Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Infamous Tor Network? (Score 5, Informative) 155

Why don't you watch the talk and find out?

Actually I'll just summarise it for you. If you run a lot of Tor nodes you will eventually get picked to host a hidden service directory. Then you can measure lookups for the entries of hidden services to measure their popularity, and crawl them to find out what's on them.

Comment Re:Obligatory (Score 2) 161

[Java took a very different approach to the problem of "how to we get rid of segfaults and memory corruption". Java basically banned all interesting use of the stack, forcing everything onto the heap, and barred developers from using RAII. Nowadays, with more advanced compilers able to do advanced lifetime analysis, we can reconsider languages - such as Rust - that take a less draconian approach.]

I think it's rather misleading to state that more advanced compilers have obviated the need for Java's approach.

Firstly, Rust doesn't solve automatic memory management like garbage collection does. Their solution appears to be basically smart pointers with move semantics + reference counting for the cases where data doesn't have a lifetime cleanly tied to scope. Well, great. It's back to the 1990's and COM. Reference counting notoriously cannot handle cycles, which are very common in real programs. Any tree structure where you want to be able to navigate both up and down, for example.

In addition to the difficulty of breaking reference cycles and preventing memory leaks in complex programs, refcounting also has poor performance especially if you want threads involved. Garbage collection has now been optimised (in good implementations like HotSpot) to the point where it's faster than refcounting.

If we start seeing teams of non-expert programmers writing large programs in Rust, you will see programs with memory leaks all over the place.

Additionally, you realise that Java compilers have got smarter over the years too, right? HotSpot can stack allocate objects in a bunch of different circumstances, when analysis reveals that it'd be safe.

Comment Re:Sounds suspiciously like welfare. (Score 4, Interesting) 109

Basic Income is welfare, not something that sounds like it. The difference between it and normal welfare is, everyone gets a basic income whether they want it or not. It's meant to be enough to live off.

The idea of a BI is a very old one. It has nothing to do with cryptocurrency, and I'm not sure what relevance cryptocurrency has (and I say that as a Bitcoin developer, so I'm a fan of CC in general). In theory a society rich enough to afford it would have moved to the oft-fictionalised post work utopia that you sometimes see in things like Star Trek. Because everyone gets it whether they want it or not, unconditionally, the basic income would be supposedly stigma free. Thus if you want to pursue things that are not very profitable but are beneficial to society nonetheless (production of art, charity, etc) then you could do that and not have to worry about being seen as a welfare sponger.

I love the concept in theory, but a society rich enough to afford one is pretty unimaginable in today's world. Western societies are clearly incapable of even providing the current levels of welfare let alone a vastly larger level. I see a BI as a useful goal to inspire people about the future rather than something practical for today.

Comment Re:Why? (Score 1) 163

They aren't allowed to impersonate another company, I suspect that's rather the point. Look at the screenshot: the HTTPS indicator was crossed out. I guess you have to click through a big fat warning to get there ..... and I'm surprised it's even possible at all. I thought YouTube was SSL pinned. Maybe it's just google.com

Comment Re:Get What You Pay For (Score 1) 163

In all of my years of being a network engineer, I've never heard of managing bandwidth that way and can't think of why someone would mange bandwidth that way.

Me neither but we have no idea what kind of filtering system you can install onto a plane.

My guess is that they can't filter by DNS lookup for some reason (people's devices have cached answers?) but they can do SSL rewriting, and for big sites like anything Google runs IP address blocking isn't useful because all their sites share IPs. They know browsers and apps won't accept their fake certs, it's just a way to create an unbypassable error.

Comment Re:Why? (Score 1) 163

You're not thinking like someone who has to deal with the general public.

People who read slashdot can easily rattle off some semi-accurate estimates for how much bandwidth a particular online activity consumes. Load BBC News? Less than 1mb (I hope). Listen to a streamed MP3 of a pop hit? Probably 3-4mb. Watch a 40 second video? Maybe 5-8 megabytes. Windows update? Errrmm ..... maybe 20-30? Stream a full TV episode. Multiple gigabytes.

None of this means anything to your average flyer. They don't think in units of bits. Telling them they have 300 megabytes of transfer quota is just meaningless nerd speak to them. What they understand is watching youtube, browsing the web, downloading TV episodes, etc. This is the fundamental problem all brokers of bandwidth have: their customers don't really understand what they're buying.

