Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - DNA confirms cause of 1665 London's Great Plague

JThaddeus writes: The BBC reports that a 17th Century mass grave uncovered in London confirms the identity of the bacteria responsible for the Great Plague of 1665-1666. "Testing in Germany confirmed the presence of DNA from the Yersinia pestis bacterium — the agent that causes bubonic plague — rather than another pathogen." The grave contains approximately 3,500 skeletons. Teeth were removed from some of the skulls, and their pulp tested at the Max Planck Institute in Germany. Positive results were found in 5 of 20 individuals tested. It is estimated that the Great Plague killed nearly one quarter of London's population (then about 350,000). The article also adds, "To reassure anyone worried whether plague bacterium was released from the excavation work or scientific analysis, it doesn't survive in the ground."

Comment It's OK to be in the minority (Score 4, Insightful) 585

In fact, in my experience, the majority is wrong quite a lot.

Fortunately, this is not a popularity contest. The question is whether the government can compel a company to rewrite its products to make it easy for the government to snoop on its customers. If they can, it's only a small jump to forcing companies to include a backdoor in their products in the first place.

Comment Re:Apple - standing alone (Score 1) 339

Actually, ignoring the unique hardware key associated with the Secure Enclave (because it can't be read by anything except the Secure Enclave), each iPhone does have several other unique identifiers that can be used to lock OS firmware to the device, such as the serial number, the cellular radio IMEI, and the Wi-Fi and Bluetooth MAC. As already pointed out, Apple could hard-encode those values in the firmware update and sign that. The resulting binary could not be used with any device where those identifiers did not match. Bad actors could not just change the numbers to match a random victim's phone, because the Apple signature would not match the binary. This is discussed at http://arstechnica.com/apple/2....

It is true that even having the source code for firmware creates a risk, but that risk cannot be turned into an exploit without Apple's secret key. And of course if someone gets Apple's secret key, all iOS devices are in trouble.

I think the real issue we should be talking about is whether the government can force companies to redesign their products to help the government spy on their customers. If it can do this, then why can't the government similarly require that circumvention mechanisms be built into devices in the first place to make snooping easy?

Comment Re:It will be an improvement (Score 1) 83

Ah, you don't care about it so much that you're bitching about it on Slashdot. I see. Besides, why would you think you're telling someone they cannot make an edit? You're just stating your opinion and he's stating his. If you bowed out of the conflict, it's your own damn fault you lost. Whinging about it here and then turning around and claiming you don't care is just icing on the cake. I bet you're a real go-getter!

Comment This is what I've always thought... (Score 3, Informative) 190

I've never understood the hype of the Raspberry Pi because the Pi is only a computer, not a full computer system. After you buy all the other components you need and piece them all together, you've spent way over $25! If you want a cheap, easy to learn computer system, make it a ZX80-type system with everything included but a monitor, then provide a TV connection. It would suck on an old low-definition TV, but on a typical TV these days it could look great.

Slashdot Top Deals

Ever notice that even the busiest people are never too busy to tell you just how busy they are?

Working...