Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment IR mods for early digital cameras ... (Score 2) 99

... used to be easy to do. Then the companies got wind that people were using them to "see through clothing" and made it impractical for most hobbyists.

Google Glass is one thing but as soon as people clamor OMG to the press and politicians loud enough, commercial companies will be afraid to market this to consumers and legislators may step in to criminalize the un-disclosed use of "IR vision" for non-"legitimate" (e.g. security cameras) use or even criminalize all non-"legitimate" IR use in public places.

Come to think if it, I might be in favor of rules allowing for civil-court action for failing to disclosure of "see through clothing-capable" photography done in places accessible to the public.

Comment Centralized theft registry as a solution? (Score 1) 704

Perhaps its time for a centralized theft registry.

Yes, this will reduce the pseudo-anonymity but it can be done.

Here's one possible way for bitcoin-wallet services to handle things, but it's off-the-cuff so it's probably buggy:

Executive summary:

Through the use of multiple wallets and a central registry of "stolen bitcoins," a wallet service's customers can put money they don't need immediately in "vaults." Unauthorized "withdrawals" from the vault will be refused by the software and will never make it into the block-chain, thereby providing some protection to the funds and deterring wholesale theft from bitcoin-wallet services.

Details:

Give account-holders two "wallets" - a "pocket money wallet" and a "vault wallet" - and create a third wallet - a "holding wallet" - that is controlled only by the wallet service.

Wallet #1 is the "pocket money" wallet. It has no additional protections. It's used for "petty cash" and for money that will be needed in the next day or two.

Wallet #2 is the customer's "vault wallet." For certain customers with few incoming transactions, this "vault wallet" will be stored "offline" and only moved online temporarily when the customer tells the wallet service there will be an incoming transaction soon.

Wallet #3 is the "holding wallet" for Wallet #2. There may be more than one such "holding wallet."

The "vault wallets" are registered in bulk by the bitcoin-wallet services with a central authority. Only certain transactions are allowed "out" of these vault wallets. All other transactions will be refused by the software - they will never make it into the block-chain.

If an exchange is compromised, all of its "vault wallets" are considered compromised until the exchange indicates they are not. Transactions indicating withdrawals from these "vault wallets" during the time of the compromised are refused by the software - they will never make it into the block-chain.

The registration is nothing more than
* some identifier belonging to the wallet service, to ensure that the registration information isn't tampered with later
* the identifier of the "vault wallet"
* the identifier of one or more "holding wallets."
* for each "holding wallet," a minimum time between each transaction. This will usually be at least a day.
* each "holding wallet" will typically be automatically dumped into the customer's "pocket money wallet" when the time expires.
* at the wallet-service's option, additional obfuscation may happen after the money leaves the holding wallet and enters the customer's "pocket money wallet." For example, the money leaving the customer's "holding wallet" may be dumped into "bank's temporary wallet #1" and an equal amount transferred from "bank's temporary wallet #2" into the customer's "pocket money wallet" shortly thereafter.
* at the wallet-service's option, the "holding wallets" may be part of an obfuscation scheme. For example, they may be randomly re-used across customers, or they may be designed as one-time-use wallets.
* a time-delay for any registration information changes other than marking wallets as compromised.

The idea is that the "pocket money" wallet is just as vulnerable as ever, but it will rarely have most of a customer's coins in it.

The "holding wallet" has some vulnerabilities but it will be empty most of the time and thanks to the "time lock" it's unlikely that all or even most "holding wallets" at a given will be able to be stolen at the same time.

The "vault wallets" are protected enough to make the immediate reward of "raiding" an exchange much lower than it is today. There will still be theft, but the number of people interested in stealing from exchanges will go down and the risk of loss from a given theft will go down.

Trade-offs:

* This is not a complete solution.
* There are probably anonymity issues I haven't considered.
* There are new denial-of-service issues introduced by this system. I can see the possibility of a DOS attack against a particular "vault," against a particular "wallet service," or even against the "central registration authority" itself.

These issues will need to be looked at and either fixed or deemed "acceptable" before this or any similar system will be accepted by end users.

