Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:How to write a good ticket (Score 1) 232

need access to my smart-phone for various reasons

[...]

various sorts of data access

Part of writing a good ticket is being specific about your use case and not presupposing the solution. From what you've written, the problem is not technical and has nothing to do with a smart watch. The problem is you are forgetful.

If you can be specific about what you are actually doing with your phone, we can give you solutions that may or may not involve a smart watch.

This is it exactly. The solutions to the problem of not having phone-like features attached to your wrist (where you can't forget them) are either a: purchase a several hundred dollar bit of tech that you clearly dont know suits your needs, or b: tie your phone to your fucking wrist.

Comment Re:I believe it! (Score 1) 48

According to the Magic Leap website, their Dynamic Digitized Lightfield Signal technology permits generating images indistinguishable from real objects.

...provided the real objects are themselves images. Look! That simulated JPEG looks exactly like a real JPEG!

I read it more like "this new gizmo permits generating anything! As long as you have some other way of generating it, then this thing won't get in the way at all!"

The word "enables" sounds more like technology that actually does something, and even that's a stretch. The word "permits" sounds like it's just a link in an otherwise useless chain.

Comment Re:Depends... (Score 1) 170

I would say that advertising the 'service' as end to end when it isn't even legal for it to actually be end to end is a legitimate moral shortcoming.

The term "end-to-end crypto" says nothing about who else might have the crypto key. Just blindly assuming that no one in the middle has it, it is a real shortcoming. The only way for a system like you are imaging (where only the caller and receiver have the key) to even work is for you to somehow establish a trusted key with every person you call, on the fly. How do you know no one is in the middle, ready to intercept the key before the first call? The only reason SSL/TLS is reliable is that there is a huge infrastructure of trusted root certificates to validate against (and you have to trust that third party who holds those certs). Guess what they are going to do for encrypted phone calls? The exact same thing.

Knowing that you are talking to who you say you are, and that no one outside of the org you *already* trusted to generate the software and the keys, is the only real assurance. Choosing the right provider of that infrastructure is obviously important. Given that Verizon is a huge, federally regulated company, do you really think anything passing through their hands is going to be immune from law enforcement attempts at seizure? No company at that level, moral or immoral, is going to be immune to state pressure. You should know that by now.

Comment Re:This should be free (Score 0) 170

if the keys aren't private then it is hard to claim the encryption is worth anything..

So all the SSL keys that have been generated by the root CAs aren't "worth anything", because the issuer has a copy of the private key? Seems like a funny system we spend billions of dollars on every year...

Comment Re:Depends... (Score 3, Informative) 170

From TFA:

"...the legislation known as the Communications Assistance for Law Enforcement Act requires phone carriers to decrypt communications for the government only if they have designed their technology to make it possible to do so. If Verizon and Cellcrypt had structured their encryption so that neither company had the information necessary to decrypt the calls, they would not have been breaking the law."

TFA is a plain ol' troll. CALEA indeed requires any switching systems used for voice traffic (land lines and cell phones) to allow for electronic eavesdropping of all calls going through them. The only caveat is that replacing/upgrading every switching system is completely impractical, even in decades-long time frames, so the FCC has been granting extensions for non-compliance. If Verizon went to the FCC saying that they were going to put software in that started to roll back CALEA compliance from any call that happened to be made using a pair of their cellphones running their provided encryption software, they would have thrown the book at them. New systems *do* have to be CALEA compliant.

Comment Re:Depends... (Score 2) 170

My kingdom for a modpoint! This whole submission is a troll right down to the last line, "Apparently, in Verizon-land, "end-to-end encryption" means something entirely different than it does in the real world." Thinking that a large, federally regulated business is going to push a system without a central keystore (what they meant to jab at instead of the "end-to-end" nature) is laughable. Trying to make Verizon out as the bad guy over this is just taking away time that could be spent making them out as the bad guy over legitimate moral shortcomings. But, trolls will be trolls.

Comment Re:And knowing is half the battle (Score 1) 48

plus FAA typically only cares when it's a powered craft being used for commercial purposes.

I agree with the rest of your comment, but this part isn't accurate, otherwise GA wouldn't even need a license.

The FAA has only pursued "drone" (R/C) pilots who stay below 700' AGL when they fly for commercial purposes (aka as a business). Plus, you can fly manned ultralights without a license; the FAA steps in with licensing when the craft is above a certain size or carries more than 1 passenger. So, yes and no. I should have said "The FAA typically only cares about unmanned flight when..."

Comment Re:And knowing is half the battle (Score 0) 48

I guess now we know who pushes those "news stories" about all the near-catastrophic near-misses

The FAA is an example of regulatory capture. It is run by aviators for the interest of pilots and aviation companies, who see drones as a threat to their businesses and jobs. So they push the stories that fit the narrative that drones are an evil threat. The FAAs regulations have become so draconian, that it is technically illegal to toss a frisbee.

