Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment: doesn't DNA age or lose fidelity ? (Score 1) 55

by vpness (#49166823) Attached to: Doomsday Vault: First Tree Samples Arrive At Underground Seed Store
I'm not slightly a DNA expert, so this is a question for those who may be. But doesn't the DNA in the seeds degrade ? Does storing them in a vault protect them from stuff that makes them degrade? if not too expensive, the concept is interesting. tho, with our nascent ability to inject DNA into another cel, wouldn't we be better off storing both the seed, and a copy of the dna for that seed, stored digitally (or carved in stone).

Comment: he dodged the good vs evil question (Score 1) 53

by vpness (#48982907) Attached to: Executive Director Andrew Lewman Answers Your Questions About Tor and Privacy
I would have been more impressed if he said "we're considering ways to limit lawlessness without compromising the premise of protection of citizens in dangerous parts of the world" "Tor can be used for good and for evil. How do you go about attempting to design the features of Tor to maximize one and minimize the other? Lewman: The Tor network is designed to provide protection online for ordinary citizens, victims of abuse, and individuals in dangerous parts of the world share information over public networks without compromising their anonymity. Most of the people that use Tor have legitimate uses for wanting privacy such as activists or reporters that need to keep their locations private. Criminals can already do bad things and there are certainly lots of options available to them for breaking the laws."

Comment: Re:Not sure how this is necessary (Score 1) 323

great point. However, bullies don't bully just one. If they went to the suspected source, then they'd have broader evidence. If the parent of the suspected bully was to allow, as they'd not want their kid to bully, that'd be 'ok.' I say this all noting that this is way over the line of where school can mandate a kid do something. But also noting that - like it or not - you've effectively 'lost' the powers that be at the school. Your ability to ask for a teacher, take the kid out of school early, etc, is shot. That's called 'life.'

Comment: Re: Why is this any different than a warrant for a (Score 1) 53

by vpness (#48712773) Attached to: WikiLeaks Claims Employee's Google Mail, Metadata Seized By US Government
if you're replying to me (not sure from the /. nesting): - my point was that wiretap warrants are issued all the time - a quick google sez there were ~ 22K issued - so why was this one of interest? I was actually wondering what made this /. worthy. An AC posted that it dice acting just like huffpo, finding the buzzwords (wiki leaks) which'd appeal to the /. audience ----- My second point was, that like another poster, this one seems to be done the 'right' way - it's on the books for who did it, why, and can be challenged. Wiretaps, performed legally, *are* part of the law enforcement process.

Comment: asymmetry is scary for govvies (Score 1) 158

by vpness (#48691313) Attached to: Norse Security IDs 6, Including Ex-Employee, As Sony Hack Perpetrators
The thought that a few, decently intelligent , disgruntled *individuals* , coupled with the 'destructive' nature of the attacks I think scares the crap out of govvies. Call it cyber-vandalism, -terrorism, or -war, the act of public destruction and 'outing' is what has made this attack a 'game changer.' State funded threat actors have been spying for years. They've mostly - the stuxnets aside - have stopped short of destruction that they're all capable of, and 'just' xfilled credit cards, or secret formulas. Think what the Target attackers could have wrought by bricking the POS terminals. So if you're a govvie, it's natural to presume that a whacky - but funded - state threat actor is behind this, as the thought of a handful of individuals is just too scary. Do any /. ers know what security product stuff that Sony deployed (which missed all of this )? I'd love to know their host based AV and HIPS, and their network FW, IPS, 'APT ' detectors/protectors.

"If it ain't broke, don't fix it." - Bert Lantz