Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Infrared Imaging Shows Trifid Nebula in a New Light (gizmag.com)

Zothecula writes: The European Southern Observatory's (ESO) VISTA survey telescope has revealed a beautiful new aspect of the Trifid Nebula, a star formation area that sits around 5,200 light years away from Earth, in the direction of the galactic center. By observing and imaging the nebula in infrared light, astronomers can look through the dust-filled, central parts of the Milky Way to expose new objects.

Submission + - A decentralised global mesh internet where nothing can be censored - or removed (thestack.com)

An anonymous reader writes: Later this year the MaidSafe (Massive Array of Internet Disks — Secure Access For Everyone) project leaves nine years of quiet development to go into public beta. The initiative aims to create an ISP-free, decentralised global mesh network with an internal cryptocurrency which automatically rewards users who contribute more bandwidth or storage space. With a single protocol, end-to-end encryption and multiple redundancy built in at the core, uptake of the SAFE network would make TCP/IP, FTP and an avalanche of protocols and other network technologies redundant, as well as compromising the viability of the data center industry. Additionally the network would theoretically be resistant to all government censorship, but by the same token would make 'questionable' web content unerasable. In this interview MaidSafe co-founder Nick Lambert admits "With privacy and security, you either provide it or you don’t. You can’t pick and choose who gets it."

Submission + - Samsung Smart TV is recording your private conversations (thestack.com)

An anonymous reader writes: Samsung’s privacy policy includes details that its Smart TV voice recognition feature may pick up on personal conversations and transmit private communications to third parties. Buried in the privacy policy related to the smart television, Samsung advises users to be aware that any snippets of conversation might be captured by the software which allows them to control their television sets with a series of commands.Questions have been raised about who these third parties could be, what the information is used for, and how the data is being transmitted – with potentially unencrypted voice clips left exposed to hackers.

Submission + - Are Carriers Trying To Steal Wi-Fi's Spectrum? Not Exactly (itworld.com)

itwbennett writes: LTE is coming to the fat 5GHz unlicensed radio band that much of consumers’ Wi-Fi use now depends on. The idea drew skepticism at first, but the mobile industry is starting to agree on some steps to make sure wireless LANs don’t get trampled under LTE’s feet. The first trial deployments are expected to begin this year, and users could get faster service as the technology is rolled out. Here's a look at how it will work.

Submission + - New Multi-Purpose Backdoor Targets Linux Servers

An anonymous reader writes: A new multi-purpose Linux Trojan that opens a backdoor on the target machine and can make it participate in DDoS attacks has been discovered and analyzed by Dr. Web researchers, who believe that the Chinese hacker group ChinaZ might be behind it. "First, Linux.BackDoor.Xnote.1 sends information about the infected system to the server. It then goes into standby mode and awaits further instructions. If the command involves carrying out some task, the backdoor creates a separate process that establishes its own connection to the server through which it gets all the necessary configuration data and sends the results of the executed task," the researchers explained.

Comment Re:BattleTech? (Score 1) 517

We are completely unable to make a tank that can survive a modern anti-tank missile, what on earth makes you think we can make an unstable (bipedal walking) robot even more survivable than that?

Once we start mining the Moon we make them out of Gundanium. That'll make them indestructible!

What actual advantage would a mech have over a conventional tank?

Intimidation factor? Badassery?

P.S. If you in any way thought that this entire thread was actually meant to be a serious discussion on the merits of BattleMechs in a real life combat setting... I think it's time for your meds.

