Forgot your password?
typodupeerror

Comment: Re:Trademark Concerns Over altslashdot.org (Score 1) 19

by cykros (#46225569) Attached to: A Modest Proposal, re: Beta vs. Classic

While I'm wary of anything with "slash" in the name for TM issues, if it were considered kosher to do so, I'd rather see "backslash.org", if only because the backslash character is used in a variety of languages as a comment character, and naturally, commentary is what makes slashdot tick in the first place.

That it sounds quite a bit like "backlash" doesn't hurt either.

+ - A Modest Proposal, re: Beta vs. Classic 19

Submitted by unitron
unitron (5733) writes "Dice wants to make money off of what they paid for--the Slashdot name--, or rather they want to make more money off of it than they are making now, and they think the best way to do that is to turn it into SlashingtonPost.

They should take this site and give it a new name. Or get Malda to let them use "Chips & Dips".

Leave everything else intact, archives, user ID database, everything except the name.

Then use the Beta code and start a new site and give it the slashdot.org name, and they can have what they want without the embarrassment of having the current userbase escape from the basement or the attic and offend the sensibilities of the yuppies or hipsters or metrosexuals or whoever it is that they really want for an "audience"."

Comment: Re:Anyone in politics should absoutely love this! (Score 3, Informative) 233

by cykros (#45461309) Attached to: US Government Embraces Bitcoin in Hearing on Virtual Currency

A transaction history isn't as useful as it necessarily sounds. I use a $20 to buy scratch tickets at a convenience store, someone else cashes in their tickets, ends up with my $20, and then subsequently uses it to buy crack in a sting operation, and they see that I was formerly in possession of that $20. So? At most, the concern here is that it may get you some unwanted attention, but it's hardly solid evidence if you have the thought to just move it between a wallets on tor exit nodes. Not to mention that "Satoshi Square Meetups" happen in a variety of cities around the world, where people meet in person to relatively anonymously buy and sell bitcoin without going through an exchange at all.

So yes, bitcoin is quite traceable. That doesn't necessarily mean it can't be used as a method of exchange with fairly solid privacy when that is one's planned for goal.

Comment: Re:When is the government actually right? Ever? (Score 5, Informative) 233

by cykros (#45461283) Attached to: US Government Embraces Bitcoin in Hearing on Virtual Currency

The exchanges I know of thus far provide no shorts yet, but Kraken has the code laid for it (they're brand new and are waiting for volume to increase before they add that along with some other advanced trade options). And yes, this would add market stability, which is part of the reason they're adding it.

Unfortunately, they're only available in a few states as of yet. The regulations in the US that apply to them unfortunately are on a state by state basis, and have significantly slowed the rollout of the exchange (unlike some of the prior exchanges that's gone up, they're A) operating in the US and B) being now scrutinized enough to really need to be fully compliant).

Comment: Re:Translation (Score 1) 233

by cykros (#45461271) Attached to: US Government Embraces Bitcoin in Hearing on Virtual Currency

Hey, look, you found a better use for the NSA's facilities. Embrace a more technologically sound method of easily moving money around (if not a stable currency) while in the meantime save face by shutting down the NSA's current agenda while replacing it with something far more profitable in the first place (ooh, you could use all that money to go build NEW facilities with MORE op-sec in mind with TWICE the floorspace!). And provided you regulate the exchanges with KYC laws, the taxes are an added bonus.

That anyone was worried they'd be really cracking down on bitcoin after the events in the EU and China was a little amusing.

Comment: Re:Nice (Score 5, Interesting) 190

by cykros (#45441273) Attached to: Linux 3.13 Kernel To Bring Major Feature Improvements

Teenagers don't question authority, by and large. They yell, throw tantrums, stomp their feet, and make a lot of noise, and then once that angst is out of their system, they promptly tend to get to doing whatever it is that the authorities have told them they should do to "get ahead".

In any case, it's not about authority here...the real issue is that to most teenagers, or most people in general, a computer is merely an entertainment device, rather than a powerful tool that can be tailored to one's own needs. It doesn't matter how easy the latest user-friendly scripting language gets, "programming" remains something they envision as involving binary and machine code, purely there for autistic folks and aliens.

What we really need is to integrate programming of SOME kind into the general curriculum of our schoolchildren. And for Christ's sake, leave enough holes open on the local school network for kids to have fun learning to poke holes in the restrictive environment you've set them up in. The classes teach them HOW to do things, and the rebelliousness of getting around the restrictions gets them interested in doing them (and then the combination of heavy handed laws and bug bounty programs bring them back into societal correctness once they enter adulthood...hopefully).

