Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Re:Alarming Freedom (Score 1) 278 278

Research the topic "how do cloud formation affect global warming".

Is it a fact we understand the impact of cloud formation on global warming?

Read what NASA thinks about it? http://isccp.giss.nasa.gov/rol...

Here is an excerpt: "Right now, we do not know how important the cloud-radiative or cloud-precipitation effects are and can not predict possible climate changes accurately."

My point is not diminish the concern of global warming, but to make the point that when we start talking about science in absolutes, we start to sound like religous fanatics, rather than rational and objective.

Comment: Windws 8.1 login not designed for security (Score 1) 58 58

The default login for Windows 8.1 is your Microsoft email / cloud account and password. So anyone watching you type in your password has access to your cloud account.

I don't understand why Microsoft is not given more flack for this decision.

Your alternatives is to not use their cloud, or use 4 digit PIN or a series of screen swipes, but they don't support a local password. If you understand how to set it up, you can supplement the PIN/swipe with a USB key, but it is not a visable user option and you have to understand what your doing.

Comment: Re:Plenty. (Score 1) 1168 1168

The Bible is our only significant source of information we have of Jesus, and so if you are saying the Bible is not true, that is a reasonable viewpoint, but if you are saying that you have some other source that says Jesus was trying to say something different or that the Bible was significantly distorted; what is that source?

That the details differ on different accounts of what happened after the resurection, I don't see as a test of anything. I can see the differences explained many different ways, and even the oppositie of what you are trying to imply, you could say they appear more authentic since they are not exact copies, or you could say they took different accounts, or they were trying to emphasize different themes, or a bunch of myths assembled seperately.

If you are trying to argue that Jesus was doing what many of the other Jews at the time were doing, it sounds like that is just a guess, and you have no evidence for what you are asserting. Or if you are not just guessing, what is the evidence?

Comment: Re:Not so. (Score 1) 1168 1168

The Bible itself says that Jesus was referring to his body when he said he would raid the temple in three days.

19Jesus answered them, “Destroy this temple, and I will raise it again in three days.”
20They replied, “It has taken forty-six years to build this temple, and you are going to raise it in three days?” 21But the temple he had spoken of was his body.
22After he was raised from the dead, his disciples recalled what he had said. Then they believed the scripture and the words that Jesus had spoken.

What inside information does Reza Asian have that the Bible is wrong?

Comment: Case of government being overzelous? (Score 3, Interesting) 68 68

There was a total of only $50,000 in transactions that were in violation, and from the article it appears that Paypal failure was that their screening system did not work very well, but they eventually fixed it. Should that warrant $7,000,000 fine? It seems excessive to me.

Comment: Re:Are the CAs that do this revoked? (Score 1) 139 139

If the self signed idea is combined with trust authorities (not signers), that verifiy this certificate is actually a valid one, and is say verified to be valid by several trust authorities (e.g. Google, Microsoft, Ubuntu, US.gov, etc) who you do have certificates for then I think it is a good alternative or supplemental approach to what we currently have.

Comment: Re:Are the CAs that do this revoked? (Score 1) 139 139

I think the idea is on the right track, and that properly implemented could simplify life for everyone, including your Grandma. A good authentication standard, akin to SSL, so that we all only had to carry and manage one key manager, for all of the the items we secure: house, car, hotel room, bank account, web site, safe. No more remembering or coming up with passwords. One method to interface and manage authentication.

Comment: Re:Are the CAs that do this revoked? (Score 1) 139 139

I second this, and add that we should start using trusted authorities to get, verify, and monitor all of the self signed public certificates, similar to how PGP works. We generally trust a few reputable companies and organizations and so these entities could setup the registries for the self signed certificates, and could monitor and establish mechanisms for generating creditibilty ratings for certificates. They can monitor for complaints, fraud, abuse, impersonations, etc. Your browser and operating system (which you already trust) would have a base line list of entities to establish the reliability of a given certificate, and you could modify that list if it suited you.

Along with your 2 way authentication proposal, establish an authentication protocol with acceptance level similar to SSL that allows the authentication to be done securely between key manager on the client side (away from any trojans or keyloggers) and a user/key database on the server side (away from any hackers). This way way we can keep the most sensitive information (the keys), in a simple isolated device or server, that does one thing, manage keys, thus drastically reducing risk of being compromised. Also, a well established authentication protocol standard, is needed if we want to rid ourselves of using passwords (not just for browsers, but also applications).

Comment: Re:Careful, they might shoot back (Score 1) 336 336

The Islamic state is the antithesis of libertarianism. The Islamic state wants extreme control over an indivduals behavior, which directly conflicts with the libertarian philosophy of maximizing individual freedom.

I think what you are trying to say is that a society without laws and strong government (a perfect libertarian society?) allows for extreme groups to rise and take over. So maybe you should have said "What happens in a perfect libertarian society. Rand Paul eat your heart out!". However that would be very misleading, because Rand Paul is a strong believer in the constitution and does not beleive in a lawless society.

Comment: Re:Hardware is trusted (Score 1) 83 83

Or make the bios completely independant of the operating system, where it runs in its own flash and memory so that it can update itself, but can not be updated by an external component. Do the same for the kernel, security key and password manager, and virus protection. Trully isolate the sensitive components in the system.

Comment: Re:But We Didn't (Score 1) 341 341

It was not comic book reading politicians that participated in the decision to test near civilians, but the actual scientists who understood nuclear physics better than anyone else int the world:
http://en.wikipedia.org/wiki/T...

The idea of testing the implosion device was brought up in discussions at Los Alamos in January 1944, and attracted enough support for Oppenheimer to approach Groves.

Comment: Re:Need a Hardware Wall (Score 1) 549 549

A secure device solution is what I want too, but before it can be effective, an open standard for authentication needs to be established. An open authentication standard that allows authentication to be securily proxied to the dedicated security device (or whatever security manager you want to use). Without a secure authentication protocol, the authentication material will still be vulnerable to a corrupt application getting at the authentication material.

You could go as far as proxying the entire secure connection through the security device, but I would still securily tunnel the authentication protocol inside the encrypted TLS/SSL connection rather than combine them in a pure TLS/SSL solution for various reasons.

All the simple programs have been written.

Working...