Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Slashdot poll: Best cube 3

An anonymous reader writes: 1. Rubik Cube
2. The Cube (movie)
3. Tardis Siege Mode
4. Lament Configuration
5. Weighted Companion Cube
6. Borg Cube
7. The Inhibitors (Revelation Space)
8. Icecube

Comment Re:Prediction: (Score 4, Insightful) 206

First of all, you say, "North Korea didn't hack Sony," as if it is an indisputable, known fact. It is not -- by any stretch of the imagination.

The fact is, it cannot be proven either way in a public forum, or without having independent access to evidence which proves -- from a social, not technical, standpoint -- how the attack originated. Since neither of those are possible, the MOST that can be accurate stated is that no one, in a public context, can definitively demonstrate for certain who hacked Sony.

Blameless in your scenario is the only entity actually responsible, which is that entity that attacked Sony in the first place.

Whether that is the DPRK, someone directed by the DPRK, someone else entirely, or a combination of the above, your larger point appears to be that somehow the US is to blame for a US subsidiary of a Japanese corporation getting hacked -- or perhaps simply for existing.

As a bonus, you could blame Sony for saying its security controls weren't strong enough, while still reserving enough blame for the US as the only "jackass".

Bravo.

Comment Prediction: (Score 5, Insightful) 206

Many of the same slashdotters who accept "experts" who claim NK didn't hack Sony will readily accept as truth that it was "obviously" the US that attacked NK, even though there is even less objective proof of that, and could just as easily be some Anonymous offshoot, or any number of other organizations, or even North Korea itself.

See the logical disconnect, here?

For those now jumping on the "North Korea didn't hack Sony" bandwagon that some security "experts" are leading for their own political or ideological reasons, including using rationales as puzzling and pedestrian as source IP addresses of the attacks being elsewhere, some comments:

Attribution in cyber is hard, and the general public is never going to know the classified intelligence that went into making an attribution determination, and experts -- actual and self-appointed -- will make claims about what they think occurred.

With cyber, you could have nation-states, terrorists organizations, or even activist hacking groups attacking other nation-states, companies, or organizations, for any number of motives, and making it appear, from a social and technical standpoint, that the attack originated from and/or was ordered by another entity entirely.

That's a HUGE problem, but there are ways to mitigate it. A Sony "insider" may indeed -- wittingly or unwittingly -- have been key in pulling off this hack. That doesn't mean that DPRK wasn't involved. I am not making a formal statement one way or the other; just saying that the public won't be privy to the specific attribution rationale.

Also, any offensive cyber action that isn't totally worthless is going to attempt to mask or completely divert attention from its true origins (unless part of the strategic intent is to make it clear who did it), or at a minimum maintain some semblance of deniability.

At some point you have to apply Occam's razor and ask who benefits.

And for those riding the kooky "This is all a big marketing scam by Sony" train:

So, you're saying that Sony leaked thousands of extremely embarrassing and in some cases damaging internal documents and emails that will probably result in the CEO of Sony Pictures Entertainment being ousted, including private and statutorily-protected personal health information of employees, and issued terroristic messages threatening 9/11-style attacks at US movie theaters, committing dozens to hundreds of federal felonies, while derailing any hopes for a mass release and instead having it end up on YouTube for rental, all to promote one of hundreds of second-rate movies?

Yeah...no.

Submission + - Comcast Forgets To Delete Revealing Note From Blog Post

An anonymous reader writes: Earlier today, Comcast published a blog post to criticize the newly announced coalition opposing its merger with Time Warner Cable and to cheer about the FCC’s decision to restart the “shot clock” on that deal. But someone at Kabletown is probably getting a stern talking-to right now, after an accidental nugget of honesty made its way into that post. Comcast posted to their corporate blog today about the merger review process, reminding everyone why they think it will be so awesome and pointing to the pro-merger comments that have come in to the FCC. But they also left something else in. Near the end, the blog post reads, “Comcast and Time Warner Cable do not currently compete for customers anywhere in America. That means that if the proposed transaction goes through, consumers will not lose a choice of cable companies. Consumers will not lose a choice of broadband providers. And not a single market will see a reduction in competition. Those are simply the facts.” The first version of the blog post, which was also sent out in an e-mail blast, then continues: “We are still working with a vendor to analyze the FCC spreadsheet but in case it shows that there are any consumers in census blocks that may lose a broadband choice, want to make sure these sentences are more nuanced.” After that strange little note, the blog post carries on in praise of competition, saying, “There is a reason we want to provide our customers with better service, faster speeds, and a diverse choice of programming: we don’t want to lose them.”

