Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re: Khaaaaaan! (Score 1) 62

I knew somebody would beat me to it.

Just like the real meaning to the Cylon Prayer, "All this has happened before and will happen again." Certain things are inevitable. There are countries and scientists who will have no problem with the the thousands of "failed experiments" necessary to perfect these techniques. The only question is whether we will die in eugenics wars, or at the hands of super-AI, or from runaway global warming.

Comment Re: Adaptive, requiring 'training' & 'stabilit (Score 2) 145

"Then maintain a pointer in some so-called 'phase space' and burn data into a sparse array to create a virtual landscape with erosion. In 'run' mode it is almost always hitting (or near) areas that have been populated. If the pointer strays from from the populated region we have an alarm."

Could you please post a link to more information about these technologies and algorithms? I am very interested in graph analysis, including geolocation of information against a real or metaphorical landscape. I tried Googling but all I got was how to simulate erosion in a 3D image of a landscape.

Thanks

Comment Re: Share your "encryption network" with Suckerber (Score 1) 138

Using JavaScript, FB can tell if someone selects your public key that is posted on your profile. (Yes, IF you choose to post it as well as just let FB use it. However most people are very likely to do so.) Have you ever clicked in a field that said "Search," or whatnot, only to have those words disappear as soon as you clicked there? That is JavaScript doing that. It is just as easy to have said JavaScript save the current user and the page's user and store them in a database. FB can then use this database to build a directed graph of who is copying who's public key. Sure, it is an incomplete graph, but all social data is incomplete and useful information is still drawn from it. Sure, the NSA could do a deep packet scan of everyone's e-mail and dig out the same, or better, information. However, that is far, FAR more resource intensive and expensive than adding a field to FB's database and some more JavaScript to the profile page.

So, once FB has built their, admittedly incomplete, graph, the NSA can look for the clusters of interconnectedness in said graph and focus their deep packet scanning efforts and resources there. Thus making the NSAs efforts far more effective.

I guess, if you want to save the taxpayers some money, go ahead and post your public key to FB. If you really want to promote encryption, include your public key and links to free software and incredibly easy to follow instructions in all your emails to your non-techie friends and family. If said relatives are conservative nutjobs then you could also include a comment about how the socialist, terrorist-loving, Nigerian, Muslim, presidential imposter (read: black guy) is reading all their personal e-mails and building a list of where to send the black helicopters. I have many such relatives. Believe me, they still believe that crap.

Comment Re:Defensive (Score 1) 97

Legally, you don't have to file a patent to prevent others from patenting things and then suing you. All you have to do is write up a description of your invention, as thorough as a patent, and publish it in any number of ways where the date of publication is verifiable. There are even services that will publish your article expressly for the purpose of establishing prior art. Remember, prior art does not need to be a patent. Dick Tracy's wrist TV was used as prior art at least once. Almost any public use of an invention is also enough to establish prior art. That is the main reason why inventors have to be careful not to let their invention be seen in public before filing. Your own invention can be considered prior art to invalidate the patent on that same invention.

Though, I do have to admit, in the current environment, having a patent goes a long way toward scaring off those trolls.

No, I am not a patent lawyer, but I have read a ton of patent law books over the years.

Comment Re: Share your "encryption network" with Suckerber (Score 1) 138

If only you had read between the lines of said summary, based on FB's past behavior. If you share your public key on your profile, I guarantee you that FB WILL keep track of everyone who downloads it.

The safest way to share your public key is to share it ubiquitously on your web page, in your e-mail signature, etcetera. Then no one can find out who is actually using it and who is ignoring it. (OK, other than deep scans of your traffic.)

Comment Share your "encryption network" with Suckerberg! (Score 3, Insightful) 138

Right, that's exactly what you want to be doing if you are interested in encrypted communication... Share the list of other people who want communicate with you via encryption. That way the most intentionally invasive service in the world can build a giant graph of everyone who communicates via encryption. Then the NSA will know who to focus their efforts on just by who has had the most people download their public key or who is at the center of the largest clusters of connectivity.

This could possibly be countered by having everyone download lots of random people's keys. But only if FB doesn't require you to be "friends" before you can exchange keys.

The best way to counter it is to let all the sheeple use it, to give the NSA something to play with, while the astute "encryptionistas" ignore it.

Comment Work remotely (Score 1) 583

Develop a skill set and the self discipline to work 100% remotely. Then you can work for a company in an expensive city while living anywhere you want.

Sure, not all companies will hire 100% remote employees, but it opens up your job search to the entire world instead of just the companies within driving distance of your house. It also allows you to work on multiple contracts at the same time.

Slashdot Top Deals

"Everyone's head is a cheap movie show." -- Jeff G. Bone

Working...