Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:This is horrible! (Score 4, Interesting) 114

Yes! This is Horrible!

Rulings like this place obstacles in the way of law enforcement doing what they want, which makes it harder for them to do what they want!

They have enacted policies and procedures that rely on being able to do what they want without any interference from the courts, and things like this will CLEARLY allow criminals to escape JUSTICE! You dont want law enforcement to LET CRIMINALS GET AWAY, DO YOU!? THINK OF THE CHILDREN!

That's why the various 3-letter agencies are hard at work trying to get laws drafted that will make it legal for them to do what they want! (Because they need to be able to do what they want to do what they want, so they can use the procedures that they have created that rely on them being able to do what they want!)

*In case you hadn't noticed, I am laying it on thick for a reason. This is basically the argument, boiled down and rarefied to its most basic components, being provided by law enforcement against rulings and findings like this.

Comment Re:Really? (Score 1) 76

Love the ad hominem. I guess you wouldn't be a slashdot AC without using one. I especially loved how you believe that I dont understand what TOR does (and that the only purpose of other peoples posts are to increase your own, personal knowledge base), or what its limitations are. Next up, you will complain about my spelling and grammar. You neednt bother though; I will spare you the expense, and admit openly that both are poor. I dont care. :P (See how I flagrantly fail to use apostrophes! Oh the humanity! Clearly I dont have a fucking clue because I cant use an apostrophe, even though I clearly do by pointing this out! OH NO!)

However, your scope of use-case is not very broad. You are assuming a person wants an easy tor node to hide all that home traffic (bank account logins, et-al), rather than for other purposes that one would want a tor node for. Say for instance, political speech, anonymizing a server that is black boxed (you can't change the software on), etc. I never said that this box needed to be the gatekeeper to the ISP. It just needs to be the gatekeeper for a TORed subnet.

Granted, there would be some added utility to the tor community at large to have so much benign traffic passing through their obfuscation network, because it would add hay to the haystack (making finding the needles harder) but it would also make the already poorly performing TOR network even more burdened, and it would in general destroy network performance, in addition to exposing lots of people to a very huge Man in the Middle.

Tor can basically be used like a vpn without a specific endpoint. This means it would be useful for people in oppressive regimes that want to send real information, free from the censors. Having a single device to configure in one's kit would be handy; especially something easily transportable, like a portable hotspot, or a router. (Just use it like a bridge instead; openwrt will let you do this. Show up at the hotel/library/Burgerking/$hotspot, use the 'free' wifi, send fully tor'd up political speech all you want.) A PORTABLE tor node that can latch onto public open networks would be quite handy, and I can definitely see a use for it.

The implication that this was for "All the interwebz!" was entirely your own fabrication, and I am hereby officially calling you out on that strawman.

Comment Re:Really? (Score 3, Insightful) 76

The internet was not designed to prevent eavesdropping either.

Hell, ETHERNET was not designed to prevent it!

If you want a technology to prevent eavesdropping, you need to go ground up quantum crypto over optical fiber or something.

Tor is basically security through obscurity anyway. However, it is still more difficult to intercept and piece together than naked, unfiltered traffic, which is what a normal router offers.

Basically, what I am pointing out is that your argument is absurd. TOR was attacked by governments, not from within the TOR network, but by observing the traffic going into and out of its exit nodes. That is because the traffic going in and out was unencumbered at that point, because it has to talk with the regular internet. Coupled with other forensic techniques, the powers that be were able to deduce a great deal about who sent what packets through TOR.

ANY APPLIANCE WOULD SUFFER THIS ISSUE.
THE INTERNET ITSELF DOES NOT PREVENT EAVESDROPPING.

Instead, the best you can do is make the message meaningless to the one who is eavesdropping. That is encryption. Even better if you use encrypted packets with a randomized route. This means that eavesdroppers will only get a few of the packets, and will not have enough data to attack the message contents.

