Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Metadata (Score 1) 300

by Meneth (#49139667) Attached to: Moxie Marlinspike: GPG Has Run Its Course

SMTP requires that those fields be world-readable. Or do you propose that SMTP servers somehow route email to the appropriate recipient without being able to read who the recipient is?!

No, what I propose is that we start using a protocol other than SMTP for email. I don't think such a protocol exists yet, and I don't know much about how it would look, but I think AC #49126801, right above, has some good ideas.

Comment: Re:More of this ridiculous (Score 3, Insightful) 134

by Meneth (#49117929) Attached to: Pakistanis Must Provide Fingerprints Or Give Up Cellphone

Surely they'll find it very difficult to get an unregistered SIM card.

No, but they'll find it difficult to get unregistered cards to work, at least once the networks start blocking all cards that are not registered.

The counter to that is to steal registered cards. The counter to that is to report the cards as stolen. Counter: kill the card-owners, so they can't report the cards. Counter: police de-registers cards belonging to dead people. Counter: kidnap/disappear the card-owners. Only works until the authorities catch on in each individual case. Mitigation: keep kill/stealing. That's what terrorists do anyway, so no problem there. Problem: you're now switching numbers often. Gonna be difficult to keep your address book up-to-date.

Comment: Re:Drama queen (Score 2) 196

by Meneth (#49037733) Attached to: Firefox To Mandate Extension Signing

All modern operating systems put restrictions on what software can run on them and what it can do.

No, they don't. Windows, Linux, the BSDs, OSX, none of those have any mandatory filters. Windows and OSX have some "anti-malware" crap, but those can be disabled.

Even on Linux your app doesn't get automatic root access and the ability to poke into the kernel just because you want it.

If an app wants root access, it'll pop up a password prompt. If you want it, it can poke anything. :)

Comment: Hard disk drives (Score 2) 251

by Meneth (#48916179) Attached to: Ask Slashdot: Best Medium For Personal Archive?

I wouldn't put anything in a lockbox. Such media will be tested very rarely, and when they do fail, it's likely you won't know until it's too late.

I'd rather use a hard drive, hooked up (NAS or mini-pc, maybe) to a network and capable of rsync. You could place it somewhere in your home, or, if available, another secure location with Internet access. Run daily or nightly automated backups.

Comment: Re:"AI" vs Strong AI (Score 1) 227

by Meneth (#48828731) Attached to: An Open Letter To Everyone Tricked Into Fearing AI

Terminator level strong AI

The AI shown in the Terminator movies is not Strong. It is never shown to be smarter than humans, and often shown to be more stupid. In particular, the franchise is built on the premise that humanity wins the war in the future.

Real Strong AI would, once activated, quickly elevate its own intelligence to a godlike level. After that, it would be to humans as humans are to ants.

Money may buy friendship but money cannot buy love.