Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Just a distraction from the real fail... (Score 5, Insightful) 47

Any hacker with any decent opsec would not be showing their actual IP address. The subpoena request is just smoke and mirrors to hide Uber's own security fail. Even if GitHub were to hand over the data, they would likely find nothing useful. Uber know that GitHub will not hand over that data without a fight. I am willing to bet that Uber are going to start claiming that the hack isn't their fault because GitHub won't hand over the data. If Uber already know the public IP of the hacker, why do they need the info from GitHub to proceed? Meanwhile the actual security fail of Uber making their database access info publicly accessible gets overlooked.

Because they think it was a crime of opportunity, which sounds like a reasonable supposition -- the hacker stumbled across the key in Github, then either gave (or sold) the key to someone else to do the hack, or did the hack himself. Clearly he wouldn't have downloaded the data using his own IP address, but it's entirely possible that when he found the key on Github, he was using a traceable IP.

By admitting that one of their developers leaked the key himself on Github, it seems a little late for them to claim that they have no responsibility for the breach.

Comment Re:Thieves looking to steal metal? lolwut? (Score 1) 133

That doesn't even make sense. There have got to be a bunch of easier ways to steal metal than going out of your way to find the exposed pipe that just happens to contain out a bunch of important fibre.

These police are complete fucking idiots if they think this was the motive. It's quite obvious the objective wasn't theft, it was just to cause damage.

How do you know if the conduit contains copper wire or fiber until you cut it open?

Comment Re:Bloatware?! (Score 1) 210

I don't understand why people call it "bloatware". This helpful software does many useful things for the user. It essentially subsidizes your $1000 computer into a more affordable $500 or so machine!

The manufacturer gets money for the installation, and you get helpful software that reduces your costs!

What would people do without search aggregators, browser toolbars, download accelerators, etc?

Maybe people should pay the full cost of the software that comes on their machines. Suddenly your "bargain" $350 "bloats" up to a $700. How about paying the full cost for Windows? How about paying the full cost for say hotmail access?

Software isn't , and shouldn't always be "free".

There should be an option for a "bloat" free computer, with the user paying the full cost for software.

Do you have a reference for that? I'd be surprised if all of the bloatware ads up to a $500 payment to Lenovo, I'd be surprised if it was even $50.

If software makers were willing to pay Lenovo up to $500 to pre-install this software, why aren't they making it available to consumers directly? I'm sure lots of people would be happy to install Superfish-like software if they were paid just $100 for it.

Comment Re:Then why live on mars? (Score 2) 135

It's only slightly better than living in a giant spinning space station... or in a bomb shelter right here.

Be that as it may, humans can tolerate such conditions and there are plenty of volunteers -- look how many people survive for decades in prison, even harsh prisons outside of the USA where they may literally never leave their cell.

Anything you can do on mars, robots can do better. already.

Then why did it take a big team of human workers to build my house? Surely a robot can hammer a nail into a piece of wood?

Why do we send human firefighters into a burning building? Why are we risking human lives for this if robots can do it better?

Why does an industrial plant call in a human technician to repair their broken robots, why don't they just call in a robot to fix the robot?

Special purpose science robots can do a lot, but there is still no robot that's as versatile as a human. The mars rover is a great example of a robot performing great science (that's far exceeded expectations), but try asking it to step over a 2 foot high wall to reach an interesting object, or asking it to excavate a 3 foot deep hole to see if someone buried an obelisk there.

Comment Re:PLIP (Score 1) 466

LapLink lets you use the parallel port without having to configure TCP/IP stuff. It's raw bytes, more like a really fast null modem cable.

But why bother getting the right cables (I have some, easy to DIY, but you can't buy them off-the-shelf anymore) and software (some piracy required I imagine). Instead you can use RS232 at 115.2kbps. Google did the arithmetic and unit conversion for me:

160 Megabytes) / (1125 (bytes / second)) = 1.64609053 days

Zmodem is pretty slow, but ZedZap/8K-Zmodem is pretty quick and easy to find software that supports it for DOS, Win9x and Linux. If you do not require error detection and flow control, then Xmodem is fast. (recommend you use a null modem cable with flow control RTS/CTS wired, this is almost always wired correctly with off-the-shelf cables). Don't need a 16550 UART for this to work, an 8250 is adequate if you have flow control enabled.

I'd highly recommend you send ZIP files over your link rather than uncompressed data. If you have enough disk space free, you can use pkzip's multivolume support and archive the entire disk into several managable files. (rar's is even easier to use than pkzip's)

You're off by a factor of 10, 115kbs is around 11500 bytes/second. Even if his serial port can only handle 56kbs, he could transfer the data in less than 10 hours.

Xmodem does do simple error checking with a single byte checksum on every packet (admittedly inferior to zmodem's crc32). Though for anything important, he should be able to find an md5 or even sha1 hash program that'll run on his system.

Comment Re:Cash is so much better. (Score 4, Informative) 186

Your ordering is wrong.

The correct ordering is:

1) Cash: 15 seconds or less
2) Credit/debit card: 45 seconds or more
3) Smart phone: 1 minute or more
4) Checks: 2 minutes or more

What kind of lame POS system does your coffee shop have? When I go to Starbucks or Peets, it takes me the same amount of time to hand over my card as it does to hand over cash, the difference being that it literally takes them only a second to swipe it, and by they time they hand it back to me, the transaction has already been approved, no signature required.

