Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:How is it malware then? (Score 1) 79

Is doing good things, that's not malware.

If I walk into your house through the unlocked front door while you are not home, does it protect me from trespassing charges if while I am there I made your bed and did your dishes?

In that case, just because I can call you a tresspasser, doesn't mean it is proper to also call you a bed-messer-upper or a dish-dirtier.

Malware is software that harms you. This is not malware. No one said it wasn't an infection, or a virus if you prefer, because that it certainly is.

Comment Re:New Tab (Score 1) 410

I just don't understand the mentality.

It's just one more step in their grand master plan to remove all web browsing functionality from their web browser, announced back in April '15.

They already approved their decision to remove HTTP support from Firefox over the next year:

After which the new tab preference will be pretty unimportant in the overall scheme of things.
Although to be fair, they will force-expire that random guys plugin a few dozen times between now and then no doubt :P

Comment Re:So it's not unlimited, then... (Score 1) 346

Making the "Umlimited" plan only actually 100GB (before you get throttled like everybody else who goes over their limit; TMoUS never actually kills your data connection) would be pretty reasonable, I think

You know what would be more reasonable than making your Unlimited plan only actually 100GB?

Making your 100GB plan only actually 100GB, followed by one of either making your unlimited plan unlimited, or making your unlimited plan non-existent.

Comment Re:When The Lunatics Take Over The Asylum (Score 3, Insightful) 456

So the conditions are fake and the drugs don't work??

I'm curious.... how would you know if the drugs were working?

It's pretty simple.

Step 1) You remove her from all electromagnetic fields and see if her symptoms change.
Step 2) You put her back in electromagnetic fields and provide her with drugs in two different periods (One using real drugs, one using placebos) and see if her symptoms change accordingly.

Since no one even bothered with step 1 according to the article (There is still sunlight in that remote area she is living in so she is still exposed to EM fields much stronger than we can produce on earth) and they refuse step 2 outright, we can conclude she has no sensitivity to EM since clearly her symptoms change while still being influenced by the same fields the entire time.

She basically claimed similar to "I experience pain while living in a house with a front door, so I moved into another house without a front door (She says while standing in the front doorway) and my pain went away! Clearly removing the front door that I didn't remove means the door was the cause of my pain"

In that made up example we have the same evidence: The claimed cause of her problem was present in both cases so should have the exact same symptoms, yet her symptoms do change, so clearly the cause is something else.

Comment Re:Very sad - but let's get legislation in place N (Score 1) 706

This should create the head of steam required to get some legislation passed to make companies and specific executives SUFFER if they screw up their data security.

Why don't we just instead make cheating on your marriage partner punishable by death.
Clearly that will prevent any data leaks like this one from occurring in the future *sarcasm*

Comment Re:Somewhere PT Barnum is smiling (Score 1) 70

So you're storing your data in a doll, and you have to buy a doll for each game you play? And people are still willing to pay above retail for these dolls? Sounds like Nintendo's happy with the current model to me, and somewhere PT Barnum is smiling.

It's worse than that.

Many games now contain features or characters that you can only unlock by swiping the matching character Amibo.
Swipe the Mario Amibo and you unlock that skin or hat or track or whatever, swap the Link Amibo instead and you unlock a Zelda themed skin or track or whatever.

The Amibo read function is basically used as DLC. DLC the store can run out of... But anyway

So many people collect an entire themed set of Amibos to play each of the different unlockable DLCs in a given game.

Combined with the write function that is only underutilized for the moment (two games support it, not one as the summary states) you go from simple addition into multiplication.

DLC that they can run out of, plus only enough on-the-go storage for one games save data.

It's obviously going to be a win-win! *depressed sigh*

Comment Re:So... (Score 1) 39

The medicine I was on is called Citalopram (it used to be brand name Celexa), which after a few months I was at 40mg per day for almost 5 years.

I was 31 or 32 when I started taking it, and stopped taking it just a year ago or so. I'm 37 now.

