Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:GitHub may have a point here (Score 1) 35

legal theory here is that the takedown notice is not proper because the MPA doesn't have standing to file the takedown

That is a question for the courts to answer. The MPA is arguing that the code is for a tool primarily for infringing copyright. If the courts agree and also rule that the DMCA also grants standing for take-downs of tools that are, in themselves, not otherwise infringing on copyright, then the case could go forward.

Comment Re:Good (Score 1) 35

Charge the MPA with criminal offence for lying under penalty of perjury stating that they own the copyright

The MPA wasn't asserting copyright ownership of the code:

Rather, the MPA argues the code is used for the development of the site, which allows for copyright infringement, while the repo also makes it possible to create NYAA clones.

In other words, the MPA was claiming the code is a piracy tool.

Of course, nearly all tools that have legitimate uses also have illegitimate uses.

Comment Re:"...Firefox will "experiment" with ODoH..." (Score 1) 64

Also, FireFox has its own DoH settings: https://support.mozilla.org/en...

While FF's DoH currently lacks the additional layer of encryption (on top of HTTPS encryption), it's provider partners certainly could insert a proxy in front of the DNS resolver to provide some screening. Or their resolvers could simply just not log requestor IPs.

Comment Re:Does it work? (Score 1) 24

I recall reading, several years ago, about an unit that claimed to interpret brain signals associated with speech into words. Supposedly it was able to distinguish spoken vs unspoken (your "inner voice" you often use to silently rehearse something you plan to say, later) and only "read" the unspoken speech. The article claimed a vocabulary of about 150 words that could be recognized. Unfortunately, I've never found any follow up.

Comment Re:Finally, the Bald win out over the Mullet (Score 1) 24

i am trying to figure out how this could interface into my xbox

The linked article mentions the included SDK is Unity based and also mentions that enterprise partners who don't want to use Unity can be given access to the core API. So, can you write a Unity based game that runs on an Xbox?

On the other hand, writing code for a Unity based application to control external devices is certainly possible. There are Arduino projects for emulating HID controllers. Maybe one of those could be modified to emulated the Xbox controller.

Comment Re:This is stupid / invalid premises (Score 1) 4

Submission needs more detail and citations (links).

I think what the summary is suggesting is that some form of interactive coaching works better than putting all the rules in the user's face.

this is because

Also, amplifying what JustNiz said, more rules tend to discourage longer passwords/phrases. This is because the rules increase what the user needs to remember to remember the password/phrase. For example:

  • Start with "mypassword"
  • Add some non-obvious capitalization: "mYpaSswoRd"
  • Substitute some special characters: "#YpaSs%oRd"

And so on. Even as bad as this password is, the more rules there are, the harder for a user to remember.

Comment Re:Obviously (Score 1) 345

What good is avoiding a small discomfort if it leads to a bitter end?

Unfortunately, far too many people don't think that far ahead.

Complacency is far easier. It's also a major sin - right up there with the "7 deadly sins". Many people might not care if they are spied on ("I'm not doing anything wrong."), but their lack of care makes it harder for those who do care to get the problem fixed. And, sometimes, those who don't care find themselves wishing they had cared.

Comment Re:And here at home... (Score 1) 70

but I was there when they tossed my PPC software investment in the garbage by abandoning the PPC emulation

A friend of mine kept her G5 Mac Pro tower because she didn't trust Apple to maintain the PPC emulation. And given that the software she runs on it is almost as old as it is, it runs as fast as today's bloatware.

As for why ARM instead of including AMD as a second supplier of x86 CPUs, Apple has invested so much in their own ARM based CPUs, it made better business sense to switch Macs to use their own ARM-based designs.

As for the NVIDIA acquisition of ARM, when they can no longer make new ARM-based designs, I suspect they will adapt RISC-V to their purposes.

Comment Re:Wayland has no wire protocol (Score 1) 89

we don't have a SSH option for wayland

Except that MS is layering it with a wire protocol:

In WSL2, it connects the graphical Linux applications via a Remote Desktop Protocol (RDP) connection

Though whether this means that you can connect directly to a WSL2 instance in a Windows Server is not mentioned.

But this is still putting the Linux desktop in a window on the MS Windows desktop.

Back in the 90s, I remember using a program (from a company with "Hummingbird" in its name) that would 1-to-1 map X Windows windows to MS Windows windows. It even supported copy/paste between MS Windows applications and X Windows applications - even ones running on other computers - giving X Windows applications (mostly) equal status with MS Windows applications (on the display).

Comment Re: Second Life v2? (Score 1) 48

There is opensimulator.org

http://simonastick.com/ is one way to test the possibilities.

The OpenVCE (Open Virtual Collaboration Environment) project has a demo simulation. http://openvce.net/resources/d...

The Virtually Enhanced Languages project has another demo simulation. http://virtuallyenhancedlangua...

I think the 3 main limitations are each region is limited to 100 avatars, the minimum region size is 256 meters by 256 meters, and probably need each region to have it's own server PC (in addition to one or more PCs for the database, login, asset and other services).

Comment Re:Too bad I don't carry a phone. (Score 2) 143

I like certificates, vastly superior to passwords.

True, but still need a master password. Biometrics have their own problems. You can be forced to scan your fingers, face, eye, whatever. Even if courts decide evidence obtained that way is inadmissible, bad guys will still do it.

Granted passwords are subject to "$5 wrench" cracking, but that requires more effort on the part of the bad guys.

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...