Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Submission + - Secret Service agent pleads guilty in Bitcoin theft

An anonymous reader writes: A former Secret Service agent pleaded guilty on Monday to diverting to his personal account over $800,000 worth of bitcoins during an investigation into online drug marketplace Silk Road.

Shaun Bridges, 33, appeared in federal court in San Francisco and admitted to money laundering and obstruction of justice. ...
In court on Monday, Bridges admitted his theft made Ulbricht believe that another individual was stealing from Silk Road and helped lead Ulbricht to try to hire someone to kill that person

Submission + - Nvidia's Maxwell architecture performs poorly at DirectX 12 games

edxwelch writes: Benchmarks have shown Oxide Game's Ashes of the Singularity’s DirectX 12 Alpha benchmark performing better on AMD GPUs. There has been much discussion about the cause, but recent comments on Overclock forums from an Oxide Games developer reveal that Maxwell GPUs do not properly support Asynchronous compute and that's why AMD performs so well in the benchmarks.
The problem seems to be hardware related. The Maxwell architecture is optimised for the serial nature of DirectX 11, while AMD's GCN GPUs have been built from the ground up to take advantage of asychronous shaders.

Comment Buy the best politicians you can afford (Score 1) 806

I would buy the best politicians my money can afford, converting some of my money into power. Then I'd use this power and money to push humanity to the stars. I don't care who does it - Musk, NASA, or someone else. We are going there and beyond and/or die trying. I'd also be on one of the first flights out.

Why? Because nobody remembers the person who bankrolled Christopher Columbus.

Submission + - Uber Hires Hackers Who Remotely Killed a Jeep->

An anonymous reader writes: The past several weeks have been rife with major vulnerabilities in modern cars, but none were so dramatic as when Charlie Miller and Chris Valasek tampered with the systems on a moving Jeep Cherokee. Now, Miller and Valasek have left their jobs to join a research laboratory for Uber. It's the same lab that became home for a number of autonomous vehicle experts poached from Carnegie Mellon University. From the article: "As Uber plunges more deeply into developing or adapting self-driving cars, Miller and Valasek could help the company make that technology more secure. Uber envisions autonomous cars that could someday replace its hundreds of thousands of contract drivers. The San Francisco company has gone to top-tier universities and research centers to build up this capability."
Link to Original Source

Submission + - Many Drivers Never Use In-Vehicle Tech, Don't Want Apple Or Google In Next Car->

Lucas123 writes: Many of the high-tech features automakers believe owners want in their vehicles are not only not being used by them, but they don't want them in their next vehicle, according to a new survey by J.D. Power. According to J.D. Power's 2015 Driver Interactive Vehicle Experience (DrIVE) Report, 20% of new-vehicle owners have never used 16 of 33 of the latest technology features. The five features owners most commonly report that they "never use" are in-vehicle concierge (43%); mobile routers (38%); automatic parking systems (35%); heads-up display (33%); and built-in apps (32%). Additionally, there are 14 technology features that 20% or more of owners don't even want in their next vehicle. Those features include Apple CarPlay and Google Android Auto, in-vehicle concierge services and in-vehicle voice texting. When narrowed to just Gen Yers, the number of vehicle owners who don't want entertainment and connectivity systems increases to 23%.
Link to Original Source

Comment Another attack surface (Score 1) 113

I use mac filter as my white list as the last measure of defense. This way most zero day exploits will have to spoof white listed MAC to even start exploiting. This is one extra step for someone wardriving my WiFi.

With public WiFi like this? You already in, so you are free to exploit the heck out of any vulnerability or misconfiguration. This is one exploit away from entire network getting turned into a botnet.

Comment Emotional Argument (Score 1) 244

>>>I used to be all for this type of research. Then my wife and I had a child

See, this is how we can be sure your argument is emotion-based instead of fact-driven. Unsurprisingly, your hormonal adjustment and parental instincts interfere with clear thinking. Logically, you having a child is unrelated and irrelevant event to evaluating merits and ethics of medical research.

Too bad you succumbed to "Think of the children" hysteria, and my condolences on the premature demise of your logical self.

We want to create puppets that pull their own strings. - Ann Marion