Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Do We Need A Better Private Browsing Mode? ( 126

Network World's Alan Zeichi recently argued "We need a better Private Browsing mode." Slashdot reader Miche67 writes: As this writer says, Chrome's Incognito Mode "doesn't offer strong protection at all." [Incognito mode "only prevents Chrome from saving your site visit activity. It won't stop other sources from seeing your browsing activity."] And Firefox's Private Browsing with Tracking Protection -- while stronger than Chrome -- is an all-or-nothing option. "You can't turn it off for sites you trust, but have it otherwise enabled by default."
The submission ends, "Every single link to non-trusted websites should open, by default, in a Private/Incognito window. C'mon, browser makers, get this done." This raises two questions. How do Slashdot's readers browse? And do you think we need a better private mode for web browsing?

The Geek Behind Google's Takeover of the Map ( 97

tedlistens writes: Google's map isn't just a map. It's a living, complex manifestation of the data that billions of users and a team of thousands of engineers and designers feed it every day. The public face of the company's mapping effort is Ed Parsons, a gregarious Briton and geographer who as Google's Geospatial Technologist evangelizes for its mission of organizing the world's geographic information. He also works on building the trust the company needs to make Google Maps and Google Earth more detailed, useful, and increasingly, 3-D and interactive -- what he describes as "a selfie for the planet."

The terrain isn't easy: that mission faces challenges from cartographical purists, hoping to preserve the art of cartography, and the democratic mappers of OpenStreetMap ("it's become almost a parody"); from governments seeking to police sensitive borders; from a host of tech companies fighting over the map business; and from privacy defenders concerned about what Google does with that data. "We're kind of looking at what to do with it. We've got a very rich source of data there, but also one that we have to be very careful of," he says. "Your location on the planet is one of the most sensitive pieces of information that anyone can hold on you."


Hackers Stole 65 Million Passwords From Tumblr ( 44

Lorenzo Franceschi-Bicchierai, reporting for Motherboard: On May 12, Tumblr revealed that it had found out about a 2013 data breach affecting 'a set of users' email addresses and passwords, but the company refused to reveal how many users were affected. As it turns out, that number is 65 million, according to an independent analysis of the data. Troy Hunt, a security researcher who maintains the data breach awareness portal Have I Been Pwned, recently obtained a copy of the stolen data set. Hunt told Motherboard that the data contained 65,469,298 unique emails and passwords. Update: 05/30 16:36 GMT by M : An earlier version of the original report claimed that data of 68 million accounts were compromised. It's 65 million. The original story, and hence, this summary has been updated to reflect the same.

DJI Files Patent Lawsuit Against Yuneec, Marking Industry's First Legal Fight ( 33

An anonymous reader writes: The world's most successful consumer drone manufacturer, DJI, has filed a lawsuit in California claiming Yuneec has infringed on two of its patents. The claim centers on "systems and methods for target tracking," and "interchangeable mounting platform." They're asking the court to halt the sale of the infringing Yuneec products and systems. The case marks the first legal battle in the consumer drone industry. "DJI welcomes competition, but is committed to protecting its intellectual property," a press release on the filing stated. "Friday's filing is a response to safeguard that investment, to protect customers and partners and to promote genuine innovation in this promising area." Last year, Yuneec launched the 4K Typhoon drone to compete with DJI's Phantom 3 Professional drone. It also announced the Typhoon H at CES, which is equipped with an Intel RealSense camera.

Comment Re:Nut Job Movements (Score 4, Interesting) 168

This assertion itself illustrates the the disconnect in culture and assumptions.

You are arguing from the typical, venerable, valid-in-post-enlightenment-culture dynamic in which ideas propogate on their own merit. In such an environment, the adaptive strategy for dealing with bad ideas is to ignore them and let them die on their own lack of merit, or "burn out" as you put it. This has been known to work as long as the immunity mechanisms against bad ideas are intact, and are capable of dealing with the particular strain of ideological pathogen.

This strategy is not effective against ideologies not in that set, such as ones that spread themselves by the sword or by intimidation or in populations that believe ideas for reasons disconnected from the merit of the idea itself. The fact that said ideologies are bad or invalid or incompatible with civilization as we know it is not directly relevant to whether they will catch on or not. Such ideologies have spread themselves very effectively and they don't care that they are regression or that they are harmful. Effective disease agents dont care that they make the host organism sick, they are effective by definition if they propogate themselves, and just ignoring the symptoms and counting on typical immune mechanisms to make them go away doesn't always work.

Westerners think that ignoring ideas or debunking them is going to always work, but those techniques only work in certain contexts and against certain threats. Ghandi's techniques were only effective because he was operating against the British Empire and pushing their buttons, for example.

The West is not able to fight back bad ideas because, sometimes in an attempt to stop low level autoimmune problems, she has ingested massive doses of immune-suppression; immune mechanisms such as the nuclear family, shared but diverse Christian heritage, societal structures are weakened, made obsolete by technology, or dismantled, and ideological infections thought to be conquered are breaking back out in the unprepared populace, and getting some rest and drinking some fluids until it burns out may not work.

Hackers Steal Bank's Crypto Credentials, But Are Foiled By Their Own Typo ( 45

New submitter tlambert writes: Unknown persons stole Bangladesh Bank transfer credentials for payments via the international banking system, and then proceeded to start moving money to the Philippines and Sri Lanka. A human foiled the plot after ~$80M had been stolen with another $870M stopped, after they noticed the word 'foundation' misspelled in one of the requests. Bangladesh, meanwhile, is blaming the U.S. Federal Reserve for trusting their credentials. (Note: Bangladesh Bank isn't like Bank of America; it's the country's central bank.)