The absolute LAST thing kids need is a user friendly interface. Save those for grandma, give the kid a raspberry pi, a book on Python, and then put them up behind a firewall that blocks most anything their friends will be wasting their time with. Not because you want to keep the kid OFF of such sites, but to make them at least learn a thing or two from time to time in their attempts to waste time in an otherwise purely wasteful manner.

Comment: Daemon (Score 1) 18

by cykros (#45410289) Attached to: The Operations of a Cyber Arms Dealer

I'm sure it's actually a set of logic trees so elaborately woven together as to monitor the news and manipulate people into carrying out it's programmed goals, put in place by a disgruntled brain cancer ridden game developer, coordinating these "cyber arms dealer" groups. Naturally, bitcoins are the darknet credits...

Comment: Tahoe-LAFS (Score 1) 200

by cykros (#45322875) Attached to: Ask Slashdot: Which Encrypted Cloud Storage Provider?

Tahoe-LAFS (https://tahoe-lafs.org/trac/tahoe-lafs) may be exactly what you're looking for. Redundancy, privacy, AND it's DIY. Grab a few VPS's (and perhaps an actual box your control or two), and have your own encrypted, private cloud.

With how cheap VPS's are getting, this may very well be your best option.

Failing that, use Truecrypt inside a Dropbox or and go nuts.

Comment: Re:Where are you located? (Score 1) 410

by cykros (#44531855) Attached to: Ask Slashdot: Recommendations For Non-US Based Email Providers?

If you use encryption anywhere , it will be stored indefinitely until a time comes and there is sufficient computing horsepower to decode it.

So, this is true, and is perhaps a major problem for some (though it's worth noting that most things the average person has that are sensitive enough to require strong encryption have a time period after which they're no longer that sensitive). The technically feasible, though slow, and perhaps difficult, solution is to use One Time Pad cryptography. When used correctly, it is mathematically unbreakable, as instead of using an algorithm at all, it uses an absolutely random one time use key. Brute forcing at that point becomes entirely impossible, as any message of a given length could be literally ANY other message of that length (or, if you're combining some other form of crypto or simply padding, even the length may be wrong). It's what sleeper cells have long used (if you're not familiar, do yourself a favor and google "number stations" for some interesting reading).

The big inconvenience with OTP crypto is that it is symmetric. You need to preshare the keys with anyone you're communicating with (and to boot, each key is only to be used for a single message, and then destroyed). So it's not really being posed as a general solution to the situation we find ourselves facing, but at the same time, seems like it may have SOME use, and is worth spreading awareness about. Just don't half-ass the key generation using rand() or anything equally foolish.

Comment: Re:I do it! (Score 1) 505

by cykros (#42746813) Attached to: Free Wi-Fi: the Movement To Give Away Your Internet For the Good of Humanity

Heh, you're nicer than I would be. Replace all image requests with Goatse and Meatspin, and maybe ALSO upside-down-ternet, just for good measure. This would actually be quite amusing to set up on a honeypot router with WEP or WPS pin authentication enabled, just to let the would-be intruder know that they just got fooled :-P.

Comment: Re:If you have a smarter router (Score 1) 505

by cykros (#42746729) Attached to: Free Wi-Fi: the Movement To Give Away Your Internet For the Good of Humanity

Most home routers with default firmware handle some degree of QoS. It might be worth looking into on your router.

And sorry to hear about your woes with DD-WRT. It can be a bit of a navigational hazard to figure out how to do exactly what with your specific hardware, but proved worth it in my case anyway. Best of luck in the future.

Comment: Re:If you have a smarter router (Score 1) 505

by cykros (#42746701) Attached to: Free Wi-Fi: the Movement To Give Away Your Internet For the Good of Humanity

I would think that anything that has iptables available would work for that. That would include DD-WRT, OpenWRT, Tomato, and a number of others. PFsense I'm sure can do it too, though I'm not familiar with the BSD equivalent of iptables (hell, they may use iptables...). For a great OpenWRT router for under $100, I can say my netgear WNDR3700v2 works wonders, and the usb port built into it makes for handy storage space for installing various programs on the router (I've seen out of date packages for snort and tor, which both seemed of interest. You'd obviously want to self-compile the up to date versions to bother deploying it though). In addition, this setup will also allow you to open a SPAN port, to throw up wireshark or tcpdump or snort, and do packet logging, which may prove VERY handy if you were to be running a Tor Exit node, or just allowing wifi through on it's own, as the logs being handed over (if you were to choose to do so) would be seen as cooperative, and likely look quite good in any possible legal proceedings that may develop.

Anyway, I'm beginning to rant. Point is, OpenWRT/DD-WRT are awesome.

There is no distinction between any AI program and some existent game.

Working...