Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Zombies versus Predators (Score 1) 247

I personally have never killed anything larger than a bug in my life; I suspect a lot of other people haven't either. I've never had to, because there have always been other people who are willing to do those unpleasant tasks for me, in exchange for modest amounts of money.

You're safe; I'm sure in our dystopian zombie future, the phones will still need sanitizing.

Comment Moo (Score 1) 1

At some point, having a server (like Linode) becomes well worth it. As long as you have a network connection, you can connect to your one development box.

Comment "Hack?" (Score 1) 107

Isn't the very point of this player's system, that the player serves the interests of the disc's publisher over the interests of the users, where the users' needs should always yield whenever there is a conflict? That's not a mere technicality; it's the very essence. From the spec's pov, this is desirable operation. Nothing has been subverted.

Comment Encryption Castle (Score 1) 192

Cell phone SIMs are the "Encryption Castle", really? From a practical perspective, they are essentially plaintext, since everything gets fully decrypted at each hop.

Maybe I will start calling my previous car a "Dining Palace" in honor of the epic glorious time that I once ate a chili dog while driving, shifting and making a left turn (alas, this was before I had a cell phone) without getting any chili on my shirt.

Comment Re:Impossible! (Score 1) 42

The hacker community is primarily a male dominated space, therefore it must be hostile and problematic, shitlord!

Perhaps we should start marketing the term "hackette", and include a pen-test ISO image with every Barbie Thumb Drive.

Seems to be the desperate approach in CS-land.

Those Barbie thumb drives already have them. Not my fault you haven't discovered it yet.

Comment What's people obsession with rubber hoses? (Score 1) 220

Rubber hoses are weak. You never get threatened with a rubber hose or a $5 wrench, without knowing it happened and your enemy revealing himself. It takes irrevocable commitment and admission of guilt on their part, and therefore risk of consequences, to take things to that level.

When they bring that stuff out, comply. Sing like a bird. They get the data they want, and then you call the media and your lawyer (or the cops, if your adversary with the hose/wrench doesn't happen to be the cops), and the TRUE bitchslapping (to whatever degree is possible, at least) may then commence.

Crypto is good. Sure, you can still find some bad things within that scenario: your privacy was still violated rather than protected. Maybe they're going to "disappear" you so that you never get to tell anyone about the threat or torture. Maybe they're going to torture you anyway after you give up your keys. But all those possibilities also exist in the plaintext scenario too! If they want to murder you, they'll do it. If they want to torture you, they'll do it. Psychopaths are going to do whatever they're going to to. But they slip up and get caught sometimes, and if you confront them with crypto, there's also the chance they'll do what many other criminals usually do: pick an easier target.

Comment Re:Who TF buys a "Smart" TV anyway? (Score 1) 370

..why would anyone in their right mind buy..

Go look at how much it would cost you to a buy a single Raspberry Pi (its capabilities are just about right for this). Then imagine what something like that would cost a huge manufacturer like Samsung (I say this part, so that you'll have some sense of how low the margin will be). That is how much a smart TV costs to make, relative to a dumb TV. On something costing hundreds of dollars, it's nearly free.

And what the game console makers, the smartphone makers, etc (and even pre-loaded OS desktop PC makers) have established over the last few decades is that "nearly free" can become "actually free" or even profitable if someone pays you to bundle malware with your product, or there's some kind of product-tying, or things like that. (So basically, damn near every expensive anything, ought to have a [potentially user-hostile] computer in it. Think of anything that costs $400 or more. That thing needs malware.) So just having a CPU can increase the revenue from the sale, so that from the manufacturer's point of view, it virtually costs less to make. So if you're in a highly competitive market, you can sell it for less.

Thus, the reason people buy these things, is that they cost less (to buy; I mean the cost at the time of the sale, not the costs of using the product).

We simply haven't yet gotten to the point where, when you first buy a TV (or a car) (or for some people, a phone) the first thing everyone knows they need to do with it, is overwrite the preloaded assumed-to-be-user-hostile software with a user-centric replacement. Fortunately, Samsung is joining Apple and Nintendo/Sony/Microsoft, and many others (this is an all-too-common thread to rehash; don't feel offended if I omitted your favorite Peoples' Enemy), in helping to teach us all this basic principle.

Comment Re:Best alternative? (Score 1) 370

Yes, I could leave it unconnected from the network, but then I'm just pushing the problem to another device.

But at that "another device" point, the problem is really easy. You can build (or even still buy) awesome Mini-ITX (or similar sized) systems to use a HTPC and can very likely mount it on the back of the monitor if you really don't have any place for it to sit.

It's only the built-into-the-monitor form factor where there aren't really any good computers avai-- actually, you might look into running Linux on an iMac (though IMHO you'll get less computer for more money, that way) if you simply just must have it down to one single enclosure without any unsightly bumps on the back.

Slashdot Top Deals

Today is a good day for information-gathering. Read someone else's mail file.

Working...