Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Key exchange (Score 2) 174

It could be handled like SSH: when you get an invite to connect to someone, their key fingerprint is displayed. If you are paranoid, you can verify the fingerprint via alternative channels. Otherwise, you blindly accept it. In either case, you are protected against man in the middle attacks after that first connection is made. Also, if you did accept a fake key, any time you try to talk to that person over a network where the man in the middle is not present will trigger a key mismatch, revealing that an attack took place on the initial connect.

Comment Re:"Net neutrality", my ass. (Score 4, Insightful) 91

It's a buzzword for demanding federal control of the internet, to remedy the government-caused problem of last mile providers who are protected from competition by local cable monopoly privileges.

What kind of additional control would net neutrality give the government over the internet besides the enforcing net neutrality itself?

Besides, I doubt any possible negative side effects of net neutrality would come close to the problem of ongoing massive warrantless spying, so if you're worried about government control over the internet, this seems like the wrong battle to pick.

All we need to solve the problem of the Comcasts and the Time-warners of the world is to expose them to competition.

That may not be easy... The big telcos lobby for laws protecting them from municipal broadband, but as far as I know they are not protected from commercial rivals, yet few are challenging them.

Here in the Netherlands when it comes to broadband competition, on ADSL there is a lot of competition because the government forced the leading telco (KPN, the former state telco) to share their telephone lines with other ISPs, since those lines were laid with public money. On cable, for some reason such a line sharing wasn't enforced, so two big companies (UPC and Ziggo) bought all the local cable networks and are now trying to merge, meaning there will be one giant cable company for the entire country (*). On fiber, there used to be a lot of different ISPs, but KPN bought most of them and a few other failed (probably because of mismanagement), so there is very little competition left there as well.

(*) I do agree with the cable companies' reasoning that they are not competing against each other anyway, since they don't operate in the same areas: every house has at most one cable connection. But in my opinion the line sharing should have been enforced for cable too, since those networks were also built with public money. But they were owned by local governments and sold for a lot of money during the dot-com boom (unlike KPN, which was owned by the state and then privatized), so I guess it would be unfair to change the conditions for network use after selling them.

My point is that mergers and acquisitions will reduce competition, even in situations where there are no corrupt laws blocking healthy competition. So I think it's wishful thinking that if you allow competition it will automatically come into existence, regardless of properties of the specific market.

There is also a practical aspect: it is inefficient to have to run several cables to each house. In my opinion, ideally each house would be connected to a single fiber optic cable, over which an unlimited number of ISPs could offer their services. The last mile is not a good place to look for competition; the rest of the service is.

Comment Re:Prevailing winds? (Score 2) 212

I don't think the prevailing winds matter all that much: it is the winds in the first days after the accident that matter, since during that time the radioactive particles were still in the air. I know that here in the Netherlands (west of Germany) in the months after the accident some types of crops were destroyed because they were considered unsafe for consumption.

Comment Re:Version control (Score 2) 127

Git is used to maintain the Linux kernel; I don't think any game has a rate of commits that comes even close to that. The problem you're referring to is probably that Git is not designed to handle large binary data efficiently. That doesn't make it a joke, but it could disqualify it for a particular use.

Comment Re:more power to him (Score 2) 286

Unfortunately the site hosting TFA from that story seems to be gone. In my opinion the most deceptive thing about 80's game boxes wasn't the cover art: it was pretty clear it wasn't representative of the in-game graphics. However, a lot of games were available on multiple systems and the box would often feature screen shots from a different system. Some had fine print stating which system the shots were from and some didn't even have that, but in either case there were more than a few game boxes with screen shots that looked significantly better than the game inside the box would.

Comment Re:I know I'm not expected to RTFA... (Score 1) 322

After reading the article from dmbrun's post, it seems what they're doing is a single code base, more shared APIs across Windows variants and a single store interface. So it's mostly focused on making it easy for developers to support multiple Windows variants. A smart move, but nothing revolutionary.

Comment I know I'm not expected to RTFA... (Score 3, Interesting) 322

The third link is not actually a link, since the <a> tag is missing the href attribute. I wanted to check what the CEO actually said, since "unify" could mean a lot of things.

Are they going for x86-64 only, killing the ARM-based WIndows RT, as Hot Hardware is reporting? They'd still have to keep ARM support for Windows Mobile. Perhaps they should have put Windows Mobile plus some tablet extensions on the low-budget tablets, that would have fit people's expectations a lot better.

Are they going for a single code base? In that case there would be multiple products created from that code base, so that doesn't tell us anything about the fate of Windows RT or any other specific products.

Are they going for a single product named Windows? While I think it would be good to drop the artificial home/pro/ultimate differentiation, having a different Windows for client and server use is still useful. Although that could be handled by having a different default configuration rather than an entirely different product.

Comment Old games were more difficult (Score 1) 178

Another reason cheat codes existed is that without them, a lot of players couldn't finish the game. I think there are several reasons for this: the arcade roots, a larger percentage of hardcore gamers, the need to prevent the player from finishing an expensive game quickly after buying or renting it and game design being a much younger discipline.

Don't get me wrong, I actually prefer today's easier games, but it does mean that you don't really need a cheat code anymore to finish most games. Instead of having the difficulty increase a lot as the levels progress, games now have selectable difficulty from the start and achievements to add challenge for more talented and/or experienced players.

Comment Re:But can you actually trust it? (Score 1) 100

Chrome extensions are tied to your Google account, and Google has pretty much complete control over them. Chrome, as a browser, does not need to be tied to a Google account (although it will suggest that you do so) and its automatic updating can be disabled.

Not updating your browser will also leave you vulnerable. You could download updated Chrome installs from a generic download page, using a different browser and an IP address that is not associated with you, instead of accepting (possibly customized) automatic updates. That would be safe under the assumption that the generic Chrome build is not trojaned.

More to the point, though, I can securely send messages even though a compromised browser, if I encrypt the messages externally.

True, but then it would be more convenient to send messages from an external mail application and not use web mail at all.

Comment Re:But can you actually trust it? (Score 4, Insightful) 100

If you're worried about Google itself being forced to compromise this extension, you shouldn't be using Chrome at all.

In any case, the current state of webmail is typically messages stored as plain text, transmitted over secure sockets. Encrypting the message itself is a big step forward.

Comment Re:Hedge (Score 5, Interesting) 238

This is Google's hedge against increasingly higher costs for peering and neutrality breaking ISP's, so why would they then turn around and be hypocrites by ruining the very reason they're moving intro infrastucture to begin with?

Android started in much the same way, to avoid telcos getting control over the content people access on their phones. While the base OS of Android is still free, a lot of the standard applications are now licensed from Google and the terms for licensing them are becoming more strict. Google's fiber is neutral today, but that doesn't mean it will stay neutral forever.

Comment Re:Surface: the only Hope (Score 1) 379

They tried to go for the infotainment market with the ARM-based Windows RT, but it found very few customers, mainly because there are not many apps for it. A "Surface Mini" would only have a chance if it runs on x86 and I don't know how feasible it is to produce a small light x86 tablet that gets a decent battery life, while also being affordable and powerful enough to run Windows 8.

So I don't know if I would call this a long-term strategy or just facing the realities of today.

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...