Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Public libraries tinker with offering makerspaces (medium.com)

eggboard writes: Public libraries are starting to build temporary and permanent labs that let patrons experiment with new arts, crafts, and sciences, many of them associated with the maker movement. It's a way to bring this technology and training to those without the money or time to join makerspaces or buy gear themselves. It seems to extend the mission of libraries to educate, inform, and enrich, but is a seemingly rare move in the direction of teaching people to create for pleasure and professionally. Many libraries are experimenting with experimenting.

Submission + - Fixing broken links with the Internet Archive (medium.com)

eggboard writes: The Internet Archive has copies of Web pages corresponding to 378 billion URLs. It's working on several efforts, some of them quite recent, to help deter or assist with link rot, when links go bad. Through an API for developers, WordPress integration, a Chrome plug-in, and a JavaScript lookup, the Archive hopes to help people find at least the most recent copy of a missing or deleted page. More ambitiously, they instantly cache any link added to Wikipedia, and want to become integrated into browsers as a fallback rather than showing a 404 page.

Comment Re:Criticisms Are Largely Off The Mark (Score 1) 332

On fees: fees are generally charged, but they are tiny. However, all those involved in Bitcoin (including miners and software developers I spoke with) know that fees will rise and mechanisms are being created to make that simpler. The production of Bitcoins will halve in 2016, and miners are, over time, expected to derive the rewards that drive investment and operation of the system's functions (operating nodes, mining, "burying" transactions in the block chain, all interrelated) from fees rather than coins.

If you read Andreessen's piece and my essay, you'll see that he properly discusses essentially counterfeit payment from one party to another, but doesn't address fraudulent payment and the infrastructure to ensure that the party paying owns the funds used to pay. That is, if Bitcoins are stolen and used to pay for goods, a merchant faces the same trouble as if cash were stolen and used to pay. Except cash can be untraceable, and Bitcoin transactions can be tracked, even if the party isn't directly known who engaged in the transaction. Law enforcement could prove funds are stolen even if they can't recover the goods or services purchased with the funds, and clawback the funds from the seller/merchant.

None of that is addressed in Andreessen's essay, in which he proposes that Bitcoin by having very low or no fees on Bitcoin-to-Bitcoin transactions removes the necessity for any per-transaction fees as are charged to deal with fraud and overhead in a credit-card system.

Most merchants are going to be more likely to deal with an intermediary Bitcoin operator who will handle transactions on their behalf and charge a fee for chargebacks and theft recovery.

Submission + - Rebutting Andreessen's Bitcoin Dreams (medium.com)

eggboard writes: Marc Andreessen wrote an essay in the New York Times that appeared today, in which he tried to make the case for Bitcoin going mainstream for payments, if not as a currency. After comparing Bitcoin to the rise of personal computers and the Internet, he tries to explain how it eliminates fraud and will solve global money transfers and the plight of the unbanked. I wrote a critique of these and other points in his essay:

Bitcoin doesn’t eliminate fraudulent transactions; it only eliminates counterfeit payments. This can, of course, save many tens or hundreds of billions of dollars a year globally and translate to more efficiency in commerce. But removing the intermediary also removes recourse outside of courts, and the cost and nature of that can’t be determined.

Submission + - Paging Dr. MacGyver: maker movement comes to medical gear (medium.com)

eggboard writes: The tools to make crafts, electronics prototypes, and cool stuff have started rapidly to turn to medical gear, especially in developing nations. The early results are quite marvelous, but there are a ton of concerns, too. The pace of change is incredibly fast:

[Many people] without any without any formal medical training—can take advantage of access to global supply chains, cutting-edge medical knowledge, and recent leaps in design and fabrication technology that have made the prototyping process faster, cheaper, and simpler than ever before. Even as concerns about safety and liability are only starting to be addressed, medical inventors and other technical tinkerers are already improving and saving lives—sometimes their own.


Submission + - Penny Arcade offers offensive, low-paying IT job with great benefits (medium.com)

eggboard writes: Penny Arcade wants to hire one IT person to do four jobs, and is looking for someone with a terrible work/life balance to be paid poorly because the company isn't money-focused. This isn't unusual for an IT job, of course, especially at a small company. But Penny Arcade rakes in millions from its webcomics, PAX conventions, games, and more, and says the job's benefits will outweigh the low salary. But did they mention you need to be able to work in an "offensive environment"? Yes, they did. Sounds perfect for the right person.

Comment Re:And this is news? (Score 1) 107

Now, c'mon, grizzled veteran (like myself?).

The point of this article, which I wrote, is both to inform people of the practical aspects of 802.11ac, and also to deal with the disappointment. Average users, to whom these products are marketed in sound bites, may be upgrading because they think "faster is better!" This is to provide a realistic case for what 802.11ac will offer in Apple's version (and everyone's).

Comment Re:wasteful on spectrum (Score 1) 107

Outdated opinion on 5 GHz. The channels 149 and higher can broadcast at 20 times the signal strength of channels 36 to 48, and Apple and others have been boosting power progressively over the years. I can see it around me in my home and the last office I had: you can see a lot of 5 GHz now because of newer devices, where before, I only saw 2.4 GHz. That's anecdote, but fire up iStumbler or a Windows equivalent (aircrack-ng?) and see what I mean.

