Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Not today though - America has no honour left (Score 1) 519

The unwritten understanding of the intelligence community is that everybody is spying on everybody else, yet nobody will actually admit to doing it.

The revelations about Angela Merkel's phone resulted in a bit of diplomatic banter and point scoring, plus a few blushed faces, but the Germans too would have been naive to believe the US wasn't trying to spy on them. Though the Germans may have been a little surprised at how good the US was at spying. However this hasn't changed the underlying alliance and trade relations between the US and the EU. A major PR flap, but no harm done.

Even if we consider enemies such as Osama Bin Laden, before the Snowdon revelations. Al-Qaeda seemed to have an understanding that the US had secret backdoor access to much of the modern digital infrastructure, even if they didn't understand the technical details. Their counter strategy was to organize themselves using pre-digitial methods, using secret face-to-face meetings and hand couriered letters.

Comment Re:Ellsberg got a fair trial (Score 1) 519

The law is nothing more than a threat that the government will use all its available power against you should you violate its written law. The call by John Kerry to "man up" and face trial is nothing more than an admission of defeat by the CIA that they are unable or unwilling to secretly kill, capture or rendition him back to the USA without creating a martyr out of him. The US has already invoked it full power, he is being actively monitored, they have revoked his passport and have pulled alot of diplomatic strings to prevent him traveling outside Russia. Snowdon has effectively beat them at their own game.

A Snowdon trial would not reveal any truth that is not already known. The only thing to be achieved by a "trial" would be to place Snowdon in the custody of the US government and allow them to keep incommunicado and prevent him access to the media. His revelations have all been about putting the US government itself on trial, by exposing the evidence to the court of public opinion.

Comment Moores Law (Score 1) 122

If it becomes technically possible to build a fully functioning humanoid robot, regardless of the price, then one will be built. Once this happens, Moore's law will start to kick in, as will the cost benefits of mass production. In fact all you need to do is to build a self-replicating robot, and call it skynet.

  "While theoretically and technically television may be feasible, commercially and financially it is an impossibility." -- Lee DeForest, inventor.

Comment Re:theft-proof by design? (Score 1) 465

The bitcoin protocol itself works by having every transaction public, this is all stored in the blockchain. I send you a coin, and publicly announce this with a message signed with my private key. If I try to spend the same coin twice, then this is where the transaction confirmation chain kicks in (and why you need to wait for X number of confirmations). When you announce sending a coin to somebody else, I see the message, and additionally sign your transaction message with my private key and add it to the blockchain. The next person to see the transaction, will again sign on top of all the previous confirmations.

If I try to double spend a coin, then there will be two different sets of transaction history. The bitcoin client is configured to accept the transaction confirmation chain with the most number of signatures as valid, the other one is ignored. Additionally, clients in the network will only additionally sign the chain they believe is valid. Once you get more than a few signatures, its almost computationally impossible to fake a confirmation chain faster than the network, assuming you don't have 51%+ CPU dominance (which is the worry about cex.io going rogue).

The MtGox issue is that they wrote their own custom bitcoin software to deal with the running of a high transaction volume exchange. They where not waiting for transaction confirmations from the network to check their own internal transactions. Their software was buggy and suffered from an exploit using Transaction Malleability. See https://freedom-to-tinker.com/...

The best real world bank analogy, is if you where to go to a cashpoint ATM outside a bank, withdraw money from the system, then enter a special code into the ATM which makes it display an error message. You then go into the bank and show them the error message, and ask them to refund the ATM withdrawal from your account claiming the ATM never gave you any cash (but in truth you did get the cash). This process didn't create new cash out of thin air, in practice you just got the bank to give you free money.

Eventually the bank becomes bankrupt, and you discover that what you actually own is not cash but rather an IOU from the bank for cash, which the bank can't pay.

Comment Re:Why not gas? (Score 1) 1038

Ah but we want a "civilized" execution. The last meal is the buy the prisoners cooperation with the process.

The prisoner may or may not have accepted his fate, but you don't want that "oh shit, its finally happening" moment and for him to suddenly fight and struggle, it would ruin the show for the "civilized audience". The prisoner may know logically, knows he is going to die at some point in the near future, but survival instincts can be very powerful.

Comment Re: Cloud != Backup (Score 2) 310

There are two aspects to data security. The first is can anybody else gain access to make a copy. The NSA probably has backdoor access to Dropbox, as anybody who can guess your username and password (just like an open ssh server). So having a strong unique password is important (just like for your email account). Anything really important (like my bitcoin wallet) is encrypted locally with a strong password before being mirrored to Dropbox, but otherwise I don't believe the NSA would be a threat to my personal safety even if they did know the contents of my filesystem.

Dropbox acts as a real-time offsite backup. The security here is that if I lose my laptop (and local backup disks), then worst case I can simply buy a new laptop, download all my personal documents from Dropbox and start working again on the same file I was working on just before my laptop disappeared, with minimal lost work assuming I am connected to the internet (a local backup will miss all work since the last backup). Its worth having an occasional local backup solution as well, such as an Apple Time Machine, as a backup for the backup.

Dropbox also guards against file corruption. Usually this takes the form of "opps, I didn't mean to delete/overwrite that file". These will usually occur to files I am actively working on and the previous desired version of the file may have been written only minutes/hours ago. This includes programming files that have got yet been committed to version control. A daily backup won't help here, but Dropbox will (I just need to login to the website and click undelete or previous version).

So in short, Dropbox is a very convenient real-time offsite backup that can protect against both catastrophic data loss and individual file corruption. It even doubles as a basic automatic version control system for your filesystem. The bet is that that I won't lose my laptop at the same time the Dropbox servers suffer catastrophic data loss as I can always reupload my data if Dropbox loses all its data. The security risk is that you are potentially exposing your data to Dropbox, the NSA and anybody who can successfully guess your username/password.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...