Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Not just robot armies (Score 3, Interesting) 161

Even if it's bound by the laws of physics as we understand them (Stross-universe-like "P=NP"-powered reality modification aside) there are plenty of dangers out there we're well aware of which computing technology could ape. Nanoassemblers might not be able to eat the planet, but what if they infested humans like a disease? We're already having horrible problems with malware clogging up people's machines, and they're coded by humans; what if an artificial intelligence was put in control of a botnet, updating and improving the exploiters faster than anyone could take them apart?

Submission + - Megatokyo Gets a Visual Novel Game

TheSHAD0W writes: It's been over a decade since Megatokyo was mentioned in a Slashdot story. Fred Gallagher, author of the long-running webcomic, has launched a Kickstarter for a Megatokyo Visual Novel Game. The KS has fared very well, funding its basic goal in less than four hours and covering most of the posted stretch goals in the first twenty-four. Fred also posted a half-joking stretch goal at a half-million dollars to include "excessively romantic content", wink wink nudge nudge. He may have been kidding, but there are some indications it might be reached.

Comment FOSS (Score 2) 318

I wonder how this could ever be implemented in FOSS.

The same way anything is implemented in FOSS. It'll be written into the source. Lots of people will modify the code to disable the backdoors. People will post versions of the software with the backdoors missing, many of which actually still have them or have different backdoors installed. Governments may lead an automated search for software without the backdoors, or may simply ignore it uniless they have a reason to target the individual using it.

In other words, what a fucking mess.

Comment what to target (Score 1) 482

Typically nations are expected to attack the other nation's strategic resources, and any people who get in the way are going to get creamed. Nations may also target persons who are providing an effective defense or offense against themselves. There's nothing new here.

However, as mentioned above, it may be very difficult to accurately target the hacker. IMO in most cases it will prove more efficient to target the other nation's infrastructure. Breaking fiber optic links, locking attackers out of satellites you control and jamming or destroying satellites you do not, would likely prove more effective in blocking further cyber-attacks than trying to locate and kill individuals.

Comment Re:Waiting for the other shoe (Score 1) 437

Yeah, I'm expecting a machine to be grabbed, then hacked, and all the coins in its account moved out.

If they're smart, they'll have a separate account for each machine to limit the potential damage, although this may make scaling and inventory difficult.

Comment Re:stupid observation... (Score 1) 909

Interesting.

Part of this is, I'm sure, that the drive measurement is a meta-level away from the socket dimension, and has simply become so universal that no one questioned it. (Sort of like SAE measurements, before metrification became trendy, talking about meta-levels.) Another part of it is that, being square drive, there's a bit more room for play in the connection than in a hexagonal drive, and if it doesn't fit right you can usually take a grinder to it to make it work.

I just found it interesting.

Slashdot Top Deals

The most exciting phrase to hear in science, the one that heralds new discoveries, is not "Eureka!" (I found it!) but "That's funny ..." -- Isaac Asimov

Working...