Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Lax attitudes toward child pornography (Score 1) 722

Dude, walk away from the game theory articles and the Rand books. Thanks.

You can criticize me for drinking the Overcoming Bias / Less Wrong kool-aid, but I am NOT a Rand fan and never have been. (I'm a leftist for one.)

Besides, Rand's fiction was totally in favor of coercive relationships, right up to the edge of rape. How much was Rand's principles and how much was Rand getting her jollies and forgetting the rule "don't publish your Mary Sue wankfic", who knows...

Comment Re:Lax attitudes toward child pornography (Score 1) 722

... However, coercion is not always a factor and when it demonstrably isn't - again, as per my post - I so no reason for it to be forbidden. ...

In spherical cow land, sure, but my argument is that an adult/teenager relationship (with a sufficiently wide age difference) is always coercive because the adult has more experience than the teen. The very nature of expertise is to train our minds to automatically jump to the right answer without any conscious thought (cf. Daniel Kahneman), which means that the more-experienced adult will take advantage of the situation, bending it to his/her will even without intending to. The difference in dating experience creates a power imbalance, and power imbalances are inherently coercive (pretty much by definition of "power" in the social sense).

Pretty much the only situation I can see where it might work out OK is if the adult has never dated, not in high school and not since then. But in that case the adult is likely to have other issues, in which case the "don't date anyone who obviously needs more therapy than you do" rule might kick in for the teenager (though sadly odds are good no one told the teenager about that one).

Comment Re:Lax attitudes toward child pornography (Score 5, Interesting) 722

... If they can consent to having sex with another child around their own age, then why not with an adult? ...

Two words: mind games. The drama in high school is all prep for the adult mating dance: "how do I get his/her attention without coming off as clingy/desperate?", "is he/she really interested in me or just planning to use me as a status symbol?", "but he/she isn't mature/hot enough, if I settle for him/her it means I'm less of a person because Hollywood tells me so". Adolescence is the phase where we take all the crap society has crammed into our skulls about love/sex/romance and sort out fact from fiction.

Adults already know and play the mind games; whether we treat them as friendly Canasta or as winner-take-all Russian Roulette, we DO play them, constantly. For example, info-dumping your life's backstory on the first date is (a) narcissistic, (b) clingy/desperate, and (c) ammunition for a poorly chosen partner to shove a knife in your heart and manipulate you like a puppet in your future relationship. Therefore even the kindest, most genuine form of the adult mating dance involves concealing information and strategically revealing your cards at the right time, to protect yourself from awful people if nothing else. But teenagers don't have any practice with this; not knowing any better, they think it's romantic to trust someone fully and unconditionally, which lasts until they put that in practice precisely enough times to get burned. During this phase, it's important that the participants in the mating game be at roughly the same skill level (viz. xkcd.com/314), as it limits the potential for damage. A teenager is wide open to the manipulation of information that adults do 100% automatically and subconsciously.

Oh, and then there's the whole "adults are the authority, you must obey them" thing. Even rebellious teenagers still recognize adults as authority figures — if the adults were seen as equals, they wouldn't be seen as authority figures to rebel against.

(It probably doesn't hurt to mention that I was molested by my stepfather from ages 16 to 18, so I've got a fair bit of firsthand personal experience on the matter. It took me years to spot the web of manipulation that he laid in my mind and unwind past his lies. What were his lies? That I chose it of my own free will; that I should feel guilty for "making" him cheat on my mother; that he was doing me a favor by giving me "pity sex" because I was too shy to get laid in high school. Nevermind that he pinned me in a corner, bullied me into coming out gay to him when I didn't trust him with that information, brought up the idea of sex with him and wouldn't drop it, and made me feel too physically and emotionally threatened to defy his rage-laden authority. For the next two years, he had me wrapped around his little finger until I left for college, and I blamed myself the whole way.)

Comment Re:How "An Inconvenient Truth" can it get (Score 1) 382

Right. The Greenland glaciers melting may be bad. Now, would you so kindly tell me how a fresh water plume will affect glaciers ON LAND?

Directly? Not at all. But it's worth keeping in mind that white ice has a higher albedo than dark blue seawater, which keeps arctic / antarctic summers cold by reflecting away summer sunlight.