Comment Choice vs. non-choice factors (Score 1) 427

If you control for # of hours worked, that's fine and dandy as long as this factor is something NOT based on gender discrimination.

If men get offered longer-hours, and therefore more-annual-pay, jobs or assignments, because they are men or because of some underlying factor where men have an advantage because they are men, then you SHOULD NOT be factoring this out.

If everyone gets offered such assignments without any gender discrimination and men choose to work longer hours, or if the reasons for any differences between what men are offered and what women are offered are all based on things that happened earlier in life that were based on free choices rather than gender discrimination, then you SHOULD factor these out.

Example:

If promotions are offered to those who have current skills for the new job, and those current skills are usually developed by taking extra training classes on the employee's own time, this may seem like a gender-neutral reason for selecting who gets promoted, even if its effect is to have many more of one gender promoted than another. In some environments, it may actually BE a gender-neutral way of selecting who gets promoted.

However, if the company's employee pool has a large number of women who simply do not have the time to take such classes (say, due to being single parents - single moms significantly outnumber single dads in the USA) and the employer either knows this or would have to be willfully blind to not know it, then using "who has current skills for the new job" for internal promotions without finding some way of ensuring everyone has a REAL opportunity to get skills training is, at best, indirect gender discrimination. If it's a deliberate "bwuhahahaha let's see if we can fool everyone into thinking we can play fair while ensuring most promotions go to men bwuhahahaha" deliberate technique, then the company better hope there is no smoking gun or they will lose any related employment lawsuit and probably alienate their customers as well.

Comment Nextflix "plus shipping and handling?" (Score 1) 520

Media providers may start charging "ISP shipping and handling surcharges" to cover their actual costs (plus a "small" markup of course!) to customers of ISPs who insist on charging peering fees.

The alternative is to spread this cost across all customers (like most manufacturers do now), effectively having the customers who have ISPs with free peering subsidize the costs of those who don't.

Personally, I think "last-mile connectivity" and "wireless connectivity" should be billed on a per-unit-cost basis with some minimum monthly charge to cover "paperwork." ($X/GB for data, Y cents (or tenths of a cent) per minute per "classic" cell-phone call, Z cents (or tenths or hundredths of a a cent) per "classic" text, etc.) then allow multiple service providers (e.g. back-haul TCP/IP-data-providers, "classic" phone/text providers, specialized data providers like VoIP, latency-sensitive streaming service providers, etc.) to provide services up to the "neighborhood box" or the "provider-interface box closest to the cell tower" etc.

This way, if I wanted to get VoIP from Comcast, regular internet from Time Warner, and television services from AT&T, all over my local cell tower, I could. I'd pay basic connectivity-fees to the company that ran the tower and pay service-bills to the other companies. They wouldn't pay the tower owner anything, or if they did, it would be at a regulated fee designed to cover costs, not provide a profit to the tower owner. I'm the tower-owner's customer, not the data providers.

Comment THAT these things happen isn't the issue (Score 1) 166

"The simple equations here make it easier to understand that improbable things really are not so improbable," [emphasis added]

Almost everyone who had birthday parties in school growing up knows SOME pair of kids with the same birthday. Anyone in America knows that "big lotteries" usually have at least a few winners a year. Helping people understand that such events happen isn't a big issue.

Helping them understand why they are expected to happen on the other hand....

Comment Either make an effort or drop it (Score 1) 467

For arrest warrants and fugitive investigations for people whose underlying crimes that have a statute of limitations, the police should have to either drop the charges when the statute of limitations would have run out, some point before that date, start making continuous, real (not merely "pro-forma") efforts to find and arrest the person, or at a minimum go to court every few months explaining why they don't have enough information pursue the person.

In other words, if the police want you, they can't be allowed to just put your file into a computer and forget about it forever. At some point, they either have to keep spending some effort on your case or drop it.

For cases where the underlying crime has no statute of limitations, like murder, this would not apply.

In most U.S. states, theft of a DVD is going to be a misdemeanor and in some states its a fine-only offense if the value of the DVD is very low. The statutes of limitations for such crimes are typically 7 years or less, depending on the state. In some states they are 3 years or less.

Slashdot Top Deals

Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin

Working...