Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Hmmm .... (Score 2) 125

According to an article in the Havana Times [havanatimes.org] the average salary in Cuba (as of 2012) was ~$22 based on a report released by the Cuban government.

Then I would say it is considerably up from what Cubans told me it was ... but, I'll take it on face value since it's not completely out of whack.

The tourism industry is also likely to see a lot of growth.

The Cuban tourism indust already represents about 60% of GDP, and has done so for a long time. A lot of their infrastructure is more or less at capacity, and isn't going to scale well.

Last I was there, they'd doubled the size of the Juan Gomez airport in Varadero ... and they were so over-run that the airport had been reduced to pure chaos -- they had dozens more flights than they could handle. And the resorts themselves didn't know when they were getting huge influxes of people and were unprepared for it. So all of a sudden they had a few hundred people showing up and no rooms for them.

The nice thing about Tourism as an industry is that scale only relates to demand (see winter vs summer demand in Florida as an example of how this already works). Too many tourists? Double the room rates. Double the restaurant prices. Double the airfare. No, triple it! A new horde of US tourists surging demand in Cuba will just drive up prices. Even crappy hotels have no problem accommodating for supply vs demand by racing up the price curve.

Comment Re:But surely... (Score 1) 309

I would like them to explain why a recording function is needed in the first place. If it is about determining what the best content for you might be, wouldn't you be the best person to choose what you want to watch? Why then take your choices away from you? Or are we evolved to the point that choices have become obnoxious?

The recording is strictly related to the ability of the TV to respond to voice commands like "lower volume" or "change to DIY channel", since the audio processing is done in the cloud they have to ship out the audio over the internet. They are including this legalese as a way to disclose possible wiretapping/eavesdropping since there is a real good chance that they will occasionally end up with recordings of third party conversations on their servers.

Comment Re:Super idea! (Score 4, Funny) 175

Nothing helps ease tension in a hotbed area run by a bunch of crazies with cannons aimed at Seoul like tiny drones. Good on ya, you bunch of smarties!

Even better, if you spend enough on the Kickstarter you can get your name on the drone that will crash land in N Korea after running out of batteries and be broadcast on State TV as a trophy of the regime.

Comment Re:Uber is the problem! Let's ban it! (Score 1) 91

That "study" makes two very dangerous assertions: 1) all of the victims of hitchhiking are found dead/raped along the highway (as opposed to in a park, someones back yard, a dumpster, etc) and 2, all of the people in the US count as the population sample (this is the craziest one). Since not everyone who dies or is assaulted while hitchhiking can be associated, and we don't have any good way to even peg how many people might hitchhike in any given year, there is no real way to tell.

Comment Re:Wrong question (Score 1) 178

Good question. I asked something similar in a comment the last time this question was asked, only about a week ago but nobody provided an answer. Maybe we'll get one this time.

My own thought was to use 7-zip to make strongly encrypted 7z files, but somebody can suggest something better. In particular, it would be nice if such a tool could automatically do the uploading/downloading to/from the storage provider, which 7-zip doesn't do.

Something like Boxcryptor, perhaps? Although it only works with consumer grade cloud storage it sounds like what you want. Although it is $48/year on its own (if you want to do fancy stuff like manage multiple cloud accounts or encrypt filenames before storing them) so the costs of the belt to go with the suspenders can add up.

https://www.boxcryptor.com/

Comment Re:Uber is the problem! Let's ban it! (Score 1) 91

And do what? As a hitchhiker you're asking a random person for a lift, which is statistically very safe indeed. The probability that a randomly selected person stopping his/her car is not only a criminal but a criminal who would target you is very small indeed.

It's like asking someone to watch your laptop for a while in Starbucks while you go to the toilet. If you ask a random person, chances are you're ok. If someone offers to do it, be wary.

Except, it's not as if you are stepping into traffic and jumping on the first passing car. By hitchhiking, you are indeed waiting for just *that* kind of person who wants to stop and let a stranger into their car.

Comment Re:That's why nobody sensible wants them (Score 1) 223

HIPAA? The Health Information Privacy Awareness Act?

Ahem, no, the Health Insurance Portability and Accountability Act. The name doesn't get at the parts of concern here, which are a number of privacy and confidentiality measures in Title II of the act, which sets guidelines on info systems that contain personal and/or medical data.

