Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Sigh. (Score 1) 378

Criminals gaining entry to an ATM after blasting a huge hole in it? Not really the kind of thing the everyday guy has to worry about.

I mean, you've got to linger by an ATM for a while, cause a huge blast, then get round the back, gather the exploded money, etc. If you're prepared to do that, you'll find any number of ways of going that far anyway.

And in the UK, ATM's are everywhere - in shops, post offices, out in the street, etc. You can't protect them all. There are no really "secure" ATMs here - not in location or design.

You just make it so that they have to do all this to hopefully draw attention. But you can't protect against every attack.

Comment Re: grandmother reference (Score 1) 468

I got a PS4 for christmas, I've stacked it under my PS3. I figure PS is lesser of 3 gaming evils - supporting MS into another attempted monopoly, all the crap of Windows gaming as here, and Sony's stupidity. But their hardware shouldn't get more broken, and in my limited game play time, hasn't acros PS3 or PS4. Of course, I don't game online or pay for PSN so that didn't affect me.

What is the "shit" about the PS4 though?

Comment Re:You nerds need to get over yourselves (Score 1) 212

Look, analogies are often not perfect. You're right that water in pipes doesn't route discreetly to given addresses. Roads and trucks isn't better in my opinion. Trucks can actively damage the road - data can't damage a router. The main point these analogies are usually used to make is that bill per byte doesn't make sense.

On roads, bill per mile certainly makes sense and is implemented in many places, because using the road quickly wears it out.

With pipes and hoses and ethernet - this really isn't the case, at least at a human scale of observation.

Also, with pipes - the system moves and directs the water - like ethernet, the frames are passive. Trucks direct themselves and the roads are passive - pretty much opposite of how data networks work.

Maybe it's been too long since my networking classes, and I haven't dived deeply enough into the networking at work - but sizing and implementing capacity rarely takes routing into consideration except insofar in bulk amounts a router or switch can route. This is pretty much directly analogous to pump specs and pipe sizes.

Comment Re:Privacy (Score 1) 65

Though you have to trust AWS with the plain text at some time since every mail server and client has to hand the message over in plain text (it may come in over an encrypted tunnel, but it needs to be decrypted by their mailservers).

No, it doesn't. S/MIME, PGP-mail, etc. Of course that only works if the party you're e-mailing can also use client-side e-mail encryption.

And how close to you think the internet is to ubiquitous client side encryption? Oh, right.

You might as well speculate how secure mail would be if it were personally delivered by unicorns.

I'll add that the OP could use S/MIME and/or PGP right now with any mail provider (as I said in my original reply), at the expense of server side searching (which is one of the best things about Gmail -- I can search years of mail archives instantly)... all he has to do is convince everyone he corresponds with to do the same. Oh, and zealously protect his private key.

Comment Re:Privacy (Score 1) 65

Though you have to trust AWS with the plain text at some time since every mail server and client has to hand the message over in plain text (it may come in over an encrypted tunnel, but it needs to be decrypted by their mailservers).

No, it doesn't. S/MIME, PGP-mail, etc. Of course that only works if the party you're e-mailing can also use client-side e-mail encryption.

And how close to you think the internet is to ubiquitous client side encryption? Oh, right.

You might as well speculate how secure mail would be if it were personally delivered by unicorns.

Comment Re:Privacy (Score 3, Informative) 65

My top priorities for email service are quality of spam filtering, support for unlimited aliases, search, and rules. I think labels work better than folders for categorization. I have not found any Amazon documentation which addresses these issues.

My top priority is privacy.

Does their service have built-in encryption, such that they cannot decrypt the message contents?

Not if you want server side search. Though you have to trust AWS with the plain text at some time since every mail server and client has to hand the message over in plain text (it may come in over an encrypted tunnel, but it needs to be decrypted by their mailservers).

If you really don't trust anyone with your email, tell everyone that emails you to encrypt everything with your public key, then you can decrypt the messages on an airgapped computer when you're ready to read them.

Slashdot Top Deals

"Little else matters than to write good code." -- Karl Lehenbauer

Working...