Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Maybe (Score 1) 133

I am curious about your experiences with the Nokia N9 as I was planning on buying one in part due to liking the Nokia N810 and being able to use it as a pocket-sized Linux computer (I never got an N900). I had thought it was pretty easy to get access to a root terminal and do whatever on it just like the N810. Is this not the case?

Submission + - FBI investigates grade change hacking (cnet.com)

An anonymous reader writes: A Twitter post from an undergraduate student at Santa Clara University has prompted the school to acknowledge that it asked the FBI to investigate how a few dozen grades were electronically altered.
Google

Submission + - Google's secret lab (technewsworld.com)

phaedrus5001 writes: Apparently, Google has a secret lab known as 'Google X' where they are working on over a hundred different projects. From the article:"These include a space elevator project, experiments working to connect home appliances and dinner dishes to the Internet, robots that can go to work instead of their owners, and the development of driverless cars for the mass market."
And, just maybe, Skynet as well...

Comment Re:WARNING: Off topic post ahead (Score 1) 100

This is certainly not a new idea. It is sometimes referred to as the "rapture of the nerds" version of a technological singularity. Ray Kurzweil is a big fan of the idea and one of the major proponents.

As to the actual feasibility, I ran across Whole Brain Emulation: A Roadmap a little while ago, which discusses the possibility given our current knowledge of how the brain works. It provides dates on how long Moore's Law would have to continue based on varyingly optimistic assumptions about how much work is necessary to actually emulate a brain.

Overall, I think there are two main problems with expecting immortality via brain uploading: (1) 40+ years is a very long time to assume Moore's Law for and (2) even if we can emulate a human brain, scanning an existing one and transferring it into a computer may not be possible.

Comment Re:WARNING: Off topic post ahead (Score 1) 100

This is certainly not a new idea. It is sometimes referred to as the "rapture of the nerds" version of a technological singularity. Ray Kurzweil is a big fan of the idea and one of the major proponents.

As to the actual feasibility, I ran across Whole Brain Emulation: A Roadmap a little while ago, which discusses the possibility given our current knowledge of how the brain works. It provides dates on how long Moore's Law would have to continue based on varyingly optimistic assumptions about how much work is necessary to actually emulate a brain.

Overall, I think there are two main problems with expecting immortality via brain uploading: (1) 40+ years is a very long time to assume Moore's Law for and (2) even if we can emulate a human brain, scanning an existing one and transferring it into a computer may not be possible.

Comment Re:I always wondered (Score 1) 63

The GP is referring to the Physical (or "strong") Church–Turing thesis which says that all physical processes (including, say, any computation done by the human brain) are Turing-computable. I do not know if Turing or Church actually suggested that version or if only later computer scientists came up with it. It cannot actually be proven without a much better understanding of physics, but it is generally believed to be true.

Comment Re:Okay... (Score 1) 179

But what exactly does this get me over SSL Client Certificates?

Less importantly, e-mail verification: the third party is providing a federated e-mail verification service, which Mozilla hopes is a service which will be done by the e-mail provider but is also providing themselves (as well as allowing any other third-party to offer).

More importantly, by taking the [very common] assumption that control of the e-mail address for an account is equivalent to control of an account, this appears to essentially give the decision of which public keys are tied to an account to whoever controls the e-mail address. That means that having multiple devices with different keys is easy, and, more importantly, losing all of your private keys is not a problem as the public keys can be changed as long as you can still log into your e-mail. Of course, the downside to this is that, as far as I can tell, your e-mail provider can now log into any of your accounts without resetting the password. In fact, I am not seeing why this would not give Mozilla (or any other trusted third-party) the ability to log into any account supporting this. (Of course, to be fair, an OpenID provider has the same power and this has the additional advantage that the provider does not need to be told which websites the user is logging into.)

Using SSL Client Certificates, either each host you use would have to have the same certificate or each service you use would have to know about every public key you use. Or, I guess, you could give the service a public key used to sign the keys you do use, but then you would still have the problem of needing to use e-mail verification to recover if you lost your keys.