The bulk of the effects took a week or so to kick in, but a bit longer to stop since they lower your dose over a period before stopping to avoid withdraw symptoms.

The only big difference I've noticed since I stopped taking it completely is depression kicking in more often and stronger than I remember, however I can't say for sure what (if anything) might be responsible for that.
I have been on other medications in that time for other things, and at the beginning I remember them trying a number of anti-anxiety medications for a couple months each before finding this one.
I've also been hospitalized and on medications for other unrelated things in that time (prior intestinal problems) so who really knows what single thing or combination of things may have caused that.
Or maybe life just legitimately sucks more now than almost a decade ago :}

Still, the more you know and all that.

I wish you good luck, and hope you end up finding the right balance of meds for your needs.

Comment Re:So... (Score 4, Informative) 39

... what's wrong with social anxiety?
Most people are assholes so it seems quite reasonable as a general attitude, doesn't it?

My problem with my social anxiety is that I can't choose who or when it gets applied to.

Even my close friends whom aren't assholes have had to put up with me "disappearing" for weeks or months on end during attacks, and while those friends are all pretty understanding of my problem it still has to be pretty hard on them as well as myself.

I've only so far found one medication that, sorta kind technically fixes the problem.
Mainly, while I don't feel anxiety while on it thus it technically works, I also don't feel anything else at all. No happiness, no sadness, no empathy, no looking forward to anything, etc.

While not under an attack I can see that given the choice between feeling only bad and feeling nothing, at least nothing is arguably better in that the bad is gone and nothing else changes.
But during an attack it's typically quite the battle convincing myself there is any point in living life without anything good to look forward to.

While CBT hasn't worked on me, I do hope this tech gets to the point to identify other treatments that would have a higher (or any) success rate.

Comment Re:Security (Score 4, Informative) 123

There are millions of ATMs and other embedded windows XP machines out there languishing as unsupported because they trusted Microsoft. Millions of ATM's and other embedded computer devices will be replaced not because they need to be, but because the operating system running them is no longer supported.

You are aware that Windows XP Embedded is still supported and receiving security patches to this very day, yes?

XP Embedded was released in November 2001 and extended support does not end until January 12th 2016.

In fact if you love living life further over the edge than just using XP, it is possible to hack up XP Pro to use XP Embedded security patches - though obviously even more at-your-own-risk than ever.

Comment Re:"Heat death"? (Score 1) 199

Ahh, now I see what you mean. Slight miscommunication I'm guessing.

The usual way it is phrased is referencing the death of the heat within the universe, not the death of the universe itself.

But from the point of view of the universe, I can see what you mean in that the universe itself will "die" from freezing. Especially compared to the alternative of a contracting universe's fate.

Of course even that follows previous thinking that the universe will remain alive and well after this time, and only the heat/energy within will be effectively dead.
But of course such thinking isn't even at the theory level for us yet, just some logical assumptions that should hold true given the options.

Or at least I personally am not willing to claim either option as a fact ;}

Comment Re:One time pad (Score 1) 128

A lot to reply to, and a lot of conflicting concepts even though you are essentially correct regarding each of them.

First, encryption alone isn't related to identification/anonymity. Those are two separate things each needing addressed.

In fact even with public key crypto, reverse encryption (aka signing) isn't required to use, but is the only method for true identification on top of the encryption.

For communications to be secured, only the requirement of 3rd parties being unable to read it is assumed. Identifying one or all parties (or not being able to) isn't typically addressed under the umbrella of encryption, so it isn't too surprising that point isn't addressed.

Second, while there is a race to the bottom so far as hardware (or even software) speed goes towards brute forcing any form of encryption, this has actually always been true (even before encryption!) and is just one of those details we "gloss over" in a high level discussion of the topic.

A method of encryption, mathematically speaking, is always a ratio of two numbers: How long it takes to encrypt/decrypt with the proper credentials, and how long it takes to brute force without the credentials (usually mean time, but mean and average can usually be provided)

The same is true for things like locks and safes/vaults. They have a rating of how much time would be required to brute force them, either in blowtorching the thing open or simply trying each combination if it is lacking any form of protection to slow that down - typically which ever method would be fastest.

