Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:Difference between this and SpaceX (Score 1) 121

On an orbital class rocket your engine will have too much thrust making it impossible to hover. That is what SpaceX is trying to do. Land using a thrust to weight greater than one.

Speaking from a position of complete ignorance here -- is there no way to reduce the thrust of the rocket to the preferred rate?

Comment Change Windows' file path separator to forward-sla (Score 5, Insightful) 491

Backslash-as-a-filepath-separator is extremely annoying, both because it's gratuitously different from every other OS, and because it's also used (in C, C++, and elsewhere) as an escape character, which can cause endless hilarity for anyone who isn't very careful about that.

And I'd also like them to replace the Windows DOS prompt with bash running inside a proper terminal window. Installed by default.

Comment Re:Except they used regular SMS (Score 1) 291

But I have no idea where this "zero knowledge encryption" label came from or what it's intended to actually mean.

Without going to extreme measures like actually reading the article, I'm going to guess that they mean encryption mechanisms where the service provider (read: Apple or Google) has no way to unilaterally decrypt the user's data, because the only place the decryption passwords/keys are ever stored is on the user's device.

Comment Re:How Is It Fine? (Score 1) 108

Maybe the US Navy designed TOR to be vulnerable in the first place

Yes, it could have all just been an elaborate ruse... but given the fact that any software of non-trivial complexity has vulnerabilities in it somewhere, it's more likely that the designers of TOR didn't foresee every possible attack vector. This would make them neither more nor less nefarious than any other designers of (allegedly) secure software.

Comment Re:The hilarity it keeps growing. (Score 3, Interesting) 259

How about this, instead:

Reporter interviewed some investigators who mentioned that the terrorists had been using encryption, and published the story including that fact. The investigators then realized that the terrorists associates might later read the article and realize that their encryption methods might now be compromised and abandon them -- so the investigators asked the newspaper to bury the article, in the hopes that the terrorists would continue using their (perhaps now compromised) encryption methods a bit longer and thereby expose themselves to capture.

I know it doesn't exactly feed the obligatory Slashdot "government is evil and wants to hack your computer" line, but it seems equally likely to me.

Comment Re: Basic income (Score 1) 674

No disrespect intended, but when "they" come for *your* shit (stuff *previously* not "taxed"), you will be one of those squealing like a pig. Good luck with that. Just saying.

I'm sure there is some theoretical point my tax burden could be raised to that would be enough to make me complain, but I already pay quite a bit in taxes and it doesn't bother me much. It's the price I pay for living in a nice area of a well-cared-for state in a first-world country, and I'm happy to pay it.

Comment Re:One TFA is paywalled, the other has a big pop-u (Score 1) 69

I wonder about the logistics behind any such system, would you have to tie a checking account to your Apple ID? Would people be willing to do that?

Plenty of people have already set up iTunes and/or Apple Pay and tied either a credit card or a bank account to their phone for that; if Apple is clever they will leverage that somehow, so that their new feature doesn't require any additional signup above what Apple Pay or iTunes purchases already require.

Comment Re:All the more reason to actually USE... (Score 1) 163

TimeMachine is a push backup on the same computer. Thus vulnerable to being encrypted too.

Only if the malware gains root access -- not that that couldn't happen, of course.

You want a pull backup from a second system ( maybe with TimeMachine on that secondary computer).

Another option would be to have two external TimeMachine drives, and only keep one of them connected at any time, and swap them every so often.

Comment Re: Seems like a much better business model (Score 1) 163

Anyhow, within a day of her first getting her Mac she had managed to install something called Mackeeper (I think?). It took some digging to find out that it was not some sort of malware protection but actually was the malware.

It probably got installed due to the fact that the MacKeeper people plaster ads for MacKeeper all over the place (presumably only if your web browser's user-agent indicates you're on a Mac, though). These ads strongly suggest that installing MacKeeper will make your Mac more better in every possible way and that you should do download and install it right now because reasons.

Complete bunk, of course, but it can work on the right type of impressionable mind (i.e. "the computer said I should do this, so I'd better do it" -- not making the distinction between what the OS is recommending and what a third-party ad is recommending). I get a phone call from my mom every 6 months or so asking me if she should install MacKeeper or not -- I'm grateful that she knows to ask about it and not just blindly install it.

And on the seventh day, He exited from append mode.