Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Awesome! (Score 1) 208

"look for them here in earth. Use them to sieve the thousands of stories about aliens"

That truly would be a complete waste of money.
All these loonie stories kidnapping, anal probes, etc, etc, is why serious SETI gets treated as a joke.

Anyway,it's been done.
The answer is 99% proven nothing happened, 1% unknown.

Use your brain. If aliens are visiting us with such frequency, WHERE IS THE PHYSICAL EVIDENCE?
Any artefact made off-earth will have a different isotopic ratio, even if we don't know what it is.
Where is one drop of alien sweat with their DNA or equivalent?

Comment Re:Futile search? (Score 1) 208

"If the search for extraterrestrial life leads to that life deciding to destroy all life on earth, would it
still be a "good investment" ?"

The proposed plan is for listening only, not broadcasting a "here we are" signal,.

If there are indeed malignant and hostile aliens who extermiante every other species that pops up, it would be even more important to know all we can about them.

Comment Re:Say what? (Score 1) 446

I think you mean "this legislation will ensure that Americans have no way of knowing they're being sold GMO food."

Unless for some bizarre reason you are purposefully trying to avoid non-GMO food, then you shouldn't care.

If you want to ensure that you are buying non-GMO food -- which is what the anti-GMO activists want -- then all you have to do is buy food that is so marked. This law doesn't change that at all.

Comment Re:The real story is even worse (Score 1) 178

And years later someone came across that piano arrangement, found that a copyright had been registered on it, and (presumably being ignorant of the actual history of the song), thought they owned a copyright on the song and started trying to enforce it.

When it comes to copyright, never attribute to ignorance that which can be adequately explained by malice. They always try to enforce the rights further than they know they are entitled to.

Comment Re:"Edge" (Score 1) 140

Then that is a fail right there. They wanted to change the name from IE because of its bad reputation but if they still want people to relate back to the icon it's not going to get them very far.

They only want people who are at least slightly tech-savvy to think it's a totally new browser. They want stupid people who don't know anything to think it's the same old browser they're already familiar with. Changing the name while keeping the icon seems like a good way to accomplish these goals.

Submission + - XKEYSCORE: NSA'S Google for the World's Private Communications (firstlook.org)

Advocatus Diaboli writes: "The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies. Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A secret GCHQ and CSE program called BADASS, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users."

also

"Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.” Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...