Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment The implementations should keep parameters open (Score 1) 169

We should not have one SHA-3 with the security parameters selected by NIST or anyone else.
For the vast majority of usages the speed of the hashing is a non-issue, they are all plenty fast enough
yet some implementations, specifically those with limited hardware my have other concerns.
We should approve the basic algorithm, and have a family of hash functions with different security parameters
to be selected for each usage.
Most of us should use an extra secure variant most of the time.

Comment As early as possible (Score 1) 299

I learned to write in basic when I was 6, even though I could hardly spell at the time, coding and typing came together,
most words were very short and easy but I still remember, 30 years later, memorizing REPEAT. I consider this a good experience.
I also had the chance to teach a class of 5 year olds to do "Lego-logo", this was a once week afternoon activity for 20 weeks.
They would build from mechanical lego. and would then program it on the computer by arranging large colorful blocks in order, the building blocks were inspired very loosly by Logo commands.
All kids had fun and were introduced to computers&robotics as something fun,cool and accessible.
A few of the kids were able to build original programs by the end of the course.
These were not gifted kids and they didn't get much personnel attention. A parent teaching his child can probably accomplish a lot.

Comment trust the algorithm or the implemenation (Score 1) 138

the algorithms have a lot of peer review independent of the NSA and the NSA had little input in their design (though may have
significant input in the slection of those algorithms that got standardized).
Though the NSA probably has better methods for attacking common cryptographic algorithms either using undisclosed weaknesses or more likely
custom hardware, it seems likely the NSA can not easily crack these algorithms.

The simplest thing to do is to pick a larger key length which will give you more of a security margin.

Some implementations have also been peer reviewed, and though one can probably hide a side channel leakage in a peer reviewed implementation
hiding something more sinister may be difficult for the algorithm to still be operating per the spec.

Comment We pretty much have to (Score 1) 659

It has nothing to do with Syria, or innocents being killed by an attack.
It is only about american interest, It is clearly in the USAs interest to be able to affect foreign nations using words alone.
We never want to use force, but the threat of force or even the implied threat can be a powerful one.
Obama made an explicit threat, he drew a red line, it is arguable if he should have done that but he did.
Not acting, even symbolically would turn his word into Mud which would force the US to use actions rather then words in the future.

Comment experienced developers are a risky hire (Score 1) 252

When looking for a development position with little to no leadership responsibility I would be hesitant before hiring someone with 14 years of experience.
Many such developers are simply incompetent, they have been around for ever and haven't risen to the top for good reason.
many developers do not want to manage but find themselves leading in their own way, becoming an architect or a very hands on team leader of a small team.
A different problem with experienced developers is ego and strong opinions. There are normally many good ways of doing something, an experienced developer is more likely to continue arguing for too long.
If I published a position asking 2-5 years of experience I wouldn't disqualify on the spot someone with 14, but it is definitely a red warning light.

Comment Why encrypt my network at all? (Score 1) 438

The vast majority of my on-line browsing is ssl anyway (and some of it through an extra VPN) so I'm not too worried about
eaves dropping on my network my porn browsing isn't that interesting.
It is far more likely some neighbor/passer by simply wants to check his e-mail or bus schedule and I see no reason
not to supply that curtsy. I certainly enjoy finding open wi-fi networks when away from home.
If anyone started abusing my bandwidth I would probably notice quickly, I've been doing this for many years in my last 3 apartments and my parents home
and this hasn't happened yet.
I keep contemplating a more complicated setup where eavesdropping would be difficult but I would still be running an open network for anyone who needs it but never get around to doing it(I wish my router simply gave it as a standard option).

Comment smart people use dumb phones (Score 0) 194

My phone doesn't need Gorilla glass to be very durable, It simply has a small screen.
It can last without recharging for more then a week of normal use.
And it can take quite a beating, (my wife washed hers 3 times)
It's not very good for surfing the internet or taking pictures but it is a much better phone then any "smart" phone.

Comment 80% precision isn't very good (Score 1) 167

And can easily be achieved without any sarcasm detection.
Social media mentions have a strong positive bias, so simply guessing positive all the time will get you
pretty close to the 80% mark. and with a simple list of negative phrases you can pass the 80% mark in identifying if a social media mention(twitter, facebook, etc.) is positive or negative.

Comment Don't worry about it (Score 4, Insightful) 252

The question is, who are you worried will find this super secret sensitive information (Your name, address and fact you use the site)?
The government? They don't need to intercept the e-mail they have easier ways of knowing it?
Some criminal targeting you specifically who manged to intercept this e-mail? He already knows who you are all he learned is you use this site,
simply seeing the IP is enough?
Some random script kiddie on the internet? intercepting e-mails is not that easy, yes they are in plain text but they are not broadcast over the internet for everyone to see
you have to position yourself along the route it travels (and this route normally doesn't change much) and attack somewhere along it, not impossible but hardly effortless. and why would he?
Which only leaves corporate espionage targeted against the site you are visiting, which though more likely then any other vector still seems a bit far fetched, and in the end all they learn is your name&address.
There are plenty of serious threats out there on the internet, this doesn't seem like one of them.
focus your worrying else where.

Comment We don't want them as safe as manned aircrafts (Score 1) 129

We build and operate manned aircrafts to a very very high safety standard.
A simple software upgrade for a manned aircraft takes years to complete, because of the standards employed.
When operating manned aircrafts we have strict standards as well on how to do everything and many many small and large things we don't do.
These are all very limiting both in the cost they impose and in the ability to get the job done.
We use unmanned aircrafts so we operate more freely both when building and when flying them, this comes with a higher accident rate from all causes but that
is the whole point.
We need to remember unmanned aircrafts are not only cheaper then their manned counterparts they also do things the manned counterparts can't or won't do.

Comment It's a vicious cycle that must be broken (Score 1) 728

In modern days education is more accessible, and almost everyone strives to get higher education, the result is more college graduates on the market, which allows more position to require a degree which drives more kids to college and the cycle continues.
This also causes more colleges to open up, many of them sacrificing quality and it helps raise the cost of education.
The root issue is lack of feedback between the job market and the universities.
We need the number of seats in colleges and universities to be closely related with limited surplus to the job market requirements.
The colleges will not self regulate and limit the number of seats because too many of them are in the business of making money,
and though this is very unpopular I see no solution other then some sort of governmental regulation to limit the number of seats fro bachelor degrees which will both increase the quality of graduates and save a whole lot of money on wasted tuition and years out of the job market.

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...