Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:good (Score 1) 364

Too much fluff, and in some cases not enough rigor in their tests for my liking.

In some cases? I'm not sure they have ever conducted a test that would be considered scientifically rigorous. I would suggest that if they were to submit their work for publication it would get bounced right back, but I've seen what passes "peer review" these days so I won't.

Comment Maybe this had something to do with it (Score 3, Insightful) 105

Maybe this little tidbit, found at the end of the article, can shed some light on the cause of the difference.

The Elizabeth George study included only two experienced Kindle users, and she is keen to replicate it using a greater proportion of Kindle regulars. But she warned against assuming that the "digital natives" of today would perform better.

Comment Re:As long as... (Score 1) 376

The difference is, you can't do much to force them to pay up, while they can cut off your internet access (and your livelihood) to get *you* to pay up.

Once you have a judgement against them you can turn the process over to a collection agency for a portion of the proceeds. Use the court to file a lien against their assets, equipment, etc. There's all kinds of fun you can have with this if you wish.

Comment Re:No signup without a Google Account? (Score 2) 167

No. Nobody can explain that because that is not the purpose of the tool....They can access a lot more content using this tool, not the same content more securely.

Incorrect. It does improves security by building a web of trust that makes infiltration by an opponent more difficult. It also improves security by compartmentalizing connection and peer information so that if a opponent does infiltrate the system, the amount of information that they can obtain about other participants is drastically reduced compared to other systems..

"In order for a censor to discover the IP addresses of your computer, they'd have to somehow convince you that they're a friend." Fisk explained. "It uses these real-world trust relationships to protect the IP addresses of these proxies because when you run Lantern in the uncensored world, you are a proxy.

Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult.

Comment Re:I fail to see why this is relevant... (Score 1) 216

I fail to see how this is relevant to the /. audience or how this matters in any meaningful way. It is professional sports after all...quite possibly one to the most useless aspects of our culture.

It is relevant to today's /. because it is a controversial topic that is likely to draw many comments which turn into page views and ad impressions. You must be thinking about the old /. which went away quite some time ago.

Having said that, it is also meaningful to you because you likely pay, via several different avenues such as taxes and cable fees, money to support the NFL.

Comment Re:Changing nature of 911 (Score 1) 80

I don't think that's the intended use at all.

I'm guessing they're expecting texts more like "someone broke into my house, and I'm hiding in the closet", or "my husband is abusing me, and thinks I'm just cleaning up in the bathroom, but I need help", etc. Situations where being discreet is important, situations where people currently try to text 911, and often get no response.

Agreed. I don't think it's intended to replace a 911 call, but to provide an alternative in situtations, such as you provided, when a 911 call might not be practical. Another example would be during a mass casualty event where 911 calls can't get through because the towers are saturated. SMS messages use essentially no bandwidth and would be able to get through, providing emergency services and first responders with additional information about injuries, people who are trapped, etc.

Comment Re:Great! (Score 1) 80

What carrier changes you for 911 phone calls? You don't even need a SIM card to make a 911 call.

All of them, but they don't charge the caller. They charge their subscribers. Subscribers are charged a number of vaguely described monthly "fees" like "Universal Service Fee". These fees are supposed to pay for mandated features like the ability to call 911. Another one of these "fees" pays for the the ability to port a number from one carrier to another. These mandated features only get imposed if the carriers get an approved way to bill customers for them somehow.

Comment Open Source? (Score 1) 175

It sounds like they plan on making the extension open source, which is mandatory or the whole thing is a non starter. Furthermore you better be able to match the checksum of the source version to the addons that might be available from the addon repositories for the browsers. We have to be able to confirm that what they say is the code is in fact what we are running in the browser.

Personally I'm not interested in anything that involves uploading my private keystore to a third party, encrypted or not, and without that you lose the main feature, portability, that comes with webmail.

Comment Timothy's Streak Continues (Score 1) 637

Hey Timothy, have you ever noticed that submenu over on the left of the front page? You know, the one that lists the various sections that you can posts stories to? Ever notice that there is one called "Ask Slashdot", which just happens to match up exactly with the premise of this story, not to mention the title. Why don't you do all of us who filter by section a favor and try posting "Ask Slashdot" stories to the "Ask Slashdot" section every once in a while? Thanks

Comment The Next Step in Remotely Controlling a Car (Score 4, Interesting) 53

So this is just a basic attack surface analysis of a networked system. According to the article, the researchers are saying that these vehicles are vulnerable because operational components (brakes, etc.) are on the same network as non-operational components (radio, etc.).

By contrast, the 2014 Jeep Cherokee runs the "cyber physical" features and remote access functions on the same network, Valasek notes. "We can't say for sure we can hack the Jeep and not the Audi, but... the radio can always talk to the brakes," and in the Jeep Cherokee, those two are on the same network, he says.

This does tie in well with and extend their presentation last year where, given access to the car's network, they were able to manipulate its steering and braking systems. The trick will be to subvert one of the remotely accessible systems and then generate the necessary commands on the network in question using that subverted system. Maybe they are saving that presentation for 2015.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...