Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: Facing similar problems... (Score 1) 268

by _Knots (#47910867) Attached to: Ask Slashdot: What To Do After Digitizing VHS Tapes?

In addition to my "online" storage pools, I keep a three-way ZFS mirror on encrypted hard drives of everything that is irreplacable. If you have more than fits on one disk, maybe use a 1+0 or 1+5, even, setup. This story does depend upon you being able to connect two complete copies of your backup to one machine at a time, so again, if it's really a lot of data, external RAID enclosures may be in your future. In any case, one of the full copies lives off-site and every month I grab one of the two at home, swap it with the off-site one, allow it to come up to date with the third, and then push that month's backups to both. Rinse, repeat, like clockwork.

Comment: That's not how traitor-tracing algorithms work (Score 5, Informative) 467

by _Knots (#44046331) Attached to: Altering Text In eBooks To Track Pirates

They don't hash the whole shebang into one number. Rather, they take a (random) number and use that to generate a set of mutations and then probe for that set of mutations in the leaked document. So now, even if you alter the document further, you probably didn't undo the mutations in question. Even if you did, you probably didn't undo all of them and you almost certainly didn't produce a high-confidence result that it's somebody else's copy.

Comment: Re:Please port this to Linux A.S.A.P. (Score 1) 164

by _Knots (#36026440) Attached to: Marlinspike's Droid Firewall Kills Tracking

The correct design is neither this reactive monitoring nor the UNIX-standard "oh sure, go ahead!" approach. I contend that the correct approach is one of a capability system: an application which could not even name a remote network endpoint unless it was granted a handle to it is in no position to leak data.

Comment: Re:As software engineers, the EFF are good lawyers (Score 1, Informative) 173

by _Knots (#33259174) Attached to: Eben Moglen Calls To Free the Cloud

> and users can move freely between them.

The proprietary world has yet to invent a mechanism for that, and it's been a known problem for a long while (decades). Data "liberation" is challenging and, even if you don't think that is a problem, cross-realm authentication is all but nonexistent. They have little incentive to provide these things unless people demand them, and by and large people don't. (And before you bring up LiveJournal's OpenID protocol, I've two things to say: 1) it's not worthy of the trust placed in it because not all parties srongly authenticate each other, and 2) note that commercial OpenID providers do not, and fundamentally cannot by nature of the beast, make it easy to transition from an identity rooted at one to an identity rooted at another.)

The only truly distributed bring-your-identity-with-you schemes out there have come from the open, usually academic, world: PGP, SPKI/SDSI, E rights, the Petname system and protocol, and so on. Similarly, shared, secure-against-the-owner storage is not something social network companies have huge incentives to produce, but it exists in open research: TAHOE-LAFS exists and Diaspora has made vague promises to being similarly secure.

Comment: Re:Addendum to first article is pretty good (Score 1) 206

by _Knots (#33181648) Attached to: Artificial Life Forms Evolve Basic Memory, Strategy

I'm not sure where the claim about "can't use each other's code" comes from. Perhaps a subtle misunderstanding. While Avida does keep each virtual machine fully isolated from the others, Avida _does_ have explicit support for parasitic behaviors, in the form of code injection into neighboring organisms.

Movies

Kaleidescape Triumphant in Court Case, DVD Ripping Ruled Legal 213

Posted by Zonk
from the only-when-you-own-it-netflixers dept.
Jim Buzbee writes "Ever wanted to rip all your DVDs to a big network server so that you could select and play them back to your TV? Up until now, manufacturers have been wary of building a device to allow this type of usage because they've been afraid a lawsuit. The DVD Copy Control Association had claimed this was contractually forbidden, but now a judge says otherwise stating, 'nothing in the agreement prevents you from making copies of DVDs. Nothing requires that a DVD be present during playback.' Kaleidescape has finally won their long-standing lawsuit, a case we first talked about early in 2005."

Wishing without work is like fishing without bait. -- Frank Tyger

Working...