Comment Re:I'm not changing to IPv6 on a specific date... (Score 1) 463

There's no reason for saying that. IPv6 is just another cyber space, there's nothing fancy, new, with it, it should be commonly accepted as something we MUST have, right now.

Except that it's not. There are billions of addresses - entire A blocks - locked up in early-adopter organizations that could be made available. For example, the US Post Office doesn't really need it's own A block. Nor do most organizations who own them. And B blocks? Thousands are unneeded. My old university has a B block and it's ridiculous...it's all behind a firewall except for a few numbers anyway. For most orgs, it's just that the money that these big blocks could be sold for doesn't exceed the cost of renumbering to 10.x internally. It will someday soon.

We're years away from ipv4 exhaustion.

Great plan: spend man-years of effort forcing the handful of companies with class A blocks to re-architect their networks... only for each class A block to be consumed by the RIRs in 6 months or less. Did you even pay attention to how fast APNIC ate two of its last three /8's? Seriously, this idea can't extend IPv4 by more than 2 or 3 years, even if it works flawlessly and re-IPing is free.

Comment Re:this, and then that other thing... (Score 1) 178

"IP addresses are not identity." Thank you. The hypocrisy around here is large, but not surprising. Does Google offer guest Wi-Fi access at any of their locations? Does anyone in Google run a Tor exit node? Are there any live jacks in Google meeting rooms? Do they NAT multiple internal addresses? It's one thing to confirm suspicions by setting up a honeypot phone number like Mocality did, and then receive calls from people identifying themselves as being from Google. It's quite another to only point to an IP addresses and place blame with no further evidence.

AppEngine apps can make HTTP requests from Google's IP blocks. Not sayin' that's what happened here, but just throwing that out there.

Comment Re:Hmm... (Score 1) 266

No, these are actually imaginary Canadian dollars, which are worth much, much less than real American dollars.

As of this writing, an American dollar will purchase 1.02 Canadian dollars. I admit that I was surprised. I stopped following it for a while, but I had thought the Canadian was worth more. What did Canada do to screw up their economy?

You have it backwards: the CAD per USD ratio hasn't gone much above 1.07 CAD per USD in the last 10 years, and used to swim in 0.75 territory for the longest time. Hence the well-known phenomenon of books and magazines with two list prices, a US price plus a Canadian price that's a good nudge higher. That suddenly became obsolete when the CAD achieved rough parity around 2007 or so, in part because of the USD inflating a bit faster than the CAD.

Comment Re:It's not just about the VPN aspect (Score 1) 136

Android needs some sort of remote wipe software to make it even remotely feasible for most businesses. For example, the government requires remote wipe, and some sort of encryption. Until Android has a solution for these two, the VPN-less capability is moot.

The Google Apps Device Policy app supports password policies and remote wipe, and Ice Cream Sandwich supports full-device encryption (I turned it on for my own ICS phone, took about an hour to encrypt the 16GB internal storage partition plus two or three reboots).

Comment Re:I have my doubts (Score 1) 220

Ethically loaded? How? I don't see how the brain would be suffering? Or are they worried about skynet?

Here in meatspace, putting a human in a sensory deprivation tank is torture and one of the more surefire ways to drive a person insane. The brain isn't wired to believe in null sensory data. If a region of the brain stops receiving stimulation, it frantically strengthens its connections to other regions, tapping randomly into its neighbors and interpreting their arbitrary stimulation as sense data (compare the hallucinations of sensory deprivation to phantom limb syndrome and somatosensory remapping in amputees, e.g. touching an amputee's face triggering sensation on the amputee's phantom fingers because the face and fingers are next to each other in the sensory map of the postcentral gyrus). If this frantic effort fails and the brain regions can't find a source of stimulus, they start to die outright, nerve by nerve, because nerves are wired to commit suicide if they don't fire regularly.

But even a sensory deprivation tank still provides senses of sound, proprioception, temperature, gravity. If we were to create an accurate nerve-by-nerve simulation of an entire vertebrate brain and then provide it with no sensory input.... Well, at best the result would be phantom body syndrome. At worst, it could go well beyond torture and become the greatest suffering ever inflicted on a single sentient being. And we don't understand the brain well enough to know which pieces of sensory data must be provided to maintain sanity and prevent existence from being torture.

