Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Criminal uses? (Score 4, Interesting) 344

True but bitcoins are completely untraceable

Ok, so here's how Bitcoin works:

  • Step 1. Distribute the entire transaction history to everyone in the P2P network, much like how a git repository works.
  • Step 2. Have a bunch of people do lots of expensive hashing so that anyone in the P2P network can tell which "branch" of the repository is the official one. ("The branch that was the most difficult to compute" is the one that wins.)
  • Step 3. To see how much money you have, look at the transaction history for the accounts that you control.

Bitcoins aren't really a thing you can have. Even the physical "bitcoins" you can buy aren't really coins. They're just private keys that are allowed to sign transactions on behalf of accounts that have a non-zero balance.

The only reason why people talk about Bitcoin as being untraceable is that anyone can create accounts, and there aren't necessarily names attached to accounts, but it would be too hard for authorities with warrants to catch you if they suspected you. The entire transaction history is still there, forever, for everyone to see!

Comment Re:Reflections (Score 2) 960

Seems like you didn't need to take it over the IT department at all - you could have made a case to them and they could have supported you. Now you got to enjoy yourselves in the moment and possibly cost you future IT security.

What part of this didn't you understand:

I pointed out that since i was being paid nearly $70 an hour, and I'm losing a good couple of hours a day on computer slugishness, that the investment would pay itself off in about 2 days, since not having the ram was costing the company about $140 a day. No dice.

Comment Mod parent down (Score 1) 272

Stop trying to sound smart by changing the topic. The original commenter wrote:

Using a .xxx TLD makes it that much easier to identify and filter porn if you don't want to see it.

My response: "No, it doesn't, and here's a 7000-word, peer-reviewed article---written by people who understand how the Internet works---that explains why."

Your response: "Yeah, but, if we lived in Magical Faerie Land where the Internet didn't work that way, this would be a great idea! Also, that article is just somebody's opinion. I won't mention any specific objections to it, and I probably haven't read it except for its title."

Comment Re:Why deb is better than rpm... (Score 1) 685

About the security model: I know that apt works by checking an OpenPGP signature on the Release file (which contains hashes of the Packages files, which themselves contain hashes of the individual .deb files). So, effectively, the entire repository as a whole is signed---a rogue mirror can't silently drop security updates by cherry-picking insecure old versions of packages.

Do you know if yum does something similar? I remember, a few years ago, RPM signatures were at the individual package level, rather than at the repository level. Is that still the case?

Comment There should be statutory liability (Score 2) 157

I propose two solutions:

1. Get rid of these notice-and-takedown laws.
2. Enact statutory liability any time this happens. That will make these folks a lot more careful about how they use the notice-and-takedown laws.

Anyone who has their freedom of speech inappropriately restricted deserves compensation from these clowns.

Slashdot Top Deals

The rule on staying alive as a program manager is to give 'em a number or give 'em a date, but never give 'em both at once.

Working...