Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Gentlemen, start your engines! (Score 5, Interesting) 219

It's completely possible.

Ulbricht was not very smart. He bought fake IDs off his own website and had them shipped to his actual home address. The IDs were intercepted in the mail. and this clued the FBI in on his activities. Then he managed his servers using a direct VPN connection. Once the FBI traced the VPN endpoint he was done. They coerced the hosting company to allow them access and they could collect all the information they needed to build a case from that point on.

I imagine this Defcon guy did something similarly dumb.

To do this right:

1. Find a VM hosting company offshore that accepts bitcoins and doesn't ask for identity. 2. Buy some bitcoins, use one of the many tumbler services to wash them, and pay for the services that way 3. Never manage or otherwise connect to your VM directly. Always use TOR. SSH works great over TOR. 4. Don't buy shit off your own website and have it shipped to your damn house.

Just finished reading the affidavit from the FBI. This guy was a dumbass. He used a gmail account to pay for the VPS service and used his home internet connection to connect to the gmail account. He used his own, hotel, and relatives internet connections to connect to the hosting provider without any sort of anonymizing service. The FBI used either an undercover agent or a confidential informant to eventually find the VPS provider. From there, he was quite easy to track. The FBI had been watching the guy for months. The affidavit suggested it was an undercover agent that was hired as a staff member on the website that lead to this case being cracked open.

Comment Re:Efficiency (Score 1) 78

The research in this article is important. It shows that what was always theoretically an option is actually possible in practice. Scalability, efficiency, effort to produce - none of that matters at this stage. Obviously that would all be interesting next steps, but this shows that the principle works. And that is damn interesting.

Don't be naive. Of course the efficiency matters at this stage. If this is just as efficient, or more efficient than burning the fuel in a turbine, then it's ready for use now. If it is not, then we know that more research is required. The GP was asking "Is this ready for use, or is this one of those technologies they say we will be using 20 years from now?" He framed that in the question of efficiency because that is how you would measure whether this is a viable method of generation or just a technological marvel.

Comment Re:The World is Overcrowded (Score 1) 106

While I don't doubt the intentions of Bill and others who want to try and people alive, sadly this is natures way of making sure the world doesn't get overcrowded. It's a sad fact but people NEED to die.

Are you volunteering to be the first to die for your cause? Or did you just mean that other people sh

Comment Re:Don't forget (Score 1) 631

When banks started to issue VISA/MasterCard credit cards in my country (one of the ex-commie countries) some 15 years ago...

Basically, if someone swiped your card, you were screwed - hopefully you had a sufficiently low withdrawal/payment limit on the card, otherwise your account could have been completely emptied.

Not defending CurrentC here (can be pretty much even worse), but the illusion that a credit card is somehow more secure is really that - an illusion ...

Maybe in your country credit card security is an illusion, but in the United States (where this battle is currently set to take place), it is not. If I use my ATM card at a store and my account gets stolen, I'm screwed. The bank does not have to give me back my money until after it concludes its investigation. With a credit card, the bank has to credit my account the disputed amount. All of the consumer protections are geared towards credit cards. CurrentC wants you to use your bank account in an EFT so that the retailers do not have to pay the credit card transaction fees. CurrentC provides zero advantage to consumers, and nothing but disadvantages over CC and Apple Pay. CurrentC will lose because it only benefits retailers. Unless they completely stop accepting credit card, no one will bother with CurrentC. And if they stopped accepting cards, then Amazon would be quite happy to take even more market share from brick and mortar retailers.

Comment Re:I wish I'd thought of that (Score 1) 221

Keep your VIN number covered up.

Obstructing VIN = Violation of the law, possible Ticket.

Sufficient probable cause for police to force entry into the vehicle to investigate.

That explains something. I am in the UK and have an American car. The VIN is visible in the windscreen, the first car I have ever known like that, and it puzzled me why. I thought perhaps to save opening the bonnet (sorry, hood) to quote it when ordering spare parts?

I know of no jurisdiction in the US that requires you to physically change license plates every year. In Florida, the license plate is owned by a person and can be registered with another car when the plate owner sells or transfers a car. In California, the plate is tied to the car and they will not issue you a new plate unless you buy a car that has been taken by lien, drug forfeiture, etc. We just have stickers that you put on the plate to show you've paid the fees for the year.

