Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:What an idiot (Score 4, Interesting) 180

by grnbrg (#48877875) Attached to: Silk Road Journal Found On Ulbricht's Laptop: "Everyone Knows Too Much"

Apparently he was arrested (in public) at a library, and the techs who got the laptop knew what they were doing...

It was logged in, and they spend several hours copying data without letting it sleep or lock.

Full disk encryption is great, but assumes that you won't have unlocked it for the attacker.

Comment: Re:In Canada it is legal to download and rip movie (Score 1) 172

> In Canada, once you have paid for a license of a movie, it is legal to rip it from a physical copy, or download a digital copy.

The problem being, is that it is still illegal to upload that digital copy. And bittorrent is peer-to-peer, which means unless you have specifically configured your client to *not* *share* with other members of the swarm, you are uploading.

Where do you think the notice companies get your IP address? You sent them a piece of whatever content they're complaining about.

Comment: Re:As a Market Lover (Score 0) 107

by grnbrg (#48572515) Attached to: Microsoft Quietly Starts Accepting Bitcoin As Payment Method

The creation itself seems troubled with the possibility of fraud.

Do some reading. Bitcoin is absolutely uncounterfeitable.

Unfortunately, there have been more than a few fraudulent exchanges, which has more to do with the involvement of amateurs than anything else. The marketplace is improving fast.

Comment: Re:Restating the obvious... (Score 2) 388

by grnbrg (#48315139) Attached to: Another Election, Another Slew of Voting Machine Glitches

There have been multiple places where the total paper ballots cast exceeded the number of eligible voters. Paper changes the fraud, but does *nothing* to stop it.

Stuffing a ballot box with fraudulent paper ballots is risky, and relies on many people to be effective in multiple polling locations.

Falsifying electronic records requires a few people at a strategic points, and can be impossible to detect.

Comment: Re:How did people not notice this early? (Score 3, Informative) 101

by grnbrg (#47630721) Attached to: Network Hijacker Steals $83,000 In Bitcoin

I got hit April 25th with this. I noticed within an hour, and it took me about an hour to determine that my connection to the pool had been spoofed, and my miners redirected to the attackers pool. I had no idea at the time *how* it was done.

My mining software was a couple of months old at the time, and the latest version would ignore such redirect requests. I updated and continued on, having lost maybe 2 hours of mining.

The redirect comes from that fact that the "Stratum" protocol used by many minors to request work from the pools was originally designed as a wallet to blockchain server protocol. Under that use case, it makes sense that the server might suggest to a (wallet) client that they use another server.

Comment: Re:Except, of course, they have to prove you can (Score 1) 560

by grnbrg (#47334963) Attached to: Mass. Supreme Court Says Defendant Can Be Compelled To Decrypt Data

There is a hierarchy of trustworthiness with the judge at the top, and the dirty criminal at the bottom. Anything the police say will be believed over what you (the dirty criminal, otherwise why would you be arrested) say. Lawyers are above the police in that hierarchy.

Comment: Shamir's Secret Sharing and Encryption. (Score 2) 208

by grnbrg (#47274899) Attached to: Ask Slashdot: How To Bequeath Sensitive Information?

Pick a nice, long, secure passphrase. Use it to secure a GPG keypair. Back up this keypair in multiple locations, and with multiple people who know "This is the key that encrypts all of my digital stuff. My family will need it when I die.".

Use that keypair to encrypt all of your important passwords and data. Back up the encrypted files in multiple locations. Make sure your family knows where these locations are, and why thy and the files they contain are important.

Download a copy of . Load the saved copy (preferably in an offline PC) in a browser, and use it to convert your passphrase into several N of M parts. ie: Create 10 parts, and require at least 6 to reconstruct the passphrase.

Use something like (or any other generator) to create QR codes for the 10 secret shares. Laser print the text share, QR code and some instructions onto a business card sized piece of paper, and have them laminated.

You now have 10 waterproof, hard to damage cards, any 6 of which will unlock your digital data. Distribute them to trusted parties and locations with instructions to use the shares once they hear and confirm your death. These parties don't have to be literate enough to merge and decrypt the data themselves, they just need to know that it is possible with their share. On your death, they will arrange to bring the shares and data together, and even if they have to hire a nerd to help them, they will unlock what they need.

Comment: Re:Ban them everywhere! (Score 1) 376

by grnbrg (#47207315) Attached to: Theater Chain Bans Google Glass

Alamo Drafthouse is banning them, and I doubt they care at all about the piracy thing - they ban talking and any sort of device use or distracting behavior flat out. People go there to watch the movie, if you want to play with your electronics instead, there are plenty of other places to go.

And from what I've read, if they catch you using your electronics, they'll help you get started finding those other places by escorting you to the parking lot. :)

To err is human -- to blame it on a computer is even more so.