Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: Re:So, who is the thief? (Score 3, Insightful) 279 279

From the comments in TFA, as written by one of the authors:

We don't set out to to de-anonymise the thief - we are researchers, not law enforcement, and we are just using that as an example to show its possible to trace the flow of Bitcoins around the network.

It is possible to use Bitcoin in a way that is almost certainly anonymous, in the same way it is possible to get almost certain anonymity on the Internet, by using encryption, onion routing, and never associating your identity with your actions.

Our point is that you don't get this anonymity automatically, and that most casual users of Bitcoin may not be anonymous, even though many of them may believe they are.

The system looks more anonymous than it is.

This, of course, is something we've already discussed ad nauseum here. :)

Comment: Re:Until Marvel Regains Control... (Score 1) 226 226

... Marvel doesn't give a shit about doing faithful comic book movies as much as they care about making movies that people actually want to see.

Agreed. As nerdy as I am, I'd rather see a fun comic book movie with a new canon than a faithful retelling of old canon that produces a movie I regret watching.

Comment: Re:Send them to public school (Score 1) 364 364

As someone who was homeschooled for 8 years, I can confidently say that it did not hamper my people skills in any way. There are plenty of opportunities for homeschooled kids to socialize. Most locales have homeschool meet-ups and coordinated events. Mine had over 50 kids; plenty of opportunity to learn about bullies, idiots, and especially know-it-alls. :)

Comment: Re:I would have been happy with that (Score 2) 223 223

Get prescribed amount of work done, then do whatever you want for the rest of the day.

I was homeschooled from fourth grade through twelfth. This is pretty much what I did, except I did it in week chunks. My mother would plan out the school year in advance then hand me my workload for a given week. I would then crank through as much as I could, often getting my work done on Wednesday, leaving Thursday and Friday for leisure time.

That schedule allowed me to start up my own computer repair business when I was 16. It was great - I could schedule clients during normal business hours when I might have been in school wasting time for the slower kids to catch up.

Comment: Re:Foul playback (Score 1) 198 198

If you're willing to assume that all companies are going to keep your data safe, you're awfully naive. Whether or not they should is one thing... whether or not they will is another.

Besides, it's not like you couldn't have seen this coming. When you install the app to your Android phone, you get the following screen:

This application has access to the following:
* Network communication (create Bluetooth connections, full Internet access, view network state, view Wi-Fi state)
* Your personal information (add or modify calendar events and send email to guests, read contact data)
* Phone calls (read phone state and identity)
* System tools (Bluetooth administration, change network connectivity, change Wi-Fi state, modify global system settings, prevent phone from sleeping, automatically start at boot)

If that doesn't scream "We are going to take data about you and sell it", I don't know what does.

The generation of random numbers is too important to be left to chance.

Working...