Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Secret state: the hidden world of governmental black sites (independent.co.uk)

An anonymous reader writes: To carry out the extraordinary rendition programme which was one of President George W Bush's answers to the 9/11 attacks, seizing suspects from the streets and spiriting them off to countries relaxed about torture, the CIA created numerous front companies: grinding through flight records and using the methods of a private detective, Paglen identified them, visiting and covertly photographing their offices and managers.

The men and women who carried out the rendition programme were equipped with fake identities: Paglen has made a collection of these people's unconvincing and fluctuating signatures, "people," as he puts it, "who don't exist because they're in the business of disappearing other people".

Comment Re:Two-Dimensional My Ass... (Score 1) 137

The dimensionality of the object can be higher than the degrees of freedom. For reference by analogy, see gimbals, which allow representation of arbitrary axes in n-dimensions, but are subject to gimbal lock, where a change in one axis may be represented by a substitution of a change in another axis, eliminating a degree of freedom (not to be confused with dimension).

Comment Re:Static DH is not better than Static RSA (Score 1) 51

The temptation to optimize for speed/memory usage over producing correct code is like will'o'the'wisps for many developers. If you develop code for a hostile environment (the default assumption for crypto) it should be assumed that any inputs will be abused.

Further, in a hostile environment, developers also need to assume that they won't have anticipated every possible way to extract information from a process. Do the simplest thing that will always work, within the limits you can predict. Then fix the bugs as you find them, because you WILL have some. Hopefully, you have a qualified set of eyes willing to review your code.

For example, timing attacks are pervasive in cryptography, and incredibly easy to enable without very thorough consideration of possible paths. Often, with higher-level languages, you have little opportunity to mitigate these issues. You check bounds because it's the low-hanging fruit for an attacker, not because it will provide absolute security. It merely raises the bar for an attacker. Crypto is often subject to attacks enabled via multiple layers of abstraction (all the way down to turtles) which obscure potential problem areas.

Submission + - Is facial recognition at retailers being used to target banner ads online? (nytimes.com) 1

retroworks writes: Yesterday I had to go to a retail store (Staples) for something unrelated to laser printers. While I was in the store, I decided to check out the laser printers, see what's new, though I don't really need one.

Now my Sunday morning news search is filled with laser printer ads for HP. I have not been searching online. Looking for updates on whether stores are selling my aisle browsing habits to online advertisers, I found this NYT article by Natasha Singer to be quite informative, with interesting links to varying leads from Snowden testimony to Silicon Valley startups to National Telecom and Information Agency web pages.

Comment Re:prove that the program works (Score 1) 189

So, you're saying that the rules of production are axioms too. Still doesn't change what I said. But, you do arrive at the same endpoint that I arrived at, which is that if you don't accept some of them at some point, you'll wind up back at my original point.

otherwise you'd be arguing with solipsists over every detail, no matter how blindingly "obvious"

Anything new to add?

Comment Re:Apologies to Douglas Adams (Score 1) 149

That's just revisionism (they tried awfully hard not to let go); the correct parallel is Aesop's The Fox and the Grapes.

One hot summer's day a Fox was strolling through an orchard till he came to a bunch of Grapes just ripening on a vine which had been trained over a lofty branch. "Just the thing to quench my thirst," quoth he. Drawing back a few paces, he took a run and a jump, and just missed the bunch. Turning round again with a One, Two, Three, he jumped up, but with no greater success. Again and again he tried after the tempting morsel, but at last had to give it up, and walked away with his nose in the air, saying: "I am sure they are sour."

Comment Re:prove that the program works (Score 2) 189

Proof is absolute, within the confines of the accepted axioms. Within the larger scope of things, we accept proof probabilistically, and this includes the entire works of every mathematician ever to live. Bayesian stats attempts to capture this idea that knowledge is never absolute, but merely held with probabilistic certainty, and all things are based on axioms (inherently unprovable, but assumed to be useful) ultimately. I only gripe (and boy is it a really fine, pedantic gripe), because your comment commits the same error you attack. Math/logic is a model, not reality. Models are based on necessary assumptions (axioms), otherwise you'd be arguing with solipsists over every detail, no matter how blindingly "obvious". This trend toward claiming that a mathematical proof or a scientific theory is "absolute" violates the very premise on which they're based.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...