Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment As an mid-old-time poster, who'd stopped visiting (Score 1) 1310

Seems I stopped visiting around 2 years ago... but I've been reading a lot more, recently.

/. seems to have mostly escaped the "can't allow wrong-think" that's hit a lot of the other big sites - and that itself is enough to bring me back.

As a regular user back then, I'd say it'd be awesome to see some stability return, no "We've got a sexy new UI to roll out / THE GOGGLES THEY DO NOTHING!", and just focus on giving the ancient nerds of the net a lovely place for our eventual retirement homes.

Submission + - Google CENSORS Adrian Crenshaw. Operation-Irongeek fights back... #opirongeek 2

richi writes: Google massively raised the ire of the infosec community yesterday. Its utterly-reliable YouTube moderators nuked the account of the infamous Irongeek (Adrian Crenshaw). It surely couldn't have been a simple false-positive mistake, right? Because Google says it already "reviewed" the "repeated or severe violations" that led to the censorship.

So, that's all right then. No evil done here. Move along.

Why Improbable Things Really Aren't 166

First time accepted submitter sixoh1 writes "Scientific American has an excellent summary of a new book 'The Improbabilty Principle: Why Coincidences, Miracles, and Rare Events Happen Every Day' by David J. Hand. The summary offers a quick way to relate statistical math (something that's really hard to intuit) to our daily experiences with unlikely events. The simple equations here make it easier to understand that improbable things really are not so improbable, which Hand call the 'Improbability Principle:' 'How can a huge number of opportunities occur without people realizing they are there? The law of combinations, a related strand of the Improbability Principle, points the way. It says: the number of combinations of interacting elements increases exponentially with the number of elements. The 'birthday problem' is a well-known example. Now if only we could harness this to make an infinite improbability drive!"

Comment Re:More HDMI dongle devices coming (Score 2) 104

I used Plex and Chromecast all over Christmas. It streamed very well indeed. It'd occasionally crash (as in the movie would stop playing suddenly), but it'd usually remember where the movie got to, and pick up where it left off - and I never needed to restart the media server.

All in all, very impressed with how Plex and Chromecast play together - mixture of file formats / quality were attempted, and all played at first time of asking.

As a by the by, I'm British, and got mine via the grey-market; if you're considering it, I can highly recommend it. All I need now is an UltraViolet player for Flixster, which will hopefully come with the SDK out, and my movie needs are completely sorted.

Comment Jesus Christ (Score 5, Insightful) 224

The majority of posts, on /. of all places, slamming Snowden for "blah blah blah, PR, narcissist, looking to make money off this."

This guy has effectively destroyed his own life, and the lives of those around him, to tell us, the plebs of the world, the truth that our Governments have been hiding from us.

And you're tearing a strip off him?

Comment Re:I like the idea (Score 3, Informative) 292

Another service offering:

SpiderOak uses AES256 in CFB mode and HMAC-SHA256. SpiderOak uses a nested series of key scopes: a new key for each folder, version of a file, and the individual data blocks that versions of files are composed from. Having keys with such limited scope allows for selective sharing of chosen portions of your data while keeping the remainder private.

        Most importantly, however, the keys are never stored plaintext on the SpiderOak server. They are encrypted with 256 bit AES, using a key created from your password by the key derivation/strengthening algorithm PBKDF2 (using sha256), with a minimum of 16384 rounds, and 32 bytes of random data ("salt"). This approach prevents brute force and pre-computation or database attacks against the key. This means that a user who knows her password can generate the outer level encryption key using PBKDF2 and the salt, then decipher the outer level keys, and be on the way to decrypting her data. Without knowledge of the password, however, the data is unreadable.

        SpiderOak accounts also include a 3072 bit public/private RSA key pair. This is currently not used for anything, but is included with all accounts with the expectation that SpiderOak will add multi-user private collaborative and sharing features which would necessitate the use of the the public/private keys.

https://spideroak.com/ .

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.