Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:How is this different than encrypted online bac (Score 1) 136

But so I ask, how is this different than online backup service providers like Mozy and CrashPlan that allow client-side encryption and end-to-end encryption??!?!? Or even Amazon S3 for that matter?!

Or taken alternately we can hypothesize that these service providers are different in some way. This would lead us to wonder what is different about these providers that causes the government to leave them alone? That's where things start getting interesting.

Comment Re:White balance and contrast in camera. (Score 3, Informative) 420

So it appears to be linked to the lighting conditions that your eyes are adjusted to when seeing the image initially... even after they've adjusted to the ambient light, the brain appears to stick to the image it created initially.

Here is a pretty good explanation of why this might happen.

Comment Re:someone explain for the ignorant (Score 2) 449

As for mail order, I'm sure Visa/MC will continue to have a web object that pops up, asks for a PW or PIN, which is used for shopping via the Internet.

This is truly where credit card fraud is going to go in the next few years. As EMV rolls out in the US (finally!) credit card fraud is going to move online. Card not present transactions will be the next target and participation in multifactor authentication schemes like Verified By Visa and MasterCard SecureCode will become critical and possibly even mandatory.

Comment Re:A programmer arrested for © infringement? (Score 1) 188

And much like the manufacturer of a hammer, they have no way of knowing whether that hammer will be used to nail together pieces of wood or open up the back of someone's head, and so they are therefore not responsible when someone misuses the tool which is intended for beneficial use.

When all you have is a hammer, everything looks like a skull.

Comment Re:You mean nightmare (Score 1) 146

The perfect keyboard has been around for a long time an IBM M13 mine is nearly 20 years old and in perfect working order. While I like the larger keyboard with f13-24 it's a pita to get many OS's to use them. You can also bludgeon an intruder with it and go back to typing.

Even better, you can wash the blood off with running water.

Comment Re:they used encryption, hmacs, thought they knew (Score 1) 83

BMW's programmers did as much as I'd expect any application programmer to do. It's then time for the security audit, by a truly qualified security person, to catch the kinds of mistakes that the author caught.

No. Security is not an afterthought or something do be approached at the end. It needs to be an integral part of the software development lifecycle from soup to nuts. Anything else results in "ship it now, we'll fix it later" decisions and we end up where BMW is today.

Comment Re:I don't think this is really true. (Score 1) 153

Also very hard if there is not a set of reference photographs.

Fortunately your friends, relative, and coworkers are willing to help out with that. Each photo uploaded to Facebook with your face tagged in it is a reference photo. Setting your privacy settings to not display those tags doesn't mean the data point wasn't saved.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...