Comment Re:What happened? (Score 2) 422

And how much of that speed do you actually notice as a human? Hell, how much of the speed gain actually matters in the scheme of your day? When I went from a 400 MHz to a 1.5 GHz what was a 4 hour compile became a 1 hour compile for the same program. Got a Core 2 Duo 2.1 GHz and the compile time for the same piece of code went down to 30 minutes. Up that to my current system (i7 4770k 3.5 GHz - 4 cores read as 8 with the HyperThreading) and the same piece of code compiled in 25 minutes. In about the mid-2000's I stopped having to upgrade hardware just to keep up with performance. That's when it turned into I only upgraded my hardware when a component failed and I could run any game or process intensive program I wanted until then. My current system was built 2 years ago. It's still going strong and I doubt I'll need to upgrade for at least another 10 provided the hardware doesn't crap out prematurely. The system I had previous lasted nearly 9 years and I only changed the Motherboard about halfway through its life because the BIOS chip cooked itself in a brownout. Tout your benchmarks all you want, they're not useful to me. What's useful to me is the actual output of "time ./configure && make && make install" showing that I'm saving more than 5 minutes on a compile.

Don't get me wrong; more speed in computing is something I think should be striving for, regardless of how much faster the next generation really is, but the improvements curve has reached a plateau and it's going to take a major breakthrough in tech before performance starts the exponential and meaningful hand over fist increases like we had in the 80's, 90's and the first part of the 00's.

Feed Techdirt: The World's Email Encryption Software Relies On One Guy, Who Is Going Broke (google.com)

The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.

Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded.

"I'm too idealistic," he told me in an interview at a hacker convention in Germany in December. "In early 2013 I was really about to give it all up and take a straight job." But then the Snowden news broke, and "I realized this was not the time to cancel."

Like many people who build security software, Koch believes that offering the underlying software code for free is the best way to demonstrate that there are no hidden backdoors in it giving access to spy agencies or others. However, this means that many important computer security tools are built and maintained by volunteers.

Now, more than a year after Snowden's revelations, Koch is still struggling to raise enough money to pay himself and to fulfill his dream of hiring a full-time programmer. He says he's made about $25,000 per year since 2001 — a fraction of what he could earn in private industry. In December, he launched a fundraising campaign that has garnered about $43,000 to date — far short of his goal of $137,000 — which would allow him to pay himself a decent salary and hire a full-time developer.

The fact that so much of the Internet's security software is underfunded is becoming increasingly problematic. Last year, in the wake of the Heartbleed bug, I wrote that while the U.S. spends more than $50 billion per year on spying and intelligence, pennies go to Internet security. The bug revealed that an encryption program used by everybody from Amazon to Twitter was maintained by just four programmers, only one of whom called it his full-time job. A group of tech companies stepped in to fund it.

Koch's code powers most of the popular email encryption programs GPGTools, Enigmail, and GPG4Win. "If there is one nightmare that we fear, then it's the fact that Werner Koch is no longer available," said Enigmail developer Nicolai Josuttis. "It's a shame that he is alone and that he has such a bad financial situation."

The programs are also underfunded. Enigmail is maintained by two developers in their spare time. Both have other full-time jobs. Enigmail's lead developer, Patrick Brunschwig, told me that Enigmail receives about $1,000 a year in donations — just enough to keep the website online.

GPGTools, which allows users to encrypt email from Apple Mail, announced in October that it would start charging users a small fee. The other popular program, GPG4Win, is run by Koch himself.

Email encryption first became available to the public in 1991, when Phil Zimmermann released a free program called Pretty Good Privacy, or PGP, on the Internet. Prior to that, powerful computer-enabled encryption was only available to the government and large companies that could pay licensing fees. The U.S. government subsequently investigated Zimmermann for violating arms trafficking laws because high-powered encryption was subject to export restrictions.

In 1997, Koch attended a talk by free software evangelist Richard Stallman, who was visiting Germany. Stallman urged the crowd to write their own version of PGP. "We can't export it, but if you write it, we can import it," he said.

Inspired, Koch decided to try. "I figured I can do it," he recalled. He had some time between consulting projects. Within a few months, he released an initial version of the software he called Gnu Privacy Guard, a play on PGP and an homage to Stallman's free Gnu operating system.

Koch's software was a hit even though it only ran on the Unix operating system. It was free, the underlying software code was open for developers to inspect and improve, and it wasn't subject to U.S. export restrictions.

Koch continued to work on GPG in between consulting projects until 1999, when the German government gave him a grant to make GPG compatible with the Microsoft Windows operating system. The money allowed him to hire a programmer to maintain the software while also building the Windows version, which became GPG4Win. This remains the primary free encryption program for Windows machines.

