Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:FF Codebase Is A Stinking Pile Of Garbage (Score 2, Insightful) 426

It's your type of thinking that caused Netscape to fail.

True, it had a terrible codebase. This was from trying to add features at a rapid pace in order to compete with IE at the time of the browser wars.

However, at some point a genius like the parent AC came along and decided that the entire codebase had to be rewritten.

This left them in the dust, with IE claiming nearly 100% marketshare.

What they should have done was rewrite code a bit at a time. The code could slowly improve, and they would still remain competitive. This is the course that has been chosen for Firefox.

Comment Re:Kudos to NSA (Score 5, Informative) 140

Just a correction: Regardless of who developed this (there seems to be some disagreement), nobody turned it over to the public domain. Read the license agreement: it says that you are not allowed to even create derivative works, nor redistribute the program to multiple sources, nor use it for commercial purposes.

Comment Re:Windows again (Score 1) 171

I think that Windows will eventually (not soon, but eventually) fail for a similar reason to Amiga.

The problem is that technological (hardware) breakthroughs are accelerating (think Moore's law). In order to keep up, proprietary companies must continue to pour more and more resources into research and development in order to keep up. Open source has no such problem since anyone can contribute to research and development at no monetary cost.

If you don't believe me, just look here. USB3.0 is already being developed for Linux, whereas it doesn't look like Windows 7 will even have support for it when it is finally released. While the latter fact may change (AFAIK it may already have changed), it does seem indicative of similar trends in the future as the rate that technology improves increases even more.

Comment Re:My favorites: Keccak and Skein (Score 1) 125

Why would that matter ? The attacker still knows the state of the hash just prior to inserting the SEED, so what do we gain from this ?

You're right. I hadn't thought of it that way. I suppose that the only real solution to this would be to double the message, such that every part of the message has a chance to affect the resultant state after every other part of the message has been hashed, ie:

hash(n+SEED+n+SEED) or hash((n+SEED)*2) depending on your personal preferences for pseudocode.

I will now assume that a truly secure hash algorithm does this automatically and move on.

How about using hash(n + previous_hash) ?-)

hash(n+previous_hash) is also totally unacceptable. Each new hash value has a 1/(2^hashlength) chance of colliding with another sequence created using an arbitrarily chosen SEED. Again, I invoke the birthday paradox. After 2^(1/2*hashlength)==sqrt(2^hashlength) new numbers there will be a 50% probability of the two sequences colliding and being the same sequence thereafter.

I suppose you probably already understood this to some degree, as you put a "?-)" after your question, but I decided to answer seriously anyway.

By the way, IANACE (I am not a cryptology expert), but I have read some books on it and taken a course at CTY, and have also done some of my own research online and theoretically (ie, thought experiments having to do with ideal systems AND practical systems).

Comment Re:My favorites: Keccak and Skein (Score 1) 125

The problem with this, of course, is that due to the Birthday Paradox, you will start creating a loop after (on average) sqrt(NUMBER_OF_POSSIBLE_HASH_OUTPUTS). For short messages, this is usually okay, but for long streams of "random" bytes, this is totally unacceptable.

On the other hand, you could use a stream based on the following:

hash("1"+SEED)+
hash("2"+SEED)+
hash("3"+SEED)+
hash("4"+SEED)+ ...
hash("1231142"+SEED)+
hash("1231143"+SEED)+ ...

assuming that your hash has a distribution indistinguishable from a random distribution.

By the way, the reason you put the SEED after the consecutive strings is that if two different seeds result in the same hash state, it will not matter since they are editing the state instead of creating it initially. Assuming a secure hash, hash(A)==hash(B) does not imply that hash(C+A)==hash(C+B) although in all modern hashes that I know of, it usually implies that hash(A+C)==hash(B+C) since new data edits the old state, and old data has no chance of editing the new state.

I hope my explanation makes sense, but if it doesn't, ask questions and I'd be happy to elaborate.

Comment Re:saying. "Fast forward to the 21st century" (Score 5, Insightful) 504

That's what calculus is for. It's so that the people selling the software/music/media/stuff/whatever can graph the people willing to pay against the price. Then they plot their expected profits for each price against that in order to find the optimal price.

