Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Odometer? (Score 1) 792

Or, instead of forcing consumers to buy some expensive gadget that could potentially be used for invasion of privacy, we could just use the simple odometer that is installed in every vehicle nowadays. The extra time spent having a person verify the odometer reading every year when the tag is renewed is nowhere near as wasteful as creating a whole new electronic system. That is, of course, if you're going to insist on having this sort of tax.

Comment Re:or 2.5" drives? (Score 1) 495

While doing your calculations, you forgot to take into account that a big rack of disks isn't going to give you any data unless you have power. So add a couple thousand pounds for a PDU. Wait, the PDU needs power so add in transformers, transmission lines and generating stations. That rack will create heat so be sure to include the cooling. That generating station will need a source of fuel so include the coal/water/whatever.

We can go on and on with these stupid metrics.

Security

Submission + - Can card transaction be individually protected? (consumerist.com)

way2trivial writes: Dear Ask Slashdot:

I'm reading an article at the consumerist http://consumerist.com/5260257/credit-card-processors-launch-a-new-strategy-to-defeat-theft that says credit card processors are trying to come up with ways to protect card data from theft- largely by securing it into smaller little chunks...

I am a credit card accepting merchant, and know from my interactions with credit card proccessor salesman and technical support that I have a better than average understanding of the means by which credit card transactions move around. After reading that piece I researched a little more more and verified what I thought I knew. For primers see http://en.wikipedia.org/wiki/Credit_card_numbers and http://en.wikipedia.org/wiki/Public-key_cryptography

The question I've been unable to answer for myself is- why not make every individual transaction a secure chunk?? Public key cryptography should enable the possibility of ALL the individual account data to be unreadable from the point of leaving my terminal until it hits the issuing bank. If my credit card terminal contained for each of the the six digit issuer identification numbers (IIN) a public key- why not wrap up the entire rest of the transaction in a public cypher-- send it to my processor- who sends that encrypted packet to the issuing bank, who decodes and sends back an approval with a re-encrypted proof of same... the only thing my processor needs to get paid and pay me is my merchant #, the 6 digit bank that I sent it to, and the dollar amount I ultimately expect to be paid on-- when the reply comes back- my processor knows if it was approved. Any individual interception en route or stored by individual merchants electronically is useless.

The only potential flaw I can think of on my own- is that perhaps as all the original clear messages are of fixed length and format- it may prove easier to decode than a usual message. I don't know enough about the depths of public key methods to know if that simplifies breaking the private keys- but even if so a very long key may solve that.

Can anyone shoot a well reasoned hole through my solution?

Comment Re:solution in search of a problem (Score 2, Insightful) 354

Well, the other solution is to distribute anti-malaria drugs to millions and millions of people across these third world countries from now until.. well, forever.

Also, while you may not personally have to deal with malaria on a regular basis, lots of people do have to worry about it. Thousands, if not millions of people die from it. That certainly qualifies as a "problem" to me. There is no search necessary as long as you look somewhere other than your backyard.

Comment Re:Large, unmarked bills. (Score 5, Insightful) 424

They probably won't need luck if the following happened. Paperwork is drawn up stating that the terminated employee gets paid $2,000. Supervisor and employee sign off on that sum. Retard typing in the info for the check keys in $20,000 instead of $2,000.

The employee can't possibly think that he/she actually deserves the extra $18,000 after agreeing to the original sum.

Comment Re:Excellent for Internet2 connected institutions (Score 1) 264

Except that the traffic won't be going over the I2 unless Google decides that it wants to pay for connections between their data centers and the I2. Even then, I'm not sure the I2 group would allow it unless Google could bring something of value to the research effort other than faster searches, gmail and google docs.

I2 != IPv6

Sure, you can use IPv6 on the I2 but most people are still only using IPv4 on the I2. The I2 runs on completely different fiber than the regular internet. You aren't all of a sudden on I2 when you switch to IPv6.

Software

South Africa Appeals ISO Decision On OOXML 79

mauritzhansen sends us a blog post by Steve Pepper, former chairman of the Norwegian standards committee responsible for evaluating OOXML, reporting that the South African national standards body, SABS, has appealed against the result of the OOXML DIS 29500 ballot in ISO. From the blog: "In a letter sent to the General Secretary of the IEC (co-sponsor with ISO of JTC1), the SABS expresses its 'deep concern over the increasing tendency of international organizations to use the JTC 1 process to circumvent the consensus-building process that is the cornerstone to the success and international acceptance of ISO and IEC standards.' Having resigned as Chairman of the Norwegian committee responsible for considering OOXML for exactly this reason, I congratulate South Africa on its willingness to stand up for the principles on which standardization work should be based."
Censorship

US Plots "Pirate Bay Killer" Trade Agreement 529

An anonymous reader sends word that Wikileaks has revealed that the United States is plotting a 'Pirate Bay killing' multi-lateral trade agreement, called 'ACTA,' with the EU, Japan, Canada, Mexico, Switzerland and New Zealand. "The proposal includes clauses designed to criminalize the non-profit facilitation of copyrighted information exchange on the Internet, which would also affect transparency sites such as Wikileaks. The Wikileaks document details provisions that would impose strict enforcement of intellectual property rights related to Internet activity and trade in information-based goods. If adopted, the treaty would impose a strong, top-down enforcement regime imposing new cooperation requirements upon Internet service providers, including perfunctory disclosure of customer information, as well as measures restricting the use of online privacy tools."
Operating Systems

To Whom Should I Donate? 299

jasonmanley writes "I currently use DesktopBSD. The other day I gave some thought to donating money to the project, but then I got to thinking — to whom would I donate the money? DesktopBSD benefits from FreeBSD and KDE among other projects. What about software with a smaller focus, such as OpenSSH? In fact, there are heaps of other projects' software embedded in FOSS packages, and I would like to know who the community thinks should get the donations."

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...