Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Oh, the irony ... (Score 5, Insightful) 70

TransUnion sells identity protection services that monitor for exposure of exactly the same kinds of data (name, DOB, SSN) that were themselves stolen in the breach. In other words:

What they promise to watch for unauthorized exposure of your personal identifiers.

What hackers actually took from them those same identifiers.

That’s a bit like a lock company being robbed of its own keys.

It highlights a fundamental problem: once those “static” identifiers (SSN, DOB, etc.) are stolen, they can’t really be changed. Unlike a password, you can’t just “reset” your Social Security number.

That’s why breaches at credit bureaus are particularly concerning — they’re custodians of the most sensitive personal data, and when they get breached, the damage is both widespread and long-lasting.

Comment Proprietary information ... (Score 2) 67

The proposal infringes on the protection of internal information.

Imagine what investors, shareholders, and competitors could glean from information like:

- The intended hire and start dates
- Whether it's a new role or backfill
- If it's being offered internally with preference to current employees
- The number of times the position has been posted in the last two years, and other factors, according to the draft language.

Comment Self-incriminating evidence .. (Score 3, Insightful) 29

.. is now portable. I wish digital devices would support dual passcodes. The primary passcode grants full access. The second wipes the device. People have the right to factory reset their devices at will. Destruction of evidence cannot be proven if there is none.

Comment ChatGPT supports dual (trible) logins ... (Score 2) 112

I open mine in Firefox, MS Edge, and Chrome. I use the same credentials, and all of the chats are the same across the browsers and other platforms like iPhone, all at the same time. For minors, parents should have the credentials and the app on their devices for casual monitoring. Outsourcing parental guidance is like herding cats.

Comment Mainframe Decentralization Metaphor (Score 1) 39

First, I never met a phor I didn't like.

Isn't this the plot line in the story about mainframes with dumb terminals decentralized to distribute workload to PCs?

Western AI relies on ridiculous centralized data centers while DeepSeek R1 pushes the load to the desktop. Look at the specs to run a local copy of it.

Comment Been there? (Score 2) 58

To understand the failure to march to the new drummer as in switching to AI and smartphone chips, those who remember this can relate:

BlackBerry was a dominant player in the mobile phone market during the early 2000s, known for its secure email services and physical QWERTY keyboards. However, the company failed to anticipate and adapt to the shift towards touchscreen smartphones and app ecosystems initiated by Apple's iPhone and Google's Android platform.

Despite its initial popularity, BlackBerry's reluctance to innovate and its slow response to changing consumer preferences resulted in a significant loss of market share. By the time they attempted to catch up, it was too late, and they were unable to regain their former position in the market.

This may be the plot line for Intel.

Comment From science fiction: (Score 1) 93

A short story "Answer" by Fredric Brown, was published in 1954. In this story, a group of scientists create a supercomputer that is designed to answer any question. When they power it up and ask, "Is there a God?", the computer's immense energy output causes a lightning bolt to strike and weld the switch closed, effectively trapping the scientists with the computer that cannot be turned off.

In a reboot, the title would be "AI".

Comment Re:Shocking... (Score 1) 93

"1) if they deliberately create gibberish or wordsalad [sic] sessions, perhaps with the help of another AI, thereby reducing the value of the data, and 2) if they copy and paste copyright restricted documents illegally into the session, forcing the AI companies to filter the data or be liable for copyright infringement if it is found out."

Look at Section 230 of the Communications Decency Act (CDA).

Slashdot Top Deals

Would you people stop playing these stupid games?!?!?!!!!

Working...