Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:Dashboards (Score 1) 415

While the road leading up to the bridge is marked with large signs that read “road closed,” orange barrels and other barricades, Hussain was likely paying more attention to his GPS than the road, deputies said.

I would say it's Darwin Award time.

If only he's had a fancy Infotainment system with car diagnostics access -- it could have told him he was driving vertically on the bridge from the same outdated navigation data.

Comment Re:Dashboards (Score 1) 415

If the stated information was available to the navigation calculations, it would know that I had slowed, stopped, moved a bit, stopped, inched forward a bit more, stopped, stopped, still stopped, grown incredibly impatient and started to curse the government which built a tunnel with very a short life expectancy and without any thought for expansion, etc.

What would that really accomplish, though? If you're stuck in a tunnel you don't need a GPS at that point -- there's only only two directions to go and one of them would require an illegal U-turn.

Comment Re:Dashboards (Score 1) 415

The glorified stereo/nav system doesn't really need the info.

Reread your sentence and rethink that. What could a nav system possibly use throttle position, speed, steering position for?

The rest of those are probably to allow display of these values back to the user.

My Garmin navigates fine without needing to be connected into the CANBUS. That's what GPS and built-in sensors are for.

Comment Re:Why do they need ANY info? (Score 2) 415

Ok, why do they even need to know if the car is in MOTION at all just to play music??

This isn't about music.
It's fairly standard for Infotainment systems to need a sensor input as to whether the car is in motion (or in gear), as many can play back video and they don't want you watching movies when you're driving. Some also tie into gear selection so they know when to activate an installed backup camera and display its video feed.

Comment Re:136 lbs? (Score 2) 179

I was going to ask how many pilots in the whole US Air force weigh less than 135 lbs, and then it occurred to me that this was just a way of keeping women out of their "no girls allowed" fighter jock club.

Isn't your comment sexist in itself because you're making assumption about the weight of someone based on their gender? It's like assuming a woman is weaker physically than a man just because she is a woman, even if statistically men develop more muscle mass that does not mean a man automatically has more physical strength.

Comment Re:despite professional code audits (Score 2) 106

despite professional code audits, serious bugs can remain undiscovered

Doesn't google finding this bug count as on more professional code audit successfully discovering a bug?

Google locating a single bug isn't the same as a comprehensive examination of the entire codebase. The problem here is supposedly someone else has done that entire review and not found an issue someone else located with what was likely testing on only a small portion of the "reviewed" code (the driver). This calls into question the quality of the rest of the review.

Comment Re:6 years (Score 2) 127

How do you know how secure it is?

Please list known security issues with the platform.


Any platform is only as secure as it's known to be, and that security opinion varies on who is making it.
  - End user knowledge of security flaws.
  - Manufacturer/Developer knowledge of security flaws.
  - Cyber-criminal knowledge of security flaws.

If you're an end user, you don't know that Blackberry is publicly listing all known flaws. There are likely a bunch more that are not disclosed for security reasons until they can be patched. So asking someone to produce a list of flaws, and calling the absence of a list of issues proof of the platform's security is fucking bullshit.

If you're the company responsible for the OS, you're not going to know about all security flaws that may be getting exploited. You have the ones you find in testing, ones reported by end users and White Hats, and maybe you have a mole or other "ear to the streets" with info on what's being exploited.

If you're the hacker, how do you know all the flaws you're aware of and the perceived "level of difficulty" are true? There can be flaws that are undiscovered or only known and exploited by certain individuals or teams that would make your malicious activities much easier if you were in the know, too.

"Falling in love makes smoking pot all day look like the ultimate in restraint." -- Dave Sim, author of Cerebrus.