Comment Re:Update on this story (Score 1) 377

I think the number you want is the "Illicit Drug Use in Lifetime" for people 18 and over. This table (part of a much larger report) gives the number as 49.3% in 2009, so not quite 50% (although if you scroll up to Table 1.11B, you can see that people 60 and above are pulling the average below 50%).

I am not really sure where to look for data on ill effects or even exactly how you would quantify them, but the same study does make some attempt to do so. For example this table shows (past year, not lifetime) rates of dependence and abuse for both illicit drugs and alcohol.

Comment Re:Make up his mind, please (Score 4, Interesting) 520

Since Facebook users volunteer up the information that pretty much makes it public information.

Okay, so if I post information on Facebook (either editing my profile or posting a status) then I am voluntarily giving that information to Facebook, so that makes it public information? Even though I expect only people I have marked as friends to see such information by my privacy settings? What if I send a Facebook message? It has a clear "To" header like an e-mail; should that information be considered public? For that matter what about GMail? I am inputting information into a textbox on a website with the intent that (specific) other people will read that text. Should I therefore treat that text as public knowledge? For a physical analogue, suppose I write my text on paper (perhaps multiple copies) and put those pieces of paper into envelopes and send them to my friends via snail mail. I, once again, have written text and tendered it to a third-party for delivery to a specific set of private individuals. Should I still expect this text to be public?

The United States has laws about privacy and due process. New technology should not make it so the government no longer has to follow due process in collecting private information on its citizens. Unfortunately, due to the nature of network effects, a lot of information gets concentrated in the hands of a few entities (in this case, Facebook) who do not necessarily have much interest in dealing with the government, so they simply freely hand over the information. I suppose privacy laws could be written to make it illegal for Facebook to hand over information about its users to the government, but it is not clear what such laws would even look like nor who would be supporting them.

Seriously, I don't care if you know that I'm at the book store buying a coffee. If I don't want this information to be public I don't post it. Problem solved.

You are right that a lot of this information actually is not that important. At the same time, I do not like the idea that law enforcement personnel can peer into my private life as recorded by various services I use without even having to justify the invasion of my privacy to a judge.

Of course, see my sig: I dislike the idea of monolithic services that are able to collect such information and would prefer that social networking (and other) services be made up of collections of smaller separately administered nodes, each of which would have far less information. How to do that while still having a usable service is, unfortunately, an open problem.

Comment Re:I have a solution!!!! (Score 2) 128

The reasoning is that the vast majority of the time, no one is doing a man-in-the-middle attack and furthermore that doing a man-in-the-middle attack on any significant proportion of the connections on the internet is assumed to be above the capabilities of any known attacker, so it means that you are probably talking to the owner of the DNS entry and normal passive sniffing attacks (ex. Firesheep) won't work. Also, the attacker may not be able to tell which connections are verified and which ones aren't (especially if the browser assumes self-signed sites will always use the same certificate until it expires), so even man-in-the-middle attacks on self-signed certs are non-trivial.

Also, the information being protected is generally assumed to be relatively low value, so protecting it with a relatively easy to break security layer is not a large problem: after all, it is currently being sent unencrypted.

Of course, hopefully verifying certificates via DNSSEC will be supported soon, which will make the entire self-signed certificates argument moot. (Err... well, eventually, once it is widely deployed.)

Comment Re:Correlation is not causation (Score 1) 490

My high school gave an unweighted GPA as you describe but also a QPA ("Quality Point Average") score that was weighted by the level of course. Other people I have talked to have mentioned weighted GPA systems that offer a similar correction. Of course, the best way to maximize QPA/weighted GPA may still not have been to get As in the most challenging courses, but such a system at least makes an attempt in that direction.

Submission + - ESP-Based forwarding brings faster internet

An anonymous reader writes: RFC 5984 was published today by IETF, describing ESP-based forwarding as a way of reaching zero-latency, infinite bandwidth internet access. The author writes on his blog: "½ÂI am very happy that our hard work has been recognized by the internet community. We have laid the foundation for ESP-Based forwarding and are looking forward to see more implementations of this concept. Perhaps this is a small step for man, but it is a giant leap for ping"

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...