Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:A link between DPR and an early Bitcoiner (Score 1) 172

Regardless if there was an official link, it is probably true that Bitcoin really took off when illegal/quasi-legal enterprises like Silk Road started using them. That's not to say Silk Road created Bitcoin or that all Bitcoin commerce is illegal, just that it would never have grown to real prominence without it.

No, it 'took off' when the media discovered it, and the fact that Silk Road commerce was conducted with Bitcoin gave them the sauce for the story - but the media would have eventually discovered Bitcoin with or without Silk Road.

Comment Re:A question to the community (Score 1) 300

From https://en.bitcoin.it/wiki/Myths#Point_of_sale_with_bitcoins_isn.27t_possible_because_of_the_10_minute_wait_for_confirmation : " Point of sale with bitcoins isn't possible because of the 10 minute wait for confirmation It is true that transactions can sometimes take tens of minutes to become confirmed. Despite this, retailers can accept unconfirmed transactions with very little risk by simply 'listening' on the network for a double-spend transaction, or partnering with a company that provides this service. After a head start of merely several seconds, the original transaction would reach so much of the Bitcoin network that a fraudulent double-spend transaction would almost certainly be fruitless. An attacker would have to commit easily-detectable fraud, in person, several hundred or several thousand times, before one of these low-value double-spend attempts would likely succeed. An attacker could work around the necessity of sending out a second fraudulent transaction to the Bitcoin network by attempting to solo-mine an attack block containing the attack transaction himself - temporarily withholding the block with the rest of the network - and then execute the fraudulent purchase within seconds, or minutes at most, of mining the attack block, before broadcasting the attack block. However, the cost of such an activity would dramatically outweigh the value of anything typically offered without a confirmation wait for several reasons. First, mining a block (attack or otherwise) entitles the miner to a valuable block reward, and because the attack involves temporarily withholding the block from the network, the attacker would put himself in the likely position of his block becoming stale, which would result in forfeiture of the entire reward. Most solo miners solve less than one block per month, so this would represent the loss of proceeds of potentially several weeks of mining. Second, it is not possible for a solo miner to know exactly when his mining activity will yield a block, and because the attack must be carried out within seconds or minutes of successfully mining a block, the attacker will not be able to know or plan in advance the brief window when the attack would be likely to succeed. While it may be easy for a determined attacker to get low-value items that are sold and delivered online instantly without waiting for confirmations (such as downloads), this unpredictability and the briefness of the opportunity would make it extremely difficult to commit any kind of fraud where real-life interaction is required, such as visiting a merchant or taking possession of goods. Petty shoplifting would be far simpler. Even if an attacker went forward with this attack, the retailer would be notified of the fraud the moment the attack block is released seconds later. In short, the 10-minute wait for confirmation is only practically necessary when delivering goods of value that significantly exceed the block reward an attacker would have to risk to perform an attack and where recourse after delivery is practically nonexistent, such as money transfers. "

Comment Anybody know why the top quark was found first? (Score 1) 123

It's my understanding that this boson was not discovered before LHC because it was too massive to produce in a lesser accelerator; however, the top quark was produced at Fermilab some years ago, and it has a larger mass (Higgs @ 125GeV, top quark @ ~171GeV). Does anyone understand why this is? I know I am missing something here...
Canada

Submission + - Canada's Internet Surveillance Bill: not dead after all (www.cbc.ca)

Maow writes: Despite a recent story claiming that Canada's Bill C-30, covering internet surveillance, has died a "lonely" death, the minister responsible claims otherwise.

"Public Safety Minister Vic Toews is denying reports that the Harper government intends to quietly shelve its controversial online surveillance bill, C-30. Speaking to reporters on Wednesday morning, Toews insisted the legislation was moving ahead."

This is the bill that you either support, "or you stand with the child pornographers."

Comment Re:This is the flaw with libertarian arguments (Score 1) 694

The market will not necessarily support what is good for society, it will only support what is profitable. This company was even given a head start by the government and still couldn't make it. It's very unfortunate that the destructive libertarian argument that the government should stop spending money and let the private sector work it out seemingly has so much traction.

