Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:The article is wrong. (Score 5, Informative) 115

The IP you can trace a transaction back to is only the IP of the person that told you about the transaction.

Try reading the paper.

The crucial idea is that each client can be uniquely identied by a set of nodes he connects to (entry nodes). We show that this set can be learned at the time of connection and then used to identify the origin of a transaction.

The crucial
idea of our attack is to identify each client by an octet of
outgoing connections it establishes. This octet of Bitcoin
peers (entry nodes) serves as a unique identier of a client
for the whole duration of a user session and will dierenti-
ate even those users who share the same NAT IP address.
We showed that most of these connections can be learned if
the attacker maintains connections to a majority of Bitcoin
servers. Then we show that the transaction propagation
rules imply that the entry nodes will be among the rst
that report the transaction to the attacker. As soon as the
attacker receives the transaction from just 2-3 entry nodes
he can with very high probability link the transaction to a
specic client. Moreover a sequence of successfully mapped
transactions can help the attacker to track dynamic changes
in the entry node set, to keep the client identier fresh. The
cost of the deanonymisation attack on the full Bitcoin net-
work is under 1500 EUR.

/all spelling mistakes are in the original text

Comment Re: Wasted millions (Score 1) 90

Dick Cheney in 1994

UNIDENTIFIED MALE: Do you think the U.S. or U.N. forces should have moved into Baghdad?

CHENEY: No.

UNIDENTIFIED MALE: Why not?

CHENEY: Because if we had gone to Baghdad we would have been all alone. There wouldn't have been anybody else with us. It would have been a U.S. occupation of Iraq. None of the Arab forces that were willing to fight with us in Kuwait were willing to invade Iraq.

Once you got to Iraq and took it over and took down Saddam Hussein's government, then what are you going to put in its place? That's a very volatile part of the world.

And if you take down the central government in Iraq, you could easily end up seeing pieces of Iraq fly off. Part of it the Syrians would like to have, the west. Part of eastern Iraq the Iranians would like to claim. Fought over for eight years.

In the north, you've got the Kurds. And if the Kurds spin loose and join with Kurds in Turkey, then you threaten the territorial integrity of Turkey. It's a quagmire if you go that far and try to take over Iraq.

The other thing is casualties. Everyone was impressed with the fact that we were able to do our job with as few casualties as we had, but for the 146 Americans killed in action and for the families it wasn't a cheap war. And the question for the president in terms of whether or not we went on to Baghdad and took additional casualties in an effort to get Saddam Hussein was, how many additional dead Americans is Saddam worth? And our judgment was not very many, and I think we got it right.

Dick Cheney in 2007: "Look what's happened since then. We had 9/11."

Comment Re:Next step - Semiconductors (Score 1) 69

I think you don't know what welfare is. The space program(s) are government money being spent on engineers and experts in all sorts of fields who work hard and come up with creative solutions to unusual problems. This gets them experience. It also benefits humanity as a whole because those engineers then go on to use their experience in other things they do in life.

Welfare is paying lazy people to sit around and continue being lazy.

Comment Re:Doesn't do enough, IMO (Score 1) 82

You have a very valid point. For their light sensor method to work they are having to implement shadow boarding (laying out everything in a predefined pace). If a shadow board is done correctly then a quick glance at it will tell you exactly what is missing (high contrast colors between the background/foreground/tool in place)

While i see the value in having a "smart" toolbox, i for one would want it to be able to give me the inventory along with helping me find the tool as you say. "digitizing" the same visual information i get from shadow-boarding just doesn't justify it for me.

Comment Re:There's another way to handle this that's easie (Score 3, Informative) 82

So to chime in on the whole Tech owning their own tools. I hate to say this but that works fine for Auto Mechanics because they are working on random people's cars. If the Tech doesn't have the right size wrench he'll jsut use pliers or an adjustable wrench, face and corners be damned, won't matter not their problem. Same with a torque wrench, let them just tap it a few times, or use the air gun.

Move over to the industrial world and a real manufacturing/process plant where over torquing something can stop production, or damaging the bolt can cause delays in repair (lost of production) and we have a real problem. Most plants do not allow Techs to bring in their own tools. I know Plants that have banned adjustable wrenches (if you don't' have the right tool for the job don't' do it mentality)..

All that being said in real industrial settings, tool control is a big deal. The more sterile and regulated the environment the more important it can be. See the link below where it was a contractor failing to do a tool count that did some real damage.

http://defensetech.org/2012/01...

Tool counting is a basic thing, and should always happen. Things like this tool box can be used for good and bad, it all depends on the culture of the company and people using it. Sure they could use it to bash people over the head for loosing tools, but they could also use it as a safe guard/helper/checker to help the tech out in doing a tool count to make the work go quicker. I know places where this would be seen as yet another big brother in the plant, and places where they would love to have this because it would make their job easier and quicker. Its all about culture.

Personally i love the simplicity of it, although i will say that you have to have a solid 5S/Shadow boarding in place to use in place light sensors like this. It would work very well for specialized tool sets, but not your run of the mill mechanics toolbox. For that cheap RFID tags/single box reader might be more appropriate. (and could also be used for locating the tools if lost in the equipment).

Trust me that the cost of something like this is a drop in the bucket compared to the costs of real specialty tools, and the impact to production/operations when a tool is lost.

Comment Tethers (Score 1) 29

Considering the terrible back luck all space agencies seem to have had with deploying tethers (getting stuck, snapping, etc) - they plan on deploying 4 per satellite? I hope there are contingency plans or someone really thought long and hard about possible failure modes and engineered around them.

Comment yeah ummm cya (Score 0) 452

>> There are no C++ public/private protections and all
functions, even secondary ones in the kernel, can be called. ...so literally everything has global scope? ..No defined interfaces anywhere and changing the implementation of _anything_ has a high probability of breaking _everything_?

Good luck with ever getting a robust system, or even finding anyone with an actual clue that would want to contribute (a.k.a. waste) their time trying.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...