Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Blocking access (Score 2) 253

The trick is that you don't need to get perfect results:

It is definitely not the case that you can be perfect results(given that we don't even have an unambiguous definition of what we seek to block, of course it isn't going to work); but even quite primitive filters will hit some stuff. This allows you to tell the Daily Mail readers that Something Is Being Done, just as it ought to.

Next, the real fun begins: various smartass nerds and/or concerned parents will point out instances where your glorious purity filter has failed. What's to be done?

Sort into two categories:

1. Porn site/source has violated some aspect of your broadly worded law and has some operations, persons, or assets in the UK or cooperative jurisdictions. Solution? A nice, soothing, show trial, followed by satisfied preening.

2. For technical, legal, or jurisdictional reasons, no penalty can be applied. Decry the depravity of the situation, where the wicked jeer as the good stand helpless, and announce that New Powers Are Needed. Announce bill to expand powers, decry opponents as pedophiles and enemies of decency, families, and the children.

You just can't lose. Sure, you wont' actually stop all the porn; but who cares?

Comment Re:Truth be told... (Score 5, Insightful) 149

Anonymous coward( 'Bull Fucking Shit', below) is far too strident; but it is the case that there's a curious sort of 'bifurcation' in the 'terrorist' labor market(a confusion we probably contribute to by conflating the various local tribal militias, warlords, strongmen, etc. who cause us trouble during our ground campaigns with the 'terrorists' who are much more international in scope).

On the one hand, as you say, the terrorist grunt supply is heavily drawn from frustrated young men(inconveniently, lots of prime recruiting grounds have demographics that skew fairly young, so there are lots of them), with limited economic prospects, often compounded by a culture where you probably aren't getting laid unless you've achieved enough economic stability to get married. The miscellaneous 'insurgents' who raise hell when you attempt to occupy their home sand trap; but lack international ambitions and/or capabilities are mostly these guys. Some of the lower-skill terrorists proper are as well(particularly for the Israelis, since Gaza's festering-prison-slum atmosphere provides an endless supply of the angry and hopeless; and you don't even need to buy them plane tickets to have them go do a 'martyrdom operation'.

On the other hand, a lot of terrorist leadership, and high-skill recruits(if you want to blow stuff up, it sure helps to have some real engineers and chemists around), are not driven by economic desperation. Bin Laden himself was basically a trust-fund fundamentalist, and a lot of the more influential and logistically important figures are people with decent university degrees, often in marketable subjects, who are financially stable; but alienated by some aspect of the injustice of the world, or disaffected by secularism or the wrong sort of religious practice, exactly which one varying by person.

They come in both flavors.

Comment Re:business of mass-murdering innocent people (Score 5, Interesting) 149

If anything, Al-Qaeda isn't actually in the mass-murder business.

They are a nasty bunch, treat civilian casualties as a feature not a bug, etc.; but they don't have nearly the resources or the direct combat assets; much less specialized infrastructure that must either be carefully hidden or sited in an area where you are the de-facto government, to do 'mass murder'.

They do terrorism: that tends to include a good deal of violence; but calibrated with an eye to maximum psychological impact, attacks on culturally salient targets, that sort of thing. In terms of straight body count, they rank well below more-or-less-strictly-business drug cartels, and even a fair percentage of the 21st century bush wars in countries that aren't interesting enough to even attract a few foreign correspondents; much less the sort of stuff that made the 20th century so notorious.

The numbers get a bit fuzzy because of the various more-and-less-actually-connected 'franchise' operators, some of which were actually collaborators to some reasonably close degree, some of which were little more than unrelated thugs with a taste for trademark infringement; but Al-Qaeda's body count just isn't that big. It's well weighted for psychological punch, lots of Americans in important buildings, fewer peasant conscripts in ethniclashistan; but in absolute numbers? Chickenshit. ISIS and Boko Haram are almost certainly well ahead; and let's not even talk about how quickly the professionals working for established nation states can stack up bodies...

Comment Re:from what I read... (Score 1) 35

The demo of course takes advantage of Sony’s ‘asynchronous reprojection’ technique to ultimately output at 120 FPS." Translation: Two eyes means two frames, so you get 120fps from 60fps. Right?

No, they are talking about a technique that is also used by Oculus to translate variable frame rate renderings to smooth fixed frame rate output without judder.

Comment So... (Score 4, Insightful) 150

What percentage of them would expect to receive zero praise and potential reprisal if they did report a security problem?

