Or there are a bunch of young boys living nearby.
Or there are a bunch of young boys living nearby.
On the one hand, we've had a lot of experience with spectroscopy, and on the other we have a rover actually there.
Depending on exactly where in the atmosphere the light used for the spectroscopy data is coming from, they might both be accurate: If you were working by telescope, Earth should show plenty of ozone; but if your ground-level sampling station is turning up any nontrival amount, that means that something is rather wrong...
Were that the case, I have no doubt that all sorts of vexing questions about how such a methane distribution could come to be would come up; but atmospheres do vary by location.
Socket accepts plugs it's designed to accept. What's the story?
The story is that the XBox violates the HDCP standard to do this; It has to decrypt protected content, in order to display it. There's three ways they could have done it; Analog conversion somewhere in line, a signed key for a device which essentially does the one thing HDCP was supposed to never allow, or they hacked the protocol / used unpublished knowledge. Either way... When the XBox launches, someone's going to take it apart, and then encrypted HDMI can bend over and kiss it's curvy ass goodbye.
Oh, right... marketing blurb. Right, was supposed to focus on that instead. Sorry slashdot... I forgot you aren't a geek site anymore, just a pile of paid advertisements posing as stories.
But this shows that Apple was less than honest in their claims about pulse detection, and sub-surface tissue detection.
Apple has been less than honest about just about every aspect of their product from design, to production, to sale. But even if iphones are designed by teenagers and young adults in china in super factories that house workers on site, make them work 16 hour days for years on end for pennies, and drive so many to suicide that they have installed suicide nets around every building, people keep buying them because they're trendy. Nobody cares if Apple lies to them, as long as people keep believing that owning Apple products is a status symbol.
I don't have a 5S - can it be easily shown that there are no fingerprints stored in it yet? If so, I'd think one could fairly convincingly demonstrate, using two people, that this exploit works.
fingerprint identification is fundamentally and irredeemably broken. no other authentication method leaves copies of itself all over the place.
Sigh. Biometrics can of course be defeated as long as the sensor is stupidly simple. And big surprise... a mass-produced mobile device built at the absolute lowest cost they can get away with... can be defeated. But biometrics was never meant to replace existing authentication measures, but to augment them. Three factor authentication is still the best way of securing a device, location, etc. One factor authentication like what's demonstrated here... is
I wondered that as well. It would have been more conclusive if he'd had a second person come in and use the fake to unlock the phone.
There's a data link between the ISS and docking vehicles. A new version of that was developed recently. Here's the presentation on that. But it doesn't seem to be operational yet. NASA has been talking about the new C2V2 system for years, and commercial spacecraft were supposed to be designed to use it. But it's not ready yet.
So Space-X and Orbital Sciences had to also develop a temporary capability to use the old automated docking system, which, I think, is derived from the Soviet-era Kursk system.
Groups, really, since it's run blue-vs-red style, with constant scenario preparation and intrusion attempts. The two (anonymized) leaders of the Blue and Red teams talk about the mind-set and skills that it takes to be in their unit, which they point out is not the place for soda and pizza hijinks.
And with that comment, they just admitted how screwed they are. And the irony is, they probably don't realize it, and even if pointed out (as I will now do), they'll steadfastly deny it.
Being good at hacking requires two things. Firstly, the ability to upload into your skullmeats vast amounts of seemingly meaningless information, trusting that later context will give it meaning and purpose. You need to be able to open up a thousand page tomb, and in under a week, hoover-vac that into your brain. This is the primary required ability for you to be good at hacking. Without it, no matter how much of a creative genius you are, you will find yourself quickly outpaced by your peers who can do this. Computers are enormously complex, and networking them adds yet another layer of complexity. Being able to rapidly absorb and retain a working knowledge of these interactions in complex systems is a job requirement.
However, that is only half the equation. The other half is to be able to see all of that, and yet arrive at a different conclusion than all the other guys. You can be a good administrator or technician if you can simply absorb large amounts of data, but you are going to royally suck at hacking if you arrive at the same conclusions they did. Hackers are both walking encyclopedias, and have a funny habit of belching out random facts and then stringing them together in a way that nobody else has, probably without being aware of it. They pull theories together from dozens of different technical disciplines, finding that thermodynamics and heisenburg uncertainty somehow jam really well with why those styrofoam containers of ramen, regardless of the amount of water put in them, invariably overflow in the microwave. And they'll do this while working out some chunk of complex code in their head absent-mindedly.
You cannot achieve this zen-like state of abstract concentration needed to hack while taking what you're doing as seriously as this guy. You can't have a military attitude to what you're doing -- you can't be focused on the risks, on the enemy, on the stakes. You need to be able to take all of that, and forget it. The only thing you need to do, is solve the problem. You need to work that problem, and you need to do it with a style of thinking that... frankly, scares the hell out of people in authority or in the military... because they don't understand how you could care less who you're fighting, as long as you get to fight back in some way that's.... wait for it... Nifty.
Israel... I like you, I really do. So please, reassign this guy to something more in line with his attitude... like ordinance technician. Don't put him in charge of a cyberwarfare unit... that's like putting Martha Stewart in charge of flight operations on a carrier. It's just sooo not playing to their strengths.
Now satire's not quite the same as a joke, to be sure, but your use of the "not a joke" idiom to suggest it's factual shows you're either really stupid (and believe it to be a factual account) or really disingenuous (and are trying to induce others to believe it is a factual account); either way, GTFO my
Well, it's not your slashdot. You're an AC. And no, I'm not trying to induce others to believe anything... they probably believe things far weirder than anything I could come up with, so what's the point?
But that said, it is well-known that Linux developers tend to be more marxist in their thinking and entertain peculiar or idiosyncratic political beliefs. Those genuinely are things that the FBI puts people on watch lists for. And there is a visible minority of programmers that collect guns, go hiking, and engage in other recreational activities viewed with suspicion by the government. It's not a stretch to say that running Linux could score you points on some whack government algorithm; They've done more to people for less.
The problem with dealing with political or religious extremism is that it is very hard to tell the difference between satire and factual accounts because extremist thinking is so very often irrational and aggressive. And people who claim to fight extremists very often fall into the same trap: "If they're willing to do anything for their cause, we have to too!"
So... feel like logging in and finding out what people here really think of your opinions, or is it that you already know and that's why you post as AC?
Every little picofarad has a nanohenry all its own. -- Don Vonada