In the case of encryption, let's take AES-128 as an example, it requires 2^126 operations to brute force (well, last I checked)
A Pentium Pro at 200 Mhz required something like 16 or 18 clock cycles per byte of data, which at that speed would have taken a couple billion years to reach mean brute force time.

Clearly our desktops today are much much faster than that, and Government super computers even more so, so the time needed for that many operations is greatly reduced - but still not zero.

NIST typically approves encryption methods that have at least a 20 year mean time to brute force, with the expectation that you have upgraded your encryption method long before that 20 year time is up, and that it isn't worth it to an attacker to hold on to 20 year old data to await the time they can brute force it faster.

Clearly those assumptions are not always true given projects like Tempora that you linked (and I assume most if not all super-power governments have something similar)
But that doesn't indicate a failing of the encryption, it only indicates the initial assumptions made when choosing a type of encryption failed.

It's more comparible to buying a water-resistant watch and then either taking it into the ocean while deep diving (failure of the user choosing the encryption), or perhaps being hit with an unexpected multi-day typhoon (failure forced upon the user)
In both cases that poor watch likely isn't going to hold up, and also in both cases the watch was never manufactured nor claimed to be able to in the given conditions.

Back on topic, it just indicates we are at a special point in time where a lot of our existing encryption methods won't last long enough for the uses we put to them, be it by ignorance of how and what the encryption actually was made to do, or in ignorance of the current state of technology being used against it.

Lastly, when it comes to "slipping up", there are of course many ways to do so (the old saying about trying to make something idiot proof produces better idiots comes to mind)

An encryption method is just a mathematical formula, and many are actual proofs, not just some guesses being made in how they operate.
However the software you use is different, it is an implementation of that encryption method.
If an implementation doesn't completely match the math proof (be it a bug, typo, or intentional backdoor) that isn't necessarily an indicator that the encryption method has any problems.
It's "just" a bug in software ("just" being quoted as I'm not intending to down-play the importance of making sure such bugs don't happen)

In practice there may not be much or any differences to the end user, but when it comes time to place blame and point fingers it very much matters that the actual problem is blamed.

Also in practice once it gets down to the point of many governments utilizing hundreds of billions to trillions of dollars of computing power, all against the thousands or perhaps a million dollars of computing power you have, there is only so much you can do so far as protection (of anything, let alone your communications!)

The idealized response is of course that everyone should have equal access to such resources.
Of course the reality is that will likely never be true (star trek replicator universe, you couldn't come fast enough!)

So far as I am aware, no one has made any encryption or other methods of protection when computing power is so unbalanced between adversaries.
So it is hardly surprising we the people have so little to no recourse against governments. Nothing we currently have has ever had that requirement in mind, and it seems like such a hard problem that even with that requirement firmly and/or solely in mind, no one has seemed to solve it.

Until that time however, it's best to just assume we are hopelessly out-gunned and act accordingly, even if that means not communicating our secrets (Not an answer one wants to hear specifically regarding "how to communicate security", but it's the only correct one)

Comment Re:"Heat death"? (Score 1) 199

Cold isn't a thing. Heat is a thing, a thing we call energy. Cold is just the lack of that heat/energy thing.

Upon the heat death of the universe, the lack of heat aka cold will be quite alive and well, and isn't going anywhere. In fact it will be all there is.

It is the heat aka energy that will be so diluted and evened out it may as well not exist anymore. Thus heat death.

Comment Re:One time pad (Score 1) 128

You still haven't answered the question to the problem at hand.

How do you securely exchange a one time pad in the first place, if all of your communications are being monitored?

That is the one and only thing public key crypto does. Nothing secret needs exchanged, and the only thing needing exchanged is perfectly fine to be public knowledge as it doesn't let an attacker do anything.
(Well, it would let the attacker send you an encrypted message that only you can read - but that's not a risk, that's precisely how encryption should work)

1: No code table for op: ++post