Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Infrastructure? (Score 1) 688

Infrastructure, maybe. But not the type you're thinking of.

The habits of drivers of electric cars have been studied extensively and here are some of the findings:

  1. Most of them don't drive very far per day
  2. NONE of them used public or private charging stations because..
  3. They all prefer to charge at home in their garages.

Yes the infrastructure is missing, but it's not charging stations. It's homes with garages. City dwellers aren't going to buy electric cars. The suburbs are and they'll charge at home thank you very much. Pull in for the night, plug it in, leave the next morning with a full charge. No need to go sit on the side of the road at some gas station for 30min to 8hrs, sharing charge points, waiting for other electric car owners for their 30min to 8hr charge.

Look the studies up, some were done by mini, others by other car companies. I've seen charging stations in my state that were installed 5-10 years ago at great cost (several million $) that have never been used and are now completely incompatible with charging standards. The last thing we need is for retards to go spending other people's money to build more of those.

Comment Re:Competent Authorities (Score 4, Insightful) 146

What does Assange's personnality, and your opinion of it, matter ? That's Ad Hominem put to the extreme. What about his work ?

It's the man, not his work, who is seeking asylum.

But it is his work that is important, regardless of this. Nay, not even his work, the work of the dozens to hundreds of brave souls who fight the slavers and face death constantly so that you may live under the freedom they provide. Something that bears mentioning regardless of the topic.

the work is more important than who's doing it

Actually, even as far as the work itself is concerned, since Assange selects what information he presents, there is a degree of judgment and choice involved. If Assange is prone to making choices based on personal interests rather than objective truth, then even the value of his work is questionable. That is why considerations about the person ("ad hominem") are relevant not just to his asylum request, but also to his work.

Hahaha. You jest right? You complain that one man may be cherry picking what secret documents he reveals, when he has revealed thousands or more... While the other side lies, cheats, steals, fabricates, leaks and murders to deploy their overwhelming propaganda.

We live in a world where the entire mainstream media are controlled by the intelligence services, even as paid assets at the very top. Where stories are censored in multi-continent wide blackouts. Where they are crafted to fit the interests of the rulers of the world. Where a whitehouse and pentagon leak secret material on a weekly basis when it's of interest to them. Where they don't even have to leak secret info if they don't want to because just BullShitting to the media will get your words repeated as truth, with no fact-checking.

Among all of this, you object to one man working against them? I think you woke up and tried to put one pant leg on a flea and the other on an elephant.

Comment Re:Indeed (Score 2) 385

Yes, but remember, in those days "Cookie Monster" was a typical virus. And internet communities were relatively homogenous.

There are, there must be, limits to free speech. Shouting down someone else doesn't count as free speech. At most it's a reasonable reaction to their stifling of your own speech.

In this case it appears (as an outside observer) that this is the silencing of an honest, truthful, and respected voice. If she is an employee of Rededit, then I suppose that is their right, but the proper response is to refuse to deal with or support Rededit in any way. Which is what this protest appears to be doing.

Comment Re:Indeed (Score 2) 385

What you say is clearly reasonable, but I've got to believe that you are mischaracterizing this event. Censorship is always questionable, even when done for the highest of motives. So are you asserting that the folk on Rededit were inciting to violence? Taken literally it appears that this is what you are saying. I'm sufficiently unfamiliar with the events that this could even be a true and accurate characterization. But I think I'd need to have seen some proof before I believed it.

Given the way that people often behave, I have to admit that defending incitements to violence isn't something I have a hard time believing. What I have a hard time believing is a massive outcry in support of defending incitements to violence (without considerable prior propaganda).

Comment Re:It's that time... (Score 1) 342

It's important. The times that it's critical are rare. So... add if's it's in the middle of the road you prefer to stop rather than run over it. If it's up-right it's proper to dodge dangerously rather than to hit it. The number of crawling kids in the middle of the road is quite small, but it's larger than the number of infants, so add in something that smoothly increases the probability of human as it's (estimated) weight approaches 90 pounds and decreases it as it exceeds 300 pounds. Or 400. So you have a flattened bell curve with a smooth top.

But really, all this fiddling is just to handle corner cases. Usually you just stop or avoid the thing on the road without wondering much what it is. Only if you can't do either of those do you need the fancy figuring, which is a pain, because that's when you need the fast decision, so you "corner case handler" need to be something simple.
Rule 1: If it's standing up, it's a human. Don't hit, even if you must take damage. (This yields several false positives, but too bad. We need a quick decision.)
Rule 2: Estimate it's weight. (Ouch! That looks like a slow process...so while you're doing it, slow and start dodging.) If it's above 25 pounds, avoid even if you must take damage. (Note that hitting something heavy at a fast speed will damage you no matter what.) Continue slowing and preparing to dodge. If it's following a ball, dodge even if you must take damage.

Sorry, time's up.

