Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:They forgot the internet (Score 1) 103

I was thinking that same thing - also: converting live performance into electrical signals; recording electrical signals digitally in a manner amenable to transmission over a packet switched network; the whole concept of exchanging currency for goods and services instead of having to barter. And, lets not forget the artists themselves. If they wouldn't produce a desirable performance, no one would want to pirate it, and so anti-piracy efforts would be much more successful.

What they need to do is have each person desiring a copy of a performance attend the live performance and only encode the electrical signals in the brain of each listener, so that playback only works if it's played back into the brain from which it was recorded. Then, piracy will be more challenging - at least until the telepathy brain-mods that allow direct brain-to-brain sharing come out. I'm sure it'll eventually be illegal to even remember a copyrighted performance without paying an additional fee. In fact, this could be the reason people think elves and fairies don't exist. It's not that no one's encountered them, it's just that no one can afford the fees for remembering the encounter.

Comment Re:Environmental impacts? (Score 1) 321

Thanks for that information the suicide rate for youths. It's new to me. Interesting that it's pointing to a wider gap in mental health care as the reason. I wonder what the difference is among older people and whether a similar gap in physical health care leaves rural older people with an unacceptable quality of life resulting in suicide.

Comment Might be nice for software (Score 1) 95

The requirement to provide the materials in an electronic format gets rid of the "send crates of printed pages" response to a FOIA request for government software, but I did not see a requirement or standard method to indicate where material had been redacted from the middle of information presented in electronic format.

Comment Architects? Look at how houses are sold (Score 1) 117

When I do a quick search for passive cooling design, I see plenty of ideas, primarily aimed a people building solar powered houses. But, that's the thing, the house you get when you build the design you want is vastly different from the house you get when you buy something designed to look good enough and maximize profit for a real estate developer.

Comment Helps to learn a new definition for "one thing" (Score 3, Interesting) 106

I have worked primarily as chief engineer or electrician on commercial fishing vessels, mostly in the Bering Sea. Generally it's 12 hour shifts, and the boat is in continuous 24 hour operation. Typically, systems that require simultaneous engineer attention include fishing hydraulics, power generation, processing equipment, propulsion, & refrigeration. When I first come to a new boat, I have these issues when I'm switching between these things. As time goes on, I develop a mental model of the specifics of the entire vessel, and instead of switching between different things, I'm paying attention to one, more complex thing. When that happens I lose this penalty somewhat. The problem comes when returning from vacation, because I want to enjoy the loss of penalty, but the model may no longer be complete or may be intermixed with models of other vessels.

Submission + - Security Researcher Publishes How-To Guide To Crack Android Full Disk Encryption (thehackernews.com)

An anonymous reader writes: Google first implemented Full Disk Encryption in Android by default with Android 5.0 Lollipop in an effort to prevent criminals or government agencies from gaining unauthorized access to one's data. What it does is it encodes all the data on a user's Android device before it's ever written to disk using a user's authentication code. Once it is encrypted, it can only be decrypted if the user enters his/her password. However, security researcher Gal Beniamini has discovered issues with the full disk encryption. He published a step-by-step guide on how one can break down the encryption protections on Android devices powered by Qualcomm Snapdragon processors. The source of the exploit is posted on GitHub. Android's disk encryption on devices with Qualcomm chips is based only on your password. However, Android uses your password to create a 2048-bit RSA key (KeyMaster) derived from it instead. Qualcomm specifically runs in the Snapdragon TrustZone to protect critical functions like encryption and biometric scanning, but Beniamini discovered that it's possible to exploit a security flaw and retrieve the keys from TrustZone. Qualcomm runs a small kernel in TrustZone to offer a Trusted Execution Environment known as Qualcomm Secure Execution Environment (QSEE), which allows small apps to run inside of QSEE away from the main Android OS. Beniamini has detailed a way for attackers to exploit an Android kernel security flaw to load their own QSEE app inside this secure environment, thereby exploiting privilege escalation flaw and hijacking of the complete QSEE space, including the keys generated for full disk encryption.

Submission + - Frontier Teams With AT&T To Block Google Fiber Access To Utility Poles (arstechnica.com)

An anonymous reader writes: Frontier submitted a court filing last week supporting ATT's efforts to sue local governments in Louisville and Jefferson County, Kentucky to stop a new ordinance designed to give Google Fiber and similar companies access to utility poles. They're concerned the ordinances will spread to other states. Frontier's filing said, "the issues raised by the case may have important implications for Frontier's business and may impact the development of law in jurisdictions throughout the country where Frontier operates." The ordinance in Louisville lets companies like Google Fiber install wires even if ATT doesn't respond to requests or rejects requests to attach lines. Companies don't have to notify ATT when they want to move ATT's wires to make room for their own wires, assuming the work won't cause customer outages. ATT claims that the ordinance lets competitors "seize ATT's property." Frontier is urging the court to consider the nationwide implications of upholding Louisville's ordinance, saying Louisville's rule "is unprecedented" because "it drastically expands the rights of third parties to use privately owned utility poles, giving non-owners unfettered access to [a] utility's property without the [...] utility in some cases even having knowledge that such third-party intrusion on its facilities is occurring." Frontier said companies should be required to negotiation access with the owners if they didn't pay to install the utility poles. They urged the court to deny Louisville Metro's motion to dismiss ATT's complaint.

Comment Only Robots? (Score 2) 262

What about computers that are smarter than robots but have been unnaturally deprived of locomotive and manipulative appendages? Don't they get to pay taxes and apply for prosthetic limbs? Prostheses for electronic persons ought to be easy, and when these people can punch the idiots who want them to work without pay, that ought to improve their quality of life.

Comment I looked around a little bit (Score 1) 126

And, it looks like alternatives might be SofortÃoeberweisung or Giropay, but they apparently don't interact with Deutsche Bank, which seems the only German bank allowing retail USA customers. However, Deutsche Postbank owns BHF (USA) Holdings Inc. since 2001. Perhaps they could use this to provide some retail customers access to these payment services. It's a sure bet that Paypal could use some competition.

Comment Re:If shove came to push... (Score 4, Insightful) 412

So, when they found out that their superiors had been lying to Congress, what did they do about that? I'm guessing that they acted in a manner that would ensure self-preservation in a situation where their superiors are always 100% sure what the subordinate employees are doing. If they call their bosses on nefarious bullshit, they will get told that they, themselves, are a threat to national security, and that's how they will be treated if the behavior persists. The individuals can be really conscientious, but the structure of their organization can prevent that from making any difference.

Slashdot Top Deals

It is not for me to attempt to fathom the inscrutable workings of Providence. -- The Earl of Birkenhead

Working...