In 2005, Koch won another contract from the German government to support the development of another email encryption method. But in 2010, the funding ran out.

For almost two years, Koch continued to pay his programmer in the hope that he could find more funding. "But nothing came," Koch recalled. So, in August 2012, he had to let the programmer go. By summer 2013, Koch was himself ready to quit.

But after the Snowden news broke, Koch decided to launch a fundraising campaign. He set up an appeal at a crowdsourcing website, made t-shirts and stickers to give to donors, and advertised it on his website. In the end, he earned just $21,000.

The campaign gave Koch, who has an 8-year-old daughter and a wife who isn't working, some breathing room. But when I asked him what he will do when the current batch of money runs out, he shrugged and said he prefers not to think about it. "I'm very glad that there is money for the next three months," Koch said. "Really I am better at programming than this business stuff."

Related stories: For more coverage, read our previous reporting on the Heartbleed bug, how to encrypt what you can and a ranking of the best encryption tools.

Republished from ProPublica. ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for their newsletter .



Permalink | Comments | Email This Story








Submission + - The one guy responsible for GPG is running out of money

jasonridesabike writes: ProPublica reports that Werner Koch, the man behind GPG is in financial straits. Link to article Link to GPG donate page

The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive. Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded.

Submission + - 500 IT workers at Southern California Edison are being replaced with H-1B's (computerworld.com)

HiThereImBob writes: From Computer World: Information technology workers at Southern California Edison (SCE) are being laid off and replaced by workers from India. Some employees are training their H-1B visa holding replacements, and many have already lost their jobs. The employees are upset and say they can't understand how H-1B guest workers can be used to replace them. The IT organization's "transition effort" is expected to result in about 400 layoffs, with "another 100 or so employees leaving voluntarily," SCE said in a statement. The "transition," which began in August, will be completed by the end of March, the company said.

Comment Re:How critical is stability? (Score 1) 175

Of course they do, on a schedule, when the system is minimally used. Where I work this usually means that the updates get pushed into production on a Sunday (branch offices are guaranteed no business on Sunday) after they've been verified to not crap out on the Model environment. And Model doesn't get the rollout until the update has been verified in the Test environment for at least a week. Also, on mission critical systems, updates are only rolled out once a month at the fastest for only the most critical security updates. Other updates occur once per Quarter. Outside of this plan, if the main system and its redundancies go down any other time, someone's head is going to roll. The Data Center is not to go completely down during production hours for any reason, whatsoever.

Submission + - Bipartisan Bill Would Mandate Warrant To Search Emails (itworld.com)

jfruh writes: Bills were introduced into both the House and Senate yesterday that would amend the Electronic Communications Privacy Act, requiring a warrant to search Americans' email messages stored on third-party servers even if they're more than 180 days old. The current version of the law was passed in 1986, and was written in an environment where most email users downloaded emails to their computer and erased them after reading them.

Submission + - What tools to cleanup a large C/C++ project?

An anonymous reader writes: I find myself in the uncomfortable position of having to 'cleanup' a relatively large C/C++ project. We are talking ~200 files, 11MB of source code, 220K lines of code...

A superficial glance shows that they are a lot of functions that seems to be doing the same things, a lot of 'unused' stuff and a lot of inconsistency between what is declared in .h files and what is implemented in the corresponding .cpp files.

Is there any tools that will help me catalog this mess and make it easier for me to locate/erase unused things, cleanup .h files, find functions with similar names?

Comment Re:Okay, Bye! (Score 1) 50

I initially read this as he was agreeing with you and that the "Whoever designed this" was to be read as "Who ever designed [the D K J interface for the game in this article] ignored a whole shitload of intuitive precedent." In analysing the context, however, I can see where the reasoning could be muddied as he was actually criticizing the control conventions that most of us are familiar with (WASD primarily).

Slashdot Top Deals

Why did the Roman Empire collapse? What is the Latin for office automation?

Working...