Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Ok.... (Score 3, Insightful) 136

Oh, that's all, is it.

Yep, you're right 1 hour max /s.

Browsers are the most insecure attack surface of any aspect of modern computers. Apple's s/w is built using standard engineering decision-making - can we rely on X being there ? Why yes we can, so we can delegate this function to that system framework which we've tested is all secure.

Except that all breaks down when someone installs a 3rd party browser. Now the security model of the system depends on the security model of the installed browser, and that's just not acceptable. It may be the user's fault that they installed but you can guarantee that Apple will be holding the can at the end of any argument over why their nudes are now all over the internet.

Comment Easy enough (Score 1) 150

I did exactly that for a long time until decent ready-built hardware came out that'd take DD-WRT or equivalent with no fuss. The main requirement is a motherboard with 2 Ethernet ports and Wi-Fi built in, or one with enough slots to bring it up to 3 Ethernet ports: 1 for the WAN connection, 1 for wired LAN, 1 to plug an access point into. Any mITX or mSTX board should do. Small cases are easy to find, lots of them for media center PCs are perfect. The annoying part is that most of them aren't designed to do their initial installation remotely, but onboard video makes it easy enough to plug them into a second port on one of your monitors, plus a USB keyboard and mouse, for long enough to get them up and running.

Frankly though, these days I'd just get a suitable home router with Wi-Fi and flash it with DD-WRT or OpenWRT or the like. Cheaper, smaller, and the install's a lot easier because the firmware's already there to flash a new image so you don't have the headache of getting enough onto it to do the rest remotely.

Comment Re:The FAA is greatly to blame (Score 1) 191

There's a difference between passing a pilot as fit to fly and passing a new aeroplane as fit to fly. In the former case, the only thing that rides on it is one person's career and you could argue that it is in the airline's best interests that its pilots know how to fly its planes. In the latter case, the financial wellbeing of an entire huge company might be at stake. There is no way a plane should be certified by employees of the company that makes it.

Comment Re:Palworld is 3d (Score 1) 101

This isn't a shame at all.

Plagiarism is plagiarism, regardless of whether there's AI involved, and this drives that point home. The tools you use don't have anything to do with it. You *can* plagiarize with AI, but just because it trained on something doesn't mean that everything the AI creates is plagiarizing that thing.

Thinking that everything AI does is plagiarism tracks extremely well with very fundamental misunderstandings about how it actually works.

Comment Definition of "published" (Score 1) 65

I think it'll boil down to a question of the definition of "published" for purposes of the law. The basic question would be: "If someone writes a letter to me asking for information, and I reply with a letter containing a statement that qualifies as defamatory about person X, does my letter constitute "publishing" that statement such that person X could sue me for defamation?". I suspect the answer's going to be "Yes.".

Some may argue that the person asking ChatGPT the question is just using a tool. Well, how is that different from them asking me the question? In both cases the source of the statement isn't the person asking the question. It might be a valid distinction if the person asking the question operated the LLM themselves and was responsible for supplying it it's training data, but that's not the case here.

Comment Nope, not gonna work (Score 3, Insightful) 67

What's to stop the deepfake people from just using the same process to add the FACStamp to their content? I can think of multiple ways off-hand to do that. Then their deepfakes will register as authenticated content and nobody can tell the difference.

Second problem is the requirement for connectivity to a central database. What do you do when you don't have connectivity for whatever reason? Or when the central database is down? Or when one of the deepfake people has hacked into the central database and wiped or contaminated it?

Now, there is a way to do this successfully, but you have to start by asking "How do we verify the source of a message without depending on a central authority to tell us the result?". The initials "HKP" might help you along, the principles apply to X.509 equally.

Comment Outsourcing FTW (Score 1) 35

This has to be for companies that contract their software development out. Employee salaries are deductible for companies, so if the costs were for software developers employed by the company they'd be deducted from revenue before taxes were calculated and the scenario given would result in 0 tax liability.

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...