Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:College education is still worth it (Score 1) 117

If anything, the Internet has revolutionized and democratized education to an extent undreamed of in human history.

Yeah, go ahead and put "Didn't attend college, but I spent a lot of time reading Wikipedia, Reddit, and getting tutored by ChatGPT." on your resume and see how far that gets you. /s

There are already first-level companies that no longer require a degree for entry-level positions... Google among them. This is only going to accelerate. There will be more things like 3rd party certification programs that to some extent replace traditional degrees. Colleges can either adapt to this change, or be wiped out by it.

Comment Re:College education is still worth it (Score 1) 117

A whole bunch of very rich assholes want you to think that you don't have any use for an education because they are tired of paying for it and because they don't want you to learn critical thinking skills. That's why you get at least two stories a week attacking education in your feed.

You get two stories a week because the current model of education we have is broken beyond repair, and to some extent, obsolete, and needs to be rebuilt from the ground up. You don't need to go away to a campus at a debt of six figures (or a cost of six figures to taxpayers) to get an education anymore. If anything, the Internet has revolutionized and democratized education to an extent undreamed of in human history. From the freely available works of the greatest minds in history to real time or recorded remote instruction, people now have everything they need for a first class education at their fingertips. It's all about personal motivation at this point. The resources are there, often at little or no cost. How hard is one willing to work to get the education? That's what it comes down to now.

The old model is going to have to either adapt to this reality, or die out and be replaced. I think some of both will happen. You already have 100+ colleges a year closing in the United States. That will only accelerate with AI now in the mix.

Comment Re:I assume you are joking, but ... (Score 1) 155

We are only a year out from the murder of a health-insurance executive, so the police are more on edge than usual.

Then we need to threaten such things much more often, so that the cops will eventually get used to it, and relax. ;-)

Debian never tried to kill me through my computer. I'd appreciate it if my car manufacturer made their car as safe as my computer.

Fuck it, I just want a Debian car. Then I won't need to extract bloody vengeance from beyond the grave, as my zombie revenant tracks down the CEO of Subaru, and the rotting flesh of my hands tightens around his throat as payment for the time a popup distracted me.

Comment There's no consensus definition of E2E encryption (Score 1) 90

Some people are busting out "definitions" of "End to End Encryption" but people were already using that as in informal descriptive term long before your formalized technical jargon was made up. Nobody should be surprised if there are mismatches. Have faith in our faithlessness.

I personally view the term as an attempt to call semi-bullshit on SMTP and IMAP over SSL/TLS. In the "old" (though not very old) days, if you sent a plaintext email (no PGP!), some people would say "oh, it's encrypted anyway, because the connection is encrypted between your workstation and the SMTP server, the connection from there to some SMTP relay is encrypted, the connection from there to the final SMTP server is encrypted, and the recipient's connection to the IMAP server is encrypted."

To which plenty of people, like me, complained "But it's still plaintext at every stop where it's stored along the way! You should use PGP, because then, regardless of the connection security, or lack of security on all the connections, it is encrypted end to end. Never trust the network, baby!"

Keep in mind that even when I say that, this is without any regard for key security! When I say E2E encrypted, it is implied that the key exchange may have been done poorly/incorrectly, mainly because few people really get to be sure they're not being MitMed when they use PGP. You can exchange keys correctly, but it's enough of a PITA that, in the wild, you rarely get to. You usually just look up their key on some keyserver and hope for the best. Ahem. And I say "usually" as if even that happens often. [eyeroll]

Indeed, every time I hear about some new secure messaging app/protocol, the first thing I wonder is "how do they do key exchange?" and I'm generally mistrusting of it, by default. And sometimes, I'm unpleasantly unsurprised, err I mean, cynically confirmed.

But anyway, if my E2E definition matches yours, great! And if it doesn't, well, that's ok and it's why we descend into the dorky details, so that we can be sure we're both talking about the same thing.

Submission + - Netflix to buy Warner Bros film and streaming businesses for $72bn (bbc.com)

sinij writes:

Warner Bros owns franchises including Harry Potter and Game of Thrones, and the streaming service HBO Max. The takeover is set to lead to a radical reshaping of the US film and media industry, but analysts have warned that it could face resistance from competition authorities.


Comment Re:A troubling trend. (Score 2) 116

I've bought Crucial upgrades for the last few laptops I've owned, both RAM and SSDs.

I used to joke around about how the AI companies wouldn't be satisfied until all resources on the planet were directly routed to them and everything else was eroding because of it. Now? Now, it's not seeming so much like a joke.

