Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Sign the petition (Score 5, Insightful) 277

If the shit was not "Waste" before it was scooped up and moved to another spot, then it's still not "Waste".

"Dredge waste" is more commonly called "sand". It is not exactly toxic industrial sludge that they are dumping.

Sometimes dredge waste is called "silt" or even "mud".

Oh well, the Great Barrier reef will be dead in a few decades anyway from rising sea temperatures, some no real harm done.

/bitter_cynicism

Comment Re:Actual Link (Score 1) 124

I'm curious what the actual "expansion ratio" is. I.e., if you want to encrypt N bytes in a cover-message of M bytes, how many bytes do you actually need to store/transmit?

From TFA:

"Even with Cohen’s clever hashing trick, the cover text for a secret message must be much larger than that message itself. Cohen suggests a file five hundred times as large as the secret message to encode communications without raising suspicions."

Comment Re:Ahhh more evidence of militerized police. (Score 1) 118

Should be "At the local range I go to", anyway you know when it's a cop shooting, they always exceed the 1 second rule and are general asshats.

Sorry, but what's the one second rule?

As to the tweets, it might be better if his accompanying photo didn't show him smiling as he offed all these people.

Submission + - Schoolboy reports vulnerability affecting 600,000+, police called. (theage.com.au)

An anonymous reader writes: The database includes full names, addresses, home and mobile phone numbers, email addresses, dates of birth, seniors card ID numbers, and nine-digit extracts of credit card numbers.
[...]
More than a week after Joshua made contact with PTV, it still had not responded, but this week it referred the matter to Victoria Police and Privacy Victoria following inquiries by Fairfax Media.

Comment Re:Not needed. (Score 2) 252

In Australia they just have a list of stolen phones distributed to the carriers, and they block the phone from network access based on the phone's IMEI.

Yes but that would make logical sense. There's a couple drawbacks to that solution, to be honest, but they are far more minor than the obvious problems with the kill-switch approach. For one, phones can still be sold out of country (although I suspect that's a VERY small market for stolen phones). For another, many phones currently don't have a built-in ID, it's contained on a removable chip so a thief could just swap it out or remove it entirely. So if anything, maybe we should mandate a non-removable unique ID for each phone, a government registry of phones which have been reported lost/stolen, and a law mandating carriers NOT allow listed phones to be activated.

BTW, I understand the theft of mobile phones in Australia dropped dramatically after this system was introduced, so while there may be ways around the law, they are probably beyond the capabilities of your average street thug.

Comment Blank Slate (Score 1) 136

Wiping all your cookies and history in your browser might help a bit, but probably not if you're using Chrome or logged into Google.

Also, the Startpage search engine claims to use Google, but anonymously.

Comment Re:..and now you see why (Score 1) 519

I don't have any problem with nuclear weapons - they're a fact of life now. I just want ours to be the best.. and if anyone launches, it needs to be understood, completely, your entire right to exist as a nation. There can be no other peace.

Reality, sometimes, is grim stuff.

And mine shafts. We need to have the best mine shafts!

Slashdot Top Deals

Happiness is a hard disk.

Working...