Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Really? (Score 1) 294

You seem to underestimate the inventiveness of a superintelligence, and the diversity of hardware controlled by computers, and our reliance on them. It is also possible to use electronic communication to make humans do work for you.

For example, if the AI solves the Protein Folding Problem, it could contact a Protein Sequencing Service and have them build proteins that fold into self-replicating nanobots.

Comment Re:Metadata (Score 1) 309

SMTP requires that those fields be world-readable. Or do you propose that SMTP servers somehow route email to the appropriate recipient without being able to read who the recipient is?!

No, what I propose is that we start using a protocol other than SMTP for email. I don't think such a protocol exists yet, and I don't know much about how it would look, but I think AC #49126801, right above, has some good ideas.

Comment Metadata (Score 2, Insightful) 309

GPG is nearly useless because it doesn't protect metadata. A properly secure communication system should prevent all attackers from learning:
  • Sender
  • Recipient
  • Subject
  • Timestamp
  • Message length
  • The fact that a message was sent.

In short, everything except the fact that you're using the system.

Comment Re:More of this ridiculous (Score 3, Insightful) 134

Surely they'll find it very difficult to get an unregistered SIM card.

No, but they'll find it difficult to get unregistered cards to work, at least once the networks start blocking all cards that are not registered.

The counter to that is to steal registered cards. The counter to that is to report the cards as stolen. Counter: kill the card-owners, so they can't report the cards. Counter: police de-registers cards belonging to dead people. Counter: kidnap/disappear the card-owners. Only works until the authorities catch on in each individual case. Mitigation: keep kill/stealing. That's what terrorists do anyway, so no problem there. Problem: you're now switching numbers often. Gonna be difficult to keep your address book up-to-date.

Comment Re:Drama queen (Score 2) 196

All modern operating systems put restrictions on what software can run on them and what it can do.

No, they don't. Windows, Linux, the BSDs, OSX, none of those have any mandatory filters. Windows and OSX have some "anti-malware" crap, but those can be disabled.

Even on Linux your app doesn't get automatic root access and the ability to poke into the kernel just because you want it.

If an app wants root access, it'll pop up a password prompt. If you want it, it can poke anything. :)

Comment Hard disk drives (Score 2) 251

I wouldn't put anything in a lockbox. Such media will be tested very rarely, and when they do fail, it's likely you won't know until it's too late.

I'd rather use a hard drive, hooked up (NAS or mini-pc, maybe) to a network and capable of rsync. You could place it somewhere in your home, or, if available, another secure location with Internet access. Run daily or nightly automated backups.

Slashdot Top Deals

Factorials were someone's attempt to make math LOOK exciting.

Working...