Is it possible that "green" solutions that are not economically sustainable, and/or that are produced by poorly managed companies may not be "good for society"? Someday a well-managed company will produce economically viable "green" solutions, and the market will definitely support them. The problem with the government spending big money betting on companies like this is that, even if the government is right about which direction we need to go in (which they frequently are not), they still don't know how to pick the right companies to lead in that direction. The market does, and will - if the government lets it.

Security

Submission + - RSA Hackers May Have Wanted Server Source Code (threatpost.com)

Trailrunner7 writes: The most important issues the RSA attack brings to the surface concern exactly what the attackers may have been after and what the successful compromise means for the integrity of the tens of millions of SecurID tokens deployed around the world.
As troublesome as these scenarios are for SecurID users, perhaps the more likely target of the attack on RSA is the source code for the software that's used to administer and run the token deployments at customer site.
"There's a lot of code needed for maintaining databases, adding and deleting users, making backups, synchronizing master and secondary copies of databases, and more. An attacker who could penetrate these administrative systems doesn't have to worry about key generation or cryptanalysis; they could simply steal existing keys or insert new ones of their own," Steve Bellovin said.

Submission + - A New Class of Nuclear Reactors (freakonomics.com) 1

prunedude writes: From Freakonomics: The folks over at IV Insights, the blog associated with Nathan Myhrvold's Intellectual Ventures, point out that it was the complete loss of power that disabled the cooling systems protecting the plant'(TM)s reactors. Which raises the question: Is there nuclear technology that could withstand such a catastrophe? Possibly. TerraPower, an Intellectual Ventures spin-off that also boasts Bill Gates as an investor, is working on a new reactor design called a traveling wave reactor that uses fast reactor technology, rather than the light water technology used at the Fukushima Daiichi plant.
The two biggest advantages of the fast reactor design is that it requires no spent fuel pools and uses cooling systems that require no power to function, meaning the loss of power from the tsunami might not have crippled a fast reactor plant so severely.

Technology

Submission + - Solar-Powered Military Uniforms (ecouterre.com) 2

fangmcgee writes: Scientists across the United Kingdom are working on a solar-powered kit that could lighten the load of soldiers—and, more important, increase their mobility—by up to 50 percent. Developed by the University of Glasgow with Loughborough, Strathclyde, Leeds, Reading, and Brunel Universities, and funded by both the Ministry of Defense and the Engineering and Physical Sciences Research Council, the new uniform will comprise photovoltaic cells to harness the sun’s energy, as well as thermoelectric devices that turn temperature differentials into electricity (see: Seebeck Effect).
Firefox

Submission + - Mozilla Releases Firefox 4 (techspot.com)

An anonymous reader writes: Mozilla has released Firefox 4. The final build comes less than two weeks after Release Candidate 1. The company originally found no major problems in the RC1 build, and decided to release RC1 as the final version, but then changed its mind. An RC2 build was quietly pushed out on March 18, 2011 with a few fixes, and today the final bits appeared on Mozilla's servers.
Google

Submission + - Google Voice teams up with Sprint (blogspot.com)

bhagwad writes: "Google announced today that it was teaming up with Sprint which will allow users to seamlessly use their Sprint mobile number as their Google Voice number and vice versa. This is quite a big step for Sprint and shows a lot of guts since carriers have always been wary of giving up control. Though GV allowed users to port their phone numbers some time ago, this tie up makes it easy and could finally propel GV into the public's mass consciousness."
Security

Submission + - Experts Weigh in on the RSA SecurID Breach (securityweek.com)

wiredmikey writes: After notifying customers on Thursday that it had been breached after hackers mounted a highly sophisticated cyber attack that put its SecurID product at risk, RSA has yet to expand on the details and potential impact of the attack, leaving customers concerned and with many questions unanswered.

In the meantime, reactions are pouring in from customers and the information security community in general, some saying to prepare for the worst, and some brushing it off as not-so-serious incident.

One expert commented that “If ‘the keys to the kingdom’—the public serial number to secret key mapping database—had NOT been compromised, there would be zero danger to users of RSA’s SecurIDs." At the same time another expert says doesn’t believe the incident is a game changer. “It's serious news that RSA's SecurID solution has been the target of an advanced persistent threat. But It's not a game-changer. Anybody who says it is, is an alarmist.”

So what are others saying and doing in the meantime while they wait for answers from RSA on the SecurID system being attacked?

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...