Encryption that is worth a shit requires a beefy FPU. That's why I pointed out that current COTS routers aren't a good fit exactly-- normal packet routing does not require FPU function. However, as data security on the internet becomes more and more a requirement, and less and less of a simple paranoia thing-- (and as cost of manufacture for SoC systems comes down and economies of scale interject into the market for SoCs) then home routers with real hardfloat will emerge. At that time, it really would be possible to have a consumer device in your house that does the data fiddling for you.

Again, your objection is bullshit. Followed to its conclusion, the internet itself shouldnt be used at all.

Comment Re:Really? (Score 2) 76

openwrt + debian chroot + tor linux package == wireless router that simply puts everything through tor, transparently.

one could dispense with the debian chroot altogether if they did a well maintained fork of openwrt with well updated packages.

Routers are getting quite powerful these days. while they often lack hardware fpu, that can be somewhat alleviated with softfloat solutions.

keep your traffic under control, and such a box can easily handle the load. (naturally, you need to keep the number of connected devices under control, and keep packet count sane within limits of the weaksauce router's hardware.)

just saying that such an appliance can be made at home right now with old network gear and free software.

enjoy.

Comment Re:wait, what? (Score 1) 82

Short of growing spinnarets on a tissue sheet from cultured spider cells, (which would give the exact organs needed), there is no way to fully replicate the features of a spider's spinnaret at this time.

According to , the processes that transform the spinning dope from an disordered liquid crystal solution to insoluble fibers involves mechanical compression coupled with saline ion removal, and that the rate of draw from the spinning duct has a profound correlation with the tensility of the resulting fibers.

This suggests that a "tapered silicon nanoneedle array" that has been doped to wick away saline ions from the needle's interior through the walls of the shaft, coupled with a controlled rate of draw, and a carefully selected for mechanical pore size, tube length, and taper, could result in a passable approximation of spider silk.

It does not need to absolutely perfect; it just needs to approximate the features of spider silk. Perfect replication is likely not possible with current nano-technology.

Comment Re:wait, what? (Score 1) 82

One solution might be to re-purpose other tech from the bio-tech industry.

Specifically, hollow silicon nanoneedle arrays.
http://www.ncbi.nlm.nih.gov/pu...

Grown with the correct length, diameter, and taper, they would function as mechanical analogues to spider spinnarettes. Wet one side, then "brush" the other to get the thread started-- then just gently tug on the resulting fibers.

They would be very fragile things though. Would take very specialized equipment to handle, install, and prime them for service. They would also be far more fragile then ones made from insect chitin, so the drawing speed and pitch angle of the pull would have to be very carefully controlled to avoid breaking off the needles.

Maybe pores in a sheet would work better?

Comment Re:wait, what? (Score 5, Interesting) 82

Just read the article myself;

This is still about the protein itself, not the mechanical processing done by the spider to create the unique fibers they produce.

Basically, the spider's silk protein is a bit like a "hook and latch", much like a zipper's teeth. Mass producing the protein produces "Zipper teeth", but that does not result in the unique conformation of a zipped up zipper.

For that, you need the zipper pull.

That's what a spider's spinnarets do. As the liquid crystal solution of spider protein gets pulled into the spinnaret, it gets compressed mechanically in a special fashion, which causes spontaneous self-assembly of these "zipper teeth", into a fully assembled, fully interlocking "zipper" of interlocked protein molecules. It is this fully interlocked assemblage that gives spider silk its unique mechanical properties.

The shape and length of these structures in the spider's abdomen are crucial to correct assembly.

As the linked Nature paper I linked to points out, this process is NOT incorporated in any currently used textile processing system.

Getting bulk, high quality protein is only PART of getting mass produced spider silk. The other part is the mechanical processing.

Silkworms do not have the structures that spiders do for processing their silk. Instead, silkworms produce a kind of salivary secretion through a much larger orifice. This orifice is much larger than a spider's spinnaret, and is not the same shape. This is why silk worms producing spider proteins will not produce silk of the same quality.

