Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:yes (Score 1) 91

our brains are not "like computers" in how they work

True enough, but that says nothing about what kinds of processing can be realized in either. There are so many layers of abstraction between the brain and the mind that it doesn't make sense to say that minds are made of neurons. Minds are made of abstract things which are made of abstract things, (which are... etc, etc), which are eventually made of neurons. But they could eventually be made of transistors, what does it matter how the bottom few layers work?

Comment Re:Hold up now (Score 1) 167

Oops, I guess I did imply that. I just meant that their are good reasons why the tax code is complicated, and that shouldn't prevent the taxation of intellectual property. The whole system needs massive reform anyway; companies that own a lot of IP already put them in holding companies and then licence them back to themselves.

Comment Re:sibling fairness (Score 1) 167

Hmm.... Maybe they should do this with intellectual property.

The owner of intellectual property would be taxed based on a value the owner specifies annually. The government would have the option to purchase it for that amount, perhaps with an added premium. If the property is sold, the purchaser is taxed initially based on what they paid. Licences & royalties would be limited based on the taxed value.

I was about to say maybe this would be too complicated to get right... then I remembered our tax code.

Comment Re:OpenPGP (Score 4, Informative) 63

Found a nice simple explanation of how this works here. There is a secret somewhere that isn't compromised, but it is ephemeral and isn't ever stored anywhere or transmitted. So that's what you meant by "long term". It's very clever. Makes perfect sense now, but it's counterintuitive, at least to me.

Anyway, thanks. I learned something new, which is why I still come to /.

Comment Re:OpenPGP (Score 1) 63

even if all the long-term secrets (passwords, keys, etc.) involved in a conversation are stolen, the person who stole them cannot go back and decrypt the encrypted messages.

I can't wrap my head around that. The way you've described it, it isn't possible, unless the original intended recipient also can't decrypt it. There must be at least one secret somewhere that isn't compromised (the recipient's private key maybe).

BTW, does your sig ever get you modded redundant? :)

Comment Re:Don't buy American. (Score 2) 63

You're right. They usually aren't, but unintentional vulnerabilities can be subtle. Intentional vulnerabilities can be subtle to the point of genius. If you're just casually reviewing code that isn't specifically known to be vulnerable, and especially if the vulnerability is intentional, it may never be discovered.

This is why security sensitive functions need to be system code, not application code. System code, and hopefully coders, tend to get more scrutiny, have higher standards of quality, and have a more conservative approach in general. Repeating security functions in each application is insane.

Comment Re:When you encrypt everything... (Score 2) 200

Exactly. The payload is encrypted, not the entire packet. You can't route traffic if you don't know where it's going. If people start watching Netflix through tunnels, the ISPs will just throttle tunnels.

Net neutrality doesn't have to mean that each packet is equally important, it should just mean that the ISPs and backbone network should be neutral about it. How about letting the endpoints decide how to prioritize their own traffic? Seems like an obvious way to stop abuse from ISPs and still get QoS for things that need it like games and video.

Comment I don't get it. (Score 1) 96

I don't get it. This makes absolutely no sense. A page full of apps each with their own implementation of encryption is not what we need. Why are we doing this at the application level? Have we all gone insane?

In the face of widespread Internet surveillance, we need a secure and practical means of talking to each other from our phones and computers.

Agreed. I have a suggestion: internet layer encryption that hasn't been compromised by the NSA?

Comment Re:umm.. what? (Score 1) 150

Excellent post, but one thing bothers me.

In Quantum Mechanics, determinism does not apply.

Isn't that begging the question? I'm not a physicist, but my understanding is that the question of determinism is a matter of interpretation. (Quantum mechanics can be understood to be deterministic.) Isn't that the question they are poking at here?

Comment Re:Save the humans! (Score 1) 583

Why would they have any goal to be working toward at all? We take it for granted that an intelligent entity would necessarily value self-preservation. But it doesn't have to be so, that's a product of natural selection. Why would a machine intelligence "care" if it survived? Why would it care about anything, for that matter? If anything, it'll be selected to have goals to serve us.

If intelligent machines ever pose a threat to humans, it will be because of another group of humans giving them that goal.

Slashdot Top Deals

"Little else matters than to write good code." -- Karl Lehenbauer

Working...