So now we come to the question of why GoGo is serving bogus SSL certs. The most obvious reason I can think of is that doing so breaks both websites and apps in such a way that they will stop immediately, rather than switching to alternative hostnames or IP addresses or constantly hammering away and retrying stuff. If you're trying to selectively kill off YouTube and other video sites so you can tell people "Sure, browse the web and play with your phone, have fun" in a massively bandwidth starved environment, causing unbypassable errors for specific websites is probably not the worst way to do it. People will be happier this way than thinking they're gonna surf for an hour before going to sleep, and then getting a quota exceeded error after five minutes because they accidentally clicked on a YouTube vid.

Comment Re:Let's ban all guns! (Score 1) 1350

Obviously a ban is not the same thing as a well enforced ban.

Note that the most recent comparable incident in the UK involved two Muslim men hacking a soldier to death with a machete. But there was only one death. It's much easier to kill people, much faster, with guns than with machetes. The UK has been very serious about gun control though, so the lack of guns in the last attack wasn't a huge surprise.

Comment Re:Any actual examples? (Score 1) 598

1) when a new OS comes out, some apps designed for the old OS have problems. This works out over time as most apps are updated. Some old unsupported apps are left in the dust and no longer work under new OS versions. this has been true since DOS.

That's a weird example given that Microsoft have always been religious about backwards compatibility and app-compat testing, to the point where you can in fact run apps written for DOS in Windows and have them work 20 years later.

Apple, on the other hand, have managed to ship software updates that break Chrome in recent times - that's not exactly some obscure hard to test for app. Yosemite was/is riddled with insanely obvious bugs that show me Apple just doesn't care or make time for OS upgrade testing. It's not some fundamental thing.

For example after the upgrade the IntelliJ UI is flickering and broken for no obvious reason, presumably something related to their new transparency everywhere. If you disabled said transparency in the accessibility prefs window, beyond being incredibly ugly, the corners of rounded popover windows like the volume indicator went black! They weren't even doing transparency blending right! Come on guys, whoever implemented the "no transparency" feature must have realised it was unfinished, but they shipped it anyway (fixed in 10.10.1 I think). Yosemite also trashed support for my USB smart card stick for, like, 4 months. The manufacturers were eventually able to make it work again, but it now comes with a list of stupid glitches that are due to new bugs in Apple's libraries - one of them is literally "if you use app X Y or Z, then apps A and B won't work until you restart your Mac". WTF? Apple didn't even make any upgrades in smartcard support in recent times. How did they manage to break it so much?

Yosemite is full of crap like this. I'm ignoring the subjective things like I think it looks worse. Yet, I cannot identify a single feature or improvement that I've benefited from post-upgrade. I had to do it to test the software I'm writing and keep up with security updates, but if I'd known and had free choice, I'd have stayed on 10.9

But this has been a trend ever since iOS. As was pointed out elsewhere on this thread, it's an open secret that Apple basically have one team of their best people that Jobs kept moving around between the most important projects. OS X has suffered for years because of this.

Comment Re:Utterly predictable (Score 1) 161

The point of Bitcoin is you don't need to put your money on deposit with someone else.

Lots of day traders and people who want to hold bitcoin for speculative purposes, but not actually use it, choose not to do this and keep their money at an exchange. But are they really Bitcoin users at that point? Or are they banking users who happen to have a BTC denominated account?

Comment Re:Somehow banks... (Score 1) 161

If Bitstamp did get hacked, then what regulation do you have in mind? "Don't get hacked" is not something you really need a regulation for.

Maybe you meant regulations in general that make it hard for new/small companies to handle money. Assuming there's a correlation between bigness and competence is ...... optimistic.

I think the main reason we don't see this happening so much in the banking space is that banks will work together to reverse transactions when possible, and all accounts are ID verified, whereas the Bitcoin community doesn't do that.

Comment Re:And therefore it is no surprise that ... (Score 1) 92

Well, it is a "surprise" in the sense that the connection between intelligence agencies sniffing wire traffic and stopping DDoS attacks is tenuous at best and non-existent at worst. I do not recall any intelligence agency stopping a DDoS attack, ever. That's up to the companies and network operators handling the traffic.

Comment Re:Does it really matter (Score 0) 86

It does not matter. Console security systems are designed to sandbox code written with the SDKs, game developers are seen as adversaries for the purposes of security because otherwise a hacked game makes it too easy to "level up" to full control and then piracy. For example an early Xbox 360 exploit was based on replacing an unsigned shader file in a specific game, which allowed arbitrary shader execution and from that control over the CPU.

The Xbox 360 security system was very impressive and only encountered truly serious problems right at the very end of the consoles much extended lifespan. I've got an interest in computer security so I'm eagerly awaiting talks on how the Xbox One is done, but given the general success of the 360 architecture I suspect the One is very similar, with some tweaks and additional defence in depth.

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...