Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:Which to trust? (Score 5, Informative) 106

On the one hand, we've had a lot of experience with spectroscopy, and on the other we have a rover actually there.

Depending on exactly where in the atmosphere the light used for the spectroscopy data is coming from, they might both be accurate: If you were working by telescope, Earth should show plenty of ozone; but if your ground-level sampling station is turning up any nontrival amount, that means that something is rather wrong...

Were that the case, I have no doubt that all sorts of vexing questions about how such a methane distribution could come to be would come up; but atmospheres do vary by location.

Comment Re:Am I missing something? (Score 1) 481

Yeah, Apple (sensibly) didn't overpromise anything; but the fan-press was talking about the thing like it was some fundamental reimagining of the concept of biometrics, which seems to have been what led to the interest in dusting off a mostly-not-news technique, tweaking it slightly, and shooting them down.

Enterprise-focused stuff gets released with fingerprint readers all the time, and nobody cares enough to do a demo because there are no fanboys talking it up.

Comment Re:Non story (Score 0, Troll) 171

Socket accepts plugs it's designed to accept. What's the story?

The story is that the XBox violates the HDCP standard to do this; It has to decrypt protected content, in order to display it. There's three ways they could have done it; Analog conversion somewhere in line, a signed key for a device which essentially does the one thing HDCP was supposed to never allow, or they hacked the protocol / used unpublished knowledge. Either way... When the XBox launches, someone's going to take it apart, and then encrypted HDMI can bend over and kiss it's curvy ass goodbye.

Oh, right... marketing blurb. Right, was supposed to focus on that instead. Sorry slashdot... I forgot you aren't a geek site anymore, just a pile of paid advertisements posing as stories.

Comment Re:Easy! (Score 2) 481

"So how do you imagine you copy a capacitative image on a photocopier?"

You don't; but a photocopier/laser-printer is a dirt-cheap way of depositing a high precision thermoplastic structure on top of a sheet of transparency plastic(ie. creating a fingerprint mold) at which point you just brush on a layer of the actual approximately-human-capacitance material you are using to make the fake print.

That's all the photocopier does. If you can get away with very flat, low-temperature, molds, laser printing is a precise and cheap way to make them.

Comment Re:Easy! (Score 1, Insightful) 481

But this shows that Apple was less than honest in their claims about pulse detection, and sub-surface tissue detection.

Apple has been less than honest about just about every aspect of their product from design, to production, to sale. But even if iphones are designed by teenagers and young adults in china in super factories that house workers on site, make them work 16 hour days for years on end for pennies, and drive so many to suicide that they have installed suicide nets around every building, people keep buying them because they're trendy. Nobody cares if Apple lies to them, as long as people keep believing that owning Apple products is a status symbol.

Comment Re:If true (Score 2) 481

fingerprint identification is fundamentally and irredeemably broken. no other authentication method leaves copies of itself all over the place.

Sigh. Biometrics can of course be defeated as long as the sensor is stupidly simple. And big surprise... a mass-produced mobile device built at the absolute lowest cost they can get away with... can be defeated. But biometrics was never meant to replace existing authentication measures, but to augment them. Three factor authentication is still the best way of securing a device, location, etc. One factor authentication like what's demonstrated here... is ... well ... not very smart.

Comment Re:Easy! (Score 4, Insightful) 481

It's a bit much for casual purposes; but it effectively demonstrates that Apple's little toy is just another fingerprint sensor (albeit a more attractive one than the usual little stripe-thing) with no more resistance to an under-a-hundred-bucks, probably a few bucks per print, in quantity, attacks than any of the others.

Still beats no passcode at all against a casual attacker; but it sounds like the CCC technique works just fine with digital reproductions (ie, you don't need the original thumbprint to use as a mold, or develop with cyanoacrylate vapor, or anything like that) so it's fuck up once, have your fingerprint on file for however long it stays roughly the same, which is never terribly encouraging.

Comment New or old data link format? (Score 5, Interesting) 51

There's a data link between the ISS and docking vehicles. A new version of that was developed recently. Here's the presentation on that. But it doesn't seem to be operational yet. NASA has been talking about the new C2V2 system for years, and commercial spacecraft were supposed to be designed to use it. But it's not ready yet.

