Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Mr Fixit (Score 1) 582

We should remember that FLOSS reacted very quickly to the "revelation," but the bug itself has been sitting there for years, which isn't really supposed to happen.

Unfortunately, the very same thing happens in proprietary software. And "isn't supposed to happen" is a misunderstanding. It's just supposed to happen less, and it's supposed to get fixed easier. The latter, at least, has been proven out.

Comment Re:not at those prices, it won't fly off the shelv (Score 1) 194

like the other poster said, all I want in there is an amp and speakers with a jack for audio input

That's what I put in my truck. You can't listen to optical media in it unless you have a heavy load, because the suspension is too hard. So I have a $20 amplifier with stereo in and four outputs.

I'd like my 1964 Dodge back. fixable, the controls fall where your hands are, no menus, and no nonsense.

Yes, if I had perfect foresight instead of excellent hindsight, I'd have kept my 1960 Dodge. It got over 20 mpg on the freeway and it was stupid simple. But I didn't know how to rebuild a brake system then (dirt simple, as it turns out) and so I couldn't afford to keep it.

Comment Re:Why spend another $700 for a car stereo (Score 1) 194

It's more reliable. Bluetooth Audio is miserably finicky. The only thing that ever worked right with my JVC was AT&T Fuze. With a couple different Android devices now including the Nexus 4 I get occasional skips. I used to use an Xperia Play, that skipped a lot. Flawless using the headphone cable in my truck instead.

I'm going to try adding bluetooth to my car anyway, switching into the line inputs from the changer with an audio signal relay, and using an ultra-cheap receiver. but i'm also going to have line in, just in case.

Comment Re:This was positive (Score 1) 582

So there was a bug in OpenSSL. Big bug, yes, but that's not the reason it was (and still is!) a big problem.

The genesis of the big problem is one of monoculture, not only of OpenSSL being the dominant SSL implementation, but probably more importantly, the fact that pretty much all Internet security that is accessible and matters to ordinary users is SSL/TLS in the first place.

If you think this is bad, imagine what happens if the fundamantals of SSL itself are compromised: What would we replace it with? How, considering this is effectively the only secure connection technology available across all common OSes and embedded devices? How long would that take? (Years, at least, I'd wager...)

What we need is more flexible security methods in the first place, and open, standard implementations (like OpenSSL, but growable) that can allow us to proactively extend security methods as the net matures, and *quickly* address bug-based vulnerabilities when that approach fails. (Note that this may require the implementation of some kind of standard "secuirity code VM", so new code and new methods can be easily distributed even to older systems that may not be fully supported anymore. And no, I'm not glossing over things like limits on code space, memory, and the like, nothing will allow every system to be upgraded, but we do need some way to allow and authenticate that (while preventing bad guys, including governments, from using the mechanism to create weaknesses.))

Encryption

Snowden Used the Linux Distro Designed For Internet Anonymity 171

Hugh Pickens DOT Com writes: "When Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. Now Klint Finley reports that Snowden also used The Amnesic Incognito Live System (Tails) to keep his communications out of the NSA's prying eyes. Tails is a kind of computer-in-a-box using a version of the Linux operating system optimized for anonymity that you install on a DVD or USB drive, boot your computer from and you're pretty close to anonymous on the internet. 'Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'

The developers of Tails are, appropriately, anonymous. They're protecting their identities, in part, to help protect the code from government interference. 'The NSA has been pressuring free software projects and developers in various ways,' the group says. But since we don't know who wrote Tails, how do we know it isn't some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it's bad for the NSA, it's safe to say it's good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. 'With Tails,' say the distro developers, 'we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal.'"

Comment Re:A win? (Score 1) 328

Incoming water is also charged a sewer fee, essentially doubling the cost. I can put a separate meter on my outside nozzle so that when I fill the pool, wash the car or water the garden, I'm not also being billed for the (not directly used) sewer fee.

Just wait, the city will start to tax you for evaporation for water released into the outside world...

Slashdot Top Deals

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...