And that's not even getting into the legal and moral issues. Let's say we can put a sane mind on a chip by cloning the synaptic structure of a recently deceased human and feeding it all the appropriate sensory inputs. Is it a person? Is it a citizen? Can it consent to a contract? Is it a minor until the hardware turns 18? May I enslave it? Is it ethical to feed it false sensory data culled from a virtual reality simulation, i.e. trap it in The Matrix? If I turn it off and erase it at the end of my scientific study, have I murdered it? If yes, am I legally obligated to keep it powered until the hardware fails? Am I morally obligated to transfer the synapse data to new hardware before the old hardware fails, making the uploaded human immortal? Alternatively, am I morally prohibited from doing that for more than N years, for some value of N? If I'm transferring the mind to new hardware, and my mistake causes a power surge that erases its synapses, am I protected by existing Good Samaritan laws, or have I committed involuntary manslaughter? As it's a simulated human mind, complete with all human appetites, am I obligated to provide it with pornography and the means to masturbate itself to orgasm? Do I have to obtain consent from the human whose deceased mind will be used to create the chip? Am I obligated to pick an atheist, or more to the point a subject who doesn't believe in souls? How well informed does the consenting subject have to be before dying? Does the family have to consent as well, or are we content with provoking another HeLa controversy for the greater good? And so on...

Comment Re:Not gonna happen. (Score 1) 904

The wear and tear on the body is such that even if you can increase the lifespan to a theoretical 150 years you wouldnt be very healthy for the last 90 or so years. You also need something that adresses the wear on the body. Our hearts arent made for 150 years of use and we build up various plaques and toxins in our bodies as time goes by. Even if we all lived under controlled and ideal circumstances the last seven decades would be pretty much seven decades of being eighty.

Actually, there's some research that strongly suggests that there's only a finite amount of aging going on. What's happening in aging might not be "the body's self repair process falls behind entropy", as commonly thought. Instead, aging would be "the same tradeoffs which favor reproductive success in youth exact a cost later in life"; after some finite time, you've paid those costs in full and aging stops, leaving only a constant risk of disability and death per year instead of the ever-growing one postulated by the "falling behind on entropy" model. In this view, there are still some specific things that actually do wear out with age because they aren't constantly replaced (tooth decay and cornea clouding / cataracts are the obvious ones), but general health doesn't suffer the same fate.

See New Scientist's The end of ageing: Why life begins at 90 (behind a paywall, sadly), which references a demographic study where annual mortality rates became constant above age 93 (Greenwood and Irwin, Human Biology, 1939), a study confirming the same pattern in fruit fly populations (Carey and Curtsinger, Science vol. 258 p. 457 and p. 461, 1992), and an exploration of a mathematical model of mutation which concluded that a mortality plateau is inevitable, not a mere special case (Rose and Mueller; PNAS vol. 93 pp. 15249-15253, 1996). (Of note: Rose is the author of the New Scientist article, with all the confirmation bias that implies.)

Also, the research into aging suggests there are only a handful systemic problems that actually cause it (accumulation of crosslinked proteins; declining telomerase production causing cells to stop dividing; etc.), and if those systemic problems were addressed we could largely arrest the aging process. Aubrey de Gray's TED talk is pretty much mandatory viewing on that front.

It's worth keeping in mind that if metabolism and entropy inevitably led to cell death after 100 years, then human beings as a species would have already died out: sperm and egg cells are metabolically active cells that contain DNA that's millions of years old, and there's no time machine that allows a pristine copy of the germline DNA to be copied forward from conception to adulthood without at least a childhood's worth of accumulated error. Likewise for our mitochondria, pseudo-cells that they are, with their own mtDNA separate from the DNA of the nucleus, exposed to the entropic ravages of the Krebs cycle firsthand without a nuclear membrane to protect it; our bodies pass these pseudo-cells on from mother to child unchanged, without even giving their mtDNA a de-methylation/re-methylation spring cleaning like mammalian nuclear DNA receives. But they thrive in the germ cell line, generation after generation, even as they suffer and decline in the somatic cell lines. There must be a difference in upkeep, some cost that evolution is willing to pay for the germline but unwilling for the somatic lines, that allows the germline mitochondria to remain healthy and "young" for millions of years.

