Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - What Do You Do With A Disruptive Discovery? 3

jcohen writes: Suppose that you've just discovered a way of making a computationally hard bit of math very, very easy. You've written out your proof, you've verified it, you've written code, and now, say, you're factorizing colossal primes at the rate of 1,000 per second. What's next? The consequences could be huge. How do you get another set of eyes on it to make sure that you're not just another crackpot, and that your results are right? Do you disclose your discovery? How? To whom? To your country's intelligence agency? To the public? What are the conceivable answers to these questions that would have the best consequences for you or for the world?
Security

Submission + - China Penetrated NSA's Classified Operating System 2

Pickens writes: "Seymour M. Hersh writes in the New Yorker that after an American EP-3E Aries II reconnaissance plane on an eavesdropping mission collided with a Chinese interceptor jet over the South China Sea in 2001 and landed at a Chinese F-8 fighter base on Hainan Island, the 24 member crew were unable to completely disable the plane’s equipment and software. The result? The Chinese kept the plane for three months and eventually reverse-engineered the plane’s NSA.-supplied operating system, estimated at between thirty and fifty million lines of computer code, giving China a road map for decrypting the Navy’s classified intelligence and operational data. “If the operating system was controlling what you’d expect on an intelligence aircraft, it would have a bunch of drivers to capture radar and telemetry,” says Whitfield Diffie, a pioneer in the field of encryption. “The plane was configured for what it wants to snoop, and the Chinese would want to know what we wanted to know about them—what we could intercept and they could not.” Despite initial skepticism, over the next few years the US intelligence community began to “read the tells” that China had gotten access to sensitive traffic and in early 2009, Admiral Timothy J. Keating, then the head of the Pacific Command, brought the issue to the new Obama Administration. "If China had reverse-engineered the EP-3E’s operating system, all such systems in the Navy would have to be replaced, at a cost of hundreds of millions of dollars," writes Hersch. "After much discussion, several current and former officials said, this was done" prompting some black humor from US naval officers. “This is one hell of a way to go about getting a new operating system.”""

Submission + - Everyday Security in a World of Word

jcohen writes: My job as an editor involves opening random Microsoft Word documents from random people all day. So far, I have been very lucky that I have not gotten pwned as a result; I run Norton Internet Security, but I know that in practical terms this is next to useless. Something has happened that makes me acutely aware of the possibility of a malicious attack by this means.

What is the best possible way of avoiding this risk? I have to use Word; as nice as OpenOffice is, it does not do a good job of preserving the picky levels of Word-specific formatting I deal with day to day. I have to use .doc. Again, a lot of the picky stuff I deal with gets boiled off when you convert to RTF. I've thought of running a VirtualBox session in which I run Word/Crossover Office/Ubuntu, but don't know how much actual protection this would afford me.

So, any ideas?
Space

Big Dipper "Star" Actually a Sextuplet System 88

Theosis sends word that an astronomer at the University of Rochester and his colleagues have made the surprise discovery that Alcor, one of the brightest stars in the Big Dipper, is actually two stars; and it is apparently gravitationally bound to the four-star Mizar system, making the whole group a sextuplet. This would make the Mizar-Alcor sextuplet the second-nearest such system known. The discovery is especially surprising because Alcor is one of the most studied stars in the sky. The Mizar-Alcor system has been involved in many "firsts" in the history of astronomy: "Benedetto Castelli, Galileo's protege and collaborator, first observed with a telescope that Mizar was not a single star in 1617, and Galileo observed it a week after hearing about this from Castelli, and noted it in his notebooks... Those two stars, called Mizar A and Mizar B, together with Alcor, in 1857 became the first binary stars ever photographed through a telescope. In 1890, Mizar A was discovered to itself be a binary, being the first binary to be discovered using spectroscopy. In 1908, spectroscopy revealed that Mizar B was also a pair of stars, making the group the first-known quintuple star system."
Programming

Haskell 2010 Announced 173

paltemalte writes "Simon Marlow has posted an announcement of Haskell 2010, a new revision of the Haskell purely functional programming language. Good news for everyone interested in SMP and concurrency programming."

Comment Considering the amount of identity fraud... (Score 2, Insightful) 537

Considering the amount of computer-based identity fraud in the world, all this would accomplish is to get millions of people unjustly pegged for crimes they didn't commit. Suppose that identity is conferred via X.509 certificates. What is to stop a garden-variety rootkit/botnet from using these certificates for their own purposes? My spam trap is filled with hundreds of messages each day from unsuspecting victims; why would it make a difference if these messages were digitally signed?

The problems are

  1. The falsifiability of the credentials.
  2. The juridical ("DNA testing") status these credentials would take on.

Comment West and Lexis/Nexis are going to love this. (Score 4, Insightful) 98

For eons, West and Lexis have been making staggering sums reselling primary legal material to all and sundry. Best of luck to this project in prying that material out of their hands, and in surviving the massive lobbying and astroturfing that will ensue before the project achieves that goal.