Comment Re:Info needs to be accessible to them, IRS(ACA), (Score 1) 223

So only the guy in the server room can access any patient^H^H^H^H^H^H customer data, for a company with millions of customers? That's going to be one busy guy! Roughly everyone who works at the insurance company needs some access to their customers' information, so it has to be on the network. The IRS demands access too, so the insurance company has to connect it to the internet.

The notion of an operator-provided or operator-unlocked key is the way it used to work "back in the days" when every server had a monitor plugged into it. You would provide a password on bootup which was a mini-key to decrypt the actual SSL/TLS keys. It would get stashed in memory at that point and (hopefully) operator intervention wouldn't be needed again until the next scheduled reboot. Before too long, the threat of in-memory attacks far eclipsed the threat of physical server theft and this practice was ditched.

Comment Re:That's why nobody sensible wants them (Score 1) 223

If it really needs to be exceptionally secure and you're dealing with a system that is constantly running, why not just keep any encryption keys in memory only where it's that much harder to get them and have them manually be entered by someone if the system needs to be brought down. That or use some module with the encryption baked in at a physical level to handle encryption and decryption. Yes, it's more expensive, but these systems are already hugely expensive and it makes it incredibly difficult for anyone without physical access to get at the actual data.

Is there some practical reason why it couldn't be done this way or something else that I'm missing outside of the obvious that there's another, cheaper way of doing things?

Putting the key alongside the data is a bad idea no matter how the key gets there. Finding it in RAM would be no different than finding it somewhere on the disk (assuming the disk approach is more complex than c:\config\crypto.key) so that's out. There are TPM solutions that can make it secure (storing the key in tamperproof memory, never releasing it, doing the encryption/decryption only at the request of signed binaries) but at this scale I don't know if the TPM can keep up or if doing it all on one closed system is enough of a safeguard. Would security go up by having one hardened database server and one hardened decrypt server in different auth realms, or would it go down since the attack surface is larger?

Comment Re:income data? (Score 1) 223

Marketing demographic information most liklely. It doesn't say how accurate or what the source of that portion of the data is.

Like many companies, my company has various different methods that we obtain leads. We automatically run every lead through a service to obtain demographic information about the email address that can tell us household size, residence value, own or rent, income, education level, field of employment, interests, age, etc. All those go towards scoring the lead as it relates to our target market.

While a data breach is a data breach, if it's somewhat public information or otherwise readily available from any number of other sources it's not like the damage from having income information is catastrophic.

In this case, it was one less step the miscreants have to go through to grade each record set for sale on the black market. No doubt they are going to (or already have) sort by income descending, break them into nice 100 ID chunks, and sell them to the highest bidder.

Comment Re:That's why nobody sensible wants them (Score 1) 223

PII should be classified based on sensitivity. At a certain level, that PII must be encrypted during transit. At the highest level, it must be encrypted during transit and at rest. SSN falls in the highest sensitivity level. SOP for years. This doesn't guarantee you won't get hacked, but it reduces / minimizes the impact if you are hacked.

PII - Personally Identifiable Information
SSN - Social Security Number
SOP - Standard Operating Procedure

Out of curiosity since you are familiar with the subject, where is the acceptable place to keep the encryption key? During a compromise it doesn't do much good when it's on or near the same server as the DB with the data. Two servers, with two distinct access control credentials?

Comment Re:Yes meanwhile.. (Score 1) 167

My Nexus 7 2012 has been unusably slow since upgrading to 5.0 and 5.0.2 isn't much better. The web browser is useless. Granted, I have a lot of apps loaded, but it was far better with Kit Kat compared to Lollipop. It looks like the biggest culprit is Google Mail since I have several accounts with a LOT of email.

It's annoying but doing a full reset (via the bootloader menus) helped my 2012 N7 to run great again with 5.0. I realized how few apps I actually needed to make good use of it, too. Battery life is still subpar, but it's almost 3 years old at this point so I don't expect it to be fresh as a daisy.

Comment Re:So, Staples Is Evil? (Score 1) 105

If you had clicked the "show more" button you would have gotten to:

enormity
inôrmd/
noun
noun: enormity; plural noun: enormities
1.
the great or extreme scale, seriousness, or extent of something perceived as bad or morally wrong.
"a thorough search disclosed the full enormity of the crime"
(in neutral use) the large size or scale of something.
"I began to get a sense of the enormity of the task"
synonyms: immensity, hugeness; More

Slashdot Top Deals

Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin

Working...