Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment The republic is now in danger (Score 1, Insightful) 1183

All this impeachment has done is made a mockery of the constitutional intent of impeachment. A still officially secret whistleblower was used as a pretext to draft articles of impeachment for leaps of logic that are neither high crimes nor misdemeanors. The Soviet show trial style hearings of the House Democrats will lead to the abuse of the impeachment process in the future for frivolous reasons. It will also probably cost the Democrats the House and the presidency in 2020 by galvanizing the Republican base around Trump the way that's happening in Virginia with the proposed gun laws. Benjamin Franklin was right: we have a Republic, if we can keep it...

Comment Re: Regulator, not judge (Score 1) 109

> why do I need a permission from the government to offer somebody a ride to begin with? Why do I need permission from the government to let me perform surgery? Why do I need permission from the government to let me run a daycare? Why do I need permission from the government to let me run a bank? When you start understanding the answers to those questions (i.e. the concept of negative externalities), you'll understand why Uber is banned in London and should be banned elsewhere. Until they start offering commercial auto insurance, do background checks and offer training to drivers on what constitutes a minimum grade of service, this isn't a level playing field and goes back to the very same problems that led to taxi regulation a century ago.

Comment LinkedIn /= Facebook (Score 4, Insightful) 261

I use LinkedIn mainly as a Rolodex and job search tool. I see so many former and current colleagues talking about politics, religion, and lots of other non-professional subjects. It's ludicrous and divisive, and I don't get why they don't stop. I'm even afraid to tell them to stop because they'll think I'm against their position rather than because I don't want prospective employers and customers to see their political positions. Unless your job is in politics or in religion, don't mix these subjects up with your work life and don't even respond to others in those discussion threads that are their to egg on participation so LinkedIn can sell promoted links and ads. Amazing how much controversy drives social media revenue^H^H^H engagement...

Comment Re: 1. Wifi handshake; 2. ???; 3. HACKED (Score 1) 29

KRACK can be used if either the AP or the client is unpatched, like older Android phones or game consoles (of which there are a lot). The only defense against unpatched clients is to set the EAPOL key retry limit to zero, meaning no key renegotiation through injection of a retry request will occur and the entire connection will have to be re-established. This is easy to change on a commercial-grade AP like a Cisco Meraki, or a home Wi-Fi router running OpenWRT. Everyone else is vulnerable if an unpatched client connects.

Comment It's not about market share or growth... (Score 5, Interesting) 56

...it's all about profit and return on investment relative to the next best rate of return on money. The value of a stock that has no prospect of substantial positive returns in the long run and is a net debtor is zero. High school math, in other words.

It's even worse when people start realizing the business models that push fixed costs onto the gig economy employees, like those who use their cars to deliver people or food. A basic analysis of competitors and substitutes in a market could crush the basic business models of the majority of these startups. People are waking up to the reality of classic economics and stock valuations beyond the "irrational exuberance" being exhibited yet again for another generation of suckers.

Comment It must be true if ADL and CNN say it, right? (Score 4, Insightful) 495

Neither of these organizations have any credibility any more, nor are they in any way authoritative, when they fall for a 4chan troll. What it does do is bolster their "narrative" to incriminate and stigmatize anyone who uses it.

But if you're from another culture where it means something other than "Ok" or what the ADL/CNN claims it is, that must make the ADL or CNN actually racist.

Comment Twice the speed of Morse code? Lolwut? (Score 2, Insightful) 102

This is the most meaningless statement I've heard in a long time. Most proficient radiotelegraphers send at a minimum of 20wpm, assuming five-character words on average. A real speed demon could do 40. Assuming representing 26 letters takes 5 bits, 39 bits per second is ~8 characters per second, far below a slow talking threshold like 40wpm. Reminds me of the Simpsons episode where the Balkan car salesman tells Homer the used car will get 300 hectares on a single tank of kerosene. Funny but meaningless. I would've expected some forethought in this kind of article.

Comment The black light of scrutiny is dim... (Score 1) 44

To paraphrase Stalin: He who submits the code decides nothing. He who commits the code decides everything.

Part of the problem with Open Source is not the concept, but the way it is run. Egos, politics and conflicting interests often dominate open source projects, but the conflict specific to this problem is the conflict in time commitment required to test and audit code changes. Many of these projects are side projects for people and don't often get the commitment they need. But even when the project is a primary focus, there's an inherent indifference about the process at times because of assumptions. Black hats exploit assumptions and indifference first simply because they're invariably the proverbial weak points in the armor. Look at the chaos that ensued with TrueCrypt and how monumental an effort it was to audit the project sufficiently - it resulted in essentially a new project (VeraCrypt) and a new philosophical approach due to the implications of back doors.

Security should always be a top concern because of the complexity of large systems. Contributors need to be validated for identity and digitally sign their code every single time to prevent attacks. Contributor accounts should require multi-factor authentication. Submissions need to be more thoroughly tested and independently audited more rigorously before a commit. The more critical the code, the more rigorous and open a process should be applied. Those projects that don't comply to these standards should not be used until they prove they can achieve proper security. Political pressure to make releases should be pushed back on if there is any material doubt about the end result.

Until a commitment to the black light of scrutiny starts coming down harder, these types of exploits will continue to cause havoc.

Comment It's not bullshit (Score 5, Informative) 67

What they did was completely insane, but possibly not bullshit. This topic is covered in better detail at and they're not bullshit artists, though anything is technically possible.

