Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:WUWT (Score 1) 441

Yet, there is still a huge difference between reporting facts from a particular perspective and running a misinformation campaign.

Efforts to downplay the significance of climate change resemble the determined efforts of tobacco lobbyists, in the face of scientific evidence linking tobacco to lung cancer, to prevent or delay the introduction of regulation. Lobbyists attempted to discredit the scientific research by creating doubt and manipulating debate. They worked to discredit the scientists involved, to dispute their findings, and to create and maintain an apparent controversy by promoting claims that contradicted scientific research. ""Doubt is our product," boasted a now infamous 1969 industry memo. Doubt would shield the tobacco industry from litigation and regulation for decades to come."[64] In 2006, George Monbiot wrote in The Guardian about similarities between the methods of groups funded by Exxon, and those of the tobacco giant Philip Morris, including direct attacks on peer-reviewed science, and attempts to create public controversy and doubt.[12]

Former National Academy of Sciences president Dr. Frederick Seitz, who, according to an article by Mark Hertsgaard in Vanity Fair, earned about US$585,000 in the 1970s and 1980s as a consultant to R.J. Reynolds Tobacco Company,[65] went on to chair groups such as the Science and Environmental Policy Project and the George C. Marshall Institute alleged to have made efforts to "downplay" global warming.

So, take your tired Republican tactic of false equivalency and shove it!

Comment Re:Run it all through Tor? (Score 1) 184

TAILS is an interesting suggestion, because it includes a general IP 'replacement' stack called I2P. And THAT is what the EFF should be encouraging people to spread as far and wide as possible: A P2P-routed, mesh-like, torrent-ready, anonymized network connection that isn't limited to TCP and browser stuff. Its even got secure decentralized messaging (also inspired by bittorrent as it uses DHT), so no more Tormail type incidents.

I almost feel like the current generation of network experts, even people like Jacob Applebaum and Bruce Schneier, are rooted in a hopelessly outdated vision of network privacy. They both advocate that the end user not only setup Tor, but also fend for their own privacy with each application's own security scheme. Instead, they could just tell people, "You can reach me on I2P; Avoid Windows; And encrypt your HD". What they offer now is more like a recipe for a nervous breakdown; They want to maintain their Tech Ninja image, so they keep spouting a dizzying array of jargon relating to "solutions" that only solve for one layer.

Offer a version of network access that is general-purpose, is anonymous/private by default, where people can choose how much of their real identity they want to associate with the virtual one.

Comment Re:Tie this in with the battery tech from Tesla... (Score 2) 262

Lithium won't be a prime target for grid storage for quite some time (if ever). There are dozens of interesting energy storage techs actually coming to market that have much lower cost/KWh and longer lifetimes. Some are batteries like this or flow batteries and some are not, like the 'icebear'. Even used lithium batteries taken from cars will probably get more of the storage business than new lithium batteries; for now, its just more cost effective and efficient.

The idea of using electric cars themselves as grid storage is an elegant one, but don't hold your breath waiting for it to become a big thing.

Comment Re:It's one of many reasons why Adblocking is mora (Score 3, Interesting) 174

No, he's implying ad servers need to start acting like a responsible industry. They pollute the web with malware and make a lot of sites unreadable with adblocking, owing to the moving, flashing and sometimes audible garbage that cover some sites.

If a simple text article with a few associated photos causes my computer's fan to wheeze and slows it to a crawl, and the ads keep breaking my concentration, AND they pose a security threat that (over the years) has gone from significant to huge, then their business model is just attempting to use you as a pair of eyes with a wallet attached. FUCK THEM.

Website operators like Ars Technica and Slashdot should be researching ways to deliver ads that are safe and sane -- there is no justification for a friggin' advertisement to be otherwise. Its just too bad the advertisers don't trust the content creators to serve the ads themselves. So what we get is a cycle of mistrust and negligence that puts their readers at risk of attack. Its sicko.

Comment Re:Does the nature of the business hold it back (Score 1) 254

Security by isolation is one way to solve that problem. With a hypervisor designed for strong security instead of primarily for conveniece as is usually the case, users can safely allocate their tasks and data to different domains. For instance, 'Work' and 'Personal' could be two domains that have network access, whereas 'Vault' would hold the most sensitive info (like certain keys and passwords) and have no networking. An 'Untrusted' domain is used for most of the general web surfing-- reading articles, watching video streams, etc. On Qubes, there is also a TorVM package that facilitates the creation of anonymous domains.

So, whatever "happens in Vegas stays in Vegas". Qubes even assigns high-risk hardware, like NICs, to their own unprivileged domains.

The nice thing about this setup is that the window manager resides in the privileged domain and both the WM and its graphics stack are isolated from attacks originating in the VM domains. Further, each domain is assigned a border-color when its created so you can always get an idea of what is running in which context by glancing at the desktop. A compromised browser in 'Untrusted', for instance, could put up a window asking for admin access to the privileged domain, but the red border (and [untrusted] marker in the title) would give it away.

Copy/paste and file copy between domains are also protected; they are integrated into the UI so as to require a confirmation step so the privileged domain knows the user really intends to perform the action.

Slashdot Top Deals

Say "twenty-three-skiddoo" to logout.

Working...