Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:I'll be keeping mine (Score 2) 257

I work at Google, in the facilities automation group. Google is really good at designing warehouse-scale computers that maximize the efficiency of electrical usage and heating/cooling. I suspect that this Nest acquisition is an attempt to leverage some of their heating/cooling expertise.

I fully expect that no one will believe this and will chalk it up to an advertising opportunity.

Comment Re:congrats guys and gals (Score 4, Interesting) 293

I work at Google.

Before anything was reported by Snowden, plans were already in place to protect user data. It started with the switch to HTTPS, continued with us encrypting user data on disk, and we were beginning to encrypt data that was transferred between datacenters. The revelation that the NSA was tapping into undersea cables only accelerated the timeline.

Comment Re:violation of trust (Score 1) 109

Google hacked your browser? Or they just used a standard web technique to get results for a +1 button and Safari piled on a bunch of extra cookies?

Why would Google do this? If we assume that it was intentional, they must have known that, with all the scrutiny the company faces, someone was going to figure it out? And what would they get in return? A little bit of data on the handful of people who upped their Safari privacy settings and are unlikely to click on ads.

Does that make sense?

Comment Re:Oh for crying out loud (Score 1) 325

Is there any evidence that email are used to build up a profile? I have never seen the contents of an email reflected anywhere else aside from right next to that same email. I get ads based on what I do web searches on, but I've never seen and ad based on my email correspondence, except for right next to the email message.

Comment Re:Just askin... (Score 1) 221

The transmission is encrypted with ECDHE, an Elliptical Curve Diffie-Hellman Exchange. Each connection is encrypted with a separate secret number which is dynamically generated and known only to the endpoints of the connection. The NSA or anyone else might be able to watch all the traffic, but it will still take anyone years to brute force it.

Do you understand how ECDHE works?

Slashdot Top Deals

You will be successful in your work.