Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment Re:Calling Wesley Crusher... (Score 1) 308

Which brings us to an interesting question... is the desire to live the product of addiction?

I think when the argument is taken out beyond 10K feet like this, it starts to break down. Self preservation instincts are about survival and need fulfillment, not addiction. Is my need to eat when I am hungry an addictive response? No. Is my desire to stop off an get a when I've already eaten enough for that time frame an addictive response? Maybe. That largely depends on your eating habits, but I think it still illustrates my point. The heroin addict doesn't need the drug to live (try telling them that), but they need it to quell the physical and mental addiction they've developed (willingly). I think its fallacy to say 'I am addicted to life, so that is why I eat/breathe/sleep.'


Submission + - Can card transaction be individually protected? (

way2trivial writes: Dear Ask Slashdot:

I'm reading an article at the consumerist that says credit card processors are trying to come up with ways to protect card data from theft- largely by securing it into smaller little chunks...

I am a credit card accepting merchant, and know from my interactions with credit card proccessor salesman and technical support that I have a better than average understanding of the means by which credit card transactions move around. After reading that piece I researched a little more more and verified what I thought I knew. For primers see and

The question I've been unable to answer for myself is- why not make every individual transaction a secure chunk?? Public key cryptography should enable the possibility of ALL the individual account data to be unreadable from the point of leaving my terminal until it hits the issuing bank. If my credit card terminal contained for each of the the six digit issuer identification numbers (IIN) a public key- why not wrap up the entire rest of the transaction in a public cypher-- send it to my processor- who sends that encrypted packet to the issuing bank, who decodes and sends back an approval with a re-encrypted proof of same... the only thing my processor needs to get paid and pay me is my merchant #, the 6 digit bank that I sent it to, and the dollar amount I ultimately expect to be paid on-- when the reply comes back- my processor knows if it was approved. Any individual interception en route or stored by individual merchants electronically is useless.

The only potential flaw I can think of on my own- is that perhaps as all the original clear messages are of fixed length and format- it may prove easier to decode than a usual message. I don't know enough about the depths of public key methods to know if that simplifies breaking the private keys- but even if so a very long key may solve that.

Can anyone shoot a well reasoned hole through my solution?

Comment Stillsuits next? (Score 1, Insightful) 349

Hmmmm. The pee levels seem good, needs more sweat. Preferably of the ball variety... Seriously though, this seems like it will have major implications for the future of space travel. One less thing to lug. Its still a closed system, so it won't completely eliminate the need to carry [i]some[/i] water, but still...

Slashdot Top Deals

I judge a religion as being good or bad based on whether its adherents become better people as a result of practicing it. - Joe Mullally, computer salesman