Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Wildly premature question (Score 1) 81

If we look at jet aircraft, wear depends on the airframe and the engines, and the airframe seems to be the number of pressurize/depressurize cycles as well as the running hours. Engines get swapped out routinely but when the airframe has enough stress it's time to retire the aircraft lest it suffer catastrophic failure. Rockets are different in scale (much greater stresses) but we can expect the failure points due to age to be those two, with the addition of one main rocket-specific failure point: cryogenic tanks.

How long each will be reliable can be established using ground-based environmental testing. Nobody has the numbers for Falcon 9R yet.

Weight vs. reusable life will become a design decision in rocket design.

Comment Re:It's required (Score 5, Insightful) 170

Your indignation should not be directed at Verizon - it should be directed at Washington, DC.

A fun part of this is that the government employees at ARPA back in the 1960s explained it all to us. They firmly rejected building any sort of encryption into the network itself, on the grounds that such software would always be controlled by the "middlemen" who supplied the physical connectivity, and they would always build what we now call backdoors into the encryption. They concluded that secure communication between two parties could only be done via encryption that they alone controlled. Any encryption at a lower level was a pure waste of computer time, and shouldn't even be attempted, because it will always be compromised.

This doesn't seem to have gotten through to many people today, though. We hear a lot about how "the Internet" should supply secure, encrypted connections. Sorry; that's never feasible, unless you own and control access to every piece of hardware along the data's route. And the ARPA guys didn't consider that, because that first 'A' stands for "Army", and they wanted a maximally-redundant, "mesh" type network that would be usable in battle conditions. They went with the approach that you use any kind of data equipment that's available, including the enemy's, and you build in sufficient error detection to ensure that the bits get through undamaged,. Then you use encryption that your team knows how to install on their machines and use. And you probably change the encryption software at irregular intervals.

Anyway, the real people to direct your anger at are the PR folks in both industry and government, who keep trying to convince you that they can supply encryption that's secure. Yeah, maybe they can do that, but they never have and they never will. And the odd chance that they've actually done so in some specific case doesn't change this. The next (silent, automatic;-) upgrade will introduce the backdoor.

Unless you have all the code, compile it yourself, and have people who can understand its inner workings, you don't have secure encryption; you have encryption that delivers your text to some unknown third parties. It's the US government's own security folks who explained this to us nearly half a century ago.

Comment Re:undocumented immigrant (Score 1) 440

Why does the fourth amendment apply? If he is not a citizen of the US, our laws shouldn't protect him.

So you think tourists shouldn't be protected by US law?

There are a lot of people and companies in the tourism industry who would strongly disagree with you. Not to mention the shipping industry, whose employees often make short visits to places where they aren't citizens, as part of their jobs.

If your suggestion were put into effect, it would be a disaster for a lot of valuable businesses. For that reason, it's not how the law works in the US or in any other country.

Comment Diary entry from 2150 (Score 1) 440

Told kid about nano-cam dust today. He's only 4 years old, so he didn't know about them yet, and I'm trying to teach him basic hygiene. I explained for that for nearly a a hundred years we have all lived in an environment where other peoples' cameras are always in our homes. We track them in, on our shoes. The AC intake blows them in. The servers the cameras send video too, aren't owned by people who are practicing subterfuge. It's not like they snuck "spy" dust onto our porches in the hopes we'd track them in. It just happens; it's an inevitable consequence of the stuff blowing around everywhere.

My great grandparents complained about it. They thought they had a reasonable expectation of privacy in their homes, because nanotech was new. They didn't see the dust, so they didn't know it was there. In the absence of sensual confirmation, the default expectation (at least to the layman) was that it wasn't there. That was naive, but my grandparents didn't work with nanotech or even use consumer models themselves, so perhaps their ignorance could be forgiven. (Just as my own ignorance of hyperspace can perhaps be forgiven, since I'm not a miner.)

My grandparents, though, grew up with the stuff, though it was still a bit expensive, so it wasn't totally ubiquitous yet. By their time, almost everyone at least knew about it, and if in a gathering of any five people you were to say "nobody sees me inside my home," chances were there would have been a few guffaws and someone would likely point out that the statement was likely incorrect. Sometimes the stuff got innocently tracked into your house, and sometimes it was manipulated into getting there, through subterfuge. The law and social norms lagged, though, and people debated privacy a lot.

