Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Restating the obvious... (Score 2) 388

There have been multiple places where the total paper ballots cast exceeded the number of eligible voters. Paper changes the fraud, but does *nothing* to stop it.

Stuffing a ballot box with fraudulent paper ballots is risky, and relies on many people to be effective in multiple polling locations.

Falsifying electronic records requires a few people at a strategic points, and can be impossible to detect.

Comment Re:How did people not notice this early? (Score 3, Informative) 101

I got hit April 25th with this. I noticed within an hour, and it took me about an hour to determine that my connection to the pool had been spoofed, and my miners redirected to the attackers pool. I had no idea at the time *how* it was done.

My mining software was a couple of months old at the time, and the latest version would ignore such redirect requests. I updated and continued on, having lost maybe 2 hours of mining.

The redirect comes from that fact that the "Stratum" protocol used by many minors to request work from the pools was originally designed as a wallet to blockchain server protocol. Under that use case, it makes sense that the server might suggest to a (wallet) client that they use another server.

Comment Shamir's Secret Sharing and Encryption. (Score 2) 208

Pick a nice, long, secure passphrase. Use it to secure a GPG keypair. Back up this keypair in multiple locations, and with multiple people who know "This is the key that encrypts all of my digital stuff. My family will need it when I die.".

Use that keypair to encrypt all of your important passwords and data. Back up the encrypted files in multiple locations. Make sure your family knows where these locations are, and why thy and the files they contain are important.

Download a copy of http://passguardian.com/ . Load the saved copy (preferably in an offline PC) in a browser, and use it to convert your passphrase into several N of M parts. ie: Create 10 parts, and require at least 6 to reconstruct the passphrase.

Use something like http://goqr.me/ (or any other generator) to create QR codes for the 10 secret shares. Laser print the text share, QR code and some instructions onto a business card sized piece of paper, and have them laminated.

You now have 10 waterproof, hard to damage cards, any 6 of which will unlock your digital data. Distribute them to trusted parties and locations with instructions to use the shares once they hear and confirm your death. These parties don't have to be literate enough to merge and decrypt the data themselves, they just need to know that it is possible with their share. On your death, they will arrange to bring the shares and data together, and even if they have to hire a nerd to help them, they will unlock what they need.

Comment Re:Ban them everywhere! (Score 1) 376

Alamo Drafthouse is banning them, and I doubt they care at all about the piracy thing - they ban talking and any sort of device use or distracting behavior flat out. People go there to watch the movie, if you want to play with your electronics instead, there are plenty of other places to go.

And from what I've read, if they catch you using your electronics, they'll help you get started finding those other places by escorting you to the parking lot. :)

Comment Re:Maybe they should ask corded phone manufacturer (Score 4, Insightful) 399

Corded phones didn't cost $350 - $500 either.

$350-$500 puts you into the range of cheap trash and knock-off timepieces. Try adding a zero. Or two.

I'm a geek, and I've got a Pebble that I wear fairly regularly. But the watch I wear when I want to dress up a bit (or when I get tired of the cheesy plastic smart watch) is a Tag Heurer with an automatic movement. The Pebble is neat, and has IMHO the right balance of features and price. But it has no soul.

Comment PassGuardian, with N of M secret reconstruction. (Score 2) 381

http://passguardian.com/

This uses Shamir's Secret Sharing algorithm to take your password, and split it into a configurable number of pieces, and requires a subset of those shares to reconstruct the original. Take your master password, split it into 10 shares, and require 5 shares to reconstruct. Then distribute the 10 shares to secure locations and trusted people.

Example:

Password: 12345
Share 1: 801650d0edcbd0c3c949f
Share 2: 802c91a40a532182e3570
Share 3: 803ad177a79bc1420a1de

Any 2 shares can reconstruct the password.

And the site runs entirely in Javascript. You can save it to a USB stick and run it from an offline PC, so you don't have to worry about your password being stolen.

Comment Re:Reminds me of other inflated markets (Score 1) 371

Who needs luck?

Over the last couple of years, I've put a two to three thousand dollars into Bitcoin... I've made some bad decisions, and currently have "only" 20 BTC or so.

If the whole thing implodes, and those coins become worthless... I've had a hell of a ride, and think the couple of grand was well spent for the entertainment. On the other hand, if it takes off and Bitcoin turns out to be the next big thing like Ebay or Facebook, I can retire early.

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...