Submission + - What Does The NSA Think Of Cryptographers? (i-programmer.info)

mikejuk writes: A recently declassified NSA house magazine, CryptoLog, reveals some interesting attitudes between the redactions. What is the NSA take on cryptography?
The article of interest is a report of a trip to the 1992 EuroCrypt conference by an NSA cryptographer whose name is redacted.We all get a little bored having to sit though presentations that are off topic, boring or even down right silly but we generally don't write our opinions down. In this case the criticisms are cutting and they reveal a lot about the attitude of the NSA cryptographers. You need to keep in mind as you read that this is intended for the NSA crypto community and as such the writer would have felt at home with what was being written.
Take for example:
Three of the last four sessions were of no value whatever, and indeed there was almost nothing at Eurocrypt to interest us (this is good news!). The scholarship was actually extremely good; it’s just that the directions which external cryptologic researchers have taken are remarkably far from our own lines of interest.
It seems that back in 1992 academic cryptographers were working on things that the NSA didn't consider of any importance. Could things be the same now?
The gulf between the two camps couldn't be better expressed than:
The conference again offered an interesting view into the thought processes of the world’s leading “cryptologists.” It is indeed remarkable how far the Agency has strayed from the True Path.
The ironic comment is clearly suggesting that the NSA is on the "true path" whatever that might be.
Clearly the gap between the NSA and the academic crypto community is probably as wide today with the different approaches to the problem being driven by what each wants to achieve. It is worth reading the rest of the article.

Comment Re:Good for them (Score 1) 158

I'd prefer a world where we as a society demanded that everyone follow the spirit of the law and publicly punished those who refused to. I realise we don't live in such a world, but I'm not going to say "I don't see the problem" for people doing the legal thing rather than the moral thing.

Comment Re:Shame, shame! (Score 1) 158

What do you mean by "legally obligated to pay"?

Do you mean that you declare all of the tax deductions that you can without having to provide evidence? For example in Australia you can declare traveling expenses up to X dollars without having to provide any proof whatsoever (expenses over X dollars require that you keep receipts in the event that your audited). would be paying the exact same amount even if I didn't use it for work purposes.

Now legally your not allowed to declare those traveling expenses without actually incurring them. However there is 0 chance you'll get caught because the tax man doesn't require you to provide proof as long as you remain below a certain threshold. So do you consider lying about those tax deductions to be "legal"? Is refusing to lie about them "paying more than your legally obligated to pay"?

What about expenses that you claim are for work? For example I'm required to have a working internet connection so that I can provide remote assistance in the event an emergency happens. Now I could try to claim that my internet connection is therefore a work expense, except the truth is that I would have that internet connection no matter what and I could just walk 10 minutes down the road and actually enter the building physically to deal with any issues. Morally my wage is not impacted by using my internet connection for work. Legally, I might be able to get away with claiming a percentage for tax purposes.

Comment Re:Just tell me (Score 3, Interesting) 463

No, it didn't. It was "some sort" of droplet transmission by monkeys in adjacent cages.

That is NOT -- repeat, NOT -- "airborne" transmission.

And no, it didn't go through the ventilation system; it was later learned that sick monkeys sneezing while they were being transported past well monkeys did indeed transmit the virus in this case.

It was also a completely different strain than the one we are talking about.

Airborne transmission occurs when an infectious agent is able to cling to particulates in the air and ride air currents for significant amounts of time, over significant distances, through ventilation systems, etc., long after the infected person who expelled the virus is no longer in the area.

Droplet transmission is NOT "airborne" transmission. It is projecting bodily fluids directly onto a well person in close quarters...usually less than 3 feet, but under optimal conditions, perhaps further. That is still not airborne transmission.

Furthermore, coughing/sneezing is probably one of the least effective ways to spread Ebola, even via droplets. Blood, feces, and vomit are the primary ways this will be spread. Yes, virus "could" be in saliva, mucous, semen, etc. But that's not the primary way Ebola spreads.

