Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment: Re:A first step (Score 1) 171

by Lennie (#49551085) Attached to: Tesla To Announce Battery-Based Energy Storage For Homes

"GTAI and Deutsche Bank’s conclusion - based on the price trends of solar, batteries, electricity in Germany, and German feed-in-tariffs - is that ‘battery parity’, the moment when home solar + a lithium-ion battery makes economic sense, will arrive in Germany by next summer, 2016."


Comment: Re:It is coming... On Weekends... From Home... (Score 1) 381

by Lennie (#49517895) Attached to: Why the Journey To IPv6 Is Still the Road Less Traveled

Every desktop operating system (Linux like Ubuntu and Fedora, Mac OS X and Windows) has IPv6 privacy extensions enabled by default (server operating systems usually have it disabled).

Privacy extensions automatically creates a secondary temporary IPv6 address for connecting to servers like websites.

So you can NOT be tracked by IPv6 more than IPv4. But also not less.

Most IPv6-enabled networks have a public range assigned.

When you visit a website one day they will see an automatically generated unique IPv6 address from that IPv6 network.

The next day they will see an other automaitcally generated unique IPv6 address from the same IPv6 network.

This is thus completely similar information you get from IPv4 NAT.

Comment: Re:I'd Like To See Electronic Voting Work (Score 1) 105

by Lennie (#49485617) Attached to: The Voting Machine Anyone Can Hack

If any electronic voting system is going to work, it would be a system that prints what you've voted so the voter can see what he/she voted. And then you have a separate electronic counting of those pieces of paper.

That way you have faster counting of votes and still everything on paper as back up.

Now I know in the past they had some what similar systems in the US and they had problems with printers not working, so I don't know if they'll ever get it right.

There are also a whole lot of people who use terms like math/encryption or blockchain.

So far I haven't seen a system that works.

It does however make for interesting presentations:

Comment: Re:Actually, it's worse than that. (Score 1) 199

by Lennie (#49477297) Attached to: Chrome 42 Launches With Push Notifications

One of the reasons browser vendors can get away with getting rid of as many plugins as possible is because they are adding features to the browsers themselves. WebEx is actually a good example.

Cisco is one of the companies working on WebRTC at W3C and IETF.

So WebEx will support it if it doesn't already I'm sure:

Mozilla and Google support WebRTC and Microsoft is working on supporting it.

About WebRTC:
- is peer2peer like Skype used to be and can do NAT hole punching if I'm not mistaken
- automatically uses a relay as a fallback if peers can't connect directly
- traffic is encrypted so the server or network can't see or change the content
- supports video/voice calling
- support for one of the most used codecs from traditional voice like analog and VoIP so sound doesn't need to be converted.
- has the best audio codec ever created for these type of applications: Opus. Which is an IETF standard created for WebRTC by Skype (before it was acquired by Microsoft) and Xiph.org developers
- screen/desktop sharing
- application sharing
- the standard says: browsers most support both the H.264 and VP8 video codec
- data channels (useful for example for building games)

Comment: Re:Break the key apart? (Score 1) 134

by Lennie (#49457327) Attached to: U.S. Gov't Grapples With Clash Between Privacy, Security

I believe I've seen Bitcoin Multi-Signature wallets use Shamir's algorithm:


A Bitcoin 'wallet' is the private key which allows you to spend your the Bitcoin you own.
A Multi-Signature wallet is a wallet for which you need 2 out of 3 keys to spend the Bitcoin.

How something like that could be used in a secure system in this case I'm not so sure about.

Comment: Re:The are working on it (Score 1) 89

by Lennie (#49456741) Attached to: The Problem With Using End-to-End Web Crypto as a Cure-All

Have to admit I'm not a big fan of incremental improvements over an old less secure system, but they do improve things and fix things and it's stuff that actually can be deployed on the public Internet.

Examples are better revocation that actually works:

Making sure regular visitors on sites always use HTTPS and only allow for certain public keys (the last one fixed the CA system for regular visitors !):

Maybe later we'll also see DNSSEC/DANE to fix the first time visit on a site:

An elephant is a mouse with an operating system.