Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:This happened with the Dutch in 2006 (Score 2, Informative) 157

You seem to think that paper voting systems by neccessity depend on transporting all the ballots to a central location, where they'll be counted.

This is how paper voting works in Sweden.

To summarize and simplify:

  • On election night, the ballots are hand-counted by election officials at every polling station. Results are phoned in to the authorities and tallied, and made available to the general public. (Basically an entire database dump of vote tallies in every district is made available as an XML over the Internet. Pretty cool.)
  • Afterwards, ballot boxes are sealed and sent to the local county to be counted again.
  • It goes without saying that Sweden is not directly comparable to Brazil, but consider this for a moment. It doesn't require all ballots to be hand-delivered to a central location where they will be counted - it's scalable. And no less secure than electronic voting. Probably just as secure technically, and more secure in practice, because it's easier to see when funny stuff happens to ballots in boxes than when bits are flipped.

Comment Re:Solution looking for a problem (Score 1) 412

No need to guess. I'm from Sweden.

The intent of my grandparent post wasn't to say that everywhere that matters has wireless broadband right now, I'm just saying that within a few short years, cell networks simply are going to get much better all over the world, simply because of the demand for services like this. Well, okay, short of places like North Korea or the North Pole.

Even in the remoter areas of the world, or in areas with practically no telecom infrastructure, cell service is how the world is being connected, because it's simply too expensive to hardwire everyone in.

I simply don't see the attraction of having a read-only device with no real time updates and no communication capabilities, in the long run.

My point is, that a product like this is an technological evolutionary "dead end" - doomed to be swallowed by and forgotten in favor of the ubiquitous web browser in your pocket - technology that exists and works today.

Comment Re:I read (Score 1) 230

From my understanding of the blog post, the hole described by the blog post allows you to write a data structure containing the window size into any arbitrary kernel memory location.

The information about terminal window size etcetera comes from the teletype. I'm sure that it wouldn't be too difficult to write an exploit which basically implemented a "stub" teletype which had most features unimplemented except one that returns a fake window size - allowing you to write arbitrary data to kernel memory.

Now, I'm no kernel hacker, I frighten easilly at the sight of X86 assembler, but I'm sure that - once you can actually write arbitrary data to kernel memory - you can get root in pretty short order. I don't know - the most straightforward way to me would sound like just munging the process table.

Comment Re:Hacking Safari? (Score 2, Insightful) 150

To give you an idea about how slow Apple are about patching security holes, and to add another data point to the description:

I reported the security issue known as CVE-2009-1697 (which is included in this large patch release). The e-mail back from Apple confirming receiving my report of this issue is dated January 7, 2009 in my e-mail inbox. That's about half a year ago.

Now, granted the security bug I reported is actually very difficult to exploit and do anything actually useful with. Basically, if you used XMLHttpRequests in Safari and requested a URL ending with a newline, it would end up in the final HTTP request as double newlines. I.e. the HTTP header would be terminated prematurely (before the Host: header, significantly) and thereby allow javascript to access files hosted on the default website on the same server the javascript was served from. For example, if victim.example.com is served on the same IP address as evil.example.com - javascript on evil.example.com could use this to request files on victim.example.com.

In other words - you could do cross-site-scripting targetting another web site served on the same IP address as the web site hosting the exploit.

Still, took them about 6 months to patch it and actually roll it out an update, it seems. Heh.

Comment Re:how outragous laws get passed (Score 1) 318

Eil,

This post so wonderfully parallells current political developments in Sweden that I had to re-post it on my blog for more people to read.

Link to blog post (in Swedish -- at least the parts you didn't write :-))

Mostly incomprehensible automatic Google translation

Thanks for taking the time to write your comment.

Space

Ionospheric Interference With GPS Signals 127

Roland Piquepaille writes "In recent years, we have become increasingly dependent on applications using the Global Positioning System, such as railway control, highway traffic management, emergency response, and commercial aviation. But the American Geophysical Union warns us that we can't always trust our GPS gadgets because 'electrical activity in the... ionosphere can tamper with signals from GPS satellites.' However, new research studies are under way and 'may lead to regional predictions of reduced GPS reliability and accuracy.'" Roland's blog has useful links and a summary of a free introduction, up at the AGU site, to a special edition of the journal Space Weather with seven articles (not free) regarding ionospheric effects on GPS.
Privacy

Submission + - Swedish SIGINT agency FRA the new "echelon"

kursu writes: "As we feared here in Sweden, the government has now approved FRA (Försvarets Radio Anstalt) which is a signal intelligence agency part of the Ministry of Defense to do in-depth wire-tapping of the internet traffic in Sweden.

