Follow Slashdot stories on Twitter


Forgot your password?

Comment Re: Only if you use App Cards with APPS! (Score 1) 317

Chip and PIN was compromised years ago.

Can you cite one instance of chip and pin being compromised?
Heres a tip, that chip and skim paper was about faulty terminals that allowed you to guess the nonce they would provide, the actual chip and pin design itself was and still is secure. Idiot manufacturers just didnt build to the chip and pin spec in their terminals.

Comment Re: Only if you use App Cards with APPS! (Score 1) 317

Hey right. The sales point cannot notify security, and film the people in the sales area. Right. To see who is using the card.

Notify security so they can do what? When a card gets reported stolen it just stops processing payments, it doesn't print out something on the terminal telling the cashier to arrest you and as soon as the card gets declined the offender is going to know the jig is up and make himself scarce asap. Filming the sales area is all good and well but the kind of criminals who steal cards go places they can avoid being filmed.

Comment Re:Only if you use App Cards with APPS! (Score 2) 317

So I steal your card and use it, scribbling a sig if needed.

My bank will reverse the charges provided I report it stolen and the card will stop working at that point. Thats how it works with both mag and chips, no difference there. What does change is you have to actually steal my card, whereas before all you had to do was get ahold of it for a few seconds to scan the mag strip so you could clone it later.


The Ethical Issues Surrounding OSU's Lab-Grown Brains 190

TheAlexKnapp writes: Last month, researchers at Ohio State University announced they'd created a "a nearly complete human brain in a dish that equals the brain maturity of a 5-week-old fetus." In the press release, the University hailed this as an "ethical" way to test drugs for neurological disorders. Philosopher Janet Stemwedel, who notes that she works in "the field where we've been thinking about brains in vats for a very long time" highlights some of the ethical issues around this new technology. "We should acknowledge," she says. "that the ethical use of lab-grown human brains is nothing like a no-brainer."

Comment An idea. (Score 5, Funny) 106

Why don't games just come on special SSDs? They could have two chips, one containing original game data and that chip is set read only after production, the other larger and read/write one contains updates and save data and then unionfs the two together so writes automagically go to the read/write larger one. Then you could just insert the SSD in a special cartridge so its easy to insert into and remove from the console!

Comment Re:I always assumed they were (Score 1) 220

Their job is NOT to find contraband.

Their job is to find hazardous materials that are not allowed on the flight.

I'm not sure you understand what the definition of contraband is. The traditional definition has nothing to do with the DEA. The common definition would include anything not allowed on the flight, drugs, weapons, explosives all that crap.

Comment Re: wan port (Score 1) 123

, because I know that Google is a business, and is not really my friend.

Don't forget to not buy linksys, neatgear, dlink, asus, buffalo or any of those either. They're all businesses and not your friend.
To negate your paranoia bout google 'decreasing your privacy' for $200 this thing isnt capable of deep packet inspecting your bandwidth, it just doesnt have the hardware for it and I seriously doubt google is vpning all of your traffic into them to inspect it on their own gear.

Comment Re:wan port (Score 1) 123

Where are you supposed to plug in that switch when the only Ethernet port on the device is in use for your WAN connection?

RTFA It has one WAN port and one LAN port, two ethernet ports total. You plug the switch into the LAN port and you plug your WAN connection into the WAN port. Hell the pictures from the article show two ports and two ethernet cables.

Comment Re:So basically... (Score 1) 123

Not that they necessarily don't want encrypted back doors in their products.

That kind of contradicts what Vinton Cerf from google said in the article:

"If you have a back door, somebody will find it, and that somebody may be a bad guy," Vinton Cerf, Google's chief Internet evangelist and the co-creator of TCP/IP, said in a speech earlier this month. "Creating this kind of technology is super, super risky."

We are Microsoft. Unix is irrelevant. Openness is futile. Prepare to be assimilated.