Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:I don't see the problem. (Score 4, Interesting) 667

by pipatron (#47497529) Attached to: Russian Government Edits Wikipedia On Flight MH17

The plane was 10km up. It wasn't shot down by something bought for $50,000 from Bob's Quality Used Implements of Death and Destruction and delivered to you by a courier van. The suspected weapon system requires at minimum one tank sized tracked launcher vehicle, and for full capability it requires three such vehicles. This is way out of Bob the arms dealer's league. Although I'm pretty much guessing here, the missile alone I expect would cost over a million dollars to manufacture.

You mean something like http://www.mortarinvestments.e...

Comment: Slow news day? (Score 1, Informative) 55

by pipatron (#47446941) Attached to: Walter Munk's Astonishing Wave-Tracking Experiment
What kind of non-story is that? One link points to some guy writing about how some other guys went to study waves at different locations. It doesn't say anything about how they did it, or has any technical information. The other link is a PDF scanned from a paper from 1982. Slow day when you have 32 year old news?

Comment: Re:This is awesome (Score 2) 217

by pipatron (#47174951) Attached to: New OpenSSL Man-in-the-Middle Flaw Affects All Clients

Is it messed up to add sensitive information to an entropy pool? From choice of wording it seems everyone should immediately and without reservation know better this is a stupid thing to do.

Question is this actually a valid position or more knee jerk based on unfounded fear, ignorance of operation of an entropy pool?

When functioning properly you shouldn't be able to extract anything except entropy from pool.

Emphasis mine. Putting it in the pool is yet another attack vector, and a great way to increase the chance of something going wrong down the line. Either by mistake or by a planned malicious code change in parts of the code that doesn't seem to have anything to do with the private key.

Comment: Re:Simple. (Score 1) 876

by pipatron (#46193649) Attached to: Ask Slashdot: Why Are We Still Writing Text-Based Code?

Actually, they are called movies. And I bet that on average, people watch a lot more movies than they read books.

(This is however not a statement of quality, and I guess there are hundreds of nerds who thinks that anectodes equals data which will reply to this and proudly proclaim that they read more books than they watch movies.)

Comment: Re:Doesn't Scale (Score 1) 876

by pipatron (#46193635) Attached to: Ask Slashdot: Why Are We Still Writing Text-Based Code?

Trial and error is usually required to see if a box responds to a message in the way you want; I can write correct C without having to run the code, I would never try that in Reaktor.

Now that's a brave statement!

I'm always suspicious when that actually happens. Which bugs have I missed?

Comment: Re:Officials learn terrorist and criminals use cas (Score 1) 411

by pipatron (#45052691) Attached to: US Intelligence Chief Defends Attempts To Break Tor

You only need to do that here (Sweden) if you want to deposit large enough sums, I don't know exactly how much should be a couple of thousands of your so-called quids.

I expect this to gradually change within the next 10 years or so, though. I mean, handling cash in this day is suspicious enough when you might as well use a debit or credit card of some sorts, or pay with your phone bill.

Comment: Re:Officials learn terrorist and criminals use cas (Score 3, Interesting) 411

by pipatron (#45050237) Attached to: US Intelligence Chief Defends Attempts To Break Tor

Actually, a better "analogy" is that they work hard on making sure that cash can't be used anonymously. Each transaction must be monitored (serial numbers on every bill, cameras in every ATM and store), and controlled (demanding proof of ownership for depositing cash at a bank, removing the possibility to actually use cash for buying travel documents).

Much like they are working hard on trying to make sure Tor can't be used anonymously.

If you think the system is working, ask someone who's waiting for a prompt.