Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment How is Bitcoin different from Shell Companies? (Score 5, Insightful) 158

Oh yeah - bitcoins are used by individuals to hide their transactions from advertisers, malware vendors, and parasitic financial services companies, while networks of shell companies are reserved for our ruling elite to hide their transactions from the unwashed masses (and tax authorities)... Tell ya what, you make your public, and I'll make mine public...

Comment "comparing" video CODEC quality is very hard... (Score 5, Interesting) 110

I've played in this space in a former position. Interesting lessons learned:
- PSNR is nearly worthless: An image with almost the same score can look terrible. Not all the time, but enough of the time.
- The only quantitative test I found that worked reliably was an old analog Tektronix PQA500 (lots of work to use for digital CODEC.)
- Management didn't like the PQA data (it said our product was terrible), decided to use PSNR data (product is great!)
- Customers fixed this discrepancy and product line failed spectacularly (due to video quality, surprise!)
- I never could find any published information sufficient to recreate the Tek PQA algorithm.

Comment Re:But at the same time (Score 1) 21

As an engineer who has designed devices and seen them deployed at a few companies with strong encryption, role based access control, auditing, and documented the thread models the system does and does not defend against, I'd take some exception to the hyperbole of "on any device anywhere". That said, yes, most companies don't care, and those of us that do fight a continual uphill battle against people who want to make security weaker so the products are easier to use. That also said, as someone familiar both the CALEA as well as what happens when you're visited by people asking for back doors, those people are certainly NOT interested in reasonably manged, audited, or in any way limited back doors - its always 'give us unlimited unaudited access or...'

Comment Re:Don't evolve your business model (Score 1) 223

Exactly this. Unless the advertising industry can 100% guarantee safety or warrant and accept 100% liability for repair of systems infected by drive-by exploits, I'll block ads. And due to overly complex systems implemented by too many poor coders and poorly tested leading to a never ending stream of 0-day attacks, this won't end. Google is making noise about trying, but its too late...

Comment Isn't this already done? (Score 2) 608

Does anyone here not believe that every citizen and resident's religious, political, and social associations aren't already sitting in federal databases? This is part of what TIA https://en.wikipedia.org/wiki/..., Prism https://en.wikipedia.org/wiki/..., and many of the related programs were really created for...

Comment Re:Complete Deniability that data exists (Score 2) 324

Nobody has found any real crypto weaknesses in TrueCrypt to date, in public or in any of the private crypto groups I know of. This article claims that two TrueCrypt driver bugs expose systems to a privilege escalation attack, and these have been fixed in VeraCrypt: http://www.itworld.com/article...

Comment Re:Complete Deniability that data exists (Score 4, Informative) 324

TrueCrypt probably triggered their warrant canary and the dev team decided to call it quits, since NSLs are so much fun to fight for people living in the formerly free country known as the US. In the mean time, code forked and picked up here: https://veracrypt.codeplex.com...

Comment Nucleus? Motorola version stunk... (Score 3, Interesting) 76

A decade ago I spent about two years on an embedded system running Nucleus, spent several months fixing bugs in the threading primitives, including the core spin-lock mutex that worked about 99.999% of the time under low-load conditions, but whose failure rate rose rapidly with load to about 2%. So much fun. Parts of that codebase looked like they were written by very low skill programmers.

Comment IBM PC HD on Commodore 64/128 (Score 1) 251

Wire wrapped PCB containing a GPIO chip and a Z80 running my recreation of the 3" floppy protocol and a subset of PC BIOS (burned into an EPROM), a PAL with some delay lines to convert bus timings from Z80 to x86, a PC XT connector, a PC Winchester controller card which now talked to the Z80, and a 5MB? HD. The Commodore saw it as a 3" drive (which supported subdirectories) that happened to be quite a bit larger than the floppy. Later I taped up a PCB on large mylar sheets, still have the films in the garage somewhere, actually had a few of the boards manufactured for fun. (Think I had one of the chip sockets backwards, swapped IO pins on a 74?373, IIRC...) Worked nice, should have sold them. Thankful my dad funded the hobby, learned enough to open several career paths...

Slashdot Top Deals

A hacker does for love what others would not do for money.

Working...