Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Ha Ha (Score 1) 299

A dangerous proposition? Its public knowledge that operators must provide network based interception facilities. Its a legislative requirement in virtual every country in the world and its standardised. Beyond that, operators can be told to turn off the encryption entirely allowing security forces to directly listen directly using scanners (some phones will display a warning icon in this case). This happened in Moscow after the theatre bombing.

Comment Re:Commendable... (Score 1) 621

Whether he was doing his job correctly or not, he was not necessarily incompetent. He managed to install SETI@home on 5000 distributed machines, and also reconfigured their firewalls. This indicates that there exists *significant* levels policy management across the district. The estimation of "at least $50,000" to uninstall what he has installed is over-inflated by a factor of at least 10.

Comment Re:objective my ass... (Score 1) 1174

You can't classify a user ignoring the rated fuse *written on the plug* and *color coded on the plug* as a failure of the UK plug. The fuse is there for the same good reasons that (some) appliances have fuses inside -> fit the wrong one and it won't work properly (which is what Wikipedia says!); wiring will melt, (more) circuitry will fry.

Comment Re:Put the damn thing in neutral! (Score 1) 1146

In 2005 there was a chap in Renault Megane who claimed cruise control would not disengage. He was in France on the Autoroute, there are toll gates. He phoned up the emergency services and they cleared the toll areas and raised the barrier so he could go through. In this case turning the key wouldn't work, the ignition is a electronic card. Several cars suffered the same problem. Renault denied saying it was a result of drivers pressing the clutch instead of the brake!

Comment Do not take watermarking lightly. (Score 1) 365

Do not take watermarking lightly. This has been a research topic for video for at least a decade, by the companies that store 50GB video data using invisible to the naked eye pits on 12cm discs using blue light - not the RIAA. This is *analogue* signal processing not bits and bytes and bar codes. One aim has been for the watermark to survive cinema screen->camcorder->avi... its not about hiding the information in bits and bytes in the stream, its about hiding the information in the image (or audio). Its a challenge, but its only a very small amount of information that needs to be hidden, 64bits would be more than enough, and over a 2 hour film, it can be hidden *many* times. Its not unimaginable that imperceptible low frequency variations could be inserted into the image and extracted several times overlayed with high frequency variations. Of course it would have to be adapatable to the type of film, it may only encode during dark scenes, it may only encode duting light scenes, in a dark corner... and then add a similar mechanism in the audio. This is done in the mastering. You might filter some of it out, but certainly not all. Diff it? You're having a laugh. The only way to guarantee removal would be to have access to the profile used for the master of that particular movie. You could get hold of a pre-master. But would you know it was 100% clean?

Slashdot Top Deals

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...