Yeah, sure, it's depressing that people aren't courageous moral heroes, or motivated to go above and beyond, most of the time, especially about boring stuff or things likely to get them in trouble.

Guess what? That's one of the areas where management is supposed to be earning its money. One of the differences between an effective organization and a trainwreck is how good the flow of information is: are important observations from the periphery being collated and passed on so that HQ can actually achieve a coherent larger picture of the world? Are directions and information passed back down usefully informed by that picture? Or do you have unrealistic demands and buzzword nonsense flowing down; and soothing lies flowing up?

This doesn't mean that 100% of employees are innocent('insider threats' are a subset of 'people who wouldn't report a security breach', since they create them; but not a terribly large subset); but if you have this problem on a large scale, that's because your organization is dysfunctional.

Submission + - Cox HSI ends unlimited internet, introduces cap system

Junior J. Junior III writes: Today, Cox High Speed Internet customers received the following communication:

Dear [Cox HSI Customer],

We spend more time online today than ever before, streaming movies and TV shows, downloading music, sharing photographs and staying connected to friends and family. As Internet and data consumption grows, Cox continues to improve our network to ensure a quality experience for all our customers.

To better support our customers' expanding online activity, we recently increased the amount of data included in all of our Cox High Speed Internet packages. About 95% of customers are now on a data plan that is well-suited for their household. In the event you use more data than is included in your plan, beginning with bill cycles that start on June 15th, we will automatically provide additional data for $10 per 50 Gigabyte (GB) block for that usage period. Based on your last 3 months of data usage and our increased data plans, it is unlikely you will need additional data blocks unless your usage increases.

What this means for you

To help our customers get accustomed to this change, we are providing a grace period for 3 consecutive billing cycles. During this period, customers will not pay for additional data blocks for data used above their data plan. Customers who exceed their data plan will see charges and a matching credit on their bill statement. Beginning with bills dated October 15th and later, grace period credits will no longer be applied, and customers will be charged for usage above their data plan.

Understanding and managing your data usage

You are currently subscribed to the Preferred package which includes a data plan of 350 GB (Gigabytes) per month. To help you stay informed about data usage, Cox will begin to notify you via email and browser alert if you use 85% of your monthly data plan and again if you use 100% of your monthly data plan. Additional blocks of data will only be provided if you exceed your data plan. This will not change your Internet package and there will be NO change to the speed or quality of your service for data usage above your plan. To better understand your household's historical and current data usage, you will find your household's data usage meter and other helpful tools and information here.

Thank you for choosing Cox.

Sincerely,

Cox High Speed Internet Team

In the wake of FCC's ruling reaffirming Network Neutrality, is this what ISPs will be doing to squeeze more money out of its customers?

Comment I hope that this was a bad description... (Score 2) 85

If you are serious about using bitcoins for transaction purposes, it seems pretty clear that there is a role for something more secure than 'wallets' running on people's shoddily-secured systems(or, god help us, 'cloud wallet' bullshit); by design, there isn't anyone in the ecosystem to soak up the fraud as a cost of doing business(which is what allows, say, absurdly pitiful CC security to survive), and the usual efficiencies associated with networked computers make stealing the things a great deal more efficient than stealing cash one wallet at a time.

If that is the idea; then sure, a 'bitcoin chip', is probably not the worst way to handle the problem(now, why any OEM would pay extra for the chip, the packaging, and the board space, rather than, say, just re-using the 'trustzone' stuff that basically all ARM cores have, or coaxing the 'secure element' that they are embedding to support some other contactless payment scheme into handling bitcoin related data, that's a much harder problem to answer). Assuming you don't fuck it up, it'll allow you to have a 'wallet' for bitcoins that isn't a total security disaster, is actually vaguely convenient in real life, and so on.

If the idea actually involves any 'mining' (beyond whatever bare-minimum might be needed for a wallet to initiate a transfer), though, this idea could scarcely be dumber. Bitcoin ICs are power hungry, achieve essentially zero gains from decentralization(modest resistance to datacenter fires, I suppose; but substantial additional bandwidth and control-node costs, plus the inability to concentrate them where electricity is cheap); and have so far become obsolete at a rate even faster than that of most cellphone components. Many of them don't even make it to customers before they burn more energy than they 'produce' in bitcoins; and the ones eating battery power, and baked into a cellphone for its entire life, sure as hell aren't going to do better.