Airborne transmission would be very bad, but the Ebola virus is too large to spread this way. It would have to shed about 75% of its genome to be small enough for airborne transmission in sub-5um droplet nuclei that could ride on particulates. And if it did that, it wouldn't be "Ebola" anymore -- it would be something very different; perhaps still deadly, perhaps not, and so much different from what we are talking about right now that it is next to meaningless to discuss.

So, in closing: no, Ebola is not airborne.

Comment What 20 years of research on pot has taught us (Score 1, Troll) 263

What twenty years of research on cannabis use has taught us

Read the full study in the journal Addiction

What twenty years of research on cannabis use has taught us

In the past 20 years recreational cannabis use has grown tremendously, becoming almost as common as tobacco use among adolescents and young adults, and so has the research evidence. A major new review in the scientific journal Addiction sets out the latest information on the effects of cannabis use on mental and physical health.

The key conclusions are:

Adverse effects of acute cannabis use
- Cannabis does not produce fatal overdoses.
- Driving while cannabis-intoxicated doubles the risk of a car crash; this risk increases substantially if users are also alcohol-intoxicated.
- Cannabis use during pregnancy slightly reduces birth weight of the baby.

Adverse effects of chronic cannabis use
- Regular cannabis users can develop a dependence syndrome, the risks of which are around 1 in 10 of all cannabis users and 1 in 6 among those who start in adolescence.
- Regular cannabis users double their risks of experiencing psychotic symptoms and disorders, especially if they have a personal or family history of psychotic disorders, and if they start using cannabis in their mid-teens.
- Regular adolescent cannabis users have lower educational attainment than non-using peers but we donâ(TM)t know whether the link is causal.
- Regular adolescent cannabis users are more likely to use other illicit drugs, but we donâ(TM)t know whether the link is causal.
- Regular cannabis use that begins in adolescence and continues throughout young adulthood appears to produce intellectual impairment, but the mechanism and reversibility of the impairment is unclear.
- Regular cannabis use in adolescence approximately doubles the risk of being diagnosed with schizophrenia or reporting psychotic symptoms in adulthood.
- Regular cannabis smokers have a higher risk of developing chronic bronchitis.
- Cannabis smoking by middle aged adults probably increases the risk of myocardial infarction.

Professor Hallâ(TM)s report is published online today in the scientific journal Addition.

Comment Re:Ebola is airborne (Score 5, Informative) 487

Wrong. Different strain, VERY bad source, did not happen through ventilation system. It happened to monkeys in adjacent cages without direct contact, through "some sort" of aerosolized transmission in very close quarters. I.e., droplets.

Fearmongers or people who think "the government" is "lying to stem panic" always trot out this story. It does NOT mean "Ebola is airborne".

It took Africa, with some of the worst healthcare, sanitation, and infrastructure in the world, 10 MONTHS to get to the ~7400 cases there are now. If it were airborne, it would be much, much worse. Ebola is not airborne; stop spreading your bullshit.

Thank you.

Comment Errata: slashdot mangled my reply... (Score 4, Informative) 487

...when trying to use the carat symbol. Fix here:

Airborne transmission occurs when an droplet nuclei containing a virus (or bacteria) is small enough (under 5 um) to travel on dust particles, and can invisibly hang in the air or travel on air currents in large spaces long after someone has sneezed or coughed, and travel great distances, and can infect when breathed in.

There is NO EVIDENCE that Ebola is, or has been, spread in this way. In fact, the evidence is that Ebola is almost exclusively spread via direct contact with bodily fluids.

Droplet transmission (over 10 um) occurs when droplets of saliva or mucous (or even blood) containing the virus are projected during a sneeze or cough and and projected directly onto someone's eyes, mouth, or mucous membranes. This kind of transmission is usually within 3', and is NOT considered "airborne" transmission.

"Droplet" transmission can certainly occur with Ebola -- or any disease that spreads via bodily fluids and is present in saliva or mucous. VHFs are not airborne diseases, and a study of one strain where monkeys in adjacent cages sneezed on each other and passed the disease does not make it "airborne".

Being able to get something from having someone sneeze or cough droplets onto you and airborne transmission are very different things.

Slashdot Top Deals

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...