and is almost never implemented because nobody thought it could happen. So the whole discussion of a leap minute is either essential or almost irrelevant because a negative leap second would break everything but we may not need one for 15 years or more.

* The problem being that the number of SI seconds between unix time of noon Jan 1 2020 (1577880000) and noon Jan 1 2010 (1262347200) is not (1577880000 - 1262347200) = 315532800, it is 315532803 SI seconds (including three leap seconds). i.e. you cannot subtract unix times to get a long time interval. Just like you can't subtract year*365+dayofyear to get the number of days between two dates. Unix time is not the number of SI seconds since 1970, it is the number of (utc) days since 1970 times 24*60*60. Exactly when those ticks happened on any given day is not well defined in the spec and different implementers have made different decisions (some repeat the last second of the day, some stretch the second for some amount of time before and/or after the leap second, sometimes the issue is ignored and the clock was just reset at some arbitrary time). Even the man page for "date" is misleading because the author was too lazy to sort this out and explain it. The simple fact is that a unix second and an SI second are not the same thing and the unix second is not even a uniform measure of time.

I am a fan of leap seconds, since I think they are a good solution to the problem caused by the rotation rate of the Earth not being uniform. Also, I agree that the difficulty in implementing leap seconds correctly is due to lazy programmers. To alleviate this difficulty, I have written a software library which manipulates time values, taking leap seconds into account. Lazy programmers are welcome to use my library, which I have made available under a free license. See Avoid Using POSIX time_t for telling time for the motivation, documentation and source code.

Comment Re:dark matter? (Score 1) 109

Not cold dark matter (cold here meaning the typical particle thermal speed is slow enough to be trapped in a galactic gravity well), since neutrinos would have had highly relativistic energies when they decoupled from other matter and the universe has not stretched nearly enough since then to make them non-relativistic yet.

Are you sure? Considering their low mass, neutrinos must have decoupled very early, and the expansion ratio since then could be very large.

Comment dark matter? (Score 1) 109

They mean chirality, although it's related to spin. The weak interaction only works between left handed fermions and right handed anti-fermions. Since we can only observe neutrinos through the weak interaction we've only ever observed left handed neutrinos and right handed anti-neutrinos, although there's no particular reason to think the opposites don't exist (and some reasons to think they do).

If right-handed neutrinos and left-handed anti-neutrinos don't respond to the weak force, that means they only respond to gravity. Does that make them candidates for dark matter?

Comment Re:Shocking development (Score 1) 65

I'm paying for a domain (including email) and I love it. However, gmail is useful in some legacy applications when you have to talk to a clerk and they ask for an email which you have to spell. If it's not one of the usual free offers they know (gmail, hotmail...) they won't spell it right or look weird at you.

Once I complained to the electric company I stopped receiving the monthly invoice. The clerk said probably because my email was "an old one I was not checking anymore", asked for a gmail address.

So here am I, regenerating an OAUTH token every week so I can use getmail6 to fetch my messages from gmail with POP3 and read them with mutt. At least, no ads.

I saw something similar to this recently when I attempted to sign up for a streaming service. They demanded an e-mail address but rejected mine, saying that I had to have an address on a familiar service such as gmail or hotmail. It appears that some people are trying to convert e-mail from a protocol into a platform.

I have a throwaway gmail address that only receives spam. Apparently I am not the only person who uses it, since I have occasionally gotten e-mail intended for other people who share my name.

Comment Re: client-side scanning (Score 1) 69

Really? That's not my experience. I've been using it since 2005 and could probably count all spam messages on two hands

Perhaps I'm doing something wrong, or perhaps I am being targeted by an especially gifted class of spammers. I am not aware of any gmail settings which control the strength of spam detection--am I missing something? I access gmail through IMAP, so I see spam in a folder.

There are a few people with my name who use johnsauter@gmail.com as a "throwaway" email address: they write it down when they don't want to give their real e-mail address. Perhaps that is what attracted the spammers to me.

Comment Re: client-side scanning (Score 1) 69

Create a model that will reliably distinguish spam from non-spam...

No need. Here's a post from over four years ago claiming 99.9% spam detection (presumably the model is even better now): * https://workspace.google.com/b...

Am I misunderstanding ? If so, please enlighten me...

I don't think you are misunderstanding, but their statistics don't correspond to reality. I have a gmail account which gets lots of spam messages eash day, and only about 75% of them are automatically routed to the spam folder. Perhaps the spammers have gotten better at avoiding Google's filters in the last four years.

A filter for child abuse images that failed to catch 25% of the images would be inadequate, in my opinion.

Comment Re:client-side scanning (Score 1) 69

Depending on how the law is worded, this might actually be sufficient. ... If there is a match, the app refuses to send the image.

You can bet the government will want to be informed about it.

I am sure you are right. However, they will have to come up with a reason for why refusing to transmit the image doesn't solve the problem.

