Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment: Re:What percentage... (Score 1) 96

by HiThere (#48638559) Attached to: Geoengineered Climate Cooling With Microbubbles

IIUC, the smaller a bubble is, the longer it lasts. This may have something to do with their calculated result. If so, this sounds pretty good.

Only thing is, I think this needs a bit more research:
What happens to fish, etc. who swim through these bubbles?
Does this change the rate at which gasses diffuse through water?
Does it affect the rate of evaporation? If so, what effect does that have?
Most of these can probably be answered fairly easily, and maybe they already have been. If not, they should be considered.

Comment: Re:Official Conclusion (Score 1) 300

Perhaps Bruce Schneier was saying something different. It sounds like he was saying that you, personally, have no way to protect yourself from your employers shitty security practices. I still disagree with him, to an extent. If anyone read the emails on my business account the worst they would get would be terminal bordom. But if you're doing business with someone, you can't protect yourself against their shitty security practices...and you can't even tell that they have any without criminal liability. Credit card numbers lost because someone you did business with was hacked isn't something you can protect against.

Comment: Re: So which building will they blow up? (Score 1) 300

I know that various different tyrants have claimed that to be true. That doesn't mean it ever was true. Politicians have always been liars. Dracula had it said about his kingdom, too, and there was a Persian Emperor who claimed that a virgin with a bag of gold could walk the entire lenght of the silk route unmolested. I never heard of one that tried.

Comment: Re:cis and mi regulation is not "bad" code (Score 1) 10

by HiThere (#48638381) Attached to: Machine Learning Reveals Genetic Controls

I thought that was what histones were for. DNA that's wrapped can't be read, so you control what is wrapped to decide what is available for expression. And epigenetic tags freeze or thaw the wrapping. This requires sections of DNA that function as labels, but it doesn't directly control the folding (more accurately rolling into a cylinder) that's handled by the histones, and when they decide to roll it up is decided by what tags are attached to the labels.

Comment: Re:Makes Sense (Score 1) 180

by HiThere (#48628347) Attached to: US Links North Korea To Sony Hacking

Threats are cheap. Is there even any evidence they come from the same source as the original hack? (Mind you, I have no idea who did it, and don't believe anything the government says anymore unless they have verifyable evidence to prove it.)

Now once someone *acts* on one of those threats, then there will be more belief that it was done with someone with either excessive zeal or lots of backing. Right now even that's lacking. Threats on the internet are so common that they've *got* to be ignored, even though that's frequently difficult.

Comment: Re:Are You Joking? (Score 1) 180

by HiThere (#48628281) Attached to: US Links North Korea To Sony Hacking

They didn't purposely deceive people, because they didn't care whether it was true or not. If that had known their claims were false, that would have been purposeful deception. However they didn't care whether the claims were true or false, but only that they were useful That's probably a bit worse than intentional deception.

Comment: Re:with what? (Score 1) 180

by HiThere (#48628257) Attached to: US Links North Korea To Sony Hacking

What you have demonstrated is that there is no politically acceptable proof, not that it didn't happen, and not that the document did not match something from the NSA database.

I haven't followed this, so I don't really have an opinion one way or the other, but what you have provided does not constitute proof that it was a hoax.

Comment: Re:Bad for small business owners (Score 1) 389

by Anne Thwacks (#48624383) Attached to: Google Proposes To Warn People About Non-SSL Web Sites
If SSL was an inconvenience to the TLA's, this would not be happening.

The boy-who-cried-wolf is the problem here. That story is at least 10,000 years old, and Google still have not got the message.

Perhaps Cartoon Network is not encrypted, so they have not watched it?

Comment: Re:503 (Score 1) 389

by Anne Thwacks (#48624321) Attached to: Google Proposes To Warn People About Non-SSL Web Sites
Why do we need security to view academic articles, adverts or mindless blather? Most people have no need of locking their rubbish bin (and most of what is on the internet is definitley rubbish - I have looked :-) There really are people who use the internet for other things than shopping!

There is every reason to have security for some things, but none for others.

Why force it on people? The result of this will be huge numbers of badly configured systems, and either over confidence or total loss of confidence in SSL.

Comment: Re:Go ahead (Score 1) 378

by HiThere (#48621121) Attached to: Sony Leaks Reveal Hollywood Is Trying To Break DNS

It ought to be possible to design an alternative based on interpersonal recommendation. But what do you use for a unique identifier? You need something. Phone number has possibilities, but that, too, is subject to centralized control, AND it identifies the individual, which effectively removes anonymity.

The problem is, you need SOME unique identifier, or nobody can find you to deliver the messages/webpages/etc. I can imagine a hierarchy of geographically based names with the lower level assigned on a collision avoidance kind of approach, which would allow anonymity to the lowest geographical level, say 1024 square kilometers on the average. But you need to remember all the id's you've used, and when you move there would be no way to carry your id (unless the system has some built in way of automatically forwarding calls, which has its own problems).

"It's ten o'clock... Do you know where your AI programs are?" -- Peter Oakley