Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:I don't understand how this is 'orchestrating' (Score 3, Interesting) 160

The orchestrating part is where the evidence of the crime (required for the extradition) hasn't been sent to the Canadians yet. They've had 10 months to provide evidence of the crime, but have not been able to produce it. So, the civil case, which was getting close to going to a Jury trial, got settled because the guy got arrested. This is one heck of a coincidence.

Comment Re:It's easy to comply with the GPL (Score 1) 566

The GPL goes beyond just the source code. There are clauses that prevent further restrictions on the licensed use of a program, there are licence grants that allow you to redistribute the binary form of the program (what was downloaded from the app store). You will not be able to do these things, the app store terms of use are going to have further restrictions on acceptable use of a program downloaded from the app store. GPL will be incompatible with the terms of the app store.

Comment Re:someone, please explain this to me (Score 1) 566

It isn't the source code redistribution or availability that is the problem with GPL on an app store.

From GPLv2:
You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form...

The app stores do not allow you to copy and distribute the Program in executable form, since they are wrapped up in DRM layers and I would bet there are also license verbiage that says you are not allowed to copy the apps downloaded from the app store. It is very easy to provide the distribution of source code for an app on the app store, you just point to a file on the internet, a phone number to call or an address to write to asking for the source.

Comment Re:Attack Summary (Score 1) 220

No, collision vulnerabilities are for validating the contents of a file haven't changed using an MD5 hash. The reason you don't use MD5 hashing to store a 1-way hash of a password is that it is an extremely fast algorithm to compute - meaning it takes a lot less time to compute a rainbow table or brute force hashes in order to figure out the password.

No line available at 300 baud.