People like you and me and anyone else who thinks the products are overpriced are not going to buy them. Either the companies making the products will be forced to lower the price to a more optimal one, or they will be able to keep it at the same price.

The problem is that they are claiming loss of sales for piracy done by people who never would have bought the game in the first place since the price is not right.

Granted, I am not a gamer and don't even bother to download these things since I don't have the time to play them, so take my gaming specific claims with a grain of salt.

Input Devices

Researchers Turn Tables and Walls Into "Scratch Input" Surfaces 54

An anonymous reader writes "Researchers at Carnegie Mellon University's HCI Institute have developed a new input technology that allows mobile devices to use surfaces they rest on, like tables, for gestural finger input. This is achieved with some clever acoustic tricks — basically taking advantage of high frequency sound propagation through dense materials. Their video highlights some neat applications, such as controlling an MP3 player by scratching on a wall and muting a cell phone by scratching on a table. Further details are available in the academic paper (PDF)."
Image

Identifying People By Odor As Effective As Fingerprinting 157

A study has found that everybody has a unique body odor, like their fingerprints, that could be used as an unique identifier. The study showed that a persons unique odor stayed the same even if they varied their diet with strong smelling foods such as garlic and spices. "These findings indicate that biologically-based odorprints, like fingerprints, could be a reliable way to identify individuals," said Monell chemist Jae Kwak. I would have thought that hundreds of years of dogs tracking people would have proved this, but it's nice to know that science has figured it out officially now.
Linux Business

German Foreign Ministry Migrates Desktops To OSS 147

ruphus13 writes "Here's another example of 'German Engineering' — The Foreign Ministry in Germany is migrating all of its 11,000 desktops to GNU/Linux and other open source applications. According to the article, 'this has drastically reduced maintenance costs in comparison with other ministries. "The Foreign Ministry is running desktops in many far away and some very difficult locations. Yet we spend only one thousand euro per desktop per year. That is far lower than other ministries, that on average spend more than 3000 euro per desktop per year ... Open Source desktops are far cheaper to maintain than proprietary desktop configurations," says Rolf Schuster, a diplomat at the German Embassy in Madrid and the former head of IT at the Foreign Ministry ... "The embassies in Japan and Korea have completely switched over, the embassy in Madrid has been exclusively using GNU/Linux since October last year", Schuster added, calling the migration a success.' The Guardian has additional coverage of the move."
The Almighty Buck

Fuel Efficiency and Slow Driving? 1114

vile8 writes "With the high gas prices and ongoing gas gouging in my hometown many people are trying to find a reasonable way to save gas. One of the things I've noticed is people driving exceptionally slow, 30mph in 45mph zones, etc. So I had to take a quick look and find out if driving slow is helpful in getting better mileage. I know horsepower increases substantially with wind resistance, but with charts like this one from truckandbarter.com it appears mileage is actually about the same between 27mph and 58mph or so. So I'm curious what all the drivers out there with the cool efficiency computers are getting ... of specific interest would be the hemis with MDS; how do those do with the cylinder shutoff mode at different speeds?" Related: are there any practical hypermiling techniques that you've found for people not ready to purchase a new car, nor give up driving generally?
The Courts

Oregon Judge Says RIAA Made 'Honest Mistake,' Allows Subpoena 175

NewYorkCountryLawyer writes "In Arista v. Does 1-17, the RIAA's case targeting students at the University of Oregon, the Oregon Attorney General's motion to quash the RIAA's subpoena — pending for about a year — has reached a perplexing conclusion. The Court agreed with the University that the subpoena, as worded, imposed an undue burden on the University by requiring it to produce 'sufficient information to identify alleged infringers,' which would have required the University to 'conduct an investigation,' but then allowed the RIAA to subpoena the identities of 'persons associated by dorm room occupancy or username with the 17 IP addresses listed' even though those people may be completely innocent. In his 8-page decision (PDF), the Judge also 'presumed' the RIAA lawyers' misrepresentations were an 'honest mistake,' made no reference at all to the fact, pointed out by the Attorney General, that the RIAA investigators (Safenet, formerly MediaSentry) were not licensed, rejected all of the AG's privacy arguments under both state and federal law, and rejected the AG's request for discovery into the RIAA's investigative tactics."

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...