Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Compared to the ITER? (Score 1) 182

I know this is a summary, and I expect the full figures will be behind one of the links; but honestly, if you aren't going to provide the actual comparison, don't tease us. The ARC reactor (which stands for what, I might ask?) would take 4 or 5 years and around $5 billion to build, compared to the ITER, which is expected to take how long, and cost how much?

Apples are a mixture of red and green in colour, have a crunchy texture, and provide roughly 52 calories each; compared to oranges, which are also a thing which exist.

Comment Re:Karma! It IS a bitch! (Score 1) 245

I think "cynic" is an understatement. What exactly do you think "the 1%" is? A made-up term for a group of particularly well-off individuals, or a secret society who actually meet and organise under that name, and could orchestrate this entire thing in the name of controlling public opinion?

Stay on the medication.

Comment Re:How does it work (Score 2) 247

Not if that key is created and stored at rest on remote infrastructure (e.g. the servers of Apple, Google, Facebook, Microsoft, and so on). Think about that for a moment or two, and you begin to realise why such backdoors undermine security so fundamentally: the only way to ensure users can't simply delete (or, more realistically, prevent transmission of) the second copy of the key is to mandate that the encryption happens on the server, not the client; so not only is it a bad idea for these second copies to exist in the first place (providing a new target for attackers, who now only have to crack a single master key to decrypt their entire haul, rather than a key per user), but it also reopens all the security and privacy concerns of transmitting a plaintext payload (encrypted in flight, but in the clear at both ends) and trusting "the cloud" not to abuse it.

You get the worst of all worlds: your data is officially readable by the government; attackers gain new, promising attack surfaces; and you get to go back to worrying about what the corporations might be doing with your trade secrets. Enjoy!

Comment Re:This is really wierd (Score 1) 184

And as a result of Paris, there is a lot of racism directed at muslims the last couple days, or at least it suddenly feels like so. Nobody yet realizes that calling for the mass execution of muslims because they are evil and rape and murder sounds stunningly like Nazi rhetoric against the Jewish (just as untrue), and worse, it appears as though now it's culturally acceptable.

I have noticed the same thing. Whilst it does not appear to be universally acceptable, unfortunately it seems to me that it is the viewpoint of those who are most outspoken, particularly on social media, which turns it into an echo chamber. How do we combat this without simply getting into an argument with such people? There is no evidence that trying to reason with these people via the Internet achieves anything - in fact, there are countless forum posts and article comment sections which point to the exact opposite; arguing with anyone with such vehement beliefs in an environment without tone of voice, body language, and face-to-face contact only degrades into name-calling.

How do we *effectively* communicate that we do not wish such a thing to become culturally acceptable? Is it even possible, when mass media is intent on only ever reporting bad things?

Comment Re:Bottom line (Score 1) 86

That may be how it is, but it is not necessarily how it has to be. It is possible to build a system where the data is encrypted with per-user private keys, which never leave the user's device(s) - at least, not in the clear, and ideally only when being migrated/copied to other devices. Do all the crypto on the device, transmit & store it with private keys unknown to the owners of the infrastructure.

For all I know, this might in fact already be how iTunes & iCloud work already; that certainly seems to be the implication in the statement that data is "placed under the protection of your passcode ... [therefore] it's not technically feasible for us to respond to government warrants for the extraction of this data" (from your mashable.com link). I'm pretty sure various online back-up services work this way.

Of course, there has to be a certain level of plaintext metadata: the fact that you have an account is not secret, nor are the amount of data stored, the access times, and the network addresses of devices used to access it. But the data itself? A system in which the service provider doesn't have centralised private keys is absolutely, completely feasible.

Comment Re: Bottom line (Score 1) 86

Could you clarify? References to Skype may or may not be relevant, but direct end-to-end communications is most certainly not impossible. It may be difficult in practice with contemporary IPv4 deployments (most devices are not directly addressable from the public Internet due to NAT), but of course it can be done: as long as it is possible for two devices to connect (which evidently it is, or we couldn't have an Internet at all), there is no "magic" which mandates that one or other of those devices be a corporate-controlled central server.

Central servers - effectively, brokers - do provide a lot of convenience: one place to publish & discover user presence, no need to bypass NAT at the endpoints because both connections are outbound, store & forward of messages for offline users, etc. But you *could* have a purely peer-to-peer network with offline exchange of contact details, or a central server used for nothing but storing details by which a user's device can be directly contacted.

Unless you count "routers" as "servers" - but with suitably randomised addressing and strong encryption, all that router logs will tell you is "device A sent some data to device B", nothing about the *meaning* of the data or the people behind it.

Comment Re:An APU with even 16GB of integrated memory (Score 1) 46

I'm confused. How would a GPU with 32GB of "integrated memory" be news, but a GPU with 32GB of [non-integrated*] memory is not news? I'm not sure what you mean when you say "integrated memory". This is not the graphics half of an APU, it is a discrete card, and nowhere do the summary or the press release state otherwise. The term "compute GPU" just means it's targeted at computing workloads, not graphics workloads.

What exactly is your complaint?

* Not even sure what this means, but you seem to be contrasting "integrated memory" and "memory".

Comment Re:Perl, bootstrap C++ (Score 2) 296

Are you trolling? For anyone not already intimately familiar with the process, the vertical learning curve of writing Perl bindings for C++ code will cause more pain, anguish, wailing and gnashing of teeth than writing in either pure Perl or pure C++. You will also gain nothing in portability: in fact you will lose, because portability will be the lowest common denominator of both Perl and C++ (I won't argue over which is lower to start with, both can be high with the right libraries), with the added headache of having to deal with two orthogonal sets of problems, in different languages.

Slashdot Top Deals

A good supervisor can step on your toes without messing up your shine.