Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:Needs to be an appliance.. (Score 1) 55

Monitoring is not the same thing as analyzing.. but I am quite certain I know where my packets are headed - at least when they're sent from my gateway. That's how the internet works.

But are you sure you know everything that is in those packets? Nothing extra in those DNS requests leaving your network?

Comment Re:Why? (Score 2) 527

from TFA: ....But Lavabit offered paying customers a secure email service that stores incoming messages encrypted to a key known only to that user. Lavabit itself did not have access.

If this is true, then how could Lavabit also have done the following?

Lavabit offered an alternative method to tap into the single user in question but ...

Either they could access the data or they couldn't.

Comment Some Issues (Score 4, Informative) 53

Before committing to anything you might want to read this follow up post.Apparently there are titles shown in the library that may not actually be available in your geolocation. In addition, you won't find out about that until you actually try to open the book. It's really quite disingenuous of them to show you books and let you add them to your library, when they clearly later know that those titles are not available to you for actual reading.

Comment Re:Marketing (Score 1) 168

On the other hand, please take a look at the history of differential cryptanalysis. The NSA was quite ahead of academia on that one. My own research back in those days demonstrated that the substitution boxes had been chosen with very specific characteristics. The same holds true for elliptic curves, where the curve chosen must have specific properties. Whether we know what all of those properties are though is still undecided, We know what makes a weak curve, but do we know what makes a strong one?

Comment Re:The next obvious step is to ... (Score 5, Insightful) 199

even software alone consist of so many layers ( from the spreadsheet software program that we use, to the device drivers, the OS, to the embedded firmwares residing inside the chips, to the myriad mix of software that keep the Net humming.

Don't forget the compilers and linkers that build the software. The source may look fine, but where did the compiler come from?

Comment Different Viewpoint (Score 2) 112

Chris Roberts, who created the well-known Wing Commander series in 1990, managed to raise millions of dollars on Kickstarter last fall for his upcoming Star Citizen, eventually collecting so much money from individual backers that he could return the budget he'd taken from "formal" investment firms. "Even nice investors, they want a return at some point. They have a slightly diff agenda than I do," Roberts told Slashdot. "My agenda is to build the coolest game possible."

Herein lies the difference. Kickstarter backers are not seen as actual investors in the project by the project owners, but rather as a way to informally fund games that the developers want to work on without feeling like there is any real obligation to those who funded it. To paraphrase what Chris Roberts stated, he couldn't care less if it ever makes any money as long as he gets to build the "coolest game possible". Without the incentive/pressure of investors looking for a return however, there will always be "just one or two more things" to finish up and the game will never actually get released.

Slashdot Top Deals

Nothing recedes like success. -- Walter Winchell