Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:How is this different than encrypted online bac (Score 1) 135

by Fnord666 (#49159321) Attached to: Under US Pressure, PayPal Stops Working With Mega

But so I ask, how is this different than online backup service providers like Mozy and CrashPlan that allow client-side encryption and end-to-end encryption??!?!? Or even Amazon S3 for that matter?!

Or taken alternately we can hypothesize that these service providers are different in some way. This would lead us to wonder what is different about these providers that causes the government to leave them alone? That's where things start getting interesting.

Comment: Re:White balance and contrast in camera. (Score 3, Informative) 409

by Fnord666 (#49153595) Attached to: Is That Dress White and Gold Or Blue and Black?

So it appears to be linked to the lighting conditions that your eyes are adjusted to when seeing the image initially... even after they've adjusted to the ambient light, the brain appears to stick to the image it created initially.

Here is a pretty good explanation of why this might happen.

Comment: Re:someone explain for the ignorant (Score 2) 449

by Fnord666 (#49084349) Attached to: Credit Card Fraud Could Peak In 2015 As the US Moves To EMV

As for mail order, I'm sure Visa/MC will continue to have a web object that pops up, asks for a PW or PIN, which is used for shopping via the Internet.

This is truly where credit card fraud is going to go in the next few years. As EMV rolls out in the US (finally!) credit card fraud is going to move online. Card not present transactions will be the next target and participation in multifactor authentication schemes like Verified By Visa and MasterCard SecureCode will become critical and possibly even mandatory.

Comment: Re:A good strategy (Score 1) 85

by Fnord666 (#49080295) Attached to: Algorithmic Patenting

It's also real life imitating art, because the protagonist of Charles Stross' novel Accelerando ( ) uses this technique and becomes persona non-grata in the US. The book came out in 2005.

I believe that Cory Doctorow's protagonist used this technique at one point in Eastern Standard Tribe as well.

Comment: Re:Co-Conspirators? (Score 1) 188

by Fnord666 (#49052985) Attached to: MegaUpload Programmer Pleads Guilty, Gets a Year In Prison

Personally I think it's insane that a civil crime such as a breach of copyright terms is treated as a criminal matter more serious than assaulting someone and leaving them with injuries that will be with them for the rest of their life.

Here in the US we have the best legal system that money can buy.

Comment: Re:A programmer arrested for © infringement? (Score 1) 188

by Fnord666 (#49052959) Attached to: MegaUpload Programmer Pleads Guilty, Gets a Year In Prison

And much like the manufacturer of a hammer, they have no way of knowing whether that hammer will be used to nail together pieces of wood or open up the back of someone's head, and so they are therefore not responsible when someone misuses the tool which is intended for beneficial use.

When all you have is a hammer, everything looks like a skull.

Comment: Re:You mean nightmare (Score 1) 146

by Fnord666 (#49035445) Attached to: Building the Developer's Dream Keyboard

The perfect keyboard has been around for a long time an IBM M13 mine is nearly 20 years old and in perfect working order. While I like the larger keyboard with f13-24 it's a pita to get many OS's to use them. You can also bludgeon an intruder with it and go back to typing.

Even better, you can wash the blood off with running water.

Comment: Re:they used encryption, hmacs, thought they knew (Score 1) 83

BMW's programmers did as much as I'd expect any application programmer to do. It's then time for the security audit, by a truly qualified security person, to catch the kinds of mistakes that the author caught.

No. Security is not an afterthought or something do be approached at the end. It needs to be an integral part of the software development lifecycle from soup to nuts. Anything else results in "ship it now, we'll fix it later" decisions and we end up where BMW is today.

Comment: Re:I don't think this is really true. (Score 1) 153

by Fnord666 (#49005723) Attached to: Facebook Will Soon Be Able To ID You In Any Photo

Also very hard if there is not a set of reference photographs.

Fortunately your friends, relative, and coworkers are willing to help out with that. Each photo uploaded to Facebook with your face tagged in it is a reference photo. Setting your privacy settings to not display those tags doesn't mean the data point wasn't saved.

"Well I don't see why I have to make one man miserable when I can make so many men happy." -- Ellyn Mustard, about marriage