Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Ridiculous (Score 1) 375

Agreed. Even if this privacy thing does become an issue, it's can probably be technically addressed. For example, if the only information is in the collision of watermarks, and if those watermarks are not steganographic, then the client app downloading the file could be made to modify the watermark. That way downloaded files will look like ripped files.

Comment Re:When will this lead to something useful? (Score 3, Informative) 121

For you and I further down the food chain, it'll probably be a while. For researchers, though, it's arguably already useful. FTA:

Generally people who want to experiment with large swarms have had to be content with computer simulations, which is fine, but at some point you have to try things out in the real world (or as close as you can get in a lab), and Kilobots can make that happen. .. at $14 each, a thousand robots is actually an achievable number with a modest grant, which is something that probably has not been possible before.

Java

Submission + - South Beach Java (article-traffic.net)

Toddjackson writes: Around the key motives list for ill heart is vascular disease, the procedure in which the blood-stream gets shortened as a consequence of abnormal build up of fat in the individual. The blood circulation for the heart could possibly get lowered on account of thickening of circulatory walls, which more can final results into cardiovascular failure if ignored.

Comment Re:In review - Meh (Score 1) 131

We can have the benefits of the placebo effect without rip-offs and mumbo-jumbo.

How? It's the very fact that the people are deceived that empowers placebo. You MUST have believed deception to make placebo work in any fashion.

Not quite. The current wisdom is that You Can Have the Placebo Effect, Even If You Know It's a Placebo.

-
Remind me again, why is this story in the idle section?

Comment Re:No doubt the "black hats"... (Score 2) 87

What part of paying with a credit card in a store doesn't reveal your identity, location, and time of purchase?

No part of it. Apologies for being vague. I was trying to say that though in both transaction types, credit card and NFC, your personal information is revealed, in the case of Google's NFC implementation, this personal information will likely be fed into a live, real time "adworks" infrastructure that cross-correlates this information with information unrelated to the transaction (GPS location, connecting other dots). I don't imagine the credit card companies are anywhere close to such an infrastructure: their business models are not anchored around selling your personal information, so they have less incentive to build such a personal information capturing pipeline.

The scary thing about this, I think, is that companies like Google and Facebook will only get better at capturing, slicing and dicing this personal information as time goes on: their business models depend on it. And as the tools of their trade become ever more powerful, they will end up in wrong hands. But I digress..

Comment Re:No doubt the "black hats"... (Score 1) 87

Or is it enabled when you tap a button while holding it up to the terminal device?

Sure, it's better if you have to tap that button. But you still give up a lot of privacy through this payment method. Every time you pay this way you advertise your identity, your location, and the time of your purchase.

This personal information leakage is a lot different than that the type that can be gleaned from say ordinary credit card transactions. It'll no doubt be captured in a way that makes connecting the dots easier, faster and more real time.

I'd use this technology if it implemented something like digital cash. Until, then, I'll be holding up checkout stand traffic--like the guy in that commercial..

Comment Re:Interesting, but flawed (Score 1) 236

Right. The video didn't explain how this cryptography works. I'm no expert in this area, but I imagine this might work something like this.

Suppose one can devise a crypto scheme in which you need all of the ballots to compute the sum of the choices cast (uncast ballots get a special null value). So to boil it down to the simplest possible example, if there are only 2 choices a and b, and only 2 ballots cast, then sum routine allows us to compute which of the following 3 outcomes occurred: (2, 0), (1, 1), or (0, 2). For the middle outcome (1, 1), we cannot tell which ballot cast which vote..

I can see holes in the strategy I describe, but I bet these cryptographers have devised something cleverer that stands up to the kinds of attack discussed here.

Submission + - China blanks Nobel Peace prize searches (cnn.com)

1 a bee writes: CNN is reporting that China is attempting to block all communication regarding Peace prize winner Liu Xiaobo. Even texting is affected:

Text-messaging on mobile phones is not immune from censors, either. A Shanghai-based netizen, @littley, tweeted his unfortunate experience: "My SIM card just got de-activated, turning my iPhone to an iPod touch after I texted my dad about Liu Xiaobo winning the Nobel Peace Prize."

Might as well add slashdot to the censored list..

Science

Submission + - When glass touch screens feel like sandpaper (cnn.com)

WebNov writes: think about the difference between typing on a hardware keyboard, where you can feel whether your fingers are hitting the right keys, and a touch screen keyboard, where the letters "q" and "w" feel exactly the same — as does the space between them

Slashdot Top Deals

"If it ain't broke, don't fix it." - Bert Lantz

Working...