Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment What type of attack? (Score 1) 151

What type of attack is being mitigated against and how does the risk of failure of the encryption solution compare to that of the attack vector? There are many ways encryption can fail, including loss of keys or too much exposure to the passwords for these keys.

For example, are we talking about hardware theft or software based intrusion?

For hardware theft, then you would probably want to find a solution where no one needs to know the keys, but it is part of the local infrastructure. This would mean that once hardware is taken out of said infrastructure then it can't access the keys it needs to make sense of the data. Just like anything there are still scenarios where this could fail or be a hinderance.

For software there are so many variables and use cases, I am not going to try to list them, but remember there are both internal vectors of attack and external vectors of attack. Sometimes the hardest one to defend against is social engineering.

Comment Re:An American patent? (Score 1) 65

If a patent or copyright makes a reasonable profit during it's term, the intent of those exclusive rights is met. Beyond that, locking up IP impedes progress, since others can't freely build on the original. Disney built their business using the works of the bros. Grimm, Hans Christian Anderson, Mark Twain, Lewis Carroll, Kipling, etc., but now work diligently to steal our culture from us by preventing newcomers from doing similar.

In the world of software I would argue that patents impede more than they help promote innovation. Many of the motivations for developing software aren't because there is a promise of a patent or monopoly, since if it were we wouldn't have the huge number of open source solutions. If a company hasn't capitalized on a software 'invention' within a couple of years, then there is a good chance someone will come up with and equivalent solution, without evening needing to see how the 'original' works and in a number of cases we even see evidence of parallel creation.

It has been argued that copyright is more valuable to software than patents.

One interesting article on software patents is here:

Comment Re:An American patent? (Score 5, Insightful) 65

People need to complain and stop this nonsense. Patents and copyrights should expire at 20 years max. Maybe less. This stifles creativity and productivity, and has nothing to do with the original intent of protecting inventors and writers. It has to stop.

If an idea can be conceived in an hour and implemented in a under a month, then 20 years is far in excess of anything reasonable. This is part of the problem with software patents: many of the patents can be designed and implemented in less than a month. Contrast that to hardware, where the cycle can often closer to a year, or more, and many hundreds of thousands of dollars are spent, so an extended protection makes some sense to recoup R&D costs.

Comment Re: Big blow to apple? (Score 0) 79

We all know how well this type of vision has worked for Google and Microsoft. Unless you have a healthy market of third-party manufacturers you may well end up needing to go your own way.

I think this may be a case of Apple rushing things. The MacBook Pro feels the same, where they could have left one legacy port as a compromise?

Comment Re:Sorry, but, (Score 3, Informative) 155

Wasn't Java open source at some point? And besides why is anybody using it now? (Here's looking at you Libre/OpenOffice) Rewrite Android in C, or better, Assembly, and the problem is solved.

Wikipedia's entry, has this to say as intro:

OpenJDK (Open Java Development Kit) is a free and open source implementation of the Java Platform, Standard Edition (Java SE).[1] It is the result of an effort Sun Microsystems began in 2006. The implementation is licensed under the GNU General Public License (GNU GPL) version 2 with a linking exception. Were it not for the GPL linking exception, components that linked to the Java class library would be subject to the terms of the GPL license. OpenJDK is the official reference implementation of Java SE since version 7

There is a post here on StackOverflow on this:

My cynical side feels whatever the reality is, this is Oracle and well lets just say that I haven't ever felt Oracle to be a community player, unless that involves providing consults at cost.

Comment Data Extradition? (Score 1) 91

I don't know if there is such a thing as 'data extradition', but surely working with Ireland would be the best approach? Anything else should surely outside of the immediate jurisdiction of US law enforcement? Maybe Google should invesigate the flip question: would the US accept e-mails on a foreign national stored on a US server to be handed over without the necessary legal paper work?

Comment Undermining the US position (Score 1, Interesting) 660

A lot of the moves that new administration suggested as making things better for the US worker, actually undermines the USA's position in the world and actually will end up potentially hurting jobs. Often the "take it all" approach it actually the less ideal position of giving up a little.

Helping NATO's members and the UN, while maybe not the best sounding when it comes to money, it does end up allowing the US to have sway over the politics of other countries and therefore help keep the US as a focal point for business.

Comment Normal for financial entities (Score 3, Informative) 70

Given the regulatory requirements this makes sense. At one major US financial institution, where I worked, this is the norm, because the risk of information leakage is an issue. You even need to use application such as Mobile Iron or Good for accessing company e-mail. Company issued iPhones had the the essentials an nothing more, with certificates limiting what you could do with the phone.

At the same time, there was a move towards BYOD, which does provide a bit of a chink in the wall, but still requires Mobile Iron or Good for accessing company e-mail and a certificate limiting certain operations. You can't copy/paste from Mobile Iron or Good, for example.

These companies need to show to regulators that they are meeting requirements and maybe even going slightly beyond. All e-mail in and out is recorded for 7 years.

Slashdot Top Deals

"When the going gets tough, the tough get empirical." -- Jon Carroll