Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment Re:Thanks for all the Fish Wrapper (Score 1) 1521

And I lurked long enough to get a low six digit id. Also, didn't get my first choice of a username, and my second choice was either inspired or lame, the jury's still out. I try to visit every day, but when I miss a day I feel compelled to go back and read the days I've missed (thanks, OCD!)

Comment Re:URL for MP3 recording (Score 3, Informative) 105

Comment Re:How Original (Score 2) 171

Mod parent up! I downloaded the Lucyphone app on my iPhone, and it's a life saver. Like Fonolo, Lucyphone is free; I suspect they make money by providing some service to the companies you call. As someone one said, if you aren't the person paying for something, then you're the thing someone else *is* paying for.

One minor quibble: Lucyphone needs you to navigate the phone tree, but once you get the message asking you to wait for the next available operator, you just hit the button and go about your normal business. There's only been a couple of times that the rep hung up on Lucy before I could get on the line, and you can be sure I let the company know about it.


Indication of Neutrino Transformation Observed 128

AmiMoJo writes "A Japanese research group says it has observed for the first time an indication that a type of neutrino can change into another type. The group generated a large amount of neutrinos at the Japan Proton Accelerator Research Complex, or J-PARC, in the prefecture's Tokai Village, and aimed them at the Super-Kamiokande observatory in Gifu Prefecture about 300 kilometers away, to look for neutrino oscillation. As a result, the group observed that muon neutrinos can change into electron neutrinos."

Comment Re:Ha Ha, mine goes to 11 (Score 1) 615

Go further to 7 characters (fh0GH5h), and the CPU would grind along for 4 days, versus a frankly worrying 17 minutes 30 seconds for the GPU."

OK, so go to 15 characters. Using a password generator I can go as far as I like. Using some sort of password bank program, I can store passwords / phrases of any complexity and use copy and paste, thus having only one strong password to remember.
So, what am I missing? (And lets keep it on topic, folks).

I've been generating 14 alpha+num+special characters with Last Pass, only to discover that some sites restrict you to 12 or fewer chacters and/or forbid special characters. And recent attacks (like Sony and Gawker) have involved the hackers obtaining user's password hashes, which are generally kept where the web server can see them to authenticate you.

Comment Re:Short Answer (Score 5, Interesting) 730

Slightly longer answer:


Would politicians accept the solution without re-bloating it first? No

Actually, the original idea will never get off the ground, because most of those 10,000 pages deal with things like "companies employing less than 100 people and which are located in a depressed neighborhood and which have names ending in a vowel get to deduct the cost of the president's jet." Things like that are added to give one particular company a break, but they never mention the company's name, just a set of circumstances that describe only that company. The company knows who they are, but we are unlikely to figure it out since each of the intersecting sets is rather large. Unless that company is part of one of the clades, that particular clause will have zip effect and it will be proposed for deletion, leading to that company and all the others in the same situation to object to the entire process.

Comment Re:Without PSN (Score 1) 386

I don't know any game that requires PSN for single player or split screen co-op mode.

Multiplayer modes would need PSN obviously. There's no way that it can be done otherwise...

  • Portal 2? Yes, there's an online component, but there's also a single player mode, and right now you can't get *any* mode to work while PSN is down.
  • Xenogears on my PSP.
  • Just about everything from Capcom (which uses a PSN-dependent DRM scheme).

Comment Re:One key to rule them all... (Score 1) 268

No, because if you encrypt your own material you hold the keys. If you let someone else do it, they hold the keys. And who knows how good they are at keeping them safe.

You always know how good you are (or, how bad you are) at keeping your own keys safe.

Keepass(x), gpg encrypted file backup with the gpg keys backed up on a CD in a bank safety deposit box. (and if you're daring, a copy of the key on a usb jump drive you keep on your person at all times)

Don't forget the copy you keep in your head and enter whenever you need to access the safe; you're vulnerable at that point to a key logger. :)

With LastPass, you encrypt your own material, LastPass never holds the keys. LastPass works exactly the same as KeePass: there's a binary blob that is kept on an Internet-accessible server, and you download the blob and decrypt it locally. All they have is an encrypted version of your key, just like in your Linux/Mac/Windows desktop system. Yeah, maybe they could have used different keys for their web site and the blob, but I don't see how that would increase security all that much. With either service, an attacker has to get your blob (by hacking the LastPass server or your computer's cache, or by finding the KeePass blob on your computer or in a Dropbox or similar cloud-based server), then they have to brute force the key. If your key is easy to figure out using a dictionary, then you're hosed no matter which service you use.

This is similar to the Gawker attack, except with Gawker the encrypted passwords were made public, along with the subset that were brute forced. I checked for my email address and it only showed up in the first list, not the second. Of course, my passwords for everywhere use the "at least one letter, number and special character" rule, they are generally fairly long (pre-Gawker, 8 characters, post-Gawker, 14), and I don't use leet-speak to determine the non-alpha characters (leet-speak increases the effort needed to brute-force by only a small factor).

Comment Re:FBI Too Focused On Child Porn (Score 3, Insightful) 487

>>>I'm sure that these people are reassured by your arguments.

Last I heard they were freed, and all charges dropped, since sharing nude photos of your own body (which you own) is not a crime.

The prosecutors didn't think that when they charged these kids with the production and possession of CP. And if sharing nude photos of your own body is not a crime, why are states now amending their laws to make sexting a misdemeanor instead of the felony that so many prosecutors were willing to treat it as.

Comment Re:Bureaucrats (Score 1) 487

But there are victims: kids. Somebody makes these photos, domestically or internationally.

You can see the math at, but basically 134,000 images are produced per year by teens sexting each other. But don't worry, prosecutors are still protecting the kids in the photos by going after the producers of the photos, even when they're the same people:

Comment Re:FBI Too Focused On Child Porn (Score 2) 487

Possession of nude photos of kids or teens is not a crime ignorant. If it were, Borders, Barnes & Noble, and Amazon executives would now be in prison (they sell nude photo books of minors). It's called free speech, free expression, and freedom of lifestyle (nudism). Read Amendments 1, 9, 10, and 14 of the Union Constitution, as well as your local Member State's constitution, which provides additional liberties.

I'm sure that these people are reassured by your arguments.

Comment Re:Someone's math is wrong (Score 3, Interesting) 487

When you see some of these news stories about some of these people having hundreds of thousands of images, if not millions, it really must be on a rather large scale.

You can see the math at, but basicly 134,000 images are produced per year by teens sexting each other. True, not all of them get posted to the internet, but it's quite possible for some people to have hundreds of thousands of images produced by underage teens of themselves.

Comment Re:Bureaucrats (Score 5, Informative) 487

If there exists a demand for a good, eventually someone will fill that demand. If there is a "healthy" "market" for child pornography then some people will go out and get fresh product for that market. This is how children are harmed by viewing it.

Pew Research Center’s Internet & American Life Project found that 4% of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or videos of themselves to someone else via text messaging, a practice also known as “sexting". The same survey also found that 75% of all American teens ages 12-17 own a cell phone. According to Wolfram Alpha, there are 22,410,000 teens between 15 and 19, which is likely close enough for these calculates. this means that roughly 672,000 images classifiable as CP are generated by teens during the 5 years that cell-owning teens are between the ages of 12-17. This works out to 134,000 images per year produced by teens for other teens.

This is the theory that Jack built. This is the flaw that lay in the theory that Jack built. This is the palpable verbal haze that hid the flaw that lay in...