Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re: Twice as productive because (Score 1) 121

Not only that, some of the stuff they already did it before in C++ so now it's just a conversion, most of the logic, which takes considerable time to think of, had already been gone through before, artificially inflating the perception that C++ takes that much more effort. I'd argue the same thing would happen if it was the other way around. In fact I frequentou prototype stuff in a simpler language A before implementing the final product in the final language B (I have specific language combinations for each problem domain and final language requirements).

Comment Re:The problem with file transfers! (Score 1) 79

Actually, there are lots of reasons. Not all material needs to be encrypted, because not all material is privacy sensitive. Which means, the only thing left to deal with is tampering.

A better alternative than blocking it altogether - because that mostly renders transparent proxies useless - is to force links to HTTP content in HTTPS transferred sites to be accompanied by a new attribute in the anchor tag with a file signature (or a link to an also HTTPS-only file containing the signatures) that could be checked by the receiver. That way, no matter where the content came from, if the signature matched, the content would be the original. We have tried to push that idea. And yes, we know there are some caveats.

This is important because the performance of HTTPS compared with HTTP, excluding any proxies, is substantially different. In tests we made, a RPi4 could easily reach 10000 transfers/second in HTTP, but only ~250 transfers/second HTTPS (local network file, overprovisioned testing endpoint, same file for HTTP and HTTPS).

Comment Re:Hmm (Score 1) 389

I was establishing a comparison between the two. If you KNOWINGLY had something on your computer you know you shouldn't have and send it to repair, you're incurring in the same risks. I can't imagine someone as a surgeon not having even the slightest hint that such a thing might happen if he had something to hide.

Comment Re:Hmm (Score 1) 389

If you give your keys to a contractor for him to perform some work in your house, don't you have the common sense to predict that if he's there alone, he might be doing more than just the work he was supposed to like browsing through your stuff including your garbage?

Comment Re:Hmm (Score 1) 389

or just someone who downloaded some file expecting it to be something else and deleted it immediately... hence it being in the trash.
Stories of people downloading stuff, either by direct download or P2P and ending up with something different aren't all that rare.

Which is why if you do accidentally download something like that, you must clear your cache, empty the recycle bin and repeatedly overwrite all the free space on your disk.

Yes, because everyone knows how to do that. And of course, the commands to perform those actions are so easily available...

would a person smart enough to be a surgeon be dumb enough to send the computer for repair with a third party knowing it had child pornography inside?

Emphatically YES! Smarts in one narrow field doesn't guarantee smarts in every field: John Podesta is a Smart Guy, but he was stupid enough to fall for a phishing attack.

It's not a "field", it's common sense. He doesn't need to be an IT expert to know that he's taking chances if he sends a knowingly tainted computer for repair. It's just pure common sense, nothing else.

Comment Re: No shit Sherlock (Score 1) 389

Nobody has the right, but that doesn't mean they won't do it. No one has the right to pick your pocket or break into your house, but... you know where this is going.

Even I don't have any illegal stuff of any kind in my computers and, a few months ago, when I sent a laptop to repair the keyboard (single key replacement), something that absolutely needs no software interaction by the technicians, I wiped my drive completely. More than the fear of anything illegal being found, I was afraid for my own personal data, the probability of identity theft, my work falling into the wrong hands and the like.

Comment Re:Hmm (Score 1) 389

Yes, he might be paedophile, or just someone who downloaded some file expecting it to be something else and deleted it immediately... hence it being in the trash.
Stories of people downloading stuff, either by direct download or P2P and ending up with something different aren't all that rare.
Even a few months ago there was a story of someone downloading what they believed to be Ubuntu ISOs (IIRC), only to find out they were pretty nasty hardcore porn.
And like the article says, would a person smart enough to be a surgeon be dumb enough to send the computer for repair with a third party knowing it had child pornography inside?

Comment Ancient process (sort of) (Score 2) 126

This process is not completely new. A process related (or actually this one) was used by the ancient romans to produce a type of concrete that severely outlasts current commercially available concrete. That recipe was thought lost, but recently someone managed to replicate it. It used see water, high quantities of carbon and volcanic rock/ash. It is good that new uses have been found for the process or to similar processes.

Comment Re:didn't this happen in 2014? (Score 1) 130

It's not an anti-Microsoft soundbite. Actually, some time ago, when the news came out about Microsoft starting the collaboration with Xamarin and the Mono team, a lot of people warned about this and used that exact expression. I was one of those who defedend Microsoft. But now, the pattern is emerging. So no, it's not an 1990 stupid anti-Microsoft soundbite, it's a reasonable expectations since the company, still today keeps applying the same tactics.

Slashdot Top Deals

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...