Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:Write a test for control (Score 1) 314

See part 4. Use randomly selected candidates to avoid character assassination. The platform/laws are written by a collaborative effort ala free/open source software or Wikipedia so there's no personality to attack. The candidates are as bland and anonymous as possible in the current system.

The entire idea is to remove personality politics and money from governance.

Comment good lord... (Score 1) 173

“So when you take a situation in which the legal rules don’t impose any effective sanctions on people for that kind of behavior, mob behavior on the Internet, then a legal analyst like myself should look at that situation and say: ‘You can’t fix everything that’s broken,’” he said. “There is not a proper legal remedy for it. I attempted to do something and I made it worse.”

Well, when the man's right, the man's right. You truly can't fix everything that's broken.

Comment Re:Would probably be found (Score 1) 576

You can check the MD5 sum, but that could be compromised (either the sum itself, or your MD5 program). Google "trusting trust" and then David A. Wheeler's diverse cross compiling solution.

That gets a bit nutty, though.

To borrow a turn of phrase from Mr. Clapper, I'm guessing what you want is the least insecure system? If that's your aim, here's my guess:

First, you have to trust that it's unlikely there's an obvious backdoor visible in the source. There's not going to be a "if password='hi_from_NSA' { grantrootaccess(); }" line. It probably won't be obfuscated, either (google obfuscated C contest), because that kind of bizarre spaghetti code would attract eyes, like how using encryption flags you for closer government inspection. If it's in the code itself, it would be underhanded (google underhanded c contest), which would just look like bugs. So pick an older distro that's "stable" and has been through a lot of bug hunts.

Next, then, it really comes down to your tool chain. That's what you'll really want to start building. Probably start with hardened Gentoo, build your compilers, and then any other distro you want, cross compiled from source on your Gentoo system.

Even then, there could be underhanded code in the compiler you built to defeat such efforts, so the rabbit hole goes deeper and deeper until you're a gibbering idiot in an insane asylum. Basically, if the men in black suits want you, the men in black suits are going to get you.

Comment Re:Would probably be found (Score 1) 576

Thought like that make me want to work for the NSA. Imagine, writing stuff like that is your job. Sure beats what I'm doing now, hacking terrible legacy ETL systems so Giant Appliance Corp can track how effective their Wisconsin dishwasher adverts were last quarter.

Except there's the whole "doing evil" thing. If it just weren't for the evil I'd sign right up. Although they probably wouldn't take me because of my bizarre libertarian political beliefs. Oh well. Back to dishwashers...

Comment Re:Would probably be found (Score 1) 576

And the sneaky code doesn't even have to be obfuscated. It could be underhanded. And that's harder to review than closed source software, which one could just consider to be very well obfuscated.

Really, I don't think you're going to find holes by looking at the source code. You're going to find holes by poking and prodding at the binaries after they're compiled. Debugging. But at least with the source code available, you can plug the holes and trace the exploits back to their contributor.

Comment Re:Would probably be found (Score 3, Interesting) 576

I never "trusted" windows, apple, google, or really any for-profit company, but I assumed because of their rational self-interest, they would not deliberately fuck me over in egregious ways to a third party, like a government, because the knowledge they had done so would be bad for business. So while I have always preferred free software, I would still use closed software because, meh, why not?

Since the PRISM slides, no. No. I have already or am in the process of eliminating from my life every closed platform I was using.

Except for video games. I have a computer that will boot windows for games and I own an Xbox, but that's it.

Comment Re:the wall of fundamental laws (Score 1) 600

Well, if this concept pans out, we'd be able to calculate all kinds of particle interactions we'd never be able to observe otherwise because those interaction would just be different facets of The One True Gem. Who knows what kind of amazing things we'd find a facet or two over from our current understanding?

Slashdot Top Deals

Nothing recedes like success. -- Walter Winchell