Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Something seems off... (Score 4, Informative) 76

by jarkus4 (#47962719) Attached to: Researchers Propose a Revocable Identity-Based Encryption Scheme

from wiki (http://en.wikipedia.org/wiki/ID-based_encryption)

Identity-based systems allow any party to generate a public key from a known identity value such as an ASCII string. A trusted third party, called the Private Key Generator (PKG), generates the corresponding private keys. To operate, the PKG first publishes a master public key, and retains the corresponding master private key (referred to as master key). Given the master public key, any party can compute a public key corresponding to the identity ID by combining the master public key with the identity value. To obtain a corresponding private key, the party authorized to use the identity ID contacts the PKG, which uses the master private key to generate the private key for identity ID.

Comment: Re:Offline cracking (Score 1) 288

by jarkus4 (#46917307) Attached to: Applying Pavlovian Psychology to Password Management

How exactly does the attacker know the passwords expiration date?

How exactly WOULDN'T they? If the attacker is doing offline brute forcing of passwords, that means they've obtained at least a partial copy of the database for the site (since they have to have the hashes and salts), at which point it's probable that they would have also obtained the expiration dates linked to each password.

Expiration dates != expiration time of current password. If you assume some maximum password expiration time (lets say 3 months) then as long as user is registered for at lest that amount of time the password expiration date doesnt provide any useful information about it. Unless of course hacker gets multiple database snapshots from widely different days, but then the system is probably doomed anyway.

Comment: good in short, bad in long run (Score 1) 358

by jarkus4 (#46487131) Attached to: EU Votes For Universal Phone Charger

I think its quite good decision in short run, since it will kill all those weird connectors with no merit to them aside from being unique and driving charger sales for manufacturer. On the other hand in the long run its bad, since it actually hampers ("why bother if we have to put usb anyway") or even completely blocks some possible innovation (eg wirelessly charged waterproof phone with no external connections at all).
IMO the best course would be to keep this legislation for a several years (5-10) to get everyone to standardize and then repeal it. Given its EU though, I expect we are stuck with those connectors long after it will become completely obsolete...

+ - Bitcoin Price Drops as Mt. Gox Exchange Closes Indefinitely

Submitted by knightmad
knightmad (931578) writes "According to Business Week bitcoin plunged more more than 7 percent today after a major Tokyo-based exchange halted withdrawals of the digital currency.

Citing technical problems Mt. Gox said in a blog post that it needed to "temporarily pause on all withdrawal requests to obtain a clear technical view of the currency processes.""

Comment: Re:I would NOT second this (Score 1) 166

by jarkus4 (#43899441) Attached to: Ask Slashdot: How To Begin Simple Robotics As a Hobby?

about 2 and 3: get some normal programming language instead of provided blocks. When I played with it in college we were using some C API with it, so we pretty much had a normal language available. Obviously there were still API limitations on our hardware interfaces, but for normal calculations, delays etc we could do pretty much whatever we wanted (it was simple unix programing with some hardware api).

as for 1: yeah, number of in and out slots was always a bit of a problem. Still you can do quite a lot within those limits.

Comment: Re:Lego Mindstorms kit (Score 2) 166

by jarkus4 (#43899033) Attached to: Ask Slashdot: How To Begin Simple Robotics As a Hobby?

Ill second this: this is what we used in Introduction to Robotics course in my college.
During practicals we had to build and program robots to accomplish some moderately complex tasks on its own. It was great fun trying to program and work around hardware limitations in my teams robot - we overcomplicated it quite a bit and it turned out a bit inferior to its competitors. Still it gave me great impression of difference between controlling pure software stuff vs a real life hardware.

Comment: Re:That's nothing! (Score 1) 362

by jarkus4 (#41989287) Attached to: US Air Force Scraps ERP Project After $1 Billion Spent

2B figure relates to the total cost of program (including PR spendings and other stuff). .
On the other hand there is also some extra computer related costs:
"(...) $227 million in computer costs, including complicated application forms that slow processing times; and $332 million for other programming costs, including money to pay staff to process the forms (...)"

"We don't care. We don't have to. We're the Phone Company."