Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:1024-fold (Score 1) 210

Well "incorrectly" is a loaded term. Si prefixes are base-10 but the byte is not an SI unit. The IEC issued a standard saying that binary versions of the prefixes should be indicated with an extra i but only long after the use of those binary prefixes without the i was well established in the computer software industry.

Comment Re:Star Citizen and Elite Dangerous did fine (Score 2) 215

Star Citizen and Elite Dangerous did fine on KickStarter back when they were still using it. Eventually both stopped using KickStarter and started using their own methods.

Well kickstarter campaigns are limited length, so it's natural that after a successful campaign a group would switch to their own methods of taking preorders.

Comment Re:Seconded! (Score 2) 80

The problem with that theory is what is known of as "impulse interference". When some large and sudden electrical event (distant lightening strikes, switching of large loads, that sort of thing) happens it can create electromagnetic radiation that is very limited in the time domain but very widespread in the frequency domain.

With an analog transmission you get a very brief flicker but stuff almost immediately returns to normal. With compressed and error-corrected digital transmissions either nothing happens at all or the error correction is overwhelmed and the system loses sync. Once it loses sync it takes substantial time for it to get back into sync during which you typically get a frozen picture and no sound.

Comment Re:Of course they don't need the full spectrum (Score 1) 80

That's the frustrating thing about digital broadcasts. With analog you have a gradual variation in quality and can tweak your antenna to get it as good as you can. With digital if your reception is on the edge you get a perfect picture/sound most of the time but occasionally (how occasional depends on how marginal the reception is and what interference sources you have arround) multi-second breakups when impulse interference causes the error correction to fail and the whole system has to re-sync.

A perfect picture most of the time with periodic multi-second breakups is much worse than a fuzzy picture with periodic interference flashes.

Comment Re:Government doesn't get it. (Score 1) 184

Governements control people and entities made up of groups of pople by exerting punishments on them.

There are various ways a government can attempt to punish a corporation beyond their borders. For example they can order those within their borders to make efforts to block access to the corporations services. They can order those within their borders not to do buisness with the foriegn corporation (It's kinda hard to sell services to a market if you can't get paid easilly by people in that market) . They can arrest any officers of the company that enter their territory.

Comment Re:Sorry guys, but you are full of shit (Score 1) 533

"supposedly"

Yes the technology can do fairly high speeds.
Yes the technology can work over fairly long lines

No it CAN'T do both at the same time. Replacing ADSL2 with VDSL2 without changing anythign else is likely to result in only a marginal imrpovement for most people. Those with the worst service now are likely to see no improvement at all.

The only way to significantly increase speeds over copper lines is to significantly reduce their length by replacing parts of the copper network with fiber. This leaves a couple of difficult questions for telcos

1: how to decide how far to go. Do they go to the cabinets located every few streets? do they go to the distribution points located up every pole?
2: is the cost of building all that active outdoor infrastructure really worth it or does it make more sense to go stright to fiber to the home (which is more expensive but also far more future proof)

Comment Re:Sorry guys, but you are full of shit (Score 1) 533

If you control the end devices then you can MITM without the users really noticing it. If you don't control the end devices then the users will either get security warnings or have to install your certificate. Either way they will become aware of your MITM setup, will get annoyed and may start asking awkward questions.

If you have sufficient organisational power you may be able to force the users to suck it up but it will certainly be a hinderance.

Comment Re:We really need (Score 1) 533

Just to let you know the services virgin media advertise as "fiber optic" aren't fiber to the home, they are fiber to the cabinet and then cable TV coax from cabinet to home.

I left them because of their crappy upload speeds, afaict the max upload you can get on a new virgin media cable service is 5mbps whereas openreach fiber to the cabinet service offers 20mbps upload.

Comment Re:Seriously? (Score 1) 533

It's not really about ISPs it's about end user communications providers who may or may not be vertically integrated with ISPs.

They have massive but old networks which are creaking at the seams with current traffic levels. Giving everyone 100 mbps symetric unmetered (heck may as well do gigabit while you are at it) would mean pretty much rebuilding those networks from scratch. Rebuilding a large network from scratch is always going to be expensive.

New upstarts can sometimes make a difference but a combination of regulatory hurdles and the natural economics of the situation mean they are unlikely to have much impact outside of small areas.

Comment Re:Why would CAs need to replace existing SHA-1 ce (Score 1) 108

Is it not enough for CA's to _stop_ issuing new certificates under SHA-1, as only new certificates would be the potential source of collision attacks?

Unfortunately SSL certificates have become a lowest bidder shithole market. In this environment ensuring that no CA continues to issue SHA-1 certs is impractical.

Rejecting certs based on issue date doesn't directly solve the problem either because the "legit" and "fake" certs in the collision attack can have different issue and expiry dates. What it does do is strongly discourage CAs from issuing SHA-1 certs which has two positive affects

1: it reduces (but does not eliminate) the risk that the attacker will find a cert issuing service that is vulnerable to SHA-1 collision attacks.
2: it prepares for the eventual complete dropping of SHA-1 support.

Is there any security gain whatsoever in upgrading any individual site from SHA-1 to SHA-2?

Not directly. It is very unlikely that the legitimate certificate for a given site and the fake one obtained by an attacker will have any cryptographic relationship to each other.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...