Forgot your password?
typodupeerror

Comment NCSC guideline: no password expiry (Score 1) 498

Contrary to many common password policies the UK National Cyber Security Centre (https://www.ncsc.gov.uk/articles/problems-forcing-regular-password-expiry) recommends passwords should never expire. Problem with password expiry is that it is not usable, since people having to make new passwords all the time choose weaker passwords.

Image

Research Suggests E-Readers Are "Too Easy" To Read 185

New research suggests that the clear screens and easily read fonts of e-readers makes your brain "lazy." According to Neuroscience blogger Jonah Lehrer, using electronic books like the Kindle and Sony Reader makes you less likely to remember what you have read because the devices are so easy on the eyes. From the article: "Rather than making things clearer, e-readers and computers prevent us from absorbing information because their crisp screens and fonts tell our subconscious that the words they convey are not important, it is claimed. In contrast, handwriting and fonts that are more challenging to read signal to the brain that the content of the message is important and worth remembering, experts say."
Microsoft

Microsoft Research Takes On Go 175

mikejuk writes "Microsoft Research has used F# and AI to implement a consumer-quality game of Go — arguably the most difficult two-person game to implement. They have used an interesting approach to the problem of playing the game, which is a pragmatic cross between tree search with pruning and machine learning to spot moves with a 'good shape.' The whole lot has been packaged into an XNA-based game with a story."

Comment Re:There is always a Way (Score 2, Informative) 811

Background: Im a PhD student working for Cryptomathic on e-voting.

Indeed we have developed some new e-voting protocols. (Building on the cryptographic literature and publishing also our own protocols.)

For those interested Ill try to give a very brief account of the ideas:

To ensure that only registered voters can vote we use digital signatures or some other authentication mechanism.

To ensure that votes remain secret we encrypt them using a public key cryptosystem.

The public key cryptosystem has a so called homomorphic property. Basically this means that by multiplying all the encrypted votes we get a ciphertext that contains the result of the election.

To prevent any state official from peeking the voter over the shoulder we distribute the secret key for the cryptosystem over several independent servers.

The servers cooperate to decrypt the ciphertext with the result.

Slashdot Top Deals

"If the code and the comments disagree, then both are probably wrong." -- Norm Schryer

Working...