I don't see how cash could possibly be faster unless I hand them exact change, but even then they still have to count the bills and put them in the drawer, so even if *my* transaction is faster, the next patron has to wait.

Comment Re:... and this is surprising how? (Score 1) 153

Do you expect that your smartphone's voice recognition is all happening in the phone?

No, but I expect my smartphone to recognize more than "channel up" "volume down". Even my 2005 era feature phone could recognize key phrases without sending the audio anywhere. Surely a modern TV with multiple gigahertz CPU cores can do the same.

Comment Re:... and this is surprising how? (Score 1) 153

But it's not a secret. You know when you buy one of these your voice is going to be transmitted over the internets for analysis. You would expect them to take some obvious steps to secure the potentially private information from third parties but there is nothing "secret" about the collection and transmission of the user's voice. The only potential violation of privacy here would be the ability for a third party to intercept the unencrypted data on someone.

Why would someone think this? If my TV had voice detection, I would expect it to all happen locally, I certainly wouldn't expect the TV to record me 24x7 and send snippets of conversation to a central server for analysis.

Comment Re:And so it begins ... (Score 1) 158

Of course. One of the articles I found proposed to do brute force solutions, and given the terabytes of code out there, it should be possible. Even the creation of the original modules should be open to brute-forcing.

Having terabytes of code to choose from does not make brute forcing any easier.

But note I described the results I wanted - not the code to achieve them. And since I've already written code to do it that way around the turn of the decade, and I don't have the resources to brute-force code creation, I'm figuring I'll go with automated code generation from a simple wish list.

Sure, natural language processing is becoming more refined and will continue to become more powerful. But that's not brute forcing - the natural language processor doesn't piece together random combinations of code to give you what you asked for, it already has algorithms to retrieve data from a database, perform transformations and updates, etc, so it puts together the code logically, not through blindly pasting code snippets together to see if it does what it needs.

Comment Re:And so it begins ... (Score 1) 158

Example - you have several different database crud operation code modules to choose from.

You also have several different database user interface to pick from.

Additionally, you have several database schemas to choose from, including different indexing options depending on what is important to get fast, the mix of reads, deletes, writes, and rewrites, etc..

And several data input modules - keyboard, external data feed, whatever.

And several logging modules, each compatible with the back end.

And several different error-reporting modules (do we put up a user alert and give a chance to edit it, do we not allow it and send a text message to a phone, whatever).

It would be able to give a list of data we want, like Name, etc. without specifiying the data size or internal type, because that's all been standardized (last name, first name, middle name, etc).

Given the requirements in more or less plain english, it should be possible to come up with the optimal solution pretty quickly, since each module has standard interfaces to the others.

For example, I need a way to track a million people. The information that's mandatory is their name and address, date of birth, and gender. When the address changes, the old address should be preserved so that I can trace back if necessary.

Optional fields are cell number, email, home and work phone numbers, and 1 or more emergency contacts. When any of these change, the old ones should be preserved so I can trace back if necessary.

Initial input is via a record dump on a usb key stored in SDF format, with updates being done by either using the same method or by someone typing them in.

A sequential account number should be auto-generated for those records that don't have an account number from the initial dump. The account number is 2 letters, 6 digits, then 2 random digits to help detect bad account numbers.

I should be able to search by account number, name, or any phone number.

Input data from the initial dump should be flagged if not valid, and input data from later should only be entered if all required fields are there.

Auto-generating such an application should be doable now.

What you are describing now is not what you were describing earlier. Earlier you suggested that a computer could "mix and match billions of code snippets already written and brute-force" a program.

What you're suggesting now is that you want the computer to parse your natural language of a problem and turn that into a program.

Do you not see the vast difference between the two?

Comment Re:And so it begins ... (Score 1) 158

If your code snippets are all working modules (not just functions) will well-defined inputs and outputs, the brute-forcing takes on a different meaning - combining modules that have the appropriate inputs and outputs with each other. Entirely doable.

That doesn't change the numbers - if you have a reasonably sized library of code modules and try to brute force an app by putting them together randomly to see what you end up with, it's going to take an obscenely long time. And it's not even clear how this code writing AI will know when it gets a useful app -- It may create a working calculator app that can only calculate the cosine of base 13 numbers... it's a valid app, but is it a useful app? How would it know? What about the billion other apps that do a similar task, like calculating the sine of base 213 numbers?

Comment Re:indirect jobs (Score 1) 158

I get entire racks prebuilt shipped in and out, it just takes one on-site person to plug it in then the shippers get back in their truck and go back whence they came.

That said, if the company cited really does only have one employee, I'm glad not to do business with them. I'd require a bare minimum of three to at least pretend someone is on site 24x7.

If you have a lights-out datacenter, you don't need employees on-site 24x7 because replacing hardware is not a time-critical task, if a disk drive, server or switch fails, you can replace it during your next monthly maintenance sweep. If a power system failure takes out half the datacenter, you failover to your backup datacenter while you wait for a repair crew to arrive at the failed datacenter. Whether you have an employee on-site or not, he's not likely to be able to fix anything himself anyway.

You don't need people on-site to monitor the datacenter, you can have everything monitored by your NOC on the other side of the country.

Slashdot Top Deals

Physician: One upon whom we set our hopes when ill and our dogs when well. -- Ambrose Bierce

Working...