Comment Re:Reminds me of a joke (Score 1) 418

Modern scientists do not believe in Zeno's paradox. This is an ancient article, but take a look at Adolf Grünbaum's "Modern Science and Zeno's Paradoxes of Motion," circa 1968. It's reprinted in Zeno's Paradoxes, edited by Wesley C. Salmon.

The joke's still funny, but it stereotypes scientists as theory-crazed and impractical -- which I suppose is the typical point of view of an engineer.

Comment Profiteers are short-sighted (Score 5, Insightful) 294

Let's suppose, for the sake of argument, that all the websites out there started charging the eminently "reasonable" $5/month for access to content. In truth, it is likely that sites run by the likes of Barry Diller will charge decidedly more than this.

Before the economic collapse, I had a monthly books/CDs/entertainment budget of, say, $150. After the collapse, that budget is closer to $40. Assuming that I choose to spend 100% of my discretionary income on nothing but paid websites, and assuming that these will all be the cheapest, $5/month websites, that gets me eight websites, out of all the sites available on the Internet. I might as well shut down my browser and head to my library to peruse some dead trees.

I can't be the only person like this. Mark my words: the Internet will route around this damage.

Image

Comic Artist Detained For Script Containing 9/11 Type Scenarios 441

Comics writer Mark Sable was detained by security at Los Angeles International Airport because he was carrying a script for a new issue of his comic miniseries, Unthinkable. Unthinkable follows members of a government think tank that was tasked with coming up with 9/11-type "unthinkable" terrorist scenarios that now are coming true. Sable wrote about his experience saying, "...I was flagged at the gate for 'extra screening.' I was subjected to not one, but two invasive searches of my person and belongings. TSA agents then 'discovered' the script for Unthinkable #3. They sat and read the script while I stood there, without any personal items, identification or ticket, which had all been confiscated. The minute I saw the faces of the agents, I knew I was in trouble. The first page of the Unthinkable script mentioned 9/11, terror plots, and the fact that the (fictional) world had become a police state. The TSA agents then proceeded to interrogate me, having a hard time understanding that a comic book could be about anything other than superheroes, let alone that anyone actually wrote scripts for comics. I cooperated politely and tried to explain to them the irony of the situation. While Unthinkable blurs the line between fiction and reality, the story is based on a real-life government think tank where a writer was tasked to design worst-case terror scenarios. The fictional story of Unthinkable unfolds when the writer's scenarios come true, and he becomes a suspect in the terrorist attacks." It's too bad that the TSA can't protect us from summer blockbuster movies and not just graphic novels.

Comment Re:700 pounds -- goodbye safety standards! (Score 1) 319

Aptera (http://www.aptera.com) has done exactly this. They have gotten the California Department of Transportation to classify their three-wheeled hybrid vehicles as motorcycles. Goodbye, automobile safety standards. Of course, potential drivers of the vehicle might be surprised at the hurdle of getting a motorcycle endorsement on their license, and possibly a little peeved at the need to wear helmets while driving.

(ObNothing: Those rule-flouting "tough guys" who wear the "Kaiser Wilhelm" bare-minimum-required-headgear helmets must be a neurologist's wish come true.)

Comment Plagiarism vs. Ghostrwriting (Score 3, Interesting) 289

I realize that plagiarism detection represents an interesting problem in computer science, and that it goes some distance toweard solving a serious problem. However, I read an article in the Chronicle of Higher Education, behind a paywall, alas, which leads me to believe that it is only a partial solution to academic dishonesty. The article suggested that, thanks to the Internet, the costs of human capital are now so low that hiring a ghostwriter to compose one's papers, sidestepping the problem of plagiarism to begin with, is far more expedient than plagiarism itself. It described a Russian-"businessman"-headed network of Filipino paper-writers, most paid between $1 and $3 a page, who are able to market their services to the West through a web site and remote call centers. At $20/page to the end-user, with no possibility of plagiarism detection, I think that most desperate students would find this a good deal. In my opinion, ghostwriting will supplant plagiarism as time goes on.

What is a teacher to do? In-class writing samples would seem to be the only hope of detecting ghostwriting. Students could, of course, argue that at home, they can "polish" their papers, and that therefore they will not resemble the in-class samples. Moreover, checking samples against papers is a thankless and time-consuming task which is only a preliminary to actually evaluating the work. Perhaps there is a computer-based solution to this, but, in the meantime, perhaps potential ghostwriting customers could take their desires to their logical conclusion, and simply buy their degrees on the Internet directly.

New MacBook Case Leak Rumors 243

Someone noted that there are more macbook case leaks which look to all but confirm a new MacBook and possibly a MacBook Pro expected to be announced for later this week. There seem to be fewer ports, and no leaks of a 17" aircraft carrier laptop.

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...