Comment Re: client-side scanning (Score 1) 69

Clearly the way to go is to have a trained machine learning model local to the app vet each image prior to acceptance. Benefits: * No dodgy images on your device * Probably stable use of space on your device

The problem with this solution is that we don't know how to reliably distinguish images of child abuse from other images. It is similar to recognizing pornography and harder than recognizing spam. Create a model that will reliably distinguish spam from non-spam, and we can talk about distinguishing images of child abuse from fine art.

Comment Re:client-side scanning (Score 1) 69

" .... The images can be encrypted with the regulator's public key."

That brings absolutely no useful value. A simple hash would give the same result and be much smaller. Encryption only has value if there is Decryption, without that all you need is a hash. Why in the world would you want to send millions of regulator content vice one user content, that's crazy!

I suggested encryption rather than hashing because I want to avoid hash collisions. I agree that a hash of the image is good enough, provided the hash is long enough to provide a very low probability that a legal image will have the same hash as an illegal image.

"It is possible to do a series of Fuzzy Hashes to determine near matches but that begs the question of exactly what is near."

"I don't think it is possible to create a fuzzy hash for illegal images that will not either miss some illegal images or incorrectly identify legal images as illegal."

You apparently don't understand that you are arguing by repeating the same statement rephrased.

I was disagreeing with the premise that such fuzzy hashing is possible without addressing the question of how to determine if an image is "near enough" to an illegal image to also be regarded as illegal..

Comment Re:Comparing problems (Score 1) 69

How much abuse would this stop? Probably none at all. This is about _pictures_ of child abuse being _sent_. It is not concerned with the creation of those pictures. And children that have their abuse not being documented (probably the vast majority) are apparently not a concern at all. The whole thing is a big, fat lie.

The theory is that if there is a market for pictures of child abuse, there will be an incentive to create it, and the creation involves abusing children.

Comment Re:client-side scanning (Score 2) 69

Apparently, new child sexual abuse images are expensive to produce. Most trading in such images is done with existing material, which is in the database.

Perhaps for now, recent examples of machine learning 'art' suggest this may not hold for long. In which case you might not want to publish any picture at all of your kids, anywhere.

snake

Interesting. There is no way to avoid publishing pictures of one's children, short of living in a cave. I wonder what the law would do about a picture that was generated from a prompt like "Make a picture of a child being abused". The law forbidding pictures of child abuse gets around the First Amendment by saying that such pictures are evidence of child abuse, but a synthesized picture isn't evidence of anything. This is an area that the law will struggle with, I think.

Comment Re:client-side scanning (Score 2) 69

That might take quite a while, and necessitate expanding the phone's storage a bit. If they encrypt, changing even a single pixel on the image to be sent would make the comparison fail or they would have to use encryption so weak that the system might itself legally constitute distribution of child porn.

If they're serious about stopping the problem, they're just going to have to put their coffee or tea down and go check on the wellbeing of children.

Of course, they could also try following up on the evidence they already have from the whole Epstein debacle.

I suspect combating child porn is just an excuse--what they really want is to be able to monitor all communications. If that is true, a proposal like this one, that does not allow them to snoop on everyone, will be rejected, though they might have to think a bit to come up with a reason.

Comment Re:client-side scanning (Score 1) 69

The images can be encrypted with the regulator's public key. The sender's computer would encrypt each of its images using the regulator's public key before comparing it to the downloaded encrypted images. Having these encrypted images would not be illegal because without the regulator's private key they cannot be viewed.

Storage is cheap. It should be possbile to store an encrrypted copy of every image in the regulator's illegal image database on a standard cell phone. If not, the regulator can pay the extra cost.

You think all phones should have an encrypted folder containing all known CSAM images/videos?! Constantly updated, I assume. You say storage is cheap, but we'd be talking about many, many terabytes of space. This is the most asinine thing I have ever heard.

I strarted using computers in 1963, when core memory was a dollar a word. Storage prices have fallen like a cliff since them. Even if the database does occupy terrabytes of space, that amount of storage will soon be cheap. I just bought a 16 TB disk through e-bay for $125 plus shipping.

Comment Re:client-side scanning (Score 1) 69

There's no reason that the local app couldn't have the hashes if all you really care about is not being able to send copies of existing material that's been identified. There are also plenty of algorithms that produce hashes which don't depend on single pixel or other common types of changes that are designed to handle these types of common manipulations.

I would be interested in evaluating a hash that will correctly flag the vast majority of test images as belonging to the database, and will not incorrectly flag any images that do not belong to the database.

It hardly matters either way. Criminals will always find a way to break the law. That and any kind of database of existing media to watch for won't stop anyone from sending newly created content.

Apparently, new child sexual abuse images are expensive to produce. Most trading in such images is done with existing material, which is in the database.

Slashdot Top Deals

"It may be that our role on this planet is not to worship God but to create him." -Arthur C. Clarke

Working...