Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Not the phone (Score 1) 243

I'll do you one better. My dumbphone costs me $100 US a year for voice and messages (I turn text messages off, though -- the phone's too small to type on with my fat thumbs), and any money I don't spend on calls gets rolled over to the next year. The phone doesn't use data, and I don't need it to. Email and Internet's what my laptop is for. Why would I want to spend $35 each month when what I've got now is more than I need? Oh, and that $35 is just the starting point. After you add state and federal fees, it's more like $50 a month.

Comment Bad Idea (Score 0) 175

I'd file this under the "Gee, mom, look what I can do" school of programming. It makes the assumption that every Linux user in the known universe has a smartphone and enough data minutes left in the month to play around with a QR code and a web page. I'm a great believer in the "KISS" principle: Keep It Simple! Your powerful computer just fell down and can't get up, so now you want to make it create and display a fancy bit of graphics? This sort of error is too important to rely on playing "stupid computer tricks"! What if it's a text-only server installation and there *is* no GUI available to display the QR? What if displaying the QR code *itself* causes an error? I'd hate to be using version 1 of *this* change! Besides, this sort of fancy error display belongs in User space, not the Kernel (IMHO). Simplifying the error message with ordinary, everyday language the user can actually write down with (gasp) pencil and paper is a much better approach than trying to impress people with how 1337 you are. /rant

Submission + - OpenSSH has a new cipher, chacha20-poly1305, from D.J. Bernstein!

ConstantineM writes: Inspired by a recent Google initiative to adopt ChaCha20 and Poly1305 for TLS, OpenSSH developer Damien Miller has added a similar protocol to ssh, chacha20-poly1305@openssh.com, which is based on D. J. Bernstein algorithms that are specifically optimised to provide the highest security at the lowest computational cost, and not require any special hardware at doing so. Some further details are in his blog, and at undeadly. The source code of the protocol is remarkably simple — less than 100 lines of code!

Comment Nothing New Here (Score 1) 141

When I was a teenager, I made copies of streaming audio all the time ... using a reel-to-reel tape recorder and a pair of alligator clips attached to the speakers of a table radio -- all to capture the latest "top 40" pop tunes in glorious monophonic sound. That was back in the sixties, and the music world didn't come to an end because I didn't spend money I didn't have in the first place, nor did the huge multinational music companies crash and burn in bankruptcy. However, later on, when I *did* have money to spend I collected thousands of record albums and 45's. Even later, I re-purchased everything on CD's.

Tell me again why this sort of recording activity is *costing* companies money? Seems to me that it's more of an investment in the future.

Comment New Jersey Just FInished Removing Them (Score 1) 1173

Until the 1990's, the main route between Philadelphia and Atlantic City had at least two Roundabouts. The earliest time I remember seeing them was during the late 1950's as a passenger in my parent's car. So, this is not a new invention this side of the Pond, but an old one that has been tried and abandoned after decades of use. I had the opportunity to drive this route before they were both redesigned, and I can tell you that the design is only effective when traffic is very minimal. It's extremely hazardous with high traffic volume.

The State of New Jersey clearly knows this, as does any American driver who has experienced what I believe is a misguided attempt at a "Can't we all get along" society. If you've ever seen the original Death Race 2000 movie, or played the Carmageddon series of video games, then you know what the highways are like in the Philadelphia area.

Properly configured traffic lights are much preferred to the risk of physical harm the Roundabout represents.

IMHO, YMMV

Comment Re:Version numbers (Score 2) 188

Google has grabbed a bunch of open source libraries, sometimes respecting the license, hacked on them, and rolled them into Chrom*.

If you have any cases where you think that Chrome is failing to comply with the terms of a free software license, then please file a bug at http://code.google.com/p/chromium/issues/list - we take license compliance very seriously. (I'm a Google engineer, though not working Chrome).

Comment Re:OpenSSH is not vulnerable (Score 4, Informative) 31

No, it is not vulnerable to this attack. The Brumley/Tuveri paper describes a timing leak in a specific algorithm that is only used for elliptic curve crypto over binary/GF(2m) fields. OpenSSH uses ECC over prime fields that use different algorithms that have no known timing leaks. A result against ECC using prime fields would be more difficult because the curve point components are integers and so can use well-tested modular arithmetic code.

Slashdot Top Deals

The finest eloquence is that which gets things done.

Working...