At least the ones you keep at home are as efficient as electrical space heaters at converting electricity to heat, with some free math thrown in. In mobile devices, that isn't a virtue.

So what's the plan? Conceptually adequate, but probably doomed, smartcard-esque IC designed to implement a secure wallet; or utterly bullshit and completely crack-addled plan to distribute compute load to the worst possible places?

Comment Re:Compelling? (Score 3, Informative) 244

There's also the problem that TVs tend either to be cheap crap for the cost sensitive(a market where Apple has little hope, much less an advantage), or one component of a larger, often partially customized for the room, 'home theater' setup. The latter is the place where customers might actually be willing to spend more money to get cooler stuff; but Apple has a very, very, tiny product lineup compared to the demands of a home theater integration type; and has a fairly tepid history of playing well with others and not shoving their pro users under the bus because they want to iterate their product line at consumer speeds.

Not only is the TV market as a whole a bit of a bloodbath, the TV market for which Apple would be most capable(systems nicer than those purchased more or less purely on price; but cheap and consumer grade enough that they need cooperate in only the most basic ways with other hardware) is especially harrowing. Since TVs are a keep-it-simple-stupid sort of device, there's virtually no UI/UX difference between the cheap crap and the midrange, it's just a question of how nice the panel is.

At least with computers, it is very often the case that cheap computers are a recipe for regret and sorrow, so Apple's strategy of 'we are going to charge you more; but give you the product you actually want, even if you don't know it yet' often makes people happy. With TVs, people who think that they want a big, cheap, screen are usually correct.

Comment Re:epoxy? (Score 2) 88

Whatever they encased it in was on the seriously lightweight side. 30 minutes in acetone and the case dissolved right off, leaving the PCB and all the ICs and passives in pristine condition. That's not 'tampering', that's 'cleaning'; and the device appears to have rolled over and wagged its tail by way of resistance.

If you are serious, you at least use the same stuff that the ICs are packaged in, which tends toward the 'black as sin and harder to remove' school of adhesives. Hot nitric acid will usually do the job; but you need to know what you are doing if you don't want it to remove the contents of the package at least as enthusiastically as it removes the package; since destroying the contents defeats the purpose of the exercise.

Comment Yes and no, mostly no. (Score 2) 618

While I find his preaching about the moral rightness of what he does, and our duty to endure whatever shit he wishes to shove in our faces to be deeply obnoxious; it would not entirely surprise me if this little experiment by the carriers ends up going...badly.

Ad-blocking at the client end('client end' includes routers, filtering appliances, etc. under user control, if the applicable network is large or geeky enough) is simply the right of the individual to run the software of their choice on their hardware, to best serve their interests, in action. Running a public HTTP server doesn't give you some special right to dictate how the output is formatted for display.

Ad-blocking at the carrier level, though, gets risky fast. Whenever an ISP starts deviating from 'dumb pipe' operation, you have to start worrying about whose interests are going to win out, and how dramatically. Especially risky if (as is the case with quite a few cellular companies and ISPs) they also have a side interest in advertising, consumer analytics, a media arm, or other properties that could benefit from a little traffic meddling. We've already seen some of the more obscure WISPs provide 'ad blocking', then inject their own ads over the originals, worst of both worlds.

Ad blocking is well and good(and, frankly, until the advertisers can clean up the ghastly security situation, they have no justification for whining. Ads are easily the most dangerous part of most parts of the web you'd admit to visiting in polite company); but anything that gives ISPs more control over traffic is to be watched with considerable concern. You don't think that a plan to stick it to google is going to stop at blocking google's ads, do you? Not when they could use their privileged position on the wire to achieve the same tracking and advertising that google actually has to offer attractive services to achieve...

Comment Re: Pass because the price point is too high (Score 2) 80

My impression is that Apple's industrial design people believe cables, physical buttons, and anything that requires a hole in the shell of the product to be intrinsically filthy and sinful.

The mac mini, which has among the fewest integrated peripherals of any current Apple product, wantonly incites users to plug their filthy cables into the various ports cut into the perfection of the aluminium body. The iMac, by contrast, can be used in relative purity(with bluetooth peripherals) marred only by a power cable that is discretely hidden as such a shame should be.

Slashdot Top Deals

MESSAGE ACKNOWLEDGED -- The Pershing II missiles have been launched.

Working...