Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment That's not how traitor-tracing algorithms work (Score 5, Informative) 467

They don't hash the whole shebang into one number. Rather, they take a (random) number and use that to generate a set of mutations and then probe for that set of mutations in the leaked document. So now, even if you alter the document further, you probably didn't undo the mutations in question. Even if you did, you probably didn't undo all of them and you almost certainly didn't produce a high-confidence result that it's somebody else's copy.

Comment Re:Please port this to Linux A.S.A.P. (Score 1) 164

The correct design is neither this reactive monitoring nor the UNIX-standard "oh sure, go ahead!" approach. I contend that the correct approach is one of a capability system: an application which could not even name a remote network endpoint unless it was granted a handle to it is in no position to leak data.

Comment Re:As software engineers, the EFF are good lawyers (Score 1, Informative) 173

> and users can move freely between them.

The proprietary world has yet to invent a mechanism for that, and it's been a known problem for a long while (decades). Data "liberation" is challenging and, even if you don't think that is a problem, cross-realm authentication is all but nonexistent. They have little incentive to provide these things unless people demand them, and by and large people don't. (And before you bring up LiveJournal's OpenID protocol, I've two things to say: 1) it's not worthy of the trust placed in it because not all parties srongly authenticate each other, and 2) note that commercial OpenID providers do not, and fundamentally cannot by nature of the beast, make it easy to transition from an identity rooted at one to an identity rooted at another.)

The only truly distributed bring-your-identity-with-you schemes out there have come from the open, usually academic, world: PGP, SPKI/SDSI, E rights, the Petname system and protocol, and so on. Similarly, shared, secure-against-the-owner storage is not something social network companies have huge incentives to produce, but it exists in open research: TAHOE-LAFS exists and Diaspora has made vague promises to being similarly secure.

Comment Re:Addendum to first article is pretty good (Score 1) 206

I'm not sure where the claim about "can't use each other's code" comes from. Perhaps a subtle misunderstanding. While Avida does keep each virtual machine fully isolated from the others, Avida _does_ have explicit support for parasitic behaviors, in the form of code injection into neighboring organisms.

Movies

Kaleidescape Triumphant in Court Case, DVD Ripping Ruled Legal 213

Jim Buzbee writes "Ever wanted to rip all your DVDs to a big network server so that you could select and play them back to your TV? Up until now, manufacturers have been wary of building a device to allow this type of usage because they've been afraid a lawsuit. The DVD Copy Control Association had claimed this was contractually forbidden, but now a judge says otherwise stating, 'nothing in the agreement prevents you from making copies of DVDs. Nothing requires that a DVD be present during playback.' Kaleidescape has finally won their long-standing lawsuit, a case we first talked about early in 2005."

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...