You must have a hell of an arm, because the FAA is only responsible for airspace above 700 feet AGL unless you happen to be on or very close to an airport, plus FAA typically only cares when it's a powered craft being used for commercial purposes. And, until there is a standard frozen-drone-through-the-inlet test on jet engines to prove that a strike would be survivable for the aircraft, they do have a duty to take action to prevent a mid-air collision that could kill many tens or hundreds of people.

Comment Re:Unsustainable business model (Score 3, Insightful) 59

The makers won't use this service. 3 years ago every hackerspace had a 3D printer, and it was a cool reason to join up. Now, the makers just buy their own printer. The cost has gone down, and designing a 3D object is an iterative interactive process.

There was, and is, and will continue to be, a huge difference in what you can do with a 3d printer that costs a few hundred (currency units) and one that costs a few thousand or tens of thousands of (currency units). A Maker who is not interested in mass producing things but instead wants to create a few interesting objects at a time will probably see a huge benefit to being able to just order up the object (instead of outlaying a huge amount for a printer) from a service that has both a very high quality printer, and a delivery chain to get it to them very fast. How many Makers like that are there? Who knows.

Comment Re:practical-based certs hold their value (Score 1) 317

I would argue that certs with practicals (CCIE, JNCIE, RHCE, etc) tend to hold their value much better than those that can simply be gotten by taking tests.

Since he mentioned that he is more into management than programming/engineering, the other very relevant "cert" is the PMI Project Management Professional endorsement. This would be the direction to go if he doesn't want to get deeper into the technical soup of vendor-specific credentials.

Comment Re:bogus pharmaceuticals/unauthorized pharmaceutic (Score 1) 82

The FDA has rather strict quality control standards so my guess is these pharmacies have not gone through the process to be fully licensed. And another thing:

But worse than that, he believes that the single biggest reason neither the FDA nor the pharmaceutical industry has put much effort into testing, is that they are worried that such tests may show that the drugs being sold by many so-called rogue pharmacies are by and large chemically indistinguishable from those sold by approved pharmacies.

Yes...after the quality control of toys, toothpaste, dog food, and drywall from China, we're sure we can trust their quality with our pharmaceuticals.

Yeah, you know, they are "by and large" indistinguishable from the real ones. I mean, what's a few PPM of arsenic, or cyanide, or lead? The rest of the drug is still there, and that's what you ordered. You wouldn't send a gourmet steak back just because the cook brushed a little olive oil and salt on it, when it was listed on the menu as just a steak? So why are we rejecting these drugs?

/sarcasm

Comment Re:Over what time interval? (Score 1) 528

Obvisouly a while but its not out of the question. Sony pissed off North Korea several months ago when they announced The Interview. If it takes a week to download ~100TB at ~1Gbps then a couple weeks/months is all they need for all that data.

Agreed, but, isn't someone monitoring internet usage? 100 TB being downloaded even in a week to 10 days is an increase of multiple terabytes a day over whatever they normally use. One would think that would cause a spike on a graph somewhere, that someone ought to have investigated.

I've been hosting websites for years, and the only time I was ever compromised (one server turned into a spam mail server -- how embarrassing) I caught it almost immediately by a sudden spike in the network traffic.

As someone else said, since Sony has been compromised before, it just seems amazing that there wasn't some higher level of scrutiny.

North Korea would no doubt draw suspicion by having that much data going toward their country anyway, given that they dont have an open internet. No, if this was in any way related to NK it was by money trail only. They perhaps incentivized a hacking group or an insider with a few hundred thousand USD (maybe a few million if its delivered as counterfeit 20's and 50's) and the rest was done on the ground in the US, from one or many different routes over long periods.

Comment Re:Over what time interval? (Score 1) 528

"Plug in a device, let it download, then come get it the next night."

100 TB / 24 hrs... = 9259259259 bps. So, plug in a device which can store 100 TB into a 10 Gb network port which connects to every data source at full speed, and that's it? A device which can hold 25x 4 TB drives would be pretty big, and it's unlikely all their systems and interconnects are 10G.

By "next night" it was impossible for you to roll that into "in a week" or even "in a month"? Lights out facilities leave things untouched and even un-looked-at for months on end. And who says the 100TB is the compressed size? No doubt whoever did this was very skilled, packing things in compressed, encrypted chunks for easy exfiltration and minimal chance of detection. If it took them 1 night or 10 nights or 100 nights the plan would have worked the same way.

Comment Re:Yeesh (Score 1) 584

Claiming that biology cannot influence differences in the way boys/men and girls/women act is not just ignorant. It's flat out absurd.

Except no one claimed that it cannot, only that it is not likely in this circumstance. The question on the table is to what extent dimorphism influences intellectual pursuits. Numerous studies have shown that boys/girls/men/women do not have any measurable difference in cognitive function across domains like math, science, etc. so the question remains, does the fact that dimorphism leaves cognitive capability (the ability to learn and practice a given domain) completely untouched mean that the gender biases toward certain career fields exist primarily outside of genetics?

Slashdot Top Deals

If Machiavelli were a hacker, he'd have worked for the CSSG. -- Phil Lapsley

Working...