This isn't a perfect approach, but it's simple, and doable. The hard step is estimating weight. There is a problem with false positives. A paper mache statue would count as human. But it should handle all common cases. And there should also be a distinction between streets where the traffic is slow and rare and streets where the traffic is fast and common. Freeways are much less likely to have humans walking in the road.

Additionally, there should be a rule about not overdriving your reaction time, especially on slow streets, but nothing can stop a kid from running out right in front of you from between two parked cars. And nobody, neither automaton nor human, can reliably deal with that. Which is why that first rule about "upright" is made to yield a lot of false positives. If you have time, then you can refigure things and perhaps decide that "that's a paper mache statute", so you may start to dodge in a way that will damage yourself, and then refigure to avoid damaging yourself when you, more slowly, decide that such action isn't needed.

Comment Re:What the fuck?!! (Score 1) 188

Disable ads as a courtesy doesn't work for long. It's a short window until the ads come back. I finally pulled out the adblock tools. Slashdot overstepped the amount of advertising I was willing to put up with. I was one of the first 100 here, this is my third account since I forgot the login for the others. Only people that probably put up with this crap are the new people that don't know better. I certainly don't recommend slashdot to people anymore.

Comment Passwords are not the only way to authenticate (Score 2) 77

Both of you are wrong and so is Dustin Kirkland (whoever he is). The core of your error is in this statement:

Only secrets can be used as token for authentication.

That sentence is true, as stated, but only because it includes the word "token". Yes if you're using secret tokens for authentication, then the tokens must be secret. But exchanging secrets (or proof of possession of secrets, which is what most cryptographic authentication protocols do) is not the only way to do authentication. Not by a long shot. In fact, humans hardly ever use secrets for authentication.

How do you identify and authenticate your mom? Do you ask her for a secret password? Of course not. You use the same tools for both identifying and authenticating her, and those tools are a set of biometric markers. The same set of tools are also used in high security situations. Back when I was a security guard in the Air Force, I was trained that personal recognition is the very best form of authentication. Not only is it not necessary to check the badge of an individual you know personally, badge-checking is inferior to personal recognition for authentication (note that badge-checking may still be important for authorization, verifying that the person who has been identified and authenticated actually has permission to enter. Thus I was trained to always check the access control list before allowing someone near nuclear weapons).

With respect to user authentication in electronic contexts we generally use secrets because computers don't (or at least haven't) had the ability to use the sorts of biometric authentication that humans use quite effectively. But, when we equip them with biometric sensors, they can.

HOWEVER, this does not mean that biometrics are useful for authentication in all circumstances.

Secret-based authentication has the advantage that -- assuming the secret has sufficient entropy and can be assumed not to have leaked nor been intercepted and cannot be rerouted (note that that's a pretty long list of criteria, some of which are hard to establish) -- you don't have to worry about the possibility that the authentication could be spoofed. An attacker who doesn't know the secret can't fake knowing the secret.

Biometrics, though, are not secrets. They are public knowledge. This means that an attacker must be expected to have access to copies of our fingerprints or faces. The biometric authentication process is different, though. It does not rely on secrecy of the authenticator, but instead on non-replayability. If we can be certain that (for example) the fingerprint placed on the scanner belongs to the person we wish to authenticate, and that the stored template we match against belongs to the person we wish to authenticate, then we can perform a good authentication. The fact that the fingerprint is not secret does not matter.

Where biometrics fail is if (a) we can't be certain that the livescan data acquired from the sensor belongs to the person trying to authenticate or (b) the stored template belongs to the person we wish to authenticate. Part (a) is particularly difficult to validate in many contexts because faking the input isn't necessarily hard to do, and in some cases an attacker can even bypass the sensor entirely and simply inject a digital copy.

This doesn't mean biometrics are worthless, it just means they're only useful in certain contexts. And, again, their utility for authentication has nothing to do with their secrecy. And rotation is likewise irrelevant and silly to discuss. You need to rotate secrets because you can't be certain they have stayed secret and because if they have low-ish entropy they may have been brute forced. None of that applies to biometrics because they're not secrets and their utility as authenticators does not depend on secrecy.

Can we please kill this incorrect meme about biometrics as identifiers, not authenticators? They can be either, or both, and are used as both, by billions of people, every day, with high effectiveness and reliability. Whether or not they provide security depends on the context.

With respect to credit card payments, fingerprint and facial recognition biometrics are pretty reasonable tools. This is especially true if the sensors are provided by the retailer, and the consumer is providing a traditional electronic authentication (cryptographic challenge-response) with their smartphone or smart card. It's not quite as good if the smartphone is also providing the fingerprint scanner and camera, because in the event of an attempted fraudulent transaction that means the attacker is in control of those components.

But you also have to consider the model that is being replaced. Is fingerprint plus face recognition better than a signature which is theoretically matched by a non-expert human, but in practice never checked at all? Absolutely. Is it better than a four-digit PIN? That's debatable, but it's at least in the same ballpark.

