Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Why? (Score 1) 92

To be slightly more accurate and less cynical, because their customers asked for one, and because there were no particular rules or guidelines laying out what to do with such requests thus no reason to refuse. Sure, any given CA could refuse on principle, in which case that customer would go to a competitor. That's why the CA system is regulated by browser/OS makers - to keep standards high in the presence of competitive market forces that would otherwise optimise for convenience.

Comment Alternative explanation (Score 5, Insightful) 398

Routing traffic via the VPN changes the path the traffic flows over, possibly avoiding routes that are saturated and (who knows) pending upgrade.

It's tempting to imagine the internet as a giant blob of fungible bandwidth, but in reality it's just a big mess of cables some of which are higher capacity than others. Assuming malice is fun, but there isn't enough data here to say one way or another.

Comment Amazon isn't out of expansion area (Score 1) 168

Amazon isn't out of expansion area. Their target is all of retail, and there's still a lot of non-Amazon retail. Most other big US companies with lots of cash have hit their natural limits.

Trying to go beyond those limits is tough. Google has not been successful in expanding beyond ads. (Android only makes money as an ad platform; Google's phone revenue is small.) Apple has a lot of cash, but can't find any way to use it that will yield the kind of margins Apple is used to. Facebook is still growing, but again, it's all ads.

There's only so much ad spending in the world, and the ad-based companies are all fighting over the same pot. There's more room to grow when your business model is "sell everything".

Comment Re: Eh? (Score 1) 137

Did YOU look at the graph? The bars are comparing all of 2013 against the first half of 2014 (obviously, as the second half is in the future). So the fact that IE already matched last year's record is where the 100% figure comes from - it's another way to say "doubled". Unless the second half of 2014 has a lower exploit rate then the conclusion will be correct.

Comment Nice job (Score 1) 60

That's a nice job. Of course, the only original part is the case. Coneniently, there's someone who sells a board with buttons designed to fit in a GameBoy case and bring out the buttons for emulation purposes.

If you 3D printed a new case, you would't need a Game Boy at all. I wonder if there's a decal set for that.

Comment iDrive has the same problem (Score 4, Interesting) 176

iDrive, which is supposed to be a remote backup service, has a similar problem. They used to be a honest remote backup service, with client-side encryption. (They didn't protect the client password very well on the client machine, but at least the server didn't have it.) File contents were encrypted, but filenames were not, so you could look at logs and the directory tree on line. Then they came out with a "new version" of the service, one that is "web based" and offers "sharing".

For "sharing" to work, of course, they need to know your encryption key. They suggest using the "default encryption key". Even if you're not "sharing", when you want to recover a copy of a file, you're prompted to enter your encryption key onto a web page. The web page immediately sends the encryption key to the server as plain text, as can be seen from a browser log. Asked about this, they first denied the problem, then, when presented with a browser log, refused to answer further questions.

They try real hard to get their hands on your encryption key. After you log into their web site, a huge pop-up demands your encryption key. Without it, some of the menu items at the top of the page still work, and with some difficulty, you can actually find logs of what you backed up. You can't browse your directory tree, though.

It's possible to use the service securely (maybe), but you have to run only the application for recovery, and never use the web-based service. They don't tell you that.

This isn't a free service. I pay them $150 a year.

Comment Tool problems (Score 1) 372

The author has a point. At one time, there were development tools, which cost money, were relatively static, and which were expected to work correctly. Then there were applications, which relied on the development tools.

We now have a huge proliferation of tools, many of them open source, poorly integrated with each other, and most badly maintained. Worse, because everything has a client side and a server side, there are usually two independent tool chains involved.

Web programming is far too complex for how little most web sites do. (And the code quality is awful. Open a browser console and watch the errors scroll by.)

Comment Re:Privacy is dead (Score 3, Insightful) 175

The same exact reasoning to justify TSA

They're incomparable. TSA is mandated by governments, you have no choice in the matter. Using a particular brand of smartphone is not. You are free to use a smartphone that doesn't use Google services and indeed are free to buy a Nexus 5 and then say "no" to the billion and one "trade data for feature?" prompts that appear when switched on the first time. No government goon is going to step in and insist that you send all your data to Google.

In fact, if you would prefer a smartphone that has a different data/features tradeoff then - conveniently! - Google provides a rather good open source operating system for free that you can use to build one. If others feel the same way you do you can even sell them without paying Google a dime.

Comment Re:popular online privacy tool Tor (Score 1) 52

Depends how you define "very popular" I guess. The most popular way to bypass state-level censorship in the Arab world and elsewhere is a product called HotSpot Shield. When Turkey blocked Twitter some time ago, HSS experienced 1000% growth and reached 1.1 million installs in the iOS App Store alone within only four days, with 800,000 regular users.

In contrast Tor went from 30,000 to 40,000 "direct connects" from Turkey.

HSS doesn't get much press in the geek world as it's just a plain old VPN run by a company in California that inserts ads into people's web pages to pay for the bandwidth costs. But usage wise it utterly dominates Tor.

Comment About 4x beyond current production. (Score 1) 260

As an actual product available right now, there's this 250 watt inverter. from Enphase, intended to work with one solar panel. That's 54 cubic inches, or 12W/cubic inch. Google wants 50W/cubic inch, so Google is asking for 4x the power density. This one happens to be configured for 48VDC input, but that's not hard to change. It exceeds the efficiency limit set by Google.

Enphase sells those little inverters for a one-inverter-per-solar-panel system, where power is combined on the AC side. The inverter, at 171 mm x 173 mm x 30 mm, is a lot smaller than the panel it sits behind. Making it smaller won't have any effect on system size.

One big difference: Enphase offers a 25 year warranty on that unit. Google only wants to run for 100 hours. They'll probably get something that will pass their tests but wouldn't last a year in a real solar installation.

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...