Most modern process technologies run on either 12" or 18" wafers. I don't know what the wafer map looks like and I'm too lazy to do the geometry, but it may literally be one die off a wafer at that size.

The things that would concern me personally as a former lead ASIC designer are:

- Design - over that kind of silicon area, how many possible clock domains and PLLs do they have? There'd have to be a lot of clock domains asynchronously latching data because even at low speeds you'd have enough clock skew to choke a blue whale. And what tool could actually place and route and what kind of memory/CPU did it have? How was power and signal integrity closed at this scale as well? And what type of front-end and back-end back-annotated simulation did they conduct, or was this all reliant on formal verification + static timing analysis? I'm even curious how long physical design and design-rule checks took on this.

- Testability - in several respects, this is a monster to test, so how long does scan/BIST/memBIST take to run, what kind of probe card and load board was designed to test this at "wafer sort" (and I use that term loosely), and how do they deal with things like gross IDD (i.e. dead shorts between power and ground)? I get that they have some kind of built-in self-repair, but one gross IDD failure and you're literally cooked. Yields must be utterly dreadful even with a stable process at a Tier 1 fab.

- Packaging - again in several respects, including how was the packaging designed, what type of I/O and power distribution scheme was used (at 15kW no less!). I'd also be really concerned about what type of heat dissipation at that much power they have, and how they prevent warping of the package substrate because of thermal differences across the area of the die/package. Is this even possible with FR4 or did they go to PTFE or some other material? Same with once it's placed on a board.

- Product - what kind of I/O is this thing supporting? How many layers of PCB did they use for this? What actually feeds this thing data coherently? Where does it all go?

Bluntly, that's a lot of questions. The fact that nobody heard anything about this up to now may be a factor of NDAs, but this monstrosity is so beyond the pale from a design perspective that I don't know that I could take someone seriously if they even told me to work on this. Again, I'm not saying it's impossible, but I'm saying that truly nothing like this has ever been attempted, and I would be much more reliant on a subdivided design with fast interconnect even when they're talking about the type of computing problem they're trying to solve. Let's see the package alone, and it'll answer some more questions for us.

Comment 47 CFR 97.113 (a) 5 is 100% clear on this (Score 5, Informative) 185

No amateur station shall transmit communications, on a regular basis, which could reasonably be furnished alternatively through other radio services.

Part 97 also specifies that there should be no pecuniary interest, meaning compensation for services, except for those related to the service.

What Part 97 doesn't specify is that its licensees are hobbyists, but that is completely irrelevant. The FCC, in agreement with the IARU, has agreed to set certain conditions for licensing and the use of the spectrum within the agreed-upon areas.

The folks who run Winlink are using the same arguments as the folks who ran Backpage or Craigslist "personals", i.e. that they don't know anything and don't control what goes over their services. The reality is that they, like Backpage or Craigslist, are facilitating unlawful communication and allowing a lot of folks (e.g. mariners) to avoid using commercial paid marine radio and satellite data services. It's even worse when considering the high frequency trading data that has been going on in the amateur radio bands.

This all has to stop. The FCC needs to step in and start issuing huge fines, if not criminal referrals to federal prosecutors. If these folks don't like the law as written, they can work to change it using legal means. Until then, they shouldn't get their way. Their dislike of it doesn't somehow allow them to flout regulations any more than if they were on police bands or cellular or broadcast or aircraft frequencies. It's good that this battle is finally being fought.

Comment So what about the bias, critics? (Score 2, Insightful) 199

None of the critics are proposing a single alternative to gathering information on if bias is occurring or not, as any good scientist with a hypothesis would test. It's what you'd expect from those who benefit from not criticizing the platform they are part of.

Social media is known to protect sexism and violence. An example of this is Clementine Ford, a sexist Australian woman who has tweeted hateful statements against men to goad them into reacting to then turn around and portray herself as a victim (see https://twitter.com/cantkillam...) yet still somehow has an active blue-checkmark Twitter account. Same with Peter Fonda's still-active still-blue-checked Twitter account talking about Trump's 12 year old son Barron being put in a cage with pedophiles (see https://www.nytimes.com/2018/0...). Same with the systematic deplatforming of so many other conservatives who have made nothing more than controversial statements against the political beliefs of the owners of these platforms. Meanwhile, terrorists continue using these platforms to recruit and coordinate illegal activities (see https://www.nytimes.com/2019/0...) .

Private platforms have the right to censor whatever they want, but not in a fraudulent way. The fraud here is that their policies on hate and violence are being inconsistently applied with bias against those with conservative viewpoints so the contract that is formed with the person signing on can't be reasonably relied upon. That threatens social media's 47 USC 230 protections regarding immunity. Even if there are concerns about how the information is gathered and what will be done with it, I think this is the executive branch attempting to gather evidence to go after these companies.

I do miss the days when our biggest problem online was a couple of lawyers spamming Usenet.

Comment And if you forget to reverse it... (Score 5, Insightful) 311

...it's entirely possible to get an unauthorized extension installed. A much better and safer method, if much less convenient, is to enable them temporarily using about:debugging, then clicking on the xpi in the profile folder for each desired extension, and not closing the browser.

Let's face it - this is a true epic fail if there ever was one. Whoever was responsible for renewing certs should be terminated. There is ZERO excuse for this. On a Friday fucking night yet.

Just watch for all the malware infections coming, not to mention users defecting to other browsers.

Shame on you, Mozilla. The public needs an alternative browser more than ever and you monkey-wrenched yourselves hard.

Slashdot Top Deals

The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford

Working...