Comment Re:Most of their apps are annoying anyway (Score 1) 110

I tried Inbox, but wasn't impressed. It strips so much of gmail away that it is basically "Gmail for beginners". You want filters, labels, etc, then it is worthless.

Actually, Inbox is Gmail for power users, for people who have massive volumes of e-mail to manage. It takes a little bit of work to figure it out and set it up, but once you have, it's awesome. There are some features it lacks, like complex filters (simple filters are very easy to set up; you just move a message to a label and Inbox asks if you want to always do that. Click "yes" and you have a new filter rule), vacation auto-responder and the like, but you can always use the Gmail UI when you need to set stuff like that up.

The Inbox features that that make it great for heavy e-mail users are:

Snooze.

Many people use their e-mail inbox at least partially as a task list, especially their work e-mail. This results in having to keep e-mails that for you can't work on yet sitting in your inbox, cluttering it up and making it harder to process new e-mail. When you snooze an e-mail, it goes away until some point in the future. You can pick a date and time, or even a location (requires using the Inbox app on your mobile device). Heavy application of snooze with well-chosen times/locations lets you clear all of the stuff you can't do yet out of the way, knowing it will come back later when you can handle it.

Bundles.

Bundles are just Gmail labels, but with an additional setting that tells Inbox to group them in the inbox. This is fantastic for high-volume mailing lists. With Gmail you can get almost the same effect by setting a filter to apply a label and skip the inbox, but then you have to remember to actually go look at the label from time to time. With bundles, you get the same grouping effect but the bundles show up in your inbox so you don't forget to go look. The reason that grouping (by whichever mechanism) is useful is because when you have large volumes of email, most of which you don't actually need to read, it's much faster to scan through a list of subject lines and evaluate what's important and what isn't when you already know the context.

My process for plowing through a busy mailing list is to scan the subject lines and click/tap the "pin" icon on the few that are interesting, then "sweep" the rest. A single click or gesture archives all unpinned items in a bundle. Then I handle (or snooze until I can handle) the pinned items.

I also have a bundle (label) called "Me" that is applied by a filter that looks for my name or username in the To line or the body of the message. This helps me to be sure that I notice e-mails where people are mentioning me or asking me questions. It's the first bundle I look for every time I check my e-mail. Similarly, I have a bundle that extracts e-mails that reference my project's name. That's the second bundle I look at. Other high priority bundles are e-mails from the code review system and e-mails from the bug tracker.

Obviously there are many e-mails that mention both my project and me. That's fine; bundles are labels not folders, and it's perfectly reasonable for an e-mail to be in more than one of them. When I archive a message in one bundle, it disappears from the others. So, often I'll look at Inbox and see the "Me", project, code review and bug tracker bundles displayed, but by the time I've processed everything in the "Me" bundle, the other three have disappeared.

Delayed Bundles.

I think this vies with snooze as the killer feature of Inbox. By default, a bundle appears in the inbox whenever you receive new mail with that label. But there's lots of stuff, at least in my inbox, that I don't need to see immediately. Having low-priority stuff displayed instantly distracts me from my work, or obscures truly urgent e-mail. Also, it's more efficient to handle low-priority e-mail in bulk. So, you can specify that a bundle should only appear once per day, or once per week. Inbox will accumulate e-mail in delayed bundles and only show the bundle at the specified time.

When I start work in the morning I have a dozen or so bundles containing low-priority e-mail. I can quickly scan each of them, pinning the items I care about and sweeping the rest. I have a few bundles for purely informational mailing lists which are set to display once per week, so I only see them on Monday morning.

I'd like a little more granularity on this feature. Specifically, I'd really like to be able to set some bundles to show, say, every three hours. Then I'd only allow the highest-priority bundles to show immediately, giving me larger blocks of uninterrupted time but with the knowledge that I'll still get notified of truly urgent stuff immediately.

Consistent Interface

It took me a while to realize just how valuable this is, but it's really great that the mobile and web UIs for Inbox are virtually identical. I don't have to have two different flows for handling e-mail on mobile vs desktop. The mobile UI is a tiny bit better because of the gestures a touchscreen interface can provide, but my process for using it is the same.

One common complaint about Inbox vs Gmail is that Gmail's more compact; you can fit a lot more stuff on the screen with the Gmail UI. I find that isn't a problem, because the Inbox workflow mostly eliminates the need to scan through a big list of messages visually, looking for something in particular. The need to do that arises mostly (for me, anyway) when I'm keeping a lot of stuff hanging around in my inbox. With Inbox, I don't do that. I snooze it or I archive it, so my inbox is empty nearly all the time. If I need to find something that I've snoozed or archived, I search for it.

Bottom line: If you're a heavy user of Gmail, you should really take a good look at Inbox. Odds are you'll never go back.

Slashdot Top Deals

"Summit meetings tend to be like panda matings. The expectations are always high, and the results usually disappointing." -- Robert Orben

Working...