Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment: Re:Sounds great in theory (Score 1) 407

by speedwaystar (#36876330) Attached to: Massive Solar Tower Planned For Arizona

but as Reagan pointed out:
"80 percent of air pollution comes not from chimneys and auto exhaust pipes, but from plants and trees." Presidential candidate Ronald Reagan, in 1979.
"Trees cause more pollution than automobiles do." -- Ronald Reagan, 1981

Comment: Re:Frederic Mitterrand ? (Score 1) 151

by speedwaystar (#36241158) Attached to: EFF Co-founder Faces Copyright Heavyweights At EG8

that's actually completely incorrect. there's no suggestion at all of forcible assault or beating, nor has there ever been. read the case documents. they're all available online.

do you think ANYONE, let alone high profile politicians, would support Polanski if he had used violence? do you think his victim would be calling for an end to the witch hunt (as she has for over a decade now) if he'd used violence?

Comment: yes/no dialogue when restricted ability first used (Score 1) 279

by speedwaystar (#35344464) Attached to: Infected Androids Run Up Big Texting Bills

my biggest peeve with the Android security model from day #1 is that this kind of thing is even possible.

every Android application has to be specifically granted a set of permissions on installation, including "able to make phonecalls that cost you money", "able to access the internet", etc. the problem is that the user only ever see this list once, fleetingly, during installation, and as everyone knows, familiarity breeds contempt so after the first couple of apps, most people stop reading the list and just click "yes". even if they read the list, once it's been authorized the application can do anything on its permission list at any time, without user intervention. this opens the gate to applications that can take photos doing so silently while the screen is off, applications that can make phonecalls doing so invisibly and undetectably, applications that can use the internet and use gps phoning home at any time with your exact location, etc. it simply shouldn't be possible.

whenever an application attempts to perform a restricted task, the OS checks that it has been granted the permission to do so and either silently permits the task, or silently disallows it. that's great, but it shouldn't stop there. the first time it's attempted a dialog box should alert the user that "steamy windows is attempting to make a phone call to that can cost you money. do you want to authorize this? yes/no/ [ x ] remember my answer and don't ask me again".

clearly "steamy windows" is going to get a "no and don't let it do it in future response", whereas the user is likely to grant "mywonderSMSclient" indefinite permission.

if there's a reason why this isn't practical, i'd like to know about it.

Comment: Re:I actually like this trend... (Score 1) 833

Yes, because trolls would never stoop to using fake "real" names.

Well, they'll find it very difficult to do that unless they figure out a way to spoof the same name on their credit card.

You can use the same credit card to create multiple WoW accounts with multiple "real" names... no spoofing is required. No ID check is involved.

Again, the credit card name *does not* need to match the account name.

Comment: Ian M Banks (Score 1) 392

by speedwaystar (#30403704) Attached to: How To Build a Quantum Propulsion Machine

Space opera author Iain M Banks' spaceships (from his various Culture novels) are propelled by "traction fields" which engage with the "energy grid" (sic) underlying the universe. Banks readily admits that this is purest gibberish with no basis in any known science. Perhaps in light of this research he can backtrack and claim to have been describing a form of quantum propulsion all along?

"Take that, you hostile sons-of-bitches!" -- James Coburn, in the finale of _The_President's_Analyst_