Follow Slashdot stories on Twitter


Forgot your password?

Comment: Re:You are missing the point (Score 1) 370

Well, no. But I am sure that Google has more resouces than, say, two dudes in a garage who indexes the same data as Google with the tech-thingie they've invented, and have to handle the same takedown load.

Nobody will ask 2 guys in a garage to take stuff down and the EU's regulators will turn a blind eye to infringements by local businesses. This is a sour grapes ruling.

Comment: Explaining the asymettry (Score 1) 178

by Flarston Marston (#42103795) Attached to: Compared to my siblings ...
So given that in a random sample, there should be equal numbers answering 1, 2 and 3, the fact that there is an asymettry between them means either: - The number of less formally educated people even seeing the survey is less. OR People are less likely to answer the survey if they have less formal education. OR Lots of people are lying

Comment: QKD is one solution (Score 1) 262

by Flarston Marston (#38020974) Attached to: Ask Slashdot: Post-Quantum Asymmetric Key Exchange?
If you're asking about key exchange specifically, then there's quantum key distribution, which is equivalent to a one-time-pad. It relies on an initial shared secret, but once the key has been exchanged, it can be proven whether it's been eavesdropped, so this is not as much of a problem as it sounds.

Comment: Re:I'd be excited about this... (Score 1) 154

by Flarston Marston (#37419358) Attached to: The Google+ API Is Released

You're thinking about bolting from google apps because their google+ is taking a while longer than they promised? I assume there's a reason that signing up for a regular gmail account and using google plus in the meantime isn't acceptable?

Yeah - you'd have to start from square 1 again when the apps version comes out. Also this solution doesn't work on my smartphone - I'd have to have that account installed on my android phone too and have it grab all my email etc... too.

+ - App-store security - a manifesto->

Submitted by Flarston Marston
Flarston Marston writes: A threat assessment of the app-store software distribution model. This paper shows various ways to get malware onto a smartphone via an appstore and then proposes an app-store security manifesto with five lines of defence — basically some ideas on how to optimise review, reputation, revocation, on-device enforcement and jails in appstores. Presumably they are hoping to get some kind of shared security standards going between Google and Apple — good luck with that...
Link to Original Source

Too much of everything is just enough. -- Bob Wier