Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:Insecure ads (Score 2) 199 199

Third party certification, mostly. There are a number of ad mediation networks (the middle-men who accept ads to distribute to end-sites, and sign contracts with both), and some of them are dirty, others are squeaky clean, because the clean ones will lose all of their high-end clients if they run a malware ad as well as get dropped from most of the high end sites. The only way to even try to fix this is a broadly distributed whitelist backed up by certs, but experience shows certifications are generally not even close to providing enough reassurance.

The person with the real answer to that problem is sitting on multiple millions of dollars. The stopgap (closed garden mobile environments) is unpleasant for everyone involved because of how crazy limited it is.

Comment Re:Insecure ads (Score 1) 199 199

My firm actually specializes in ads that use javascript calls to webgl to render 3d content. But no, high end brands (i.e. not unscrupulous fly by night credit rating vendors or mugshot extortionists) like luxury cars or fashion control very carefully how their brands are placed in advertising, and everyone realizes by now that pop-unders and similar serve only to destroy brand value, not add to it.

Comment Insecure ads (Score 5, Insightful) 199 199

Unfortunately, I work in the ad industry, though my firm's clients are premium brands that specifically avoid the undesirable ad types (banners only, no pop unders or bullshit. Those types of ads actually hurt brand value more than anything else). That being said, by far the worst ads are the ones that have been compromised to deliver malware. That really blows the other options out of the water.

Comment "there's not much to indicate difficulty" (Score 5, Insightful) 278 278

Only complete idiots/tools think this way about any profession. Brick laying looks easy, but I wouldn't trust someone who's never picked up a trowel in their life before to put up a brick wall. Anyone 'outside the profession' should only be concerned that the code works, is maintainable, and is to spec, along with passing a security audit.

Comment What's the problem? (Score 3, Interesting) 188 188

If you use your card online, you're telling the retailer who you are and where you generally are, and having them do their homework is nothing but a good thing. Making people go through more verification steps if red flags are thrown is nothing but a good thing. If you use Tor and then buy something with a personal credit card or debit card, you're doing it wrong.

If you want to stay anonymous, load a pre-paid debit card and jump through the anti fraud hoops. Nobody said staying off the grid was going to be easy.

To Beat Spam Filters, Look Like A Spammer? 143 143

Slashdot contributor Bennett Haselton writes "A recent webinar for newsletter publishers suggested that if you want your emails not to be blocked as 'spam,' you paradoxically have to engage in some practices that contribute to the erosion of users' privacy, including some tactics similar to what many spammers are doing. The consequences aren't disastrous, but besides being a loss for privacy, it's another piece of evidence that free-market forces do not necessarily lead to spam filters that are optimal for end users." Read on for the rest of Bennett's thoughts.

Comment Re:How are they identified? (Score 1) 510 510

I'm sure they have cameras recording plates of people who enter and exit the airport, and they'll flag people for suspicious activity (going to the airport more than 2 or 3 times a day, for example) and ask them what they're doing. If they admit ridesharing it's off to the pen

Submission + - Why Javascript on Mobile is Slow->

An anonymous reader writes: Drew Crawford has a good write up of Javascript's current state regarding mobile development, and why the lack of explicit memory handling (and a design philosophy that ignores memory issues) leads to massive garbage collection overhead, which prevents HTML5/JS from being deployed for anything besides light duty mobile web development.
Link to Original Source

Comment Won't work. (Score 2, Interesting) 119 119

I was at a 'technology literate' middle school when Lego Mindstorms came out, and the school bought a few of them for the school computer club so people could 'program' and 'debug' the RCX robots. It was good fun, but all it taught to kids was a very rudimentary concept of program flow.

If you want to make kids tech literate, you deconstruct something they use in their every day lives, when they're old enough to be capable of it. A good example would be a high school course focusing on high level full-stack design - here's twitter, here's how their servers look like in a very simple way, here's their API, let's do a 2 month project to make a frontend. Or let's make our own mini twitter just for our class, here's a sql server and we can write the backend together over a month or so. That sort of thing would both engage kids and give them useful experience.

It's not so hard to lift yourself by your bootstraps once you're off the ground. -- Daniel B. Luten