Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:non-isolated third-party cookies are data troja (Score 1) 165

Yes, that too. They can better standardize their headers, and/or they can add some noise to the signal to throw off the fingerprinting, which can be done without any kind of concerted effort.

Just mentioning this for completeness: there is also the IP address, but that has other solutions, and isn't a web browser's responsibility.

Comment non-isolated third-party cookies are data trojans (Score 4, Interesting) 165

Toolbars are just the tip of the iceberg. All major browsers are malware because they don't isolate cookie storage (or all storage, really) between origin domains, breaking the same-origin policy. Third-party cookies then become data trojans. Intent is important here. It isn't just a vulnerability, but a design flaw continued by the fact that all major browser development is funded by advertising companies.

See for yourself how Mozilla refuses to fix a security vulnerability that is enabling billions to be made from stolen user data: Bugzilla bug 565965

Comment Re:It's A Business (Score 1) 68

The GP merely talked about market-only thinking, not free markets. In fact, the Marxist ideology you are referencing as a straw-man is merely an extension of the liberal thinking of Adam Smith. Even Adam Smith discussed the disparity of power between classes. That is why Marxists are also labeled liberals. The extreme ideology is unregulated markets, just as extreme as unregulated state power. Markets can be free and regulated at the same time the same way people can be free and regulated at the same time. Freedom is about self-determination, the ability to make choices. For example, anti-discrimination laws increase freedom because a significant percentage of the population is now able to make choices that otherwise would be limited and infringed by others. More people may now choose to marry, and otherwise participate in society, because of law that prevents discrimination.

Comment Re:Networks are not private (Score 2) 68

You are creating a straw-man out of the GP's terms. The GP even used the term *delivered* to make the appropriate distinction. Information in a payload that is encrypted is not the *delivered* information *without* the decryption key information. A network *may* have access to the *delivered* information, but it doesn't necessarily *need* to have it, and having it is considered a security weakness that may be *attacked*.

Comment Re:High-frequency trading=respctable insider tradi (Score 1) 113

There are always ways to shave time off of reactions, no matter what approach you take.

It is not difficult to formally solve this problem with constraints at the exchange. If timing is the issue, then just randomize it. Just delay the evaluation of bids for the timing-sensitive period, and replay the bids with scrambled timing at the end of the period. This would effectively distribute the advantages and disadvantages in timing across the bidders.

The issue is not technical. The issue is political. No one wants to do any of the number of ways to fix this, and there are many ways to fix this that would work. I just came up with one off the top of my head, which certainly means that there are dozens more, and probably at least a dozen better ones.

"Conversion, fastidious Goddess, loves blood better than brick, and feasts most subtly on the human will." -- Virginia Woolf, "Mrs. Dalloway"