Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:So many extra fees (Score 1) 91

"you can do the same thing with the European system. On the receipt you just have to break down the advertised 9.95 Euro price into merchandise and taxes."

The national sales tax (VAT, or the local-language equivalent) is always printed on the receipt in the EU. Other taxes that come to mind: tourist tax on hotel stays, which is also printed on the receipt (city-dependent fee, not always listed up-front) and "extra costs" on plane tickets which used to be treacherous but must be included in the ticket price nowadays.

There are special tariffs/duties on things like alcohol and cigarettes, but I've never seen them stated explicitly, not even in an airport duty-free shop.

Comment Re:Title is Spot-On Accurate! (Score 1) 85

the encryption approach is the right one. It's fast, easy and much harder to circumvent.

If you are paranoid enough to encrypt the data locally after receipt at the phone, then you had better also examine the how the sender and the snapchat server deal with the data. Better setup a public-key system and figure out how to do the key management without discouraging Joe and Jane User.

Comment Re:Title is Spot-On Accurate! (Score 1) 85

Due to wear-leveling and the likes that is not good enough for data that is supposed to be gone forever.

You're presenting it as an all-or-nothing issue. There are a couple of shades of gray in between. The internal storage of Android devices is typically formatted as ext4, wtih the wear-leveling (I think) done by the flash memory controller. Accessing the "overwritten" data would require quite a bit more work than just analyzing a block-device image. I suspect that you might have to desolder the NAND memory modules.

And even if the file is deleted but not overwriten, I don't think it's that easy to find the right blocks in the correct sequence; compressed JPEG data past the header data looks pretty much like random data.

Comment Re:I don't get it (Score 1) 85

"I just can't think of a situation in which I would send a photo to someone and subsequently care whether they saved it or not. "

Sending nude pictures to your (teen) lover while reducing the risk that they get to be seen by the rest of the school if the relation goes sour. Or to prevent being charged for spreading child porn, like these kids: http://www.connectsafely.org/Commentaries-Staff/teens-convictions-for-child-porn-upheld.html

Maybe cheating husbands and wives who don't want to leave too many trails. Although I'd be rather suspicious if my significant other had Snapchat installed on her phone...

Comment Re:CO2 at an active volcano? Who wudda thot? (Score 1) 497

"cool the air to -78C and then collect the solid precipitate."

At that temperature, the vapor pressure is equal to atmospheric pressure. It would be like measuring the water content of air by cooling to just below 100 C.

You'd need to go quite a bit lower in temperature.
http://en.wikipedia.org/wiki/Carbon_dioxide_data

Comment UDF file format (Score 3, Informative) 309

any good reason not to use UDF for large flash cards?

I have no personal experience here, but this UDF compatibility matrix does not look too promising. Apparently there are five UDF versions and three variants within each version, and only the oldest versions (from 1996-1997) actually have wide OS support.

A bit more googling produces more comments from users about tricky incompatibilities.

Comment Re:Nothing new (Score 3, Informative) 202

"What remains: not much, really. Some glass, stone, metals. Not much that burns well."

I'm not sure what country you're describing, but here in the Netherlands, we separate paper, glass, plastic packaging (PE, PET, PP, PS), organic waste, electrical equipment, chemical waste. Stones (e.g. from breaking down a wall) are not supposed to be mixed with household waste. Laminated materials such as potato crisp bags and milk cartons, styrofoam, discarded household items go into the "other waste" bin. I'm not sure whether I'm supposed to, but plastic with food scraps sticking onto it don't make it to my plastics container since I don't want them to rot and smell. My trash bags will burn pretty well.

For the Netherlands, I think company offices are a big contributor to incinerable waste. They separate the paper, but not the plastics. Many company restaurants are not separating compostable waste from what the employees leave on their trays.

Comment Re:"Cheap?" Who's still paying for chat apps? (Score 1) 242

thousands of bucks per GB cost of an SMS

I see the upside of SMS'es costing the sender money: it throttles the rate of incoming messages. I fear the day that the spammers figure out how to use Whatsapp for massive spam runs.

Too bad that here in Netherlands the telcos are moving to unlimited-SMS plans due to competition with Whatsapp...

Comment Re:Utterly irrelevant rubbish (Score 1) 417

From this and your earlier post:

tell me you are not this dumb! ... ridiculous ... If you are not a complete retard ... nutcase born-again Christian ... morons ... mathematically retarded and should be removed

Rational arguments could be more convincing than strong language and ad-hominem attacks.

Comment Re:Utterly irrelevant rubbish (Score 2) 417

Motor vehicles are behind about 15% all CO2 emissions.

True on a world-wide scale. However, in the US, 32% of CO2 emissions is from transportation. It's harder to find numbers on motor vehicles in the US, but the closest I get within 3 minutes of Google is almost a quarter of annual US emissions of carbon dioxide (CO2). (...) The US transportation sector emits more CO2 than all but three other countries' emissions from all sources combined.

Unfortunately, it looks like there is no simple way to reduce CO2 emissions. Just saying "just cut all the CO2 sources except the my car, my airconditioning, and my incandescent bulbs" is a bit too easy.

Comment Re:Hashed and salted is obsolete (Score 1) 80

I'm glad they aren't using MD5, but wish they were using at least SHA-256

What kind of security flaws do MD5 and SHA-1 have that are relevant for password hashing? As far as I understand, those weaknesses are about attackers who may specially craft pairs of messages (passwords) that have the same hash, not about constructing a message that will generate a given hash without prior knowledge of the message.

The main thing that matters is how much effort it is to find a password by brute force and in that sense, you should use no hash algorithm that is designed for computational efficiency (as explained by your bcrypt link).

That said: I used to have an encrypted home directory on a netbook with an Atom processor; the encrypted filesystem (ecryptfs) used some kind of slow hash function -- that would generate about 5 seconds delay upon login and even upon unlocking the screen. So, take it easy with those slow hash functions...

China

US and Russia Lead List of Malware Hosts 39

Trailrunner7 writes "China has become the go-to bogeyman behind every cyber attack or malware campaign, but if you're looking for the most malicious hosting providers on the Web, you won't find any of the top 10 in China. In fact, the United States and Russia have many more bad hosting providers in the top 20 than China does. ... [One] interesting data point is the appearance of Amazon in the top 10 list of providers hosting the highest concentration of infected Web sites. These are the kind of sites used in drive-by download attacks and to deliver exploits from exploit packs. Amazon, with more than two million IPs, ranks fourth in the list of providers hosting infected sites. Also on that list is Google, which comes in at number seven. The top spot belongs to Mail.ru, a Russian hosting provider."

Comment Re: Can it access media over ssh? (Score 1) 114

what URL? what webserver? won't work over ssh. wont work OVER your connection. it has to work VIA it to be feasible.

I'm using Gnome 2 and Compiz, so I'm not sure whether this translates to your platform, but in the Gnome file manager I can enter sftp://username@hostname:/home/username/foo.jpg . I guess the problem is figuring out as which hostname the server is accessible, which will probably mean an old-style ~/.tyls configuration file ("When logged in from 192.168.1.14, then prefix the pathnames with sftp://bob@192.168.1.5/"). Since this is completely separate from Terminology itself, one could implement this right now as a lightweight Perl script that can run on a NAS.

now to display a thumbnail i could have tyls generate small low res thumbs itself and embed the thumbnail image inside escape

Well, for remote hosts I think a generic "This is an image" or "this is a video clip" icon should do, otherwise you might be sending huge amounts of data over a 1 Mbps data connection.

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...