Crucial was always my go-to for RAM upgrades. I'm getting my son some upgrades for Christmas, and when I saw desktop memory prices, I was stunned. It's the same thing everywhere. "AI vendors are grabbing all the RAM they can get their hands on, dramatically driving up the price".

Comment Re: No, I don't think so (Score 1) 143

Trump doesn't have the will to deploy military strength.

Syria says "Hi".

 

His actions so far have been performance theater (ie, pick on small countries in hopes that Russia and China will be afraid).

We're the United States. The world's most powerful country. Outside of Russia and China, all countries are "small".

And Russia and China... they have nukes. Attacking them means WWIII. If you think this is a good idea, by all means, run for President on your End Humanity platform.

Comment Re:Wow... (Score 1) 69

There is zero value in some big scary climate risk number also being disclosed, because A that risk accounted for if you are studying the details anyway and does not help you make a rational decision, because it literally does not affect you beyond the places where it is already baked into the numbers.

If you don't care why the insurance is so expensive or unavailable (e.g. high risk of flooding) then maybe you also don't care about why the house's price is so high (e.g. nice location, good construction, etc). No need to even look at the house. Just treat the whole damn thing as an abstract exercise in numbers.

OTOH, some people might actually care about details. Maybe because they're considering living there?

Comment Open Source just can't keep up (Score 4, Insightful) 95

Once again, Open Source is embarrassed and left behind.

mplayer and mpv still, after all these years, don't have a way to prevent things from working if the content origin happens to be Netflix. It just plays on, stupidly Just Working, instead of breaking the way that Netflix realized their users want it to break.

Comment Re:Not for long they don't (Score 1) 237

To be fair your link does say "designed to bypass internet filtering mechanisms or content restrictions", so it sounds like SSH, work VPNs, banking etc. don't count because they aren't designed to get around the porn filters.

You make sense, but there is nothing that is "designed to bypass internet filtering mechanisms or content restrictions" more than SSH and VPNs bypass internet filtering mechanisms or content restrictions, is there? Why would anyone ever design a tool to get around filtering and restrictions, when they can already do that with established mainstream tools such as SSH or VPNs?

I can't believe the bill is intended to never be applied to anything. If we do think it's written in such a way that it never applies, I don't think it'll be litigated that way. Once it's enacted, they're going to say it applies to something, and that something is going to be anything that is secure.

Comment Re:Not for long they don't (Score 1) 237

You didn't read the bill very closely.

I think I read it much more closely than you did.

Sec 2(a):

"Circumvention tools" means any software, hardware, or service designed to bypass internet filtering mechanisms or content restrictions including virtual private networks, proxy servers, and encrypted tunneling methods to evade content restrictions.

This is either intended to apply to something or never apply to anything. Do we agree that the text is intended to do something, to somehow cover some possible situation which might realistically come up? You don't think they just put this in there, but with the begrudging admission that it could not ever possibly apply, do you?

Assuming you're still with me there, please give an example of what kind of tool this defines as a circumvention tool. Surely you have something in mind.

The bill is about outlawing the distribution of p0rn, and a VPN is merely listed as an unlawful circumvention tool.

That might have possibly been the original intent several years of editing ago, but I do not see anything in the definition of "circumvention tools" which even tangentially relates to porn. Do you? I think porn is 100% irrelevant in this discussion.

What I'm getting at, is that there isn't a "porn version" of Wireguard or SSH or HTTPS. They're all the same, content-neutral. The bill either bans them all, or doesn't ban anything. If you take my above bolded challenge to name a circumvention tool that this bill does address, I'm going to take all of your arguments that you give for why the law does apply to your circumvention tool example, and I am going to successfully apply them to SSH and HTTPS. And I'll be exactly as correct as you.

The only way this bill doesn't restrict SSH and HTTPS, is if it doesn't restrict anything at all. Don't agree? Then name something it does restrict.

Submission + - Chernobyl's Radiophile Fungus (sciencealert.com)

j_f_chamblee writes: There is a black fungus thriving on the outside of the sarcophagus of Chernobyl's infamous Reactor 4. And it may be thriving because of the high radiation, not in spite of it. From the article:

"That fungus is called Cladosporium sphaerospermum, and some scientists think its dark pigment – melanin – may allow it to harness ionizing radiation through a process similar to the way plants harness light for photosynthesis. This proposed mechanism is even referred to as radiosynthesis."

Slashdot Top Deals

Evolution is a million line computer program falling into place by accident.

Working...