Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment: Who controls the software? (Score 1) 105

by gmuslera (#48667793) Attached to: How Laws Restricting Tech Actually Expose Us To Greater Harm

Thats the start of the problem. People control the software. Like with guns, is people that is the one that kills, abuse, take advantage or use it for their own ends, giving them more tools to control our life is letting not only the saint, pure and morally perfect and responsible ones to do so, but all of them, at all levels. People is not perfect, either the one that decides what the software should do, the ones that actually does that, or the ones that in the end have the capabilities to control them, and in that way, you. You know how police can behave already, give them and people in higher more control, and that won't stop them to misbehave, just give them new ways to do it, with more broad impact and the possibility of doing it without consequences nor leaving a trace.

And if not bad enough the people with their own interests, biases and corruption in the "right" side of the controlling that software, it is not perfect, and you have vulnerabilities, design faults, leaks and plain idiocy at the hour of deciding who can control that software that could let not authorized people to do that control too. And they can do pretty bad misuses too.

And you are in the center of it, not knowing, not having a warning, not having any possibility of control, In some moment shit will happen because of this and you will be dead, without savings or property, working as a slave or maybe worse consequences. And maybe, not even realizing that all of that already happened.

Comment: Wolf in sheep clothes (Score 1) 320

by gmuslera (#48663793) Attached to: Ars: Final Hobbit Movie Is 'Soulless End' To 'Flawed' Trilogy

The original story was a books for childs that started with "In a hole in the ground there lived a hobbit" and kept being childish most of the way. This movie? "Die Hard: Dwarfs edition", deserving a PG-13 or R rating for violence and mass slaughtering. It was like watching the porn version of Cindirella. The basic elements were there, but is not the same.

Anyway, may worth to see the CGI work.

Comment: Fuel (Score 1) 222

by gmuslera (#48605115) Attached to: Linking Drought and Climate Change: Difficult To Do
In the other hand, what can't be denied is that global warming provides more energy to the climate system. And in a system so complex that is the root of the butterfly effect concept adding more fuel will affect it, maybe even in ways that we didn't realized yet. And with a civilization that is rooted in stable and predictable climates (agriculture depends on that) it will hit us pretty hard in all those ways.

Comment: Re:"Expected" to release methane (Score 4, Informative) 329

by gmuslera (#48563069) Attached to: Warmer Pacific Ocean Could Release Millions of Tons of Methane
Is the sort of things that happens with very complex and interrelated systems. We make models, and sometimes don't know how many factors plays in or the importance of some of them. But impredictability is something that should scare you more than dismiss this as a potential danger. If a big possitive feedback mechanism is not yet discovered or understood for global warming (a bit like this big methane release, but maybe worse/faster/whatever) once global climate hit a critical point, things can go wrong very fast, very global, and in a very irrevocable way.

Comment: Re:This actually sounds pretty cool. (Score 1) 149

by gmuslera (#48561429) Attached to: Ubuntu Gets Container-Friendly "Snappy" Core

Docker is not just containers, but image/container fs management is a key element too. Union fs with copy-on-write makes a big difference against traditional containers. And the image ecosystem, the easy creation with dockerfiles and a good api/powerful cmdline command are pretty important elements too.

Other containers technologies could learn/adapt that other docker ideas, and even VMs could get a bit closer to them. No matter if Docker is the dominant implementation there in the future or not, with those core ideas we all will win.

+ - Ubuntu Gets Container Friendly "Snappy" Core ->

Submitted by judgecorp
judgecorp (778838) writes "Canonical just announced a new Ubuntu Core which uses containers instead of packages. It's the biggest Ubuntu shakeup for 20 years, says Canonical's Mark Shuttleworth, and is based on a tiny core, which will run Docker and other container technology better, quicker and with greater security than other Linuxes. Delivered as alpha code today, it's going to become a supported product, designed to compete with both CoreOS and Red Hat Atomic, the two leading container-friendly Linux approaches. Shuttleworth says it came about because Canonical found it had solved the "cloud" problems (delivering and updating apps and keeping security) by accident — in its work on a mobile version of Ubuntu"
Link to Original Source

+ - CIA Lied Over Brutal Interrogations

Submitted by mrspoonsi
mrspoonsi (2955715) writes "The CIA carried out "brutal" interrogations of terror suspects in the years after the 9/11 attacks on the US, a US Senate report has said. The summary of the Senate Intelligence Committee report said the CIA misled Americans on the effectiveness of "enhanced interrogation". The interrogation was poorly managed and unreliable, the report said. President Obama has previously said that in his view the techniques amounted to torture. The Senate committee's report runs to more than 6,000 pages, drawing on huge quantities of evidence, but it remains classified and only a 480-page summary is being released. Publication had been delayed amid disagreements in Washington over what should be made public."

Comment: Bluetooth 4.2? (Score 1) 47

by gmuslera (#48553755) Attached to: Bluetooth Gains Direct Internet Access, Security Enhancements

You misspelled Backdoor. We know how riddled with backdoors, default/fixed passwords, vulnerabilities that never gets fixed and so on are typical consumer embedded devices. And we know how pushy are governments forcing manufacturers to include their backdoors, or to use weak encryption standards, to make them hackeable at will (even assuming good will of the main/components manufacturers, that are not all saints).

What possibly could go wrong?

Only through hard work and perseverance can one truly suffer.