Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:I don't "consume" content (Score 1) 107

Good point. But a quick sip isn't exactly something I depend on, right? That was the real point. If one source of marginally interesting information flow gets ruined, there are plenty of other things to do. My mental well-being doesn't depend on 'consumption' of what Comcast/TWC might control. Maybe I'll just take the kayak down to the river and paddle around for a bit, take the dog for a walk or take the bike out for a spin. Comcast/TWC can DIAF.

So when you go down to the local polling place, assuming that you even vote, do you just pick randomly?

Comment Re:Patternicity (Score 1) 325

Pattern recognition is an interesting way to put it.

We are predisposed to pattern recognition. Selection also likely accounts for the fortunate ones... whose patterns of recognition proved causal rather than corollary, such as this leaf cures that malady.

Don't forget a healthy sprinkling of confirmation bias on top.

Comment Re:selective enforcement at it's finest. (Score 4, Funny) 325

Pearl Harbor Survivor is not a licence(sic) plate HOLDER.

It is a state-issued alternative license plate.

Dude, chill out. He didn't mean a physical license plate retention device, he meant a person who has been issued that license plate. Kinda like when someone holds an office, they don't literally have a bunch of office furniture in their arms.

Comment Re:Thank you for the mess (Score 2) 239

Sadly, this is not the case. The evidence is that bad actors had this exploit for months: http://arstechnica.com/securit...

One of the two sites cited as evidence have since taken a step back,

Important update (10th April 2014): Original content of this blog entry stated that one of our SeaCat server detected Heartbleed bug attack prior its actual disclosure. EFF correctly pointed out that there are other tools, that can produce the same pattern in the SeaCat server log (see http://blog.erratasec.com/2014... ). I don't have any hard data evidence to support or reject this statement. Since there is a risk that our finding is false positive, I have modified this entry to neutral tone, removing any conclusions. There are real honeypots in the Internet that should provide final evidence when Heartbleed has been broadly exploited for a first time.

Comment Re:Situation is a Shambles (Score 1) 239

While something tells me this exploit is somewhat overblown, what really ticks me off is that this is all the result of delegating memory management to C pointers and basically mmap. As far as I'm concerned, in this day and age, that amounts to spaghetti code and I can't say it endears me to the reliability of openssl.

It has nothing to do with mmap or C pointers per se. The issue is simply bad programming. Someone wrote code that trusted unvalidated user input and they got bit in the ass. Whomever performed the code review should have known better, even if the developer didn't..

Comment Re:A simple solution (Score 1) 97

Do you have an unlimited plan for your cell phone? Do you feel obligated to use it constantly and feel guilty about not using it? Probably not.

Do you have unlimited internet? Do you download large files constantly in order to maximize your usage? Probably not.

Do you go to all-you-can-eat buffets and eat as much as you possibly can and make yourself sick? Probably not.

Dude, this is /. You're probably 0 for 3 here.

Comment Re:anyone can devise encryption they can't break (Score 1) 179

Which is not going to happen because the authors haven't given any reason why anyone should care. We have lots of widely-deployed ciphers which are fast and secure. No one attacks modern cryptographic security systems by breaking the ciphers, they do it by exploiting peripheral flaws in implementation, key management, etc.

A potential patent to deal with just to use it is one more nail in the coffin of this.

Comment Re:Area of expertise (Score 1) 179

Not that I've actually done my own research, but what qualifications do these folks have to state the security of an encryption mechanism? Everybody who finds a new way to twist a message thinks it's secure.

None whatsoever, but that doesn't stop physicists or managers from deluding themselves into thinking that they can do it better. Fortunately they patented whatever method they came up with so no one will want to even go near it as a replacement.

Comment Re:day trader loses to second traders (Score 1) 246

Do you have any evidence that they are doing it anyway?

He has empirical evidence that supports his claim. That was the whole point of the investigation that the author was doing. When his orders hit the various exchanges at the exact same time, they were all filled. When they hit one exchange before the other, the "later" orders were suddenly unable to be filled.

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...