Comment Re: Except (Score 1) 81

I am a different poster from gp. I was only responding to the preposterous statement that a digital back or a separate digital camera could replace Polaroid-type proofs. There is no real replacement. I personally shoot 4x5 and 6x7/6x9 and am quite upset about losing instant proofs. I am developing a scheme involving lightproof black plastic bag, xray film or RC paper, monobath developer, and a field changing-bag, but not looking forward to it.

Comment Re: Except (Score 1) 81

Spoken like a true non-photographer.

  Polaroid proofs allow a final check of everything, because they sit exactly where the "real" film does. Everything from exposure, including if you shutter is running slow or not opening, to composition, including hard to spot objects that intrude into the image, or bellows that might sag into the light path in the camera, or the aperture you forgot to stop down, or the shiny spot on the model's forehead that will ruin the shot but only appears at the specific angle of the camera lens...there is no substitute for Polaroid proofs, and there won't be until full-size digital sensors are impossibly cheap, and even then, they will not be as convenent as something that requires no batteries and gives an instant original that you can write notes on.

"I don't understand it, so it must be worthless"

Elon Musk's Next Great Idea? Electric Air Travel ( 346

An anonymous reader writes with this excerpt from BGR: Elon Musk is changing the world one idea at a time. First, with Tesla, the man so many people call the real life Tony Stark has done an incredible job of bringing electric vehicles to the mainstream. Second, Musk has been doing an impressive job over at SpaceX in the realm of space travel. And third, Musk's effective rough draft of a high-speed transportation system known as the Hyperloop is being contemplated and conceptualized in a very real way by some extremely smart people. So where does Musk go from here? Why, Mars of course. Recently, Musk said that he plans to unveil SpaceX's Mars roadmap next September. But on another front, Musk has also been thinking about developing an electric airplane capable of taking off and landing vertically. While answering a few questions during a Q&A session at the SpaceX Hyperloop Pod Award Ceremony last week, Musk was asked what his 'next great idea' was. The answer? Electric-powered air travel.

The Performance of Ubuntu Linux Over the Past 10 Years ( 110

An anonymous reader writes: Tests were carried out at Phoronix of all Ubuntu Long-Term Support releases from the 6.06 "Dapper Drake" release to 16.04 "Xenial Xerus," looking at the long-term performance of (Ubuntu) Linux using a dual-socket AMD Opteron server. Their benchmarks of Ubuntu's LTS releases over 10 years found that the Radeon graphics performance improved substantially, the disk performance was similar while taking into account the switch from EXT3 to EXT4, and that the CPU performance had overall improved for many workloads thanks to the continued evolution of the GCC compiler.

Ethics Panel Endorses Mitochondrial Therapy, But Says Start With Male Embryos ( 125

sciencehabit writes: An experimental assisted reproduction technique that could allow some families to avoid having children with certain types of heritable disease should be allowed to go forward in the United States, provided it proceeds slowly and cautiously. That is the conclusion of a report released today from a panel organized by the U.S. National Academies of Sciences, Engineering, and Medicine (NAS), which assesses the ethics questions surrounding the controversial technique called mitochondrial DNA replacement therapy. More controversially, however, the panel recommended that only altered male embryos should be used to attempt a pregnancy, to limit the possible risks to future generations. (Males can't pass along the mitochondrial DNA that is altered in the procedure.)

LG G3 'Snap' Vulnerability Leaves Owners At Risk of Data Theft ( 39

Mark Wilson writes: Security researchers have discovered a vulnerability in LG G3 smartphones which could be exploited to run arbitrary JavaScript to steal data. The issue has been named Snap, and was discovered by Israeli security firms BugSec and Cynet. What is particularly concerning about Snap is that it affects the Smart Notice which is installed on all LG G3s by default. By embedding malicious script in a contact, it is possible to use WebView to run server side code via JavaScript. If exploited, the vulnerability could be used to gather information from SD cards, steal data from the likes of WhatsApp, and steal private photos.

Serious Linux Kernel Vulnerability Patched ( 85

msm1267 writes: A patch for a critical Linux kernel flaw, present in the code since 2012, is expected to be pushed out today. The vulnerability affects versions 3.8 and higher, said researchers at startup Perception Point who discovered the vulnerability. The flaw also extends to two-thirds of Android devices, the company added. An attacker would require local access to exploit the vulnerability on a Linux server. A malicious mobile app would get the job done on an Android device. The vulnerability is a reference leak that lives in the keyring facility built into the various flavors of Linux. The keyring encrypts and stores login information, encryption keys and certificates, and makes them available to applications. Here's Perception Point's explanation of the problem.

Comment Re:why stockpiling? (Score 1, Interesting) 292

They are probably waiting for the price to go up. There are wells all over the Midwest that have been prepped for drilling but not drilled, or drilled but not fracked, or fracked but are being held idle, because the economics of their existence was calculated on $80+/barrel oil. The companies are letting them sit hoping the price goes up so they can make more. It's easy to project how long this is worth doing given a certain amount of volatility in the price and the fact that demand will always be there, in fact, the current glut of NG in North America means applications are being converted to run NG, possibly boosting the coming price upswing.

Slashdot Top Deals

"We Americans, we're a simple people... but piss us off, and we'll bomb your cities." -- Robin Williams, _Good Morning Vietnam_