Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment What about real numbers of losses in power lines? (Score 1) 341

Big copper cables have electrical resistance which results in line losses.

...

The line losses would be tremendous...most of the power would be lost to heat and RF emissions.

Can you prove that with math instead of just assuming abstract losses? How much real power line looses per 1000km for example? Soviet Union moved electricity around its vast spaces, using its non-high-tech united electric grid. Without any superconductors.

It is far more efficient to have highly distributed generation AND storage than to have an intercontinental power grid of supersized transmission lines.

Yes, it is. But it's much more expensive than global transmission grid.

Anyway, my point was not that we must concentrate on single solution, but rather that solutions exist in many ways, I just suggestged simpliest one (except that political fantasy part of couse).

Comment Wonder how they'll rate Global Warming discussions (Score 1) 375

... when there is more than one version of the truth (conflicts, spin vs fact)... plus not all information is facts... philosophical questions may have more than one answer etc... so I am definitely curious to see how this works out.

I'm curious as well.

In particular, I wonder how they'll handle Global Warming / Climate Change discussions.

Then there's electoral politics, economics, Illegal immigration / undocumented migrants, ...

Comparing to a knowlege base presupposes that the knowledge base is full of truth. Filtering search results to exclude (or down-rate) anything at odds with the current paradigm is a recipe for hamstriging research, debate, and intellectual progress

  Ideas need to be supported or rejected based on evidence and logic, not whether they're orthodox.

Comment Re:Or the malware might cover its tracks. (Score 1) 324

I mean if they go to the trouble to do this why do it in a way that would be discoverable via jtag for other state actors. I mean if they go to the trouble to do this why do it in a way that would be discoverable via jtag for other state actors.

Because hacking the JTAG to hide malicious hacking of the software is a massive endeavor and a massive PITA.

Besides, if they built it into the original software they wouldn't NEED to hack the JTAG to hide it. The code would match the released version. (You'd have to reverse-engineer it to discover their back doors.)

Comment Re:Foxconn Factories' Future: Fewer Humans, More R (Score 1) 187

Technology creates new fields

Yes, I realize that, but will it always be enough to offset the losses? I don't see enough "new fields" to replace lost factory jobs. Retail? That seems like a stretch, but the web and self-checkout technologies are eating into that also. Plus, retail pays lower than factory work.

Road construction, gas stations, repair shops, car factories, etc. clearly offset any loss in the "horse and coach" business. I don't see the equivalent in quantity these days.

Comment Or the malware might cover its tracks. (Score 1) 324

If you ask the drive to read out the whole flash.
The maybe the firmware would have to go to the platter to get the real image.

Or the malware could regenerate the un-attacked version.

For instance: If it's a patch that loads into an otherwise cleared-to-known-vallue region it can detect that region while reporting flash content and report the cleared value, instead. Add a couple other tiny regions where it saved (or alread knew) the previous contents where it "sank it's hooks" and you can't tell it's there from its replies to dump requests.

JTAG seems safer.

Yep. JTAG, in principle, could be corrupted. But it would require substantial hardware support that almost certainly isn't there (yet!)

Comment Hashes can be useful. (Score 1) 324

Which is why I always laugh my ass off at all these people who use PGP to sign things and put a hash on the same website you download it from ... look you can verify this file you downloaded from the website hasn't changed because theres no way anyone would be smart enough to update the hash as well!

That's why you SIGN the hash. Then only the public key needs to be published by a different route.

And it doesn't HURT to publish it on the web site as well: Then someone tampering by substituting a different public key sets off alarm bells when that differs from the public key obtained from another site or by another path. Blocking that makes man-in-the-middle more complex: The attacker has to have essentially total control of the path to the victim and be able to recognize and substitute the public key whenever it shows up. One slip-up and somebody may raise the alarm.

Meanwhile: Even if publishing hashes on the same site may not provide additional security against MITM, it DOES let you check the download wasnt corrupted in transit (in ways other than malicious substitution). With modern protocols that's less of a problem these days than it used to be, but a check would be comforting.

Comment Re:Foxconn Factories' Future: Fewer Humans, More R (Score 2) 187

It used to be that new technologies created new jobs as it destroyed old ones. But that's merely a historical pattern, not necessarily a law of nature, and it may end.

It's kind of like Moore's Law: it's held so far, but nobody knows if it will keep.

Many conservatives feel that if the gov't doesn't meddle, new jobs will come from somewhere. However, they are slow to name specifics. The few they could name are also ripe for offshoring.

Slashdot Top Deals

He who steps on others to reach the top has good balance.

Working...