Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment All for nothing, but the chicks are free? (Score 3, Interesting) 483

808 hp in a country with 70-75-80(-85) mph speed limits,

What will happen with american built high power cars when - perhaps even by committing a crime - being pushed to the max speed? (breaking apart?)

Because its no such big deal to put much power into a car, the problem of aerodynamic lifting forces come into play interacting with shock absorbers.

The space between the street and your cars under-floor at high speed can make out the difference between driving and flying,
because more distance to the road = more air being pushed under the car = lifting your car off the ground.

So a bump on the road can send you flying, and I don't think american highways are designed for speed like the german "Autobahn".

Just saying:

https://www.youtube.com/watch?...

Comment Macron the sly french fox of all trades! (Score 0) 671

Option A.
His team intentionally leaked prefabricated and "russianized" files, with false flag offshore bank account information to blame russia and its alley Le Pen - because they knew Le Pen could not keep her mouth shut after finding out that Macron would have an offshore bank account.

Option B.
Or his team new they would be hacked so they planted "russianized" files before hand to have "good" publicity and give Le Pen bad publicity.

Option B. is mostly out of the question, those internal information mostly has unfavourable points and you don't want unfavourable things to be leaked, because even if you blame russia, the unfavourable information would be out in the wild - bad for Macron.

Option A. has basically the same caveat as Option B. the unfavourable information that would "signal" it to be legit.

Guys, its plain simple, Wikileaks has been duped.

And I think that Wikileaks has done good things in the past, but they now fall short because they just leak .. they do not work together with the press for a responsibly disclosure policy.

Opening their flank wide open for Trumpets and GOPhers and demoRATS alike to shame Wikileaks for "endangering" lives and threatening national security - because without a responsible disclosure policy and support from the press that's the easiest way to counter wikileaks.

The ego of Julian Assange plays right into the hands of the bad guys - russia, america, 5 warts they all have agencies, that all bend and break the law to their liking and spy on each and everyone - and wage war just to name it.

Sadly Wikileaks is currently a sock puppet. Wikileaks needs to go back to be a tool of democracy and against abusers of power - equally.

But with an Assange in hiding and in fear, wikileaks is weak.

Assange needs to leave the embassy and get to Sweden,
if sweden dares to extradite(*) him to the U.S. we will have a good discussion in the media about wikileaks and the good they have done ..

(*) I cannot imagine that Sweden will extradite him especially in the face of the european court for human rights, the current administration and their publically "expressed" interest in human rights and humane treatment (water boarding != torture and so on) - Sweden simply cannot extradite him.

But Sweden could be obliged to grant asylum for Assange due to his situation.

If would face death penalty, Sweden cannot extradite him right away -> European human rights charta.

So generally I would suggest that Assange leaves the embassy earlier than later especially in the face of the "Brexit"
because the Brexit will perhaps leave Assange in the hands of the english judical system .. and 28 days later Trump has his trophy.

Comment Leadership is more than giving and taking orders. (Score 1) 230

As you did, one can easily state that giving and taking orders is the prime mode of operation in leadership, and in the meantime it is.

However especially in times of crisis you need soft skills, you need to have leadership to build up a working team a unit of individuals that works seamlessly, is mentally stable.

A crisis situation will draw out the real personality of a human and a solid team will stick together and control the extremes.

And part of that is team building encouragement and a certain amount of leasure time - and even if they want to smoke or to vap - its a stress releave mechanism anyway. Smoking/vaping is also a social mechanism. (smokers group together)

Military is team work.

This is why even in the military you need to take account of the human factor, when you ignore it, you will destroy your resources.

Comment Trying to draw the specification for this or not . (Score 5, Interesting) 151

If you decide to implement server-level encryption across all your servers,

This is basically simple you can build a server that does all encryption in ram, meaning the OS is loaded once then the encryption key is used to have it decrypt the content for the outside.

To stop tempering you could setup such a server yourself and equip it with various sensors that detect presence of people or tempering, and if detected it could shut down not compromising the encryption key to forensics.

Firewire(because of its DMA) needs to be disabled and unkown devices need to trigger a shut down event and must otherwise be ignored

con:
However this type of server would still emit the key data as radio spectrum.

con2:
The requesters question is quite sketchy, I suggest writting a specification first with the neccessary "must haves" and possible use cases.

my iscsi-encryption approach
So I can only explain my private approach, I got a root server with big harddrives and those harddrives are exported via iscsi that iscsi-connection is tunneled through ssh.

I de-/encrypt & mount the drives only on my home server and sync the directories with rsync. The harddrives are double encrypted meaning I have two encryption devices and two dependend keys.

This sounds slow, but it isn't I get nearly the full upload bandwith of my connection.

Meaning my root server never "knows" what data is backed up on it - its a "dumb" server

I would suggest a similar approach for the requesters situation, because it solves a first step, separating the encryption key from the encrypted data.

And a second step having two encryption keys making it more difficult to get all two if separated (which is contrary to my use case)

I would expand my approach there to have a "data" server, a level1 encryption server and a level2 encryption server.

level1 decryptes the first encryption layer and level2 does it with the data provided by level1

Usecase:
If only the data server is seized, shut down at least one of the intermediate servers along with its key and the data is inaccessible. And it doesn't matter which "key keeper" server you kill, its a fail-one-fail-all system.

The drawback is however the level2 encryption server shall not be compromised, because there all pure data is accessible.

encrypted backup
With todays highspeed connectivity the servers can be backed up by just cloning the harddrives over iscsi for example, that works quite well.

another idea
Most encryption providers from linux and bsd provide the possiblity of having more than one master key.

