Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Medicine

The World's First Full Face Transplant 193

Dave Knott writes "A thirty-member Spanish medical team has achieved the world's first full face transplant. There have been ten previous similar operations, but this is claimed to be the first total transplant, replacing all of the face including some bones. The unnamed recipient originally injured himself in a shooting accident, and received the entire facial skin and muscles — including cheekbones, nose, lips and teeth — of a donor. The complex operation involved extraction of the donor's face, followed by removal of the jaw, nose, cheeks and parts of the eye cavities. Then the medical team took all of the donor face's soft tissue, including musculature, veins and nerves. In order to transplant the face, the medical team has to connect four jugular veins, extract bones and join all the musculature and blood vessels. The recipient has had a chance to see himself in the mirror, and is reportedly satisfied with the results. It is unknown whether he now looks more like John Travolta or Nicolas Cage." The pictures and videos in the linked articles are all computer-generated at this point, so the squeamish need not worry.
Encryption

Government Could Forge SSL Certificates 168

FutureDomain writes "Is SSL becoming pointless? Researchers are poking holes in the chain of trust for SSL certificates which protect sensitive data. According to these hypothesized attacks, governments could compel certificate authorities to give them phony certificates that are signed by the CA, which are then used to perform man in the middle attacks. They point out that Verisign already makes large sums of money by facilitating the disclosure of US consumers' private data to US government law enforcement. The researchers are developing a Firefox plugin (PDF) that checks past certificates and warns of anomalies in the issuing country, but not much can help if government starts spying on the secure connections of its own citizens."
Input Devices

Droid Touchscreen Less Accurate Than iPhone's 198

gyrogeerloose writes "A test published by MOTO labs comparing the accuracy and sensitivity of smartphone touchscreens among various makers gave the iPhone top marks ahead of HTC's Droid Eris, the Google-branded Nexus One and the Motorola Droid. The test was conducted within a drawing program using a finger to trace straight diagonal lines across the screens and then comparing the results. While it's not likely that a smart phone user is going to draw a lot of lines, the test does give some indication of which phones are most likely to properly respond to clicking on a link in a Web browser."
Patents

Why Apple Denied the Google Latitude App 308

awyeah writes "A recently revealed Apple patent looks remarkably similar to the functionality of Google Latitude, which Apple relegated to WebApp status earlier this year. Obviously if Apple is working on their own version of Google Latitude (or owns the IP rights to this functionality), they'd be hesitant to put an app with the same functionality on their devices from another company."
The Internet

Towards a Permission-Based Web 230

On his blog over at RedMonk, analyst James Governor looks at the walled garden we seem to be moving into, and possible cracks in the wall. "As we rush to purchase Apple products and services on Cupertino’s monochrome treadmill of shiny shiny, I can’t help thinking the open web community is losing something vital — a commitment to net neutrality and platform openness. If a single company can decide what plays on the network and what does not, in arbitrary fashion, how can that be net neutrality? ... Is the AppStore a neutral network? Should it be? Is Comcast, the company net neutrality proponents love to hate, really the only company we should be wary of? Pipe level neutrality is surely only one layer of a stack. The wider market always chooses proprietary wrappers — every technology wave is co-opted by a master packager. Success in the IT industry has always been about packaging — doing the best job of packaging technologies as they emerge. Twas ever thus." Governor ends his essay with an optimistic look at Android, which he says "potentially fragments The Permission Based Web, and associated data ownership-based business models."
Security

Apple Keyboard Firmware Hack Demonstrated 275

Anonymouse writes with this excerpt from SemiAccurate: "Apple keyboards are vulnerable to a hack that puts keyloggers and malware directly into the device's firmware. This could be a serious problem, and now that the presentation and code (PDF) is out there, the bad guys will surely be exploiting it. The vulnerability was discovered by K. Chen, and he gave a talk on it at Black Hat this year (PDF). The concept is simple: a modern Apple keyboard has about 8K of flash memory, and 256 bytes of working RAM. For the intelligent, this is more than enough space to have a field day. ... The new firmware can do anything you want it to. Chen demonstrated code which, when you put in a password and hit return, starts playing back the last five characters typed in, LIFO. It is a rudimentary keylogger; a proof of concept more than anything else. Since there is about 1K of flash free in the keyboard itself, you can log quite a few keystrokes totally transparently."
Government

Obama Sides With Bush In Spy Case 906

palegray.net is one of many who writes "President Obama has publicly sided with the Bush administration on the question of whether the President should be allowed to establish warrantless wiretapping programs designed to monitor US citizens. The President has asked a federal judge to stay a ruling that would allow key evidence into the domestic spying case against the government. 'Thursday's filing by the Obama administration marked the first time it officially lodged a court document in the lawsuit asking the courts to rule on the constitutionality of the Bush administration's warrantless-eavesdropping program.'" jamie points out that Obama's views and opinions were made clear through his Senate vote and numerous public statements, but many others see this as a disappointing start to an administration promising transparency and openness.

Comment Re:5 reactors? (Score 1) 356

Until and unless you can get any power generation technology simple enough that it rivals a toaster in complexity, I will take centralized facilities any day.

Think about how many people electrocute themselves when trying to retrieve bread from a toaster with a fork.

Slashdot Top Deals

What is worth doing is worth the trouble of asking somebody to do.

Working...