Perhaps because, in the USA, don't you physically change the licence plate every year? In the UK the licence plate is permanent and is all that the police nornally need to know. You could physically and illegally change the number plate for a false one, but so you could change my VIN in the windscreen - only looks like a strip of metal stamped with the characters.

Comment Re:Misleading- Good will is common accounting (Score 1) 255

Waiting 15 years is a better deal than everybody else gets. Everybody else gets to wait indefinitely; most have to realize a loss before it can be claimed. In other words, if you overpay for an asset you don't get to claim a loss until you sell that asset to somebody else.

No. He already paid for the team. So he has already realized the loss. The question is whether its a short term loss, or not. Either way, if you or I were to purchase a home and then sell it for a loss, we could choose to do the exact same thing: amortize the lost money over the course of many years. As a homeowner you're given the option of realizing the loss in a single tax year, an option he did not have with this loss. The only difference between this and a homeowner who loses money is the scale. The fact that most homeowners cannot afford to lose that kind of money is a separate issue having to do with wealth distribution.

Comment Re:Semantics (Score 1) 571

"Any reasonable person should be able to tell when someone is uncomfortable" - bzzzt! This implies that they display the discomfort instead of internalizing, brooding and acting on it later. The dongle incident is a good example of your statement not working.

The victim in the dongle incident was unusually sensitive. That is why a key element in such cases is that the personal has to externalize their discomfort and tell the perpetrator that they are uncomfortable in the situation. If someone is unusually sensitive then the onus is on them to let people know. If you're doing or saying something that is questionable, it should be obvious, based on the person's reaction, whether you should stop.

Comment Re:Semantics (Score 1) 571

So the GP missed the key point there, which is that it has to be both unwelcome and troublesome. No, you missed the point that the "victim" defines both of those conditions subjectively.

In any reasonable jurisdiction, harassment IS subjective to the receiver of the attention, but they must notify the culprit that they do not appreciate their attention. Any reasonable person should be able to tell when someone is uncomfortable with their behavior, and modify their behavior towards that person accordingly. Where it becomes tricky is when the harasser is in a position of authority. A subordinate may not feel like they can say no. In that case, it is up to others to determine whether or not it was reasonable for the harasser to know that their behavior was unappreciated.

Comment Re:PUFFERY IS FRAUD (Score 1) 95

If one tells it like it is puffery is fraud just as a salesman's soap is fraud. If a product is desireable enough no sales efforts are required. The reason that we have marketing and sales is that most products really are not desireable at all.

How do I know what a product does without sales or marketing? Someone has to know about it in order for word of mouth to take effect. And what is word of mouth but a viral marketing campaign? I agree that most products are average or mediocre, but to say that sales and marketing is completely useless on a desirable product is naivety at its finest.

Comment Re:Since these people still don't get it.... (Score 1) 79

My point is that you can't depend on the language to protect you. I'm not saying you should ignore good technology choices because you know better than those crazy compiler people. But I do not believe that it is possible to create something that is completely unhackable. Perhaps you can create something that is non-trivial to exploit, or that is unexploitable using known techniques, but that doesn't mean that you can create a software/hardware combination that is completely foolproof. There will always be risk associated with any device that is network accessible.

Comment Re:Secure it but.... (Score 1) 79

Tattoos can be damaged or destroyed. People can get your password when they video tape you undressing at a department store changing room, or even by implanting hidden cameras in your home. But I supposed if someone went to those efforts to get your pacemaker password, they would find some way to kill you.

Comment Re:Since these people still don't get it.... (Score 1) 79

Anything computerized with a network connection can (and most likely WILL) be hacked...

Not if you take appropriate precautions, like using a safe programming language.

Last I checked, programming languages are designed and implemented by human beings. Even if a programming language can decrease your attack surface, there could still be an exploit associated with the interpreter/compiler or a mistake in implementation of the language. When an omniscient being develops your language and its corresponding dev tools, I would say you may have a meaningful point.

Slashdot Top Deals

"If truth is beauty, how come no one has their hair done in the library?" -- Lily Tomlin

Working...