Now, we have some pretty kick ass micro-pipette technology these days (and surface morphology control on silicon substrates from PV solar research) that could probably be used to create synthetic spinnarettes--- Just wet one side with the silk solution, then draw silk fibers from the other side.

I just have never heard of any serious research into creating such synthetic spinnaret technologies.

Comment wait, what? (Score 4, Informative) 82

I thought the magic in spider silk was 2-part.

First, is the molecule-- but the second is how it gets "zipped" into a silk filament by the spider's spinnarets.

http://www.nature.com/nature/j...

Just putting the genes into a silkworm WILL NOT PRODUCE SILK LIKE A SPIDERS!

Producing the proteins in goats wont fix the mechanical processing that spiders do.

This is why these things keeps failing. The protein is only part of the package. They need nano-structure spinnaret simulants to spin the solution with as well.

Comment Re:Hoax (Score 1) 986

Here's all that needs to happen:

Rossi needs to produce approximately 20 test devices, with easily eject-able fuel systems. This separates the fuel system from the catalyzing system.

He needs to provide these loaded devices to independent testing labs, observed by a lawyer to assure that the independent labs dont disassemble the catalyzer, and only examine the fuel canister.

Independent verification, free from the "Rossi was there" objection, can then be performed on the device.

This is because the claims-- "My catalyzer is able to turn this stuff into this stuff, releasing energy!" does NOT require disassembly of the catalyzer. Only analysis of the fuel. Making the two easily separated solves the issue nicely. It is quite easy to falsify that claim if rossi provides such a device and fuel sample for independent testing.

That alone can make or break rossi.

Are you people asking him to compromise this way? No. You are not. Are you thus being sensible in your approach? No, no you are not.

Comment Re:He tried patenting it... (Score 1) 986

No, that would be Jumping to conclusions.
http://en.wikipedia.org/wiki/J...

Not Occam's Razor.
http://en.wikipedia.org/wiki/O...

Since it is based on total number of assumptions made, let's count, shall we?

Yours, that this guy and his team are frauds, requires these assumptions:

This guy manipulated all samples himself, so he must have tampered with them to get these results.

The samples before and after the experiment are not the same sample.

His team must be complicit in his fraud

his measurements for his samples are specifically designed to misrepresent a non-working device as a working one.

his device does not work.

That's 5 assumptions.

Now, let's look at mine-- 'the device could be real' scenario.

The device may work

The inventor does not release his secret because he does not have good legal protection from intellectual theft

the research team he used is the same team because it is the only one who will do it for him.

the sample before and after the experiment is the same sample.

That's 4 assumptions.

Nope, 5 is not less than 4. Sorry.

Comment Re:He tried patenting it... (Score 1) 986

I admit to not reading their paper.

Rather, I was pointing out that the blanket accusations of fraud were not science.

If they indeed did not properly document their test protocol, then their test is indeed useless, and their paper should rightfully be torpedoed into oblivion during peer review.

BUT-- that is again not an accusation of fraud per se-- It is a reprimand for not properly documenting their experimental test protocol for independent verification via the scientific method, which is the actual purpose of the peer review process.

"Hey bitches, your paper sucks balls, because I cant fucking replicate your experiment, let alone your results! If you have that documentation on hand, and just neglected to put it in your paper, then put it in your fucking paper-- If you were too dumb to collect the needed data to replicate your experiment, your experiment is worthless because we cant verify it!"

That is NOT "Bitches be lying." It is "Bitches be incompetent." or "Bitches be negligent." :D

Comment Re:He tried patenting it... (Score 1) 986

That too is one of the uncontrolled variables I cited that applied--

"Was the sample tampered with?"

AGAIN, catch-able with proper independent experimental replication, which is the prescribed methodology.

The below criticism-- that their methodology is fundamentally flawed due to not actually collecting valid data using wholly faulted practices, and that they did not properly document their experiment, preventing third party replication-- Is a real and valid criticism.

Comment Re:Since you are using occam's razor (Score 1) 986

Which is exactly what I called for-- It is the ONLY LEGITIMATE WAY to either verify or refute this data.

