Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Gold has value in a working economy (Score 1) 249

Petrol may well be more valuable than gold in a Mad Max scenario, but don't think for a moment that any collection of humans will not want a way to disintermediate their labor and have a means of trade.

Within their society they'd use reputation-based credit, and with outsiders they'd use petrol. It's not clear why they'd need gold at all in your example.

Comment Re:No surprise in the collapse (Score 1) 475

The problem is that there are an infinite possible number of cryptographically signed digital currencies.

I'm not a BitCoin fan, but I'm not sure I buy this argument, because it seems too close to saying "gold can have no value because lots of other metals exist." How do you differentiate those two arguments?

Comment Re:Splendid (Score 1) 321

I understood him to be commenting on the number, not the existence, of the photos. I'm the designated archivist for the family's (7 members in 2 households) photos. At last check , I have about 20k photos in the archive. It's hard to imagine having "hundreds of thousands" without having enormous amounts of redundant or irrelevant photos, which is what the parent post is poking fun of.

Submission + - Bitcoin protocol vulnerability could lead to a collapse

stanga writes: Cornell researchers unveiled an attack on the Bitcoin mining protocol that enables selfish mining pools to earn more than their fair share. In a technical report the authors explain this attack can be performed by a pool of any size. Rational miners will join this pool to increase their benefits, creating a snowball effect that may end up with a pool commanding a majority of the system's mining power. Such a pool would be able to single-handedly control the blockchain, violating the decentralized nature of the increasingly successful Bitcoin.

The authors propose a patch to the protocol that would protect the system from selfish mining pools smaller than 25% of the system. They also show that Bitcoin can never be safe from selfish mining pools larger than 33% of the network, whereas it was previously believed that only groups larger than 50% of the network were a threat to the system.

The question is — can the miners operating today adopt the suggested fix and dismantle too-large pools before a selfish mining pool arises?

Comment Re:the difference (Score 1) 473

" All the good learning and counter points that have helped me grow, or pissed me off entirely, have been in forums and comments. Not in books."

Reading a book gives you a well-reasoned, long-view argument but omits alternate perspectives. Reading comments on internet news gives you those alternate perspectives but the articles often can't see the forest for the trees, unless you're specifically visiting a site that does long-term-research, multi-page articles. I've found that the best of both worlds is to read a book, then to search on C-SPAN Video or similar sites to watch author interviews and viewer-call-in shows. CSPAN Book TV is really great for this purpose.

Submission + - N.S.A. Foils Much Internet Encryption (nytimes.com)

An anonymous reader writes: The New York Times is reporting that the NSA has "has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show."

"The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated."

Submission + - Encrypted traffic being intercepted

lucag writes: It appears that most of the encrypted traffic over the net is currently being intercepted and in some way decoded by NSA.
Here there are some references, unfortunately scant on the details that matter; actually it is not clear if it is broken algorithms, compromised protocols, MITM attacks or just plain old simple "enforced" cooperation by the providers.

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?smid=tw-nytimes&_r=0

Submission + - Michael Lewis on Serge Aleynikov

An anonymous reader writes: Michael Lewis discusses the Serge Aleynikov case at Vanity Fair:

Serge quickly discovered, to his surprise, that Goldman had a one-way relationship with open source. They took huge amounts of free software off the Web, but they did not return it after he had modified it, even when his modifications were very slight and of general rather than financial use....
Open source was an idea that depended on collaboration and sharing, and Serge had a long history of contributing to it. He didn’t fully understand how Goldman could think it was O.K. to benefit so greatly from the work of others and then behave so selfishly toward them....
The files contained a lot of open-source code he had worked with, and modified, over the past two years, mingled together with code that wasn’t open source but proprietary to Goldman Sachs. As he would later try and fail to explain to an F.B.I. agent, he hoped to disentangle the one from the other, in case he needed to remind himself how he had done what he had done with the open-source code, in the event he might need to do it again.

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...