Forgot your password?

Comment: Filter bubble (Score 4, Interesting) 130

by drolli (#47344179) Attached to: In 2012, Facebook Altered Content To Tweak Readers' Emotions

What actually disturbs me more is: why should they do this? The answer is simple: They want to determine the most effective non-obvious way of creating filter bubbles to make the user feel well and stay longer.

It is so-to say a "second order filter bubble", i.e. the use of a positive feedback mechanism.

Comment: Re:AWS Email (Score 1) 75

It is fine that they introduced it. It protects against very specific things:

a) S3 data in there to stay, probably for many decades. To me it is a difference if all S3 data is unencrypted if there is a bug in the system at some point, or a new insitutional requirement in the future, or just the data which is accessed during the unfixed bug or after the change in laws.

b) One more layer of safety is never bad. You can use this to transport the key safely to the system of the user and the rest of the requests via normal html.

Comment: Re:Good luck with that (Score 1) 155

by drolli (#47189615) Attached to: Millions of Smart TVs Vulnerable To 'Red Button' Attack

Slashdot comments dominated by software guys. I can tell you, with the *right* (semi-expensive ~ 10k) equipment, the hardware part of this is fairly trivial. (lets say 1h)

Police and secret services use IMSI catchers and trojan-based attacks on a large scale, so why should they not set up a DVB base station for an attack on a specific target (nevertheless infecting 1 Mio of devices in the target area).

Large-scale phishing attacks could get *much* easier. Imagine a News channel which broadcasts a warning about credit card fraud with a contact number to call.

Imagine a finance stock market TV which broadcasts a sudden warning about a stock on which you placed your bets before.

Criminal easily spend 10000s of $ for bullet-proof hosting, so buying DVB Test devices and applications from Agilent could even reduce their costs. If you earn enoung money with it, it pays off.

Everything which worked via spam now can be done without any chance of blocking it. I am fascinated by the idea that a semi-modern device would accept anything withou authentication. (oh, i forgot, typing in a verification number would be *so inconvenient*, so it would hinder shoveling advertisements up into everybody's ass).

Comment: Re:Apple is no longer competitive... (Score 1) 114


Android development started a long time before the iphone was released. Taken into account the first target market for any mobile company back in that day (Japan), it seems indeed likely that there were *many* other devices which influenced the design of samsungs mobile phones. (Most notably the huge amount of PIM devices in japan like the Sony Clie Series).

What indeed was manifested by the Iphone is that even mobile phones should not be designed as PIM devices but as media players (thus the loss of buttons makes sense).

Comment: A complicated thing. (Score 2) 334

What really worries me about this is that such a thing cant be enforced or checked without decrypting all my storage, how unrelated it may be.

I find that court rulings should have the property of being enforcable without confiscating all of my stuff if i am not guilty (or accused) of any crime.

Comment: I am 39 (Score 1) 232

by drolli (#47024459) Attached to: Programmers: It's OK To Grow Up

My advice is: train your analytic skills and understand where thing go right, wrong, or just different. This can only be done by experience. While i learn programming languages slower than with 25, i learned to analyze code. Having seen code written by many very different people (everything from physics professors to psychologists), i understand the idea of most code better than the authors (since i see the limitations the author is placed under). If you apply your analytic experience and skills to the problem, you will be welcome to any team.

Live within your income, even if you have to borrow to do so. -- Josh Billings