Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Metal (Score 1) 240

It depends what metal, in what amount, and what configuration.

I can tell you know that a metal-rimmed bowl I put into a microwave sparks like fuck, cracks and crackles, destroys the metal on the rim and makes the kitchen smell of burning metal for a day.

Maybe it's "safe". But it's not a bright thing to do and entirely opposite to the function of a microwave - to heat food quickly. There's no point in heating food quickly if it all tastes of tin (the metal was gold, I think, but the smell was burning tin) because you put the wrong bowl in.

And microwave a CD and see what happens. No it won't explode, but it will arc like fuck and leave little flakes of metal and plastic all over your microwave (and therefore food).

Been there. Done it. Maybe not "dangerous" but still "stupid".

Comment Re:Metadata (Score 4, Interesting) 49

There isn't a solution to that. You have to talk to other points, and you have to do so from a connection you are on. That information, on ANY network in the world, is inevitable.

The only thing you can do is obscure it as much as possible so that people can't tell WHAT you did over the connection, or WHAT you passed to those others. They will be able to know who they were, but unless you can introduce sufficient plausible deniability (with Tor, that's just by using random people as the next hop), you can't do anything about that.

I don't think that's a problem we should waste time trying to solve. You aren't going to be able to obscure your endpoint's knowledge when 100% of the time someone is paying money for that endpoint to be connected to other endpoints. We do not have a darknet.

But it's also not that big a deal. With proper encryption and enough fake / routing data running through your connection with that encryption (and PFS), it's meaningless. All that can happen is someone can say "you were online, and so was John". If that's enough to convict you, you have bigger problems than the protocol of the network you used.

Comment Re:Google control the value of the TLDs (Score 1) 67

Google won the search wars because it ignored what content providers thought should be top of the listings (but let them buy ads), and put what search USERS should be top of the listings. That's how it got where it is and why it's stayed where it is. That's why there are entire businesses based around trying to get your site to the top of Google without getting chucked off their listings - because it's not as easy as just asking, or paying, or tricking Google.

Hence, if ".buy" suddenly starts getting to tops of listings where you have no reason or interest of it being there, then Google will suffer - as well as ".buy"

Decent search made domain names obsolete. I don't even know the domain of many of my favourite sites, but I know an exact Google search that will list them in the top 10 if I ever need them (e.g. I lose my bookmarks). That's why I don't get why people still are buying anything more than a single, relevant domain for themselves.

Seriously, what difference do you get in search rankings if you search from a mobile? Google knows you're on mobile. You can search for mobile terms. Now how many of those results are actually of ".mobi" sites?

TLD's and domain names are money-grabs. They only have any effect on "dumb" search engines that are already selling your entire front page to the highest bidder.

Comment Re:Encryption (Score 1) 126

Agreed.

But, please, what makes you think that Apple, or even Samsung, aren't doing exactly the same?

Apple can install stuff on your device when it feels like it. In fact, you have even less control over an Apple devices and its whims. You'll happily plug in your Exchange details into the Apple device, you have no idea what it is or isn't doing with that. Apple doesn't even have permission systems. You either install, or not. And Apple spyware is just as - if not more - rampant.

So, your concern is really about modern devices, not anything to do with the meat of the story - encryption.

P.S. With Android, you can see the source, and build from clean source, without any Google services whatsoever if you want. People have done it for you. Almost every big-selling Android phone is supported. You can get root access and check everything you like. And then encryption really means something.

Comment Just Apple? (Score 0, Troll) 207

Anecdotal or not, almost everyone I come into contact with who has an iPhone is either living with a smashed screen or had to take it back to Apple to get the screen replaced after smashing it.

I do not see as many, if any, of non-Apple phones that are smashed as easily.

Personally, maybe I'm just not as clumsy, but I've dropped my phone any number of times and even kicked it accidentally as I dropped it and smashed it into a wall... and it wasn't even scratched. I don't think I've ever managed to break a phone like that, and I've had some spectacular drops in the past (plastic covers and batteries flying all over the room, but just put it back together and it worked).

Comment Sigh. (Score 5, Informative) 231

I work in IT in English schools.

Welcome to a decade ago.

I've worked in several schools that have biometric library systems and the move to cashless canteens has been underway for years (I've never happened to work with one, but that's not because they aren't around).

It is sold as preventing bullying, stopping you having to pay for the cards, etc. The privacy implications came up 10-15 years ago. Nobody, especially parents, really cared.

