Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Yeah, that looks anonymous. (Score 1) 108

There are simply too many moving parts to the usable Internet (the WWW). Everything from the browser to the DNS request can be compromised. And the browser itself is complex, speaking at a minimum of three languages (HTML, CSSx, Javascript) which, even if one or two are disabled, may still leak information.

And then, let's talk operating system. Unless your OS air gapped, it probably has holes in it that are exploitable. In fact, anything that interfaces with the network will potentially have exploitable holes. It could even be a side channel attack.

Finally, we get to the router. The router does most of what your computer does: DNS resolution, packet forwarding, etc. If the router is insecure in any way, you're also in trouble. If the router is compromised from the start (phone home, secret log, etc.), it's game over. Worse, unless you're running a DD-WRT router (and even if you are running one), you can't even audit the logic in your router.

If you want the kind of security that TOR promises, you're going to need to secure everything from the router to the browser. And that's hard. Chromebook is the closest thing, and even then you can't completely trust hardware you didn't build yourself.

Comment Re:Ring Spacing Reason? (Score 1) 91

I'm guessing here, but probably because the matter comprising the disc is homogenous. Since all planets start forming at roughly the same time, if the material were all approximately the same throughout, then the areas of local maximum gravity that are collecting the particles will be equidistant.

What happens next will be interesting, because with this assumption, there's more material as you get farther form the disc. That means the farther you go out, the larger the planets will become (you can sorta see that in our own solar system). The interactions between these newly-formed bodies will determine the eventual planetary sizes and positions, and if they collapse back into the star or get flung out into space or somehow manage a stable orbit.

Comment Re:Still a niche company (Score 2) 111

Actually, at $0.02 earnings per share, they're profitable already.

Musk released all of the patents Tesla owns related to electric cars. I'm almost certain that if the other car manufacturers don't have a competing product in the works, they're smoking some really good stuff. Oil subsidies will only get them so far.

I can't wait for the Model 3. Once that hits the streets, you'll be seeing a lot more Teslas.

Comment Re:Microsoft can't win (Score 1) 236

They put a tablet OS in their tablet, it doesn't have full Windows functionality.

Unfortunately, RT did have full Windows functionality. Which, when perfectly usable with keyboard and mouse, is completely useless when interacting via touchscreen.

Metro was usable (albeit barely at times) with a touchscreen. Too bad it was only half-assed and offered practically no functionality.

Comment Re:For it to be secure, it has to be weird. (Score 1) 96

we need to seriously think about using digital equivalents of "one time pads" for high security applications..

We do. But OTP's are not practical for normal, every day usage. And despite what you might think, normal every day communication is not a high security application. The idea is to make it difficult to break into everybody's communications, not to make it difficult to break into anybody's. See the difference there?

Comment Re:missing from the Scorecard (Score 1) 96

PGP was never usable by ordinary people. PGP is as close to perfect security as you can get. Perfect security is hard. Ordinary people can't deal with hard things. Ergo (and I repeat) PGP is not usable by ordinary people.

You don't need perfect security for normal, everyday communications. You don't need to be certain that "Alice" online is actually the Alice you know in real life. You only need to be certain that "Alice" online is "Alice" online and not "Eve" online or "Mallory" online. That's a much easier problem. Self-signed certs (or any other sufficiently-strong encryption key) centrally stored by the IM service and are pinned by the client would be sufficient.

Yes, an attacker can compromise the service, and either or both clients at the same time, but if either client is compromised, you have bigger issues than secure communications.

Comment Re:Agreed (Score 1) 574

The ideal candidate should be able to do both: Come up with a solution to a problem quickly, and also be able to research and evaluate the longevity of the solution. The more experienced the candidate, the more accurate the latter evaluation should be. There's little time in an interview, but given time the ideal candidate should be able to come up with better solutions than the initial one.

The experienced individual should at the very least, have a hunch as to a direction to start. You can spend days surfing Google if you don't know the right questions to ask. Your intellect gets you to the solution, but your experience points you in a good direction to start.

Slashdot Top Deals

If all else fails, lower your standards.

Working...