Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Corrected story :) or maybe :( (Score 1) 166

$FUTURE_DATE: Citizen Lab released new research today on a targeted exploitation technique used by state actors involving "network injection appliances" installed at ISPs and with the possibly-coerced "cooperation" of https: web sites or the companies issuing https: certificates. These devices can target and intercept encrypted YouTube traffic and replace it with malicious code that gives the operator control over the system or installs a surveillance backdoor. One of the researchers writes, "many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked - like visiting an unencrypted web site, ...many of these commonly held beliefs are not necessarily true." This technique is largely designed for targeted attacks, so it's likely most of us will be safe for now - but just one more reminder to not trust the person on the other end to not cooperate with The Man in the middle. It is unknown how long such attacks have been happening but they might date to 2014 or earlier.

Comment Re:When every feature undocumented (Score 1) 199

Everything you think as being "intuitive" is simply you being used to other software behaving in a similar way, or you expecting some icon to match the behavior / usage of a real-world item it kind of looks like. It's training, whether you realize it or not.

Thank you for making part of my point for me (new readers: see my earlier posts in this chain for context).

If you can depend on your users to have a certain skill - be it reading English, knowing how to use a telephone, knowing how to drive, or knowing how to use a computer with a very similar user interface to yours - then for all practical purposes those behaviors and any obvious variations of them can be considered "intuitive" as far as you and your customers are concerned. To put it another way: When I go buy a brand-new car, I don't have to be taught what to do with the big wheel that is a few inches in front of where I am sitting - I can "intuit" how to use it based on my knowledge of the very similar big wheel in my existing automobile.

Comment Next sensationalist show: "The Linux Kernel" (Score 1) 103

Next on Discovery, discover how this once-obscure hobbyist "computer program" now runs key parts of the Internet and even the core of that computer-in-your-pocket that you call a telephone. See the dangers as the Discovery Channel uncovers 10 year old bugs in "embedded systems" are ticking time bombs that could destroy the Internet as we know it if they go off. ....

Comment Re:When every feature undocumented (Score 1) 199

Plus, there is no such thing as intuitive GUI

I dunno, I'd say it's fair to call the user interface at most ATMs and credit-card machines intuitive. Granted, some of those user interfaces aren't graphical, but some are.

To put it another way, the learning curve on these things is so shallow that if there's a difference between its shallow learning curve and what you would call an "intuitive GUI" I'm not seeing it.

Comment How intuitive is it? (Score 1) 199

You can skimp on documenting the obvious.

You can delay documenting the obscure, or even leave it undocumented as an "easter egg."

Anything else I would expect to be well-documented OR I would expect the product to say, up front, that its documentation is sparse.

Have you considered making bare-bones documentation in the product and making the full documentation a community-driven project, perhaps a Wiki? Now that the base Wiki software makes it easy to have "pending edits" which are not shown to non-logged-in users, you can do this without as much of a "troll/vandalism" risk as in the past.

User Journal

Journal Journal: Sig update 2018-02-17, was Sig update 2014-08-14

Updated 2018-02-17

Knowledge is how to play a game, intelligence is how to win, wisdom is knowing what game to play.

--
Updated 2016-07-08 (the day after a multi-criminal police shooting in Dallas, Texas, USA, leaving 5 police dead, 7 other police injured, and 2 non-police civilians injured)

#IAmDallas - remembering the fallen of 7/7/2016

Updated 2016-04-25 (temporary/for a few weeks)

Comment Charging-only cable adapters (Score 3, Interesting) 72

This is one reason why charging-only cables or cable adapters which do not carry the "data lines" should be cheap and just as widely-available and widely-marketed as other USB cables.

Bonus points if they are transparent so the end user can visually verify that the only connected lines are the power and ground lines.

OBDIYHACK: http://www.instructables.com/i...

Comment You want cheaper textbooks? (Score 1) 95

Except for rapidly-evolving subjects, encourage professors to use "old" textbooks or, whatever the subject matter, encourage professors to use "open source" textbooks when they are available.

If publishers balk at reprinting old textbooks at "old prices," lobby Congress to allow colleges to reprint old textbooks and pay a royalty based on the lowest published price during the book's lifetime.

