Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Fear issue in Europe (Score 0) 684

"Our test results show that two 5-minute chunks of consecutive viewing without major interference by other appliances is sufficient to identify the content,"

emphasis added

So what? All you need is a couple of 5-minute periods when major appliances don't change their power consumption significantly. If everyone in the household is sitting watching television, then that's not too unlikely - you might find that the AC or fridge motor turns on or off, but those have a fairly long on-off period so could be handled; lighting and idle computer/hi-fi equipment will have a fairly constant power usage pattern. Of course, this will depend on the equipment in your house and the people using it, but it's not as implausible as it might at first seem.

Comment Re:Fear issue in Europe (Score 2, Interesting) 684

That link really doesn't demonstrate the answer to the question of "how will they read power consumption down to the device level"?

No, but this one does.

Basically, the meters read (or at t least, can read) the power consumption to a very fine degree of accuracy every 2 seconds. That's enough to figure out what TV channel you're watching (by watching power fluctuations caused by varying brightness levels of the TV). And with that level of detail it would also be fairly easy to make good guesses at: what time you leave for / get home from work (lights/kettle/coffee machine/cooker); when you're in the shower; how many people are in your house; whether you're on holiday... it all starts to get creepy pretty quickly...

Comment Re:Most interesting statements are unprovable (Score 1) 261

"Undecidable in general" != "unprovable for any program". Or rather, just because it's not possible to write a general purpose algorithm that will tell you whether any given computer program {terminates, crashes, is secure against a particular threat} doesn't mean that, for any program I'm ever likely to write, there doesn't exist a proof. Or in other words - there exist billions of programs where it's difficult to know for certain whether they terminate - but those programs aren't relevant to determining whether my program terminates - and if I've got any sense I'll write my program in such a way that I can prove that it terminates (if that's the behaviour I want).

Comment Re:Everything is insecure (Score 1) 261

"Branch prediction isn't about fallibility or security."

How wrong you are. Ever hear of a Simple Branch Prediction Analysis attack? We covered that back in 2006, if not earlier.

Your original comment said:

And since humans make both hardware and software, it can't be infallible. Hence why we have branch prediction, error correction, and more.

... which implies that you consider branch prediction to be a form of mitigation against errors, similar to error correction — i.e. that the reason branch prediction exists is to improve security.

A Branch Prediction Analysis attack makes use of branch prediction to break security, but that's irrelevant — it doesn't change the reasons why branch prediction existed in the first place, and it certainly doesn't turn branch prediction into a security feature.

Comment Re:that first sentence (Score 1) 306

Technically, your own grammar here is also incorrect, and your sentence is illogical. For the sentence to be logical, you must intend either "did any" or "didn't any." Otherwise, you are inexplicably and precisely addressing 'none,' which here can only be a pronoun meaning 'no body' or 'no one.'

Rubbish. The question doesn't mention its intended audience; it's perfectly valid and logical, and equivalent to "Is it true that none of you paid attention in English class?". If someone asks, "Did none of them arrive?", it's not addressed to "none", "none of them", nor to "them" - and nor is this question addressed to "none".

superlative of you

Superlatives of personal pronouns? If such a thing exists, it wasn't in the sentence in question...

Comment Re:What the fuck is this shit? (Score 4, Informative) 275

Reminds me of the Ronald RayGun years, and the "word" proactive. It seems to have been made up by someone who didn't know the difference between "act(ion)" and "react(ion)".

But there's a difference between active and proactive. Someone who's active does a lot of stuff. If you're reactive you do stuff in response to issues that come up. Someone proactive does stuff anticipating issues that may otherwise come up. That's a useful distinction to be able to draw...

Comment Re:Parenting? (Score 5, Insightful) 302

Put the laptop on a table, out of arms reach and hold the child on your lap. There. Problem solved. No need for restraining of hands, you just hold the child on your lap

Something tells me you've never actually tried this with a live toddler. That, or you were using a different model of toddler to the ones I've encountered...

Comment Re:Set it free!!!!! (Score 1) 109

After all, source code can be patched and re-built... just like passwords and keys changed...

It can... but the difference is that, once I know my password is compromised, changing my password takes seconds—whereas analysing a code problem, coding a fix, testing it, distributing it to customers and having them deploy it can take months or even years.

and if you don't have the support to get the code changes completed and implimented, you'll still be affected by security related bugs weather the software is open or closed source. There is lots of out of dat open source software with major holes floating around in the wild...

I'm not really sure what you're saying. Sure, open and closed source software may both have security bugs - which may or may not get fixed. But this doesn't change the fact that there is a significant difference between security by obscurity and using passwords/keys.

Comment Re:Set it free!!!!! (Score 1) 109

Passwords/public key encryption etc. are all "security by obscurity" as well...

No they're not. Sure, you have to keep them secret, but the key thing is that the security of the whole system doesn't pivotally depend on just your password: if you suspect your password has been compromised, you can very quickly and easily change it, and the system is then no less secure than it was before (give or take any damage done while your password was known). On the other hand, if security depends on your source code not being available (because it does uber-secret stuff), and it then gets leaked, there's nothing you can do to put the genie back in the box, short of rewriting your entire software...

Slashdot Top Deals

The question of whether computers can think is just like the question of whether submarines can swim. -- Edsger W. Dijkstra

Working...