Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:The biggest challenge? (Score 3, Interesting) 186

Not sure about the Google and Android solutions, but you don't need a network or cell connection to use ApplePay

Nor with Google Wallet.

Also, I dunno about you, but I always have my phone in my pocket, just has handy as my wallet, but with my wallet, I need to remove a card, swipe it, and usually either sign or enter a code.

My phone is actually handier than my wallet, because I use my wallet less and keep it in a less accessible pocket. Actually, most of the time while I'm in a checkout line my phone isn't in my pocket, it's in my hand.

(Disclaimer: I work for Google and bits of my code support Google Wallet. However, I was a fan of NFC payment before joining Google, and whether it's Google, Apple or someone else I'm really glad to see it finally taking off.)

Comment Re:Why are they using SIMS this way? (Score 0) 155

The first article says they are just storing a secret key on the SIM and on the network provider's systems. That is just dumb and was totally insecure even before this happened. They should be using privat/public key pairs in which the private key is generated on and never leaves the SIM.

Symmetric cryptography is not "totally insecure", and there's no reason to accept the complexity, large key size and performance hit of asymmetric cryptography when there's a perfectly reasonable key distribution mechanism in place. Further, your proposal wouldn't even help... who cares if the private key was never off the chip? Given a public key how do you know that the corresponding private key was ever on any chip? Answer: You need to obtain the public key in a secure fashion in a controlled environment, such as during manufacturing. If you drill down on the requirements for the context and process needed to identify that public key as trustworthy you find that you have exactly the same requirements for a secure symmetric key injection, which is much simpler and easier to manage.

And as for attack by NSA/GCHQ, if those are your opponents, and they're actually focused on you, you can't win. At most you can make them work for it a bit, but not very much. So it really doesn't make much sense to include national intelligence agencies in your threat model.

Comment Re:Bill Nye, the Dogma Guy! (Score 1) 681

In the first link he says to get vaccinated; and he's only wrong if you look at it from a libertarian political perspective. In the second he says that TV weathermen should once in a while mention that a heavy storm is "consistent" with climate change (not "caused by"). That's a typical denier tactic is to imply that since we don't know which individual storms were worsened by climate change, then we can safely say that none of them were. That's exactly what Marsha Blackburn said in that video.

Comment Re:Universal developer rule... (Score 3, Insightful) 81

Build on a flood plain, make millions of dollars today, and let the tax payers pick up the bill after a catastrophic 100-year flood years later. Rinse, rebuild and repeat.

Seeing how those tax payers have spent 100 years eating cheap food from that fertile flood plain, and the bill only amounts to a tiny fraction of their direct savings - much less the increased economic opportunities inherent in a more populous nation - it works out quite nicely to everyone. Until, that is, someone starts making noices about taxes being stealing, the city remains a ruin, and everyone starves.

Comment Re: Feminism HURTS families (Score 1) 126

Other than the "ownership" hyperbole, you're right, regardless of the posterior plumbing of the douchebag.

The whole point of slapping - or other low-intensity violence - is to show the victim's very body is perpetrator's possession, to do with as they please. Please explain how describing this as ownership is hyperbolical?

Except the numbers show that, obviously, people do just that. And when a stronger target DOES hit back, the attacker takes more hurt than gives.

Half of population are below median intelligence. Bullies are no exception.

I used to agree with this just as vehemently as you seem to. When the bullies started coming up without a Y-chromosome, though, I'm sexist enough to content myself with discrediting them.

I'm sorry to hear that. Let's hope you get better soon.

Comment Re:on starting with smaller-scale albedo modificat (Score 2) 421

It's a shame the company didn't offer a retrofit kit to bring the old design into compliance.

They don't have to do this stuff to sell their stoves anywhere else, so why bother? Just drop the market, and keep selling the old design which works fine as long as you don't overdamp it. But sadly, most of us have no idea that overdamping is what causes excessive wood stove emissions. I mean, nobody ever taught me anything about starting a fire, or maintaining one, even though I grew up in a house with a fireplace.

Comment Re:Feasibility of end-to-end encryption (Score 1) 155

You can have end-to-end encryption right now if you are willing to do some work. Your Android phone has a built-in SIP client. Well, in theory; my SIP settings seem to have disappeared with Lollipop. I hope they'll come back by 5.1, if not sooner. But there's various SIP softphones available for all mobile platforms, probably even including windows phone. Android at least, and probably the others too, supports IPSEC. Everything you need is right there. The problem then becomes whether you can actually trust your phone. The answer is probably no.

If you truly want to protect against things like this, you're going to need a portable device with wifi and an open CPU. Best of luck finding one. It'll also need an IOMMU and a driver which prohibits the NIC from stepping out of line, or a NIC with open firmware. Otherwise, someone could (theoretically) own your NIC and then browse your memory from it.

Comment What? (Score 0) 81

Wait, you mean they were using the same equation? Did they discover it on stone tablets chiseled by ALIENS?

How about, ancient and modern cities follow same mathematical pattern? Because that could actually be true. Both ancient and modern cities weren't built from the same city planning manual, because most cities (even modern ones) aren't planned at all, except haphazardly and as they go.

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...