Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Here is the solution to all voting problems.
1. Confirm your vote is collected correctly.
2. Try to assure the people that no votes were added.
3. Don't hide results.
4. Keep votes anonymous.
1. Keep a large public vote database.
2. Be able to Look up votes by voter id, county, polling location and time.
3. Keep large visible clock and voter count at each polling station. Every time a person goes into the voting room, the count goes up. Voter counts can be confirmed online. Maybe even in a graph over time.
The voter should be able to go online and see his own vote. Since every voter can see every vote counted up in every polling location in the country and know that everyone else can, they'll be assured of the results. If they're paranoid, they can watch their local polling station's voter count and confirm the published results don't have added votes.
Note: Maybe instead of voter id's, it should be a random confirmation code thats generated on the spot. That should be even more anonymous.
Problems: Some people actually vote for the wrong person on accident. That's unfortunate, but the solution isn't to hide it from them.
If vote online doesn't match your vote, have a dispute process. Keep track of dispute counts over time, for the public to see.
The initial version of IE sucked, but, in the end, they beat the snot out of Netscape.
Why do people actually think that IE "beat" Netscape?! It was just made default and installed on every new computer. You had to use IE to go download Netscape. Ever since then, it's had a majority.
Are we assuming that the packets will be obvious IRC packets or something? It would be suggestive of a botnet if lots of traffic was moving while the computer was idle, but that could always be background programs downloading updates or whatever. If a botnet used any sort of encryption, or even a binary protocol instead of ascii, it could be extremely difficult to tell it's a botnet by just looking at packets.
"Our economy is a disaster. We have two wars going on with no real plan to get out of either."
"And for some reason marijuana is an important issue?"
I hate to point out the obvious here, but current problems are the entire reason it's even being debated right now. Legalizing marijuana would save the government huge amounts of money. Not only would they make money on taxes, but it would take a huge load off of our criminal justice system. We could also finally stop sending money to the powerful drug cartels that fund crime and are causing major violence in our southern border. There are of course plenty of other reasons to legalize marijuana that aren't related to current issues.
P.S. I don't smoke weed. I hate it.
Its implications, though startling, have gone almost un-reported. So I decided to change that.
I really want a million dollars. I've decided to publicly harass Google to give me a million dollars. Simply ignoring Google won't solve my problem. I will continue until one of two things happens:
1) Google dies and no one gets anything from Google ever again.
2) Google continues to live and gives me a million dollars.
So basically, you're saying that Google put up a lot of time, effort, money, lawyers, all at a huge risk. And no one else can compete with them because they'd have to to put up the time, effort, money, lawyers at a huge risk just like Google did?
What this slashdot post needs is:
1. A description of the law that was passed. 'three strikes and you're out' isn't very descriptive. I'm assuming it has to do with file sharing and cutting off people's internet connections?
2. How many deputies were supposed to be there? 18? 100? 300?
Should Google start paying for search results? This is idiotic. If they don't want Google to index them, thats what robots.txt is for. They can restrict Google from indexing them, they can lose traffic and everyone can move on.
SWFScan is a free Flash security tool (download here), released by HP Software, which decompiles all versions of Flash and scans them for over 60 security vulnerabilities.
It sounds like SWFScan actually scans flash SWF files, not flash itself like the post suggests.
Yeah, there isn't really an alternative to C for low level things, which is what bothers me. It seems like an alternative language is the obvious solution to huge classes of security problems.
ATS looks interesting, they even have a paper on writing linux device drivers in ATS. Maybe the alternative will turn out to be ATS, or maybe BitC, but it needs to hurry up and people need to start abandoning C/C++.
Am I the only one that thinks it's ridiculous we still have programs crash? It's 2009, why are we still programming in C? It's certainly possible to have the same speed and low level expressiveness and include assurances against crashes and buffer overflows.
F-secure was one of the first people I'm aware of to register some of the domain names that infected machines try to contact. When people were asking this question, this was their response.
On a regular day, our sinkhole sees around 1.5M-2M unique IP addresses that are infected with a various catering of malware: viruses, trojans, bots, worms and so on. Downadup.B is responsible for about 1M-1.3M of those IP addresses. So let me explain what we do with the data first:
We try to contact the ISP's where the infected IP addresses are coming from and try to get them to notify the customers to take down the infected systems. We also notify various CERT organisations in the countries where the infections are and work with them to get the infected machines offline. We also share some the data with Law Enforcement organizations in those cases where the author of the malware is known. This allows the police to get their hands on real, raw, data on the amount of infections. That data can later be used in court as evidence to get reasonable convictions.
Now, why won't we automatically disinfect the machines? The reason is simple: we would be knowingly, and with intent, be accessing the infected computer and giving it commands without having a prior permission from the owner. In most countries that equals to unlawful access which gets you an appointment in court. Some laws do weigh things by judging "a greater good", but in this case it does not help. Imagine the world being a huge porcelain store, inside a black box with only two holes for your hands allowing access. You can put your hands in the box but can't see what you're doing. Now, try to remove all the dust without breaking anything...
There are several things that might go wrong and the consequences could be severe. Imagine if we, while disinfecting, would knock out life support systems in hospitals. Or radar systems in major airfields. Or traffic lights in a major city. Or any other of imaginable and unimaginable scenarios that would be bound to happen taking into consideration the scale of this thing.
And it doesn't matter where we offered the disinfection from. We are a corporation with presence in various countries. The disinfected victims would be in those countries, suing us there. The place where we caused the damage from does not matter, its the place where the damage happened.
To make automatic, remote, unwilling disinfection ever possible there is a need for an international treaty. And an internation body of authority that will decide what to disinfect, who to disinfect and when to disinfect. And unfortunately I don't see that one coming in near future. I wouldn't bet foreign militaries or intelligence organizations being too happy about anyone tampering with their systems, regardless of the intent.
We've had long talks about remotely disinfecting machines and everyone in here is in unanimous vote on not doing it for the above reasons. And don't think it's a happy moment seeing hundreds of thousands, or millions, of machines being infected. Still, we do our best to get them fixed.
So what's the difference between a private defendant and a public defendant? One is just a person and the other is backed by a company?
Are we creating rules that don't apply to companies?