Hell, five years ago, my daughter's creche had fingerprint entry (I refused to take part, mainly because I saw it as insecure given I could gummi-bear the reader and enter as whoever came in last, but I was apparently the first to complain).

Old news people. It's already in schools all over the UK. There was minimal protest.

Comment Re:ZFS - faster IO on larger pools (Score 1) 370

1) Yes, it's a general features of RAID's. Multiple devices are reading the data, the "fastest finger first" wins.

2) File server only dependent on your disk format, you mean? I happen to agree here but, if you're doing it at the FS level, then just a standardised RAID layout (such as Linux md / LVM) is the same thing. The non-standard formats that tie you into hardware do so for a reason - the hardware RAID provides things that no software RAID can, sheer speed. (Though, please note, I've happily run Linux software RAID on server-end hardware in production systems without any performance problems).

3) 3 disks dying out of 11? RAID6+1 will actually do better (I think... I can't do the maths just now).

ZFS is cool, don't get me wrong, but it's basically just a RAID fs. The Merkel tree journalling trick just saves having to have battery backup, but whether it works like that in real life failures is another matter entirely.

Comment Re:hmmmm (Score 5, Insightful) 275

I don't care how many 1-star reviews a place get. You know what matters? How they respond to them.

I'd rather go to a place that replies politely to every negative review than one that ignores them entirely. And if they are genuinely fake, things such as "We have no record of your stay, but we're sorry that you had trouble" speak a thousand times more to what's actually happening then any amount of ignorance.

Everywhere gets bad reviews. You cannot have perfection. What matters is how you deal with when you fuck up.

Comment Re:My emails are not on it (Score 1) 203

Same for me, same for my brother.

Someone's just collected 5m GMail addresses from somewhere.

To be honest, it's more likely that my address has been sold by a Google employee - there's no way I should be getting as much spam as I do to an address that's completely unadvertised and which is only the end-point of various domain forwarding.

Password compromise too? Just sounds like someone's collated all the compromised data from other websites etc. they could find, rather than hacked into GMail somehow.

Comment Re:Thank you for finding the flaw (Score 1) 142

Security software cannot fix stupidity.

In this case, one of the scripts on a Tor service pulled data from and thus advertised it's globally-addressable IP address.

Sure, they can improve their processes and pull that script and replace it with a Tor-compatible version - but Tor can't detect this kind of stupidity and fix it for you. If you're stupid enough to put your home address on a Tor service, there's nothing Tor can do about that either.

The most interesting thing about this story is that all the "Tor was somehow broken by a omnipotent government agency" nonsense actually boiled down to "Idiots were giving out their own IP over a Tor service providing illegal content" (which is more often than not the case - I'm not at all convinced that most countries actually have the talent and resources to do what people claim they can, let alone that they routinely do them).

This either proves, when used properly, how effective Tor is, or ineffective the relevant agency is against Tor.

Honestly, I don't care too much about the detail. I don't support the illegal activity that this service was built upon. But I find it worrying that they were that stupid, and that it was that easy to "find" them, and also that the relevant agencies don't seem to have made much progress at all since the days of GCHQ.

All I see in the modern day is unbreakable maths stopping (or severely hindering) anyone but the most stupid people from being caught. I see that as both a good thing (encryption, etc. doing what it was designed to do, and implemented strongly) and a bad thing (our governments are still unable to stop such services because they don't have the talent to infiltrate them).

Comment Re:Does the original magnetic tape have those prop (Score 1) 130

The analogue signal on a VHS tape corresponds to an exact (enough) representation of a PAL or NTSC signal, which you can capture in as much detail as you like but it will hardly vary.

The storage mechanism may be able to cope with more, but the actual useful data that could ever come out down a cable is limited to a quite precise specification. As such, higher resolution samples aren't going to help.

Also, VHS isn't entirely analogue. It has a magnetic representation on tape that is - again - highly specified to enable readback.

As such, it's not akin to, say, photographic slides or negatives (but even they have a useful resolution beyond which we won't see any advantage in delving), but more akin to storing computer data on audio cassette - something which formats like TZX encompass entirely even if they do not store every single magnetic charge that may be on the tape.

Your magnetic tape is 0's and 1's, by the way. Stored using a helical layout to stripe them around the tape.

Slashdot Top Deals

MESSAGE ACKNOWLEDGED -- The Pershing II missiles have been launched.

Working...