Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:*The* Quickest, Not *Its* Quickest (Score 1) 130

It's not Tesla's fault if a stupid driver loses control. While I haven't driven a car with ludicrous speed, my P85 handles acceleration quite well. The traction and stability control of my model S works extremely well. Any stupid driver can cause an accident and lose control.

My experience with my model S is that it is very forgiving despite having so much power and it's very good at maintaining control. It's certainly a hell of a lot better than the Prius I drove previously.

Comment Re:Here's the problem with stereo Bluetooth: (Score 1) 319

In my Prius I had to have a ground-loop adapter added to make aux useable if my phone was charging. Before I had this adapter added the audio was quite noisy. (there was a service bulletin on this issue so it was covered under warranty). If the audio signals aren't well grounded they can also pick up all sorts of noise, including noise from a phone's antenna.

The Prius may also be feeding the AUX input into an A-D converter as well rather than keeping it analog.

Comment Re:Contradictory (Score 1) 68

what exactly are you missing?

Schematics, and the ability to tinker.

no more or less than any other modern system. No modern PC system I'm aware of gives you schematics these days, and there are many that have gone to minimal chip motherboards with limited slots. So other than pining for the build it yourself systems of yesteryear, what are you missing compared to a Dell, Alienware, Lenovo, HP, or Acer computer? What about a Surface Pro?

They are all less open than previously, and less able to be tinkered with, at least not without voiding the warranty.

Comment Re:Good luck (Score 1) 150

The Republicans of the 80s and even 90s are nothing like the party of today. Somewhere along the lines it was hijacked by religious nutjobs.

True, but even the Republicans of the 80s (Reagan #1) were not fiscal conservatives, no matter what their lips were spouting. The closest we got to a balanced budget since 1980 was under Clinton's terms, whether by luck or happenstance, who knows.

Comment Re:Double Standards (Score 2) 322

In Canada, the only rights foreign persons don't have are political, voting and holding office, and mobility rights including entering and/or staying in the country and earning a livelihood. Landed immigrants have most of the mobility rights but can still be deported.
I'd think most countries would be similar.

Comment Re:Contradictory (Score 1) 68

It's not what I can't run...

OK, so you can run whatever you need. So there's no "openness" issue regarding software.

it's that the entire system is less open. The Apple 2, for instance, was openable, an end user could easily plug in cards into available slots much like what PC ISA would years laters, and the manual that came with the machine even had a complete schematic for the computer!

And today, you can still open up the computer. Granted, there are fewer slots, and some things are now soldered instead of card plugs. Today's expansions are more about plugging things into those Thunderbolt/USB-C connectors, which offer much higher throughput than PC ISA, EISA, or even base PCI. So, removing all those things from consideration that you can now extend via either of those connectors, what exactly are you missing? (We'll take memory off the table, since that is the one item that is now only upgradeable on the Mac Pro)

Comment Re:Authentication then anonymity (Score 1) 214

"A one-way hash function serving as a checksum for the ballot content combined with the voter identity."

The government owns both the voting machine and the database storing the results, which means the government can MiM the hash. Which in turn means that it is not enough for the voter to be able to recall the hash, it needs to recover what his result is, to be sure it's what he indeed voted. But once the voter can do that, he can be coerced to vote one way or another.

Comment Re:What is it that you say? (Score 1) 441

Except it's never happened in the hundreds of times this process has repeated. False premise. Go away.

Huh? Whole classes of people have been removed from the labour system due to automation. Overall employment has dropped from close to 100% to less then 50% with groups like the 5yr-15yr olds completely removed, and the 15-25 yr olds also being routed into education instead of going to work (and no dole for them, they have to borrow). At the other end the same happened with large numbers of people being retired instead of working. In the middle, the ones considered too disabled to work have multiplied. At various times the female half of the population have also been encouraged to not work, the 20th century idea of the stay at home housewife was a reaction to automation removing many jobs.
Then there are the under employed, people that would love to work more, but are lucky to get enough work to work 75% of the time.
This is all due to automation meaning that there is not enough work for everyone to start working at 5 years old and work until death, which in previous times, with luck, was sometime in your 70's.

Comment Re:"Technologically impossible?" (Score 1) 214

"This data must be recorded in a register of WHO voted, it must NOT be recorded in the register tallied votes."

Registered is the key here. How do you make sure whatever the voter decided is what got into the database?

Authentication means allowing the process to be submitted or not."

This is, by its own definition, authorization, not authentication, but I get your point. The problem is that this is *one* kind of authentication. You not only need to make sure the one voting is allowed to vote (you authorize by means of an authentication process followed by a tracking one), but you also need to make sure that the casted voted is counted as is. For this you also need authentication, the ballot's in this case.

"The numbers have to match, but the data doesn't have to be associated."

It needs to, if the system puts the vote in the shadows, where it may be modified from casting to counting.

Comment Re:Authentication then anonymity (Score 1) 214

"What you're missing, I believe, is that the authentication is required at a certain time"

What you are missing, I believe, is that authentication is required at more than one moment in time, for more of one action or good.

You need to authenticate the voter to be who he says to be in order to avoid him voting twice. This you can get with this kind of system. But then you also need to authenticate that whatever that person voted is in fact what he voted. With paper you get this by the voter having the ballot in his full control from the moment the vote is decided (the moment he puts the vote within an envelope) till the moment he puts it in the ballot box and having an in-plain-sight chain of custody from that moment up to the moment the vote is counted. With an e-vote, how do you make sure whatever the voter decided is what got into the storing database without, at the same time, losing the voter's anonymity?

"...and the anonymity is required at a different, later time"

No. Anonymity is required along the full process. There *is* a moment when anonymity is also under risk with physical ballots and it is the period that goes from the voter putting the ballot in an envelope till the moment he puts it in the ballot box, and that's why this is done on a public place.

So, let's recap: on physical vote you gain both anonymity and authentication the Sherlock Holmes' way "Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth." You don't really probe them, you just leave neither place nor time where/when the ballot can be tampered with or its content tied back to its caster. On a purely electronic system, there's no way you can offer neither such impossibility nor a positive proof that it cannot be done, as there's a single party -which is not to be trusted, owning the full process, from cast to storage.

Slashdot Top Deals

"May the forces of evil become confused on the way to your house." -- George Carlin

Working...