Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment: Re:Wonder if the OTG port can be used as a periphe (Score 1) 140

by BaronAaron (#48565379) Attached to: $35 Quad-core Hacker SBC Offers Raspberry Pi-like Size and I/O

I can think have 5 ways you could have accomplished the goal of network configuration without a keyboard and mouse off the top of my head.

1. The Pi A's USB port can be configured for slave mode. The B doesn't support this but not sure if you needed a B.
2. You can fake a USB device over the GPIO ports on both the A and B through various bitbang techniques.
3. You can use the UART pins and a USB to UART chip which wouldn't be a very expensive add on.
4. Add a DHCP server to the Pi, so when connected directly to a PC with ethernet, the PC gets an IP from the Pi. Your PC program can then connect to the Pi for final network config.
5. Add a cheap two line LCD and some push buttons to your device. Create a simple text driven menu for configuring the network through that.

Comment: Re:First (Score 4, Interesting) 446

by BaronAaron (#48508243) Attached to: 18th Century Law Dredged Up To Force Decryption of Devices

This is the reason I prefer Android devices. You can install a firmware that is compiled from the open source you trust. There is still the possibility of hardware level backdoors, but there are a 100 different manufactures of Android devices, many of them have little to no presence in the USA. Google doesn't have to be involved with your device at all.

Versus Apple, Microsoft, etc who are easy targets for US courts orders.

Comment: Re:I don't understand this ... (Score 2) 184

My understanding is the relative velocities between macro sized objects in the universe are rather small. Small enough where relativistic effects are minute. The article mentions 3% the speed of light being the high end. You would be hard pressed to find anything larger then a particle moving 99% the speed of light relative to our sun. Even these hyper-velocity stars are only 33-50% the speed of light.

Comment: Re:After whast happened to Odroid-w, why? (Score 2) 81

by BaronAaron (#48205475) Attached to: Raspberry Pi Founder Demos Touchscreen Display For DIY Kits

We want tools of computing to be as useful and flexible and free (in design) as cement, steel girders, wrenches and sockets, pencils and paper.

While the general concepts of those tools are free and open, there are patents on specific implementations of all of them. People are always inventing better wrenches. If you made a copy of Craftman's new wrench of the week and started selling them, I'm sure you'd be hearing from their lawyers.

We live in a world, wrong or right, were people innovate for profit, not the betterment of society. I don't see why people feel computing devices should be any different.

Comment: FBI Had VPN Access (Score 4, Interesting) 191

by BaronAaron (#48057265) Attached to: Silk Road Lawyers Poke Holes In FBI's Story

My guess is the FBI is covering up that they somehow got VPN access into the Silk Road's internal server network. The same VPN access Ulbricht used to administer the servers from his local coffee shop.

They had already been tipped off about Ulbricht when he tried to order fake IDs from Canada. Then they figured out he was spending a good amount of time using the local coffee shop's wifi. They then sniffed his wifi traffic directly or just ordered the coffee shop / ISP to allow them to do the same. They couldn't decrypt his VPN session but they could see the destination IP which either lead to his server host provider or a 3rd party VPN service. Either way they just pressured the company that runs the service to give them the keys. Now that they have access to the server network they could collect what ever information they needed to build a case.

The key to my theory is the PDF of the PHPMyAdmin access. Notice it's an internal IP address. No way they were accessing that from anywhere but the server network.

Comment: Re:Header Compression + Binary Headers (Score 1) 122

by BaronAaron (#48055553) Attached to: Internet Explorer Implements HTTP/2 Support

Plain text is great when you're just transferring text. The problem is HTTP has been used for transferring a lot more then just text for a long time. Images, file downloads, video, etc. With HTTP/1.1 browsers have different parsing code paths depending on if it's a binary file or plaintext html. There are also special cases for handling white space and stuff like that. It makes developing and testing a browser more complex then is should be.

Comment: Re:Header Compression + Binary Headers (Score 3, Interesting) 122

by BaronAaron (#48055415) Attached to: Internet Explorer Implements HTTP/2 Support

This won't effect AJAX. HTTP is abstracted away from the javascript engine by the browser. I imagine there might be some additional HTTP header parameters to play with while making AJAX calls, but that's about it. All the benefits from HTTP/2 will happen behind scene as far as AJAX is concerned.

: is not an identifier

Working...