Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Attack Submarines Not Backbone of US Navy (Score 1) 439

by kullnd (#49057959) Attached to: Will Submarines Soon Become As Obsolete As the Battleship?
Read again; I said "capable of being configured". What I said means that some of them will be configured as trident missile boats, not reconfigured after construction. That being said, it is possible that a boat could be reconfigured as well. Some of the Ohio class boats have been reconfigured as SSGNs, carrying a massive load-out of tomahawk missiles instead of trident missiles with some of the tubes reconfigured to support SEAL deployment.

Comment: Re:Bad idea (Score 1) 385

by Wonko the Sane (#48859273) Attached to: FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

Don't assume that anyone involved with Bitcoin since the beginning had any illusions about how it would be received by the incumbents.

Bitcoin early adopters are more prepared for the conflict than the incumbents, because they knew a fight was coming before the incumbents knew Bitcoin existed.

+ - Tips for Securing Your Secure Shell

Submitted by jones_supa
jones_supa (887896) writes "As you may have heard, NSA has had some success in cracking Secure Shell (SSH) connections. To respond to these risks, a guide written by Stribika tries to help you make your shell as robust as possible. The two main concepts are to make the crypto harder and make stealing keys impossible. So prepare a cup of coffee and read the tutorial carefully to see what could be improved in your configuration. Stribika gives also some extra security tips: don't install what you don't need as any code line can introduce a bug, use the kind of open source code that has actually been reviewed, keep your software up to date, and use exploit mitigation technologies."

Comment: Re:Put this same government in charge of healthcar (Score 1) 279

It's a great point: people who don't have an emotional investment in the Department of X can easily see that the people who make up the Department only care only for improving their own power and financial position, and are making X even worse both by getting in the way and also by consuming valuable resources that could be used to actually provide X instead.

The difficult part is realizing this is true for all X, even the ones which are your personal favorites.

Comment: Almost nothing in the OP is true (Score 5, Interesting) 144

by Wonko the Sane (#48627173) Attached to: Will Ripple Eclipse Bitcoin?

Ripple is a debt accounting system.

You can send Dollars or gold over Ripple - you can transfer promissory nodes for those things.

The difference between a promissory note and the value the note represents is something that Ripple should be trying to clarify - instead they seek to obscure it.

Because they try to pretend that promissory notes are equal to underlying assets, they don't include any features that would act like leverage limits. There is no ability to deal with counterparty risk rationally in their system, since trust in a counterpary is binary.

In real world, liabilities of different entities are discounted by a value that reflects their credit risk. Ripple does not permit this operation. You either value liabilities at par or not at all.

As others have mentioned, their consensus system is neither distributed nor trustless. It's a centralized, badly-designed, debt accounting system trying to pretend it's a trustless cryptocurrency.

An inclined plane is a slope up. -- Willard Espy, "An Almanac of Words at Play"