Comment Re:WTH (Score 1) 48

I'm never sure if Slashdot commenters read the original article or the blurb.

In the article, which I wrote, I explain the precise degree of risk, who is at risk, and how to mitigate.

* Recommending software: I did not write the article about 1Password Pro; Joe Kissell did.

* I do not receive a share of advertising revenue, nor is any my writing for any of many publications based on advertising revenue. I receive a fixed fee arranged in advance. Only the publication knows whether or not advertising was justified.

* Attacked on his income: Neither the publication TidBITS or me personally have any income issues associated with the sale of any security software.

This article was for normal folks, not security experts, and tried to explain in clear terms how to disable (for instance) any PIN-based access or switch away from a numbers-only passwords.

The criticism here seems both misplaced, conspiracy oriented, and not based on a reading of the article.

Submission + - NY Times Biffs Conference Wi-FAIL Story (wifinetnews.com)

eggboard writes: The New York Times ran a strange story that tried to explain why Wi-Fi fails when thousands of people gathered a tech event try to use a network set up by organizers. The story says Wi-Fi wasn't designed for that kind of use. I disagree, and explain why at length. The 1999 IEEE 802.11b spec might not have been designed for it, but 802.11g could handle mass numbers, and 802.11n is designed to deal with interference and large user bases.
The Media

Submission + - Wired Responds in Manning Chat Log Controversy 1

Hugh Pickens writes: "Earlier this week Glenn Greenwald wrote in Salon about the arrest of US Army PFC Bradley Manning for allegedly acting as WikiLeaks' source and criticized Wired's failure to disclose the full chat logs between Manning and FBI informant Adrian Lamo. Now Wired's editor-in-chief Evan Hansen and senior editor Kevin Poulsen have responded to criticisms of the site’s Wikileaks coverage stating that not one single fact has been brought to light suggesting Wired.com did anything wrong in pursuit of the story. "Our position has been and remains that the logs include sensitive personal information with no bearing on Wikileaks, and it would serve no purpose to publish them at this time," writes Hansen. "That doesn’t mean we’ll never publish them, but before taking an irrevocable action that could harm an individual’s privacy, we have to weigh that person’s privacy interest against news value and relevance." Poulsen adds that Wired has "led the coverage on this story, and we would gain nothing by letting another scoop simmer unreported on our hard drives" and that Greenwald's assertions the Wired has a journalistic obligation to publish the entirety of Manning’s communications is backwards — the truth is the opposite. "Greenwald’s piece is a breathtaking mix of sophistry, hypocrisy and journalistic laziness," concludes Poulsen. "In any event, if you can’t make an argument without resorting to misstatements, attacking the motives of an experienced and dedicated team of reporters, name-calling, bizarre conspiracy theories and ad hominem attacks, then perhaps you don’t have an argument.""

Submission + - Wired defends its coverage of Manning (wired.com)

johnlist writes: Wired.com editor-in-chief Evan Hansen and senior editor Kevin Poulsen respond to criticisms of Wired’s Wikileaks coverage by Glenn Greenwald in Salon.
Wireless Networking

Finland To Legalize Use of Unsecured Wi-Fi 151

Apotekaren writes "The Finnish Ministry of Justice has started preparing changes to a current law that criminalizes using unsecured wireless hot spots (Google translation; Finnish original). The reasoning includes the impossibility of tracking unlawful use, the ease of securing networks, and the lack of real damage done by this activity. It is also hard for a user to know if an unsecured network is intended for public use or not. The increased ubiquity of legal, open networks in parks, airports, and other public places has also influenced this move by the Ministry of Justice."
Networking

Submission + - iPhone 4 May Have Wi-Fi Driver Fault (arstechnica.com) 1

eggboard writes: After examining the WWDC video and talking to two veteran Wi-Fi experts, it seems likely that the iPhone 4 has a Wi-Fi driver flaw that was part of the trouble in making a network connection during Steve Job's WWDC keynote. The other problem was the massive congestion caused by so many independent access points. (Congestion may have triggered the iPhone 4's troubles, too.) With mobile hotspots proliferating on phones and in portable devices like the MiFi, we're going to see more trouble in the future.

Comment Re:TKIP and CCMP (Score 2, Informative) 77

1. If you're having trouble with WPA2, it's an implementation issue. There's no reason that WPA2 shouldn't work as well or better than WPA. In some silicon, AES-CCMP encryption can work faster than TKIP. Check for firmware upgrades on adapters and APs.

2. TKIP keys cannot be extracted by any known methods. Short TKIP and AES-CCMP passphrased-based keys are vulnerable to brute-force dictionary attacks, typically based on precomputed common SSIDs. A key of 10 or more characters is probably fine; 20 random characters is beyond computation in this universe. 63 is just silly.

3. The TKIP exploits are particular to AES-CCMP and don't recover the key, nor does any particular key length prevent the exploit. The exploits rely on a set of givens (such as 802.11e/WMM being available and enabled on a router), but this latest exploit that I link to uses the integrity checksum to extract a packet delivered to a client in the right circumstances.

4. This attack could be weaponized, but it's a proximity attack, so the yield is very very low in such attacks.

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...