By the time their children (my parents) grew up, though, it was all over. Everyone knew about nano-cam dust, and unless you did a rad-flash a few minutes earlier, fucking in your own bed was just as public as doing it in Times Square.

And now my kid knows too. It's just something everyone is expected to know about and deal with. If I were to write a story about it, I think I would set the story in the time of my grandparents, back when society was truly conflicted and in the midst of change. I bet those were interesting times.

User Journal

Journal Journal: Interface

I plan on trying the suggested browsers, but thought I'd revisit Opera first. It dawned on me that changing browsers is going to be a big PIA, since Firefox holds a bunch of passwords.

It's been at least a decade since I've tried Opera; it was brand new when I last tried it. So I installed the latest one. The result was...

Comment Re:Under US Jurisdiction? (Score 1) 281

No but if you got a government request for your keys you'd know about it.

The government "request" would come in form of customised malware and you'd never even know you got hacked.

If google gets such a request you wouldn't know you were compromised.

You aren't gonna know, no matter what.

It isn't like they are sending l33t hackers to break in and get the data.

Schmidt isn't an idiot, despite how the press like to portray him via selective quoting (note that TFA does not provide much context for this quote). When he says Google is the safest place to put your data, he's probably comparing Google to other companies that provide similar services, not some hypothetical fully self hosted system - bearing in mind self hosting of email is rapidly going the way of the dodo even in business situations (it died for home email a long time ago).

Given that Yahoo still have not fully deployed SSL everywhere let alone encrypted their internal datacenter links, and if Microsoft have a similar effort they aren't talking about it, there's some evidence that he might be right. After all, if you get a government warrant for your data you're just as stuck as Google is: not much you can do about it. On the other hand, you are unlikely to secure your infrastructure as well as Google does.

Comment Re:Under US Jurisdiction? (Score 1) 281

But Google makes money from targeted advertising

Google makes significant sums of dough from paying corporate customers who use Google Apps. These clients can switch off advertising if they like. These are also the places where some of the most sensitive data is stored.

So Google have both the financial means and incentive to solve the end to end crypto problem for such clients. The difficulty is not financial. It's technological. Matching even just the feature set of Gmail with end to end crypto is insanely hard, and that's before you hit the "everything is a web app" problem.

Comment Re:Under US Jurisdiction? (Score 2) 281

The point of forward secrecy is there are no such keys to seize. The "master keys" are only used for identification, not encryption. So whilst a gov could theoretically seize Google's keys, this does not help them decrypt wire traffic. They'd have to do a large MITM attack, and to get everything? They'd have to decrypt and forward ALL Google's traffic. Not feasible.

Good use of applied cryptography means that realistically the only way for a government to get data out of it means requesting it specifically from the providers. In places where the warrant system has been vapourised (which certainly includes the USA and UK), this might not seem like much, but it does help prevent fishing expeditions.

Comment Why not ask who are in charge of defining words? (Score 1) 173

If you were going to ask a "someone" how they meant to define "derived work", you would ask Congress, not the author(s) of one out of a million contracts which happen to make use of that term.

You're right that it's upsetting that (mostly) people who don't really work with copyright would end up answering it, but that's the nature of law, or at least until you start electing[/appointing/etc] authors. (Cynic: or until those people start funding election campaigns.)

It's only after you have determined that something is a derived work, that you go study licenses. Until that point, licenses are irrelevant.

Comment Re:Gawd, I love that man (Score 1) 95

Under Bush, our country was attacked despite the fact that FBI agents tried unsuccessfully to warn about it; gasoline more than quadrupled in price (very suspicious; he's an oil man); got us into two wars, one of which was not only completely unnecessary but led to the rise of ISIS; took office in some of the best economic conditions I've seen in my life and left the economy in worse shape than any time since the great depression.

I never thought I'd see a worse President than Carter, who was far worse than Obama, but Bush proved me wrong.

Under Obama the wars are over, unemployment is half of what it was, gasoline is half what it cost under Bush. He's by no means a great President, but you have to remember that the Republicans' #1 agenda was to make his a failed Presidency.

The two best Presidents in my lifetime were, I think, Eisenhower and Clinton.

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...