Iscsi can also work on image files so you can provide many independed iscsi-volumes and encrpytion can be outsourced to the users computers.

Comment Re:Is this news going to bring them more business (Score 4, Interesting) 164

Question is: How do you handle the data on a customers computer?

Here is how I handle it:

When I need to reinstall a computer:

1.) Before I do the installation or data gathering I generate a 1:1 hard drive image and I store that on an encrypted drive.
(checksumming of origin and copy included)

This is why I take the computers mostly to my lab to return with a fully prepared, clean and backed up computer.

2.) The backup is then bzip2-ed for space saving.

3.) Then the target hard drive is zero-ed out.

4.) Prior to this backup I gathered the data that needs saving - together with the customer.

5.) Only operate on a need to know basis, before I open a folder I ask the customer, and I only ask and do when it is really neccessary.

6.) I do only copy "blindly" and let the customer know beforehand what I'm going to do next and why - on a non-technical level.

7.) The encypted backup is afterwards stored on a lended hard drive I give over to the customer and I get that drive back after two months and tell the customer - when he remembers anything that needs to be looked up, to call me, and I let them have the drive for longer time when they aren't sure.

The first thing I do when getting a drive back - sure zero-ing it out.

I have a sufficient collection of smaller and larger checked hard drives that my former customers donate to me for deletion and for keeping.

Prior to the hard drive solution I longterm stored the data on LTO-5 tapes and gave these to the customer - I got a bunch cheap for 3-5 EUR per 1.5Tbyte tape - but the prices grew to much.

Yes, I have nice customers and I let them exactly know what I do with this donated drives. The compression from 2. comes in handy there.

8.) The encryption passphrase is later changed to be known to the customer only or directly when I do "on-site" work.
- yes I do train my customers to remember the phrase and I let them test it several times.

Why:
- I do only know what I need to know (when I don't know I'm not required to act - like I would need to do, if get to know about the presence of anything criminal on the computer)

- I have generated a backup and can revert data to that state
but at the earliest possible point in time I surrender that data and the knowledge about the encryption key to the customer

- the amount of unencrypted or "only-deleted" data is minimized, by zero-ing out the hard drive prior to reuse or even disposal

- the customer is aware and in control of all my actions because I'm laying them out transparently before I act

- My customers are satisfied and I get recommended to their family members and friends - and yes its still a hobby I do not do advertisement

Comment Mass & kinetic Energy - Extinction (Score 1) 308

Ok, people pointed out the complete bullshit number about the actual - inflation corrected worth.

But there is another vector that needs to be taken into consideration, that has a devastating effect on bigger space mining undertakings.

To make it short if done on a big scale space mining could change the earths orbit and rotation period.

And this is what most fly-highs do not take into consideration.

1.) every planetary body in our solar system is there and "does" that because it has a mass, and a certain kinetic energy

a.) also mass distribution plays a role (moon tide = earth has changing mass distribution, "wobble, wobble")

2.) .. and interacts with other bodies through the "mystic and largely unkown" force of gravitation - its so unkown many people just jump and do other silly things and consider to survive ..

3.) these properties make the planetary bodies move in such elliptecal shapes as they do.

From 3.) change them by mass and the momentum/energy that is "glued" to the mass, you change how the planetary bodies will behave.

Yes, this happens contiously. Earth is loosing as well as gaining mass - naturally. Helium can escape the atmosphere, but meteors are hitting the earth, transfering mass and energy.

And the Apollo missions transfered mass to the moon.

The key point is the scale you'd do that and when thinking in "deathstar" categories you can predict a big change.

If you can't imaging it, go ice skating and do a pierotte and pull your arms to your body.

What in consequence might happen I can only guess , however I know something will happen.

Because you change the system on a big scale. .. our planets relative distance to the sun has considerable effect on our climate. .. the day/night cycle has considerable effect on our life.

I call this the real "masseffect"

Comment Re:Rate of prion conversion dep. on ingested amoun (Score 2) 133

From what is known this cannot be correct.

1.) Because the test is a blood test, testing for prions present in the blood and multiplying them. Also do the prions accumulate in the tonsils and so on.

Meaning: you will ingest prions and they can/will accumulate in you.

2.) even by todays slaughtering standards, like separating the brain early out and sucking away the spinal mass. It cannot be excluded to contaminate the meat.

Because to get to the spinal mass you need to cut it open. Also is the carcass split into halves by a chainsaw,
does cut bones open to the marrow.

And many industrial slaugthering houses do not adhere fully to the standards, its a very rough business.

3.) the cases of vCJD in the UK cannot simply be explained to be only have been transmitted through brain tissue, because these people ate meat but perhaps they ate hamburger meat where you'd cannot really tell or taste if there was a brain among.

Comment Rate of prion conversion dep. on ingested amount (Score 1) 133

The problem with prions is that they need to multiply over time.

Having a very early onset means you'd likely had ingested huge amounts of prion contaminated beef. But even if you have ingested some amount you might get hit later on, this is what they meant with "decades".

So his conclusion is correct.

Because he reduces the prion ingestion - there are still cows getting diagnosed, but the diagnoses is only done on older cows and on cows that show symptoms!

And because the symptoms show up lately the unsymptomatic cows might have also infected you before.

Slashdot Top Deals

The human mind ordinarily operates at only ten percent of its capacity -- the rest is overhead for the operating system.

Working...