Either the data is good, or the data is bad. The only way to tell is to conduct the experimental protocol as described in the literature in a fully independent test laboratory setting with completely different researchers.

I did not once say otherwise.

If you want an example of occam's razor giving a seemingly implausible explanation as the most likely-- just look at the double slit experiment data. :D

In this case, I was pointing out that having to resort to wild conjectures like "He totally fudged with the sample, and did shit to it behind people's backs" without any data to this effect, while the researchers published their data for review, places the burden of evidence on the nay-sayers. There are perfectly plausible scenarios where room temperature fusion events can occur, which would perfectly explain the isotope data, and would be necessary to get the energy flux reported.

Currently, you and others are saying "It's more likely that this guy and his so called team just shat out some numbers on a device that does not actually work, after initially being ball busted with their first paper."

What I am saying, is that this may be an actual device, that does actually work, getting a revised experiment published after properly following up with peer review feedback where they refined their experiment.

The only way to be sure, is to fucking run the experiment in an independent setting, and qualify the findings.

Casting aspersions without providing data is not science.

Comment Re:He tried patenting it... (Score 1) 986

which I acknowledged-- Hell, the samples collected from the reactive sample for isotope spectroscopy would throw it off! Then you have skin oil contaminant from picking the thing up, noise from dust in the room settling on the thing-- all kinds of noise you would have to account for with such a large sample.

That's why I said that very tiny samples undergoing the same process with more sensitive thresholds are required as additional experiments. (Say, putting a nanoscopic sample on the end of an AFM, or a nanostructure electronic force meter, and evaluating the force exerted as it undergoes the process)

With properly controlled experimental gear, the change in mass of such small samples *IS* fully measurable with good confidence. (They can measure samples in AMU using those things!)

However, that would require for this process to be fully scalable. It may well be that such small samples are incapable of undergoing the process because they lack critical mass potential-- but that information is itself useful in understanding such mystery processes, and therefor the experiment would still be valid to conduct.

No matter how you slice it, these finding all point at further experiment.

Comment Re:He tried patenting it... (Score 2) 986

Also, if the power delivery curve is nice and smooth, indicating a progressive reaction is producing the signal.

Intermittent chargings, as the GP suggested, would produce a very spiky power delivery curve over the observation period.

In the case of a fusion based reaction producing heavier, and more unstable isotopes, this curve should resemble a bell curve, where initial fusion events are few, but their presence catalyzes additional fusion events, until the costs of further catalysis exceeds the energy liberated and the power curve falls off as useful fuel is depleted.

And again, there's the isotope population data that needs to be addressed. Neutrons are perniciously difficult to focus into a coherent beam, because they are 1) massed particles, and 2) have no charge. This means making a sufficiently powerful neutron source to accomplish the slow population shift from one isotope to another, heavier one over the month long observation window would require a very conspicuous neutron generator, which would probably have irradiated the researchers quite profoundly--- since it would have to be strong enough to literally cause the constituent atoms in the sample to have appreciable neutron capture. (The researchers themselves, being in close proximity to the sample being bombarded by the neutron source, would likewise also be subjected to this bombardment, due to the nature of focused neutron sources --- And again, external sources of such neutrons would be quite conspicuous. I somehow strongly suspect that the researchers would ask what the giant assed neutron collimator is doing in the lab, especially with the focal point of the collimator directly where the sample is.)

So, again-- that would be a pretty damned awesome thing. A focused neutron beam would have fantastic applications, especially one that is compact enough to be inconspicuous, yet powerful enough to cause substantive neutron capture in a large sample, --OR-- One that focuses neutrons into a tight and coherent enough beam to deliver the neutrons over a sufficient distance that the neutron source is not immediately apparent to the researchers.

No matter how you slice it, the data presented is showing something very enticing for further study.

Slashdot Top Deals

"Here's something to think about: How come you never see a headline like `Psychic Wins Lottery.'" -- Comedian Jay Leno

Working...