Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:How about... (Score 2) 190

by mattventura (#49349931) Attached to: Generate Memorizable Passphrases That Even the NSA Can't Guess
Why would they go through the trouble of reverse enigneering your password system when there's thousands of other people who just use the same exact password everywhere? Unless someone is trying to specifically target you, it's usually sufficient to simply not be the low-hanging fruit. In case of these large password leaks, what they're probably doing is something like this:
1. Take every username (or email) and password combination
2. Through automated means, check if they are valid on other websites
3. Record the ones that worked and abuse/sell those as well.

Steve Wozniak Now Afraid of AI Too, Just Like Elon Musk 281

Posted by timothy
from the I-can't-let-you-do-that-steve dept.
quax writes Steve Wozniak maintained for a long time that true AI is relegated to the realm of science fiction. But recent advances in quantum computing have him reconsidering his stance. Just like Elon Musk, he is now worried about what this development will mean for humanity. Will this kind of fear actually engender the dangers that these titans of industry fear? Will Steve Wozniak draw the same conclusion and invest in quantum comuting to keep an eye on the development? One of the bloggers in the field thinks that would be a logical step to take. If you can't beat'em, and the quantum AI is coming, you should at least try to steer the outcome. Woz actually seems more ambivalent than afraid, though: in the interview linked, he says "I hope [AI-enabling quantum computing] does come, and we should pursue it because it is about scientific exploring." "But in the end we just may have created the species that is above us."

Comment: Re:I can't find the commercial speech section (Score 1) 239

The whole "no commercial use" thing is beyond silly. What if I took some pictures with my drone, not intending to do anything commercial with them, and then later someone wanted to buy the rights to those photos? Am I retroactively breaking an FAA rule? There's far too much gray area, but that's beside the point entirely. The FAA should be regulating what can fly, where it can fly, and how it gets flown, not the reason for flying it.

Comment: Re:VM (Score 2) 73

by mattventura (#49245867) Attached to: New Crypto-Ransomware Encrypts Video Game Files
Looking at the Bromium report, it appears that it's checking for various drivers that Vm programs would typically install as part of their guest tools. It looks like if you were to install something as simple as the VMware mouse driver it would think you're in VMware. It also checks for Fiddler so you could simply install that.

Comment: Re:Just re-download it? (Score 2) 73

by mattventura (#49245845) Attached to: New Crypto-Ransomware Encrypts Video Game Files

Then again... only a fraction of the audience is really that invested in their save games. The truly valuable stuff (relatively speaking) is all tied to mmo accounts (and therefore not stored on your PC anyway).

Exactly, it would be far more profitable for them to simply steal any saved account credentials.

Comment: Re:Put everything needed in the capsule (Score 1) 169

by mattventura (#49227221) Attached to: Ask Slashdot: Video Storage For Time Capsule?
I was going to suggest something like this, but maybe with an iPad or other simple tablet. But the issue becomes supplying power to it. I have no idea if USB will even be around when this time capsule is opened, so you'd possibly want to include a schematic showing how to power the device.

Comment: Re:Reality of YikYak (Score 1) 367

by mattventura (#49218357) Attached to: Yik Yak Raises Controversy On College Campuses

From what I understand (and I have only sketchy information on this), the police were contacted, and YikYak was asked for an IP address.

However, either they refused to give one, or it ended up being some public computer (this is, after all, a university; there are hundreds of public computers on campus). Nothing the police can do about that. Even CSI's reality-bending tricks would have trouble figuring out which of dozens of people who sat at that computer might have sent the message.

Dan Aris

How is that different from any internet communications platform? If someone hops on a random public computer, they could easily anonymously send those death threats or other nasty messages via an email, some other anonymous website/service, or even through a payphone of all things. The only thing that YikYak provides is convenience. I don't think that if there were no death threats before YikYak, that any of the death threats sent through YikYak would have any shred of credibility. Someone isn't going to say "wow look at this app that I can send death threats through, I think I'll go murder someone that I wasn't going to murder before".

Comment: Re:Lift the gag order first... (Score 1) 550

The prolem is that it's difficult to allow access to just the top 25 sites when everything goes through CDNs and pages have scripts being pulled in from 30 different sites (if my noscript menu is taller than my screen, I generally question the developers if the site). How do you determine what stuff to allow access to when those top 25 sites require so many other domains to function?

Comment: Re:Most of the internet is like that now (Score 1) 467

Well that is my name, because I don't post things on /. that I wouldn't mind having associated with my real identity. I wouldn't even think about posting something even remotely close to the things the people in TFA posted. Do I ever say things on the internet I wouldn't want attached to my name? Sure, but I sure as hell wouldn't attach my real name of all things to it.

I think the scariest part of all of it is that someone could easily just use my name, post bad things, and I'd take the blame for it.

The meat is rotten, but the booze is holding out. Computer translation of "The spirit is willing, but the flesh is weak."