Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment My bucket (of money) list (Score 1) 774

1. I'd pay the folks at the Genode project whatever it took to produce a live CD bootable image, and keep them doing it with every new release. (genode.org if you care)
2. I'd see if the silly idea I had in college for an FPGA replacement on steroids would actually work by designing the chip and having it fabbed... then fixing the bugs until it worked right. (bitgrid.blogspot.com if you care)
3. I'd redo the house, install enough solar to power everything, and build a laboratory with a machine shop.
4. I'd build my own locomotive to run out at the Heston Steam Museum (either diesel electric, or just electric)
4. I'd dig to the bottom of the cold fusion thing, and see if it really works.

Comment Secure devices, securely accessed (Score 1) 46

When they start making devices based on Genode, and can generate a Private/Public key pair for authentication by pushing a button, and share the public pair via a local web page... I'll be interested.

As long as these things are running some version of Linux, Windows or that ilk, they won't be secure, no matter how many updates and patches you apply vigorously.

Comment How about securing things correctly for a change? (Score 3, Insightful) 220

There are security models and systems perfected in the 1970s in response to the data processing needs of the air war in Viet Nam. There are commercially available systems which work for multilevel security. This model can be ported to the open source world, if enough people are interested. I'm waiting for the Genode project from Germany to get something I can use in the next few years, and I hope there will be others.

I hereby suggest we just eliminate the possibility of a cyber-war, instead of getting stuck in an arms race.

Comment Only idiots trust computers that trust programs (Score 1) 77

If your operating system isn't smart enough to require a list of resources to feed a program you want it to run, you lose.

If you built your entire civilization on such a stupid foundation, you lose.

Anyone smarter than that can wipe you off the face of the earth, unless you can survive long enough to correct your deeply embedded mistake.

Comment The technical problem was solved 40 years ago (Score 3, Insightful) 36

The information processing need to handle both classified and top secret data in the same computer system in order to direct air traffic for the Vietnam war resulted in honest-to-goodness multilevel secure systems in the early 1970s. The Rainbow books tell you how it's done.

The reason we're all mired in shit these days is that nobody believed multilevel security was something normal computers used. Unix was named as a joke to mock Multics, which aspired to have multi-level security (and did in the end, if I recall correctly).

If your OS doesn't ask for a list of resources to use to execute a program, it isn't secure. MacOS, Linux, Windows don't... the only thing I know of coming down the pike is the Genode project from Germany.

Comment It's all about the Insurance Profits (Score 1) 191

When you have middlemen (Insurance Companies) and administrations working to maximize profit, all being paid by the procedure... the quality of each procedure is far less important that the quantity. We need to put health back in the drivers seat as the #1 priority... which isn't going to happen until we Nationalize health care... even then it's not guaranteed to happen.

Comment See Also: The Adolescence of P1 (Score 1) 227

There is an old story, set in the days of mainframes about a programmer who hacks together a small AI to steal time on mainframes, which eventually becomes self-aware. It was plausible enough back then, I'll be surprised it it doesn't happen by random chance in the next 10 years.

It is widely acknowledged that no system is secure, if an advanced persistent threat has made it a target.... and an AI could be that threat, imagine a bot-net specifically trying to spread itself out like an algal bloom across all the systems on the internet, getting smarter as it goes.

*(&YTUEWTYW+++^NO CARRIER

Comment Wrong data structure (Score 1) 70

They need to fork Wikipedia, and add some directed tree flags to it. Skill META can be considered to belong to multiple parent categories, and has multiple meanings because of the vagaries of language META.

Any attempt to shoe-horn this into a tree is going to fail. Oh... and their search function is dead.

Comment Re:No big issue (Score 1) 146

The recurrent weakness in US military thinking (and procuring) is that small numbers of fancy, high tech stuff can beat large numbers of low tech things.

This is also the same reason the Nazis tanks lost their battle against he Russians... most of them failed due to mechanical problems, only a smaller amount of them were destroyed in combat. One might almost think that all those scientists from Project Paperclip infected us with the need to do fancy things.

When a fellow says, "It ain't the money but the principle of the thing," it's the money. -- Kim Hubbard

Working...