Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Think about What Could Be... (Score 4, Insightful) 582

Think about what could be made if, instead of burning all of this money for a Pyrrhic victory against each other, Google and Apple spent all of that money on development. That would be nice. That would be neighborly.

Apple, Google: Listen to Mr. Rogers's ghost. Why won't you be each other's neighbors?

Linux

Submission + - You use Linux? What was your distro order? (networkworld.com) 6

colinneagle writes: Linux dude Bryan Lunduke blogged here about the top three approaches he thinks are the easiest for new users to pick up Linux. Lunduke's, for example, went Ubuntu -> Arch -> openSUSE.

It begs a question that Slashdot could answer well in the comments: what's your distro use order from beginning to now? Maybe we could spot some trends.

Comment Re:I remember thinking about implementing this... (Score 2) 63

I was thinking about this originally in January of 2011, and I think I remember finding people mentioning XHR but not finding anything beyond scant mentions. No good "what is this and how do I do" documentation. I was originally thinking a DH key exchange, but that requires you to store it each session, which means each session is vulnerable to MitM, or to use HTML5 things that were not widespread two years ago.

Comment Re:Client/Server support? (Score 5, Insightful) 63

Chrome will probably put in an update which contains this when nobody's looking. Firefox will update two weeks after Chrome. And IE will take another two years, and their interface for it will be completely broken. Opera will have already had it implemented a month before everybody else, but nobody cares because nobody uses Opera.

Comment I remember thinking about implementing this... (Score 3, Interesting) 63

It was because NearlyFreeSpeech doesn't support HTTPS, and I wanted to implement some sort of encryption. So, I figured that my server could encrypt pagelets and send them, and then the client could use a previously-established key to decrypt the pagelets, attaching them to the DOM structure in a logical way. The problem is, since JavaScript explicitly disallows XSS, I couldn't figure out a way to contact a separate key authority server. This meant that however I did it, I'd be (more) vulnerable to a man-in-the-middle attack.

Looking this over, it looks like this specification doesn't solve that issue. I know that key authorities can be compromised, but it's better to require two points of failure rather than one.

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...