So Space-X and Orbital Sciences had to also develop a temporary capability to use the old automated docking system, which, I think, is derived from the Soviet-era Kursk system.

Comment Why So Serious (Score 0, Troll) 61

Groups, really, since it's run blue-vs-red style, with constant scenario preparation and intrusion attempts. The two (anonymized) leaders of the Blue and Red teams talk about the mind-set and skills that it takes to be in their unit, which they point out is not the place for soda and pizza hijinks.

And with that comment, they just admitted how screwed they are. And the irony is, they probably don't realize it, and even if pointed out (as I will now do), they'll steadfastly deny it.

Being good at hacking requires two things. Firstly, the ability to upload into your skullmeats vast amounts of seemingly meaningless information, trusting that later context will give it meaning and purpose. You need to be able to open up a thousand page tomb, and in under a week, hoover-vac that into your brain. This is the primary required ability for you to be good at hacking. Without it, no matter how much of a creative genius you are, you will find yourself quickly outpaced by your peers who can do this. Computers are enormously complex, and networking them adds yet another layer of complexity. Being able to rapidly absorb and retain a working knowledge of these interactions in complex systems is a job requirement.

However, that is only half the equation. The other half is to be able to see all of that, and yet arrive at a different conclusion than all the other guys. You can be a good administrator or technician if you can simply absorb large amounts of data, but you are going to royally suck at hacking if you arrive at the same conclusions they did. Hackers are both walking encyclopedias, and have a funny habit of belching out random facts and then stringing them together in a way that nobody else has, probably without being aware of it. They pull theories together from dozens of different technical disciplines, finding that thermodynamics and heisenburg uncertainty somehow jam really well with why those styrofoam containers of ramen, regardless of the amount of water put in them, invariably overflow in the microwave. And they'll do this while working out some chunk of complex code in their head absent-mindedly.

You cannot achieve this zen-like state of abstract concentration needed to hack while taking what you're doing as seriously as this guy. You can't have a military attitude to what you're doing -- you can't be focused on the risks, on the enemy, on the stakes. You need to be able to take all of that, and forget it. The only thing you need to do, is solve the problem. You need to work that problem, and you need to do it with a style of thinking that... frankly, scares the hell out of people in authority or in the military... because they don't understand how you could care less who you're fighting, as long as you get to fight back in some way that's.... wait for it... Nifty.

Israel... I like you, I really do. So please, reassign this guy to something more in line with his attitude... like ordinance technician. Don't put him in charge of a cyberwarfare unit... that's like putting Martha Stewart in charge of flight operations on a carrier. It's just sooo not playing to their strengths.

Comment Re:And then I got my eyes tested. (Score 2) 183

Now satire's not quite the same as a joke, to be sure, but your use of the "not a joke" idiom to suggest it's factual shows you're either really stupid (and believe it to be a factual account) or really disingenuous (and are trying to induce others to believe it is a factual account); either way, GTFO my /., ok?

Well, it's not your slashdot. You're an AC. And no, I'm not trying to induce others to believe anything... they probably believe things far weirder than anything I could come up with, so what's the point? :)

But that said, it is well-known that Linux developers tend to be more marxist in their thinking and entertain peculiar or idiosyncratic political beliefs. Those genuinely are things that the FBI puts people on watch lists for. And there is a visible minority of programmers that collect guns, go hiking, and engage in other recreational activities viewed with suspicion by the government. It's not a stretch to say that running Linux could score you points on some whack government algorithm; They've done more to people for less.

The problem with dealing with political or religious extremism is that it is very hard to tell the difference between satire and factual accounts because extremist thinking is so very often irrational and aggressive. And people who claim to fight extremists very often fall into the same trap: "If they're willing to do anything for their cause, we have to too!"

So... feel like logging in and finding out what people here really think of your opinions, or is it that you already know and that's why you post as AC?

Slashdot Top Deals

"Don't drop acid, take it pass-fail!" -- Bryan Michael Wendt