Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:The answer nobody likes... (Score 1) 286

I've used my tools to open my own vehicle and had the police stop to check it out. A quick explanation, hand over my ID, and they go on their way. Not a hassle at all. Same thing for friends. If they lock their keys in the vehicle, I can open it, with them present, and prepared to give the ID to the cops to prove ownership.

The reality is that around here, you're not getting charged with possession of burglarious instruments unless you're misusing them. Being able to quickly open your own vehicle or that of a friend, instead of waiting for AAA, is really useful. You should also check out locksport--TOOOL is active in Mass. and there are other smaller locksport meetups.

Submission + - Secret state: the hidden world of governmental black sites (independent.co.uk)

An anonymous reader writes: To carry out the extraordinary rendition programme which was one of President George W Bush's answers to the 9/11 attacks, seizing suspects from the streets and spiriting them off to countries relaxed about torture, the CIA created numerous front companies: grinding through flight records and using the methods of a private detective, Paglen identified them, visiting and covertly photographing their offices and managers.

The men and women who carried out the rendition programme were equipped with fake identities: Paglen has made a collection of these people's unconvincing and fluctuating signatures, "people," as he puts it, "who don't exist because they're in the business of disappearing other people".

Comment Re:Two-Dimensional My Ass... (Score 1) 137

The dimensionality of the object can be higher than the degrees of freedom. For reference by analogy, see gimbals, which allow representation of arbitrary axes in n-dimensions, but are subject to gimbal lock, where a change in one axis may be represented by a substitution of a change in another axis, eliminating a degree of freedom (not to be confused with dimension).

Comment Re:Static DH is not better than Static RSA (Score 1) 51

The temptation to optimize for speed/memory usage over producing correct code is like will'o'the'wisps for many developers. If you develop code for a hostile environment (the default assumption for crypto) it should be assumed that any inputs will be abused.

Further, in a hostile environment, developers also need to assume that they won't have anticipated every possible way to extract information from a process. Do the simplest thing that will always work, within the limits you can predict. Then fix the bugs as you find them, because you WILL have some. Hopefully, you have a qualified set of eyes willing to review your code.

For example, timing attacks are pervasive in cryptography, and incredibly easy to enable without very thorough consideration of possible paths. Often, with higher-level languages, you have little opportunity to mitigate these issues. You check bounds because it's the low-hanging fruit for an attacker, not because it will provide absolute security. It merely raises the bar for an attacker. Crypto is often subject to attacks enabled via multiple layers of abstraction (all the way down to turtles) which obscure potential problem areas.

Submission + - Is facial recognition at retailers being used to target banner ads online? (nytimes.com) 1

retroworks writes: Yesterday I had to go to a retail store (Staples) for something unrelated to laser printers. While I was in the store, I decided to check out the laser printers, see what's new, though I don't really need one.

Now my Sunday morning news search is filled with laser printer ads for HP. I have not been searching online. Looking for updates on whether stores are selling my aisle browsing habits to online advertisers, I found this NYT article by Natasha Singer to be quite informative, with interesting links to varying leads from Snowden testimony to Silicon Valley startups to National Telecom and Information Agency web pages.

Comment Re:prove that the program works (Score 1) 189

So, you're saying that the rules of production are axioms too. Still doesn't change what I said. But, you do arrive at the same endpoint that I arrived at, which is that if you don't accept some of them at some point, you'll wind up back at my original point.

otherwise you'd be arguing with solipsists over every detail, no matter how blindingly "obvious"

Anything new to add?

Comment Re:Apologies to Douglas Adams (Score 1) 149

That's just revisionism (they tried awfully hard not to let go); the correct parallel is Aesop's The Fox and the Grapes.

One hot summer's day a Fox was strolling through an orchard till he came to a bunch of Grapes just ripening on a vine which had been trained over a lofty branch. "Just the thing to quench my thirst," quoth he. Drawing back a few paces, he took a run and a jump, and just missed the bunch. Turning round again with a One, Two, Three, he jumped up, but with no greater success. Again and again he tried after the tempting morsel, but at last had to give it up, and walked away with his nose in the air, saying: "I am sure they are sour."

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...