Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Hashes not useful (Score 1) 288

by fph il quozientatore (#49157959) Attached to: Ask Slashdot: How Does One Verify Hard Drive Firmware?

MAybe HDD manufacturers should ship a hash in print along with their drives which can be then tallied with the one on the website .. they cant hack every hard disk shrinkwrap can they ?

At this point, they could simply ship their public key in print and sign all present and future versions.

Comment: Re:iPad too fucking expensive (Score 1) 139

Personally, I give much importance to the presence of a physical keyboard. Keyboards are what makes the students able to create original content and tinker with a device. They make the difference between a machine that you can use to write essays, program, communicate... and a device that is only able to play Angry Birds and send short KTHXBYE messages on Whatsapp.

Comment: Re:Strong Thunderbird? (Score 1) 296

by fph il quozientatore (#49001387) Attached to: Firefox Succeeded In Its Goal -- But What's Next?
At a past institution where I still have an e-mail address, they have recently moved their mail infrastructure to Gmail "business" services. The sysadmins now advise against using Thunderbird because it uses "outdated security practices" (my interpretation: it does not support two-factor authentication). Of course, Google is very happy with that (online client = yay more ads).

Comment: With whom do you entrust your METAdata? (Score 2) 178

by fph il quozientatore (#49001347) Attached to: Ask Slashdot: With Whom Do You Entrust Your Long Term Data?
As many have said, this is a non-problem if you use encryption. A more actual problem is: who do you choose to give your METAdata? If you have Dropbox permanently running on your pc, encrypted or not, they get to know when you are logged on your PC and where you are. Similarly for your mail provider and your instant messaging/VOIP provider. Hell, your NTP server of choice could probably log your location by geolocating your IP address and fingerprinting your NTP request.

Simplicity does not precede complexity, but follows it.