Comment Re:For IPv4? (Score 1) 151

I realize that IPv4 is going to be with us for quite some time, but is this going to be worth the effort? It requires a bit of jiggery-pokery to repoint your DNS, the kind of thing that appeals to the Slashdot crowd but which your grandma will never, ever pull off. ISPs could help, but will they do so before IPv6 makes it irrelevant?

It's described in IPv4 terms, but extending it to work with IPv6 addresses should be simple enough. The trickiest part will be finding the golden CIDR mask to replace IPv4 /24. Giving up /64 is too much, since it identifies most ISP customers uniquely, and /48 has similar issues. Probably something near /32 or /40 would be appropriate, although you could probably do a lot with as little as /20.

Other than that, the described technique is still fully relevant because IPv6 doesn't change the game in any other way: DNS still works the same way, HTTP still works the same way, and websites are still slow for the same reasons, so you have the same incentives for regional caching and the same choices in how to do it.

Comment Re:Does anyone (Score 1) 127

Does anyone else see this as a giant security hole? As in, various schemes like this have been tried since the days of ActiveX, and the only reason ActiveX has the worst reputation is because it's the only one that gained widespread use?

The point of NaCl is that it's a virtual machine bytecode language, and you can statically verify (without running the code) that the bytecode conforms to the spec. However, for performance reasons, the bytecode language and the virtual machine architecture just happen to line up with the native machine code and native architecture. NaCl provides only a subset of the full instruction set, though, and this prevents arbitrary pointer arithmetic or self-modifying code that could break outside the sandbox. NaCl authors actually need to recompile their code to x86 NaCl or ARM NaCl as a distinct GCC compiler target, instead of plain old x86 or ARM, because the NaCl targets are easily distinguishable from the native ones when you examine the machine code bytes. (The most important feature: all jumps are aligned and no ops cross an alignment boundary, so there's only one possible machine code interpretation for each byte of NaCl code.)

Needless to say, this is a vastly different model compared to ActiveX, which was "we'll trust any old native code to make arbitrary system calls, just so long as there's an RSA signature attached". NaCl ditches the central trusted authority model that Microsoft preferred, and instead goes with the Java/JavaScript/Lua/LISP model of "you can only perform side effects that the interpreter chooses to expose to your code". As with the interpreted languages your NaCl code is Turing-complete, so you can waste CPU and RAM until the cows come home, but you can't actually touch the filesystem, create GUI elements, or modify the address space of other processes unless Chrome decides to permit it. The only difference is that you don't run at some fraction of native code speed, but exactly at native code speed, and you can statically optimize as much or as little as you like, or write in any language you want (so long as someone's written a NaCl target for your language's compiler).

There will probably be a few bugs in the static verification logic that allow not-quite-NaCl code to slip through, but this is no worse than the sandboxing problems we already face from Javascript in the browser. With JavaScript, this has even included double free bugs that allowed overwriting arbitrary memory with native code and executing it. The risks with NaCl are no different.

Comment Re:Dark side? (Score 1) 196

The bright side is that the people who innovated to make the patents are being compensated for their efforts. This is how patents motivate people to innovate. Would you prefer if Google could use other people's innovations without compensating them?

If anything, patents in the software industry cause innovation NOT by rewarding the company that holds the patent so that they will feel inclined to invent more, but by encouraging companies to patent the lowest-hanging fruit and forcing everyone else to invent workarounds as the patent owner lords over the market by charging exorbitant prices. Think of gzip, PNG, Vorbis, Tarkin, and to a lesser extent VP3/Theora and VP8/WebM, which were all developed in response to the patents on LZW and MPEG 1 through 4 because the licensing terms were greater than the market would bear.

Patents give their owners monopoly power, which ipso facto means that the licensing fees charged by the owner will never be at the free market price created by the intersection of supply and demand. Even the MPEG-LA consortium, which actually goes to the effort of trying to invent a "fair" price, doesn't have enough information to actually determine what the fair price would actually be in the absence of a monopoly, e.g. what the MPEG algorithms would sell for if they were a contractually-protected trade secret bought and sold on the open market (the scenario that patents were created to prevent).

Slashdot Top Deals

"Kill the Wabbit, Kill the Wabbit, Kill the Wabbit!" -- Looney Tunes, "What's Opera Doc?" (1957, Chuck Jones)

Working...