Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Seems fine to me. (Score 4, Insightful) 184

I don't like the idea of anyone else recording me, either (stores, etc), but I find the benefits of getting food, goods, doing my banking, etc outweigh my distaste. It doesn't have anything to do with Google Glass specifically.

because you don't have a legal leg to stand on

Why would that be the first thing that comes to mind? I'm not planning on suing someone for recording me. That would be pointless. Just because I have to put up with something to take part in society doesn't mean that I have to like it (or that I wouldn't appreciate places that share my viewpoint on the matter).

Comment Re:Seems fine to me. (Score 1) 184

Am I in that geek's house, or on their property? When I'm in a store or a bank, I'm on their property, and they have an interest in recording me that I understand. Same with the cop; he's doing something comparatively dangerous in the execution of his duties. He's a public servant. A private citizen in a public place recording me for unknown purposes? That's unsettling. Personally, I wouldn't ask them to stop, but I'd be appreciative of a business that forbid its patrons to film other patrons without their permission.

Comment Re:You have a broken sense of responsibility. (Score 1) 184

An 802.11-compliant device that receives a deauthentication message is required to terminate its connection to the base station. As such, if you transmit a deauth, you didn't just "express an idea", you gave a command to a device that's required to obey it. It's like saying "I'm not responsible for the damage caused by hitting the self-destruct button; whoever wired the button to the explosives is". When YOUR actions cause something to happen that wouldn't have happened if you didn't do anything, then YOU are completely at fault.

Whoever selected wifi is negligent, but that doesn't fully absolve the deauthenticator of responsibility.

Comment Re:Great, crash the drone into things. (Score 1) 184

Deauthentication messages work outside wifi encryption. It's a common wifi attack to broadcast deauth messages, then record the reauthentication of clients as they reconnect to the wireless access point. For encryption with known weaknesses (like WEP), reauthentication attempts can be analyzed to discover the network key. This attack is similar, but without the goal of discovering the key.

Apparently, the 802.11 standard states "Deauthentication is not a request; it is a notification. Deauthentication shall not be refused by either party." If the device is standards-compliant, then spamming a deauthentication message should continually knock it offline.

Comment Re:Bullcrap (Score 1) 387

Are companies ever going to get off this fixation on specific programming languages?

About the same time that they get over the fixation on specific college degrees. I was hired as a C++ developer, but I've touched code in half a dozen languages besides that, and I didn't know a few of those before I had to use them.

Comment Re:I really don't my vital body parts to be on wif (Score 1) 183

The safe level varies based on the patient's physical activity at the time. Imagine that they're out swimming and someone uses their smartphone to set their heart to "going to bed" flow rate. And if the heart has a safety feature where it can read the neural signals for heartbeat speed, then why would it need to be externally controllable anyhow? Wireless access just seems like an unnecessary complication to the system.

Comment Disappointing (Score 3, Interesting) 730

I'm not a giant Apple fan, but one thing that I actually liked about their strategy up to this point was keeping their phones smaller. I've had a 4.7" phone, and that was almost too large for my (admittedly small) hands. I've got a 5" screen now, and it's notably difficult for me to use. I'm pessimistic about my future upgrade options at this point, if even Apple is jumping on the mega-sized-phone bandwagon.

Comment Re:Humans have too much (Score 1) 206

All of Slashdot can use the AC account, while only a subset of Slashdot (often only one person) can use any given named account. People leak information when they type, and if the same person or small group of people can be identified by an anonymized identifier like a username, then you can glean information about whoever's using that name.

It's like the databases of "anonymized" information. Gather enough information, and eventually you'll have enough data points to uniquely identify an individual. That's pretty far off from "just as anonymous", provided someone wants to actually do the work to datamine someone else's old /. posts.

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...