Under this kind of "book market" most Freshman and Sophomores won't have more than 1 or 2 classes where they have to buy expensive textbooks.

As for the interactive software that increasingly accompanies college textbooks and in many cases is part of the reason they are so expensive - college professors need to decide if the software is cost-effective before recommending it. In some cases, it might be cost-effective but in most cases outside of specialized situations or advanced coursework, it won't be.

Comment There is a place for the Morse telegraph (Score 3, Interesting) 144

The non-wireless Morse telegraph using only 19th-century technology (plus modern conveniences like plastic-insulated wires) is a fun educational tool for places like museums that reflect the era when telegraphy was widely used.

It's also a fun educational tool for children's camps which specialize in either the history of that era or which specialize in STEM and which have a historical component.

The same can be said for semaphore signaling, "hand-crank" telephones, and even "tin can and a string" telephones.

Wireless telegraphy is still used by amateur radio operators and other hobbyists, alongside more modern "digital modes" like packet radio. Because of its very low bandwidth, Morse Code, particularly the computer-controlled "slow code" that is used on very-narrow-bandwidth transmissions in the sub-600KHz bands can typically get a message through in high-noise or low-effective-transmitting-power situations where other methods, such as "phone" (i.e. voice communication) or other digital modes can't.

Comment Re:We Are All Under Suspicion Now (Score 2) 232

The only valid reason for a passport photo is to make sure that one person doesn't have two passports.

That, and to make sure the passport is really the person who claims it is his.

OK, I will grant you this: You can dispense with the photo altogether for "yes, this passport is mine" purposes if there is another practically-un-spoofable method for the purported passport holder to prove that it is his. A hash of DNA/fingerprint/iris/etc. will do. Possession of knowledge, such as a decryption key of encyphered text embedded in the passport that says "yes, it's really me" will be good enough for most purposes but it's not as good as a unique biometric identifier.

Comment Re:Does BitCoin need a way to void coins? (Score 1) 101

No, you couldn't, because a transaction can and often does have multiple inputs from different past transactions and multiple outputs into future ones. Your "evil" transaction will eventually be in the history of most if not all of the unspent outputs.

Bitcoins don't have identity. A Bitcoin is a unit of magnitude for use in accounting, not a dollar bill with a serial number.

I've already addressed this issue above, see "or if they have been co-mingled with valid coins and re-issued, declare all of the progeny of that mixing as having a total value equal to the non-tainted transactions, i.e. these coins would have a "lesser value" than a regular coin."

Let's use a simple example:

If a transaction has an input of 1BC from A and 2BC from B, and an output of 1BC to C and 2BC to D, then coin "C" would be considered to have the weighted value of "A+B+B"/3 and coin D would have the weighted value of "A+B+B"*(2/3). If coin A were discovered to be "voidable" - say, it was reported stolen in a timely manner - then whoever is holding coins C and D would suddenly find that some merchants or perhaps the entire BC community would treat these coins as having only 2/3 of their face value.

If the coins had been "spent" already, then this diminished value would likely be spread through many other coins created as a result of the intervening transactions.

The Military

Snowden: NSA Working On Autonomous Cyberwarfare Bot 194

WIRED published a long piece on Edward Snowden today (worth a read on its own), and simultaneously broke news of "MonsterMind," an NSA program to monitor all network traffic and detect attacks, responding with a counterattack automatically. From the article: Although details of the program are scant, Snowden tells WIRED in an extensive interview with James Bamford that algorithms would scour massive repositories of metadata and analyze it to differentiate normal network traffic from anomalous or malicious traffic. Armed with this knowledge, the NSA could instantly and autonomously identify, and block, a foreign threat. More than this, though, Snowden suggests MonsterMind could one day be designed to return fire — automatically, without human intervention... Snowden raised two issues with the program: the source of an attack could be spoofed to trick the U.S. into attacking an innocent third party, and the violation of the fourth amendment since the NSA would effectively need to monitor all domestic network traffic for the program to work. Also in Bamford's interview are allegations that the NSA knocked Syria offline in 2012 after an attempt to install intercept software on an edge router ended with the router being bricked.

Slashdot Top Deals

"If it ain't broke, don't fix it." - Bert Lantz

Working...