The proposal was approved by the Lagrådet (law council) 2007-02-09.

This is just one of many laws passed lately that threats the democracy and free speech i Sweden.

Swedish: Oscar Swartz about the Regime supercomputers around the corner.
The new wiretapping law
National Defense Radio Establishment (FRA)
Wikipedia about ECHELON"
Music

Submission + - Major record producer blatantly ignores copyright

gloom writes: In a follow-up to one of the more exciting David VS Goliath-stories so far this year, american super-producer Timbaland now speaks out on a radio-show ("Elliot In The Morning") and to MTV regarding the allegations that he stole a song from finnish demoscene musician Janne Suni. It would be sort of funny if it wasn't so serious — I quote:

""It makes me laugh. The part I don't understand, the dude is trying to act like I went to his house and took it from his computer. I don't know him from a can of paint. I'm 15 years deep. That's how you attack a king? You attack moi? Come on, man. You got to come correct. You the laughing stock. People are like, 'You can't be serious.'"

Is this new version of the Chewbacca-defence going to hold up? Is it okay to steal music and pass it off as your own as long as you are already famous?
Censorship

Submission + - YouTube bans video containing Qur'an quotes

skraps writes: "YouTube, in a move that has caused quite a reaction in the community, has censored popular atheist commentator NickGisburne. Mr. Gisburne has built a large following on YouTube by making simple and accessible logical arguments against Christian beliefs, and had recently decided to change the focus of his videos to the Qur'an, the central religious text of Islam. YouTube reacted by deleting his account, along with 60+ videos, after he posted a simple slide-show video with direct quotes from the English translation of the Qur'an, containing no commentary aside from the video's title "Islamic Teachings — Cruelty from the Qur'an". YouTube's explanation was "After being flagged by members of the YouTube community, and reviewed by YouTube staff, the video below has been removed due to its inappropriate nature. Due to your repeated attempts to upload inappropriate videos, your account now been permanently disabled, and your videos have been taken down."

Do "Web 2.0" sites like YouTube fit the legal definition of a "public commons", and if so, what will it take for corporations like YouTube to start honoring constitutionally protected speech?"

Father of Internet Warns Against Net Neutrality 322

An anonymous reader writes "At a recent talk at the Computer History Museum Robert Kahn, co-inventor of TCP/IP, warned against net neutrality legislation that could hinder experimentation and innovation. Calling 'net neutrality' a slogan, Khan also cautioned against 'dogmatic views of network architecture.' A video of the talk is also available."
Announcements

Submission + - Long-lived super heavy element created

treeves writes: "Radioactive nuclei that hang around for a mere half-minute before falling apart hardly seem stable. Yet compared with the fleeting lifetimes of their superheavy atomic neighbors, the roughly 30-second period that transpired from creation to disintegration of four atoms of a newly discovered isotope of element 108 qualifies those atoms as rock solid.

Theoretical physicists predicted years ago that some nuclei of elements much more massive than uranium should survive for a relatively long time — possibly long enough to probe their chemical properties — if they could be synthesized. On the chart of nuclides, theoreticians pinpointed a region with coordinates corresponding to 114 protons and 184 neutrons and indicated that nuclei with those "magic" numbers of subatomic particles should lie at the center of an island of stability. The nuclear longevity, according to the models, is due to the closing of proton and neutron shells, which renders the particles stable against spontaneous fission much the same way that a filled outer electron shell endows noble gases with chemical inertness. Experimentalists, though, haven't yet found a route to reach the center of the island.

Other theoreticians calculated the effects of subshell closings in other superheavy nuclei. They concluded that an isotope of hassium containing 108 protons and 162 neutrons (270Hs) should survive a long timemuch longer than the millisecond or shorter lifetimes typical of most of the heaviest nuclides.

Now, an international team of experimentalists has detected four of those atoms and probed some of their chemical properties during the roughly 30 seconds the nuclei survive (Phys. Rev. Lett. 2006, 97, 242501). The findings confirm the predictions and provide new statistical data with which such theoretical models can be refined. The team includes 24 scientists from 10 research institutions, including the Technical University of Munich (TUM) and the Institute for Heavy-Ion Research (GSI), both in Germany, as well as institutions in Russia, the U.S., Switzerland, Japan, China, and Poland.

As TUM graduate student Jan Dvorak explains, the hassium nuclei were formed by firing a high-energy beam of 26Mg projectiles into a target enriched in 248Cm. [http://pubs.acs.org/cen/news/84/i52/8452hassium.h tml]"

Slashdot Top Deals

Work expands to fill the time available. -- Cyril Northcote Parkinson, "The Economist", 1955

Working...