Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re: meta discussion who is responsible for hacks? (Score 2) 73

Is Apple responsible for users selecting weak passwords? Yes and no.

Forcing a user to use a TFA protocol significantly reduced the danger of a weak or reused password might pose.

Can Apple stop someone from reusing a password (weak or otherwise)? No.

Can Apple force users to use TFA? Yes.

Submission + - Will work for BEER!!!! (arstechnica.com)

Ronin Developer writes: It would seem that, according to this article, that ancient workers were among the first to announce they would "Work for Beer". Enjoy!

Comment Re:Sign 'I don't agree' on all HR paperwork (Score 4, Insightful) 223

Most WILL NOT issue a severance check UNTIL you sign the separation agreement. They WILL issue you your last paycheck, however - they must do that.

I think requiring companies to pay a 50% salary when a non-compete is in effect is brilliant as they can dictate for whom you can work (and, as such, the ability earn a comparable salary).

If a company determines you are no longer of value to them and they release you (fire/layoff, then the non-compete should be voided entirely. If they still deem you of value but have let you go, they need to provide compensation such as in a layoff with option to recall (as in temporary down-size), they need to pay up or release the obligation.

Comment Dawn of the Machine or Samaritan? (Score 1) 117

It's just a matter of time before they will hook these feeds into an AI (ala "Person of Interest") to process those feeds. Does putting something on the internet without a password make it a public asset? Makes you wonder how long it will take before they will be able to readily access even password protected cameras without a warrant."

Everyday, I walk through the Skyways of Saint Paul. There are cameras every hundred yards or so and at every turn and it's a bit disturbing. Still, the little cretins have managed to put up graffiti in a passageway two days in a row...something new.

Comment Re:QR Codes w/wo Shamir Secret Sharing (Score 1) 167

That's the premise of a Threshold-Based Secret Sharing solution. There are multiple ways to provide a scheme where you need some X of Y shares to recover a value based on WHO is trying to recover the secret.

The simplest is to implement a scheme where N shares are generated and M (where M is less than/equal) to N shares are required to recover a secret.

The same secret can be split into different numbers of shares (or, even splitting a particular share into more shares that get distributed).

Assuming that all the share holders don't meet on Facebook and collude to unlock your secret, you can comfortable distribute the shares and they need not be encrypted (they are useless without the quorum of shares).

Of course, all it takes is one or more share recipients to encrypt the share (or have it encrypted prior to sending it to them using asymmetric encryption) and then it will require those individuals to decrypt the share before your secret can be revealed. It may be, theoretically, harder to compromise an individual AND their share repository vs just the repository.

Comment QR Codes w/wo Shamir Secret Sharing (Score 4, Interesting) 167

Why not print the encrypted key as a QR Code?

Similarly, you could use Shamir Secret Sharing with a theshold to break the key up into N shares which could be provided to people you trust. Then, your (or those you designate - include law enforcement) could recover the keys provided they have the threshold number of shares.

Maybe when burning such info into a crystal becomes cheaper and feasible for the common person, it could be burned into one for all posterity.

Comment Re:Remember how "Top Secret" works (Score 1) 592

And, interestingly, "public" information can deemed classified if an analysis of the information and any related resources deem it so. And, such classification can occur at anytime. Does that mean everyone in possession of that information prior to classification should be held accountable for possessing it? No.

However, as you noted, removal of classification markings from a document does not make it any less so until the appropriate classification authority lowers or removes the classification.

Comment Not so new (Score 1) 215

This was state of the art in 2010 on T-Mobile.

Our pet tracker was re-purposed for personnel (not intentionally) and vehicle tracking. It also found its way to used car dealerships and, in particular, was designed for repossession when leasing to those with dubious credit histories (a fairly large market, btw).

The tracking data was uploaded and stored on our servers whenever the device had a strong cell signal.

Due to the size of the device, the technology was creepy and our ops folks had to share location logs when police were investigating murder and domestic assaults.

The high point was reviewing the more popular names people gave to their devices and posting the top 10.

Comment Just Apple? (Score 1) 875

How about make all companies doing business in the US use US resources (including human) rather than just focusing on one company outsourcing their labor?

Unless Apple is a national company (which, it isn't) or vital to national defense/security, I don't see how they legislate just one company to use his proposed model.

Comment Not Strictly Mobile Anymore? (Score 1) 17

When Facebook Messenger was announced, it was clear that only mobile devices could use the service. Additionally, the criteria for creating Messenger content was also fairly high. As a result, I wonder what the adoption rate of Messenger has been since its launch.

By opening up to BOT creation, there is now the potential to create potentially useful services for Facebook mobile users. This could be a good thing. I can think of several services and business models that could benefit from Messenger platform opening up to BOTS.

Comment Relative Unpredictability? (Score 1) 748

"...their relative unpredictability on the road are nonetheless leading to more accidents than expected."

Quite the opposite - they are predictable in that they follow all traffic laws - that's very predicatable. It's the unpredictability of human nature that causes the accidents. Should these robots be taught to break the law in order to conform with the behavior of their more chaotic human counterparts???

The article brought up another ethical question - the just one posed in Issac Asimov's book, "iRobot" - where the robots calculated the probability of survival and made the cold, calculating decision on who to save. In the case of a self-driving car and self-driving bus full of children, should the both vehicles decide to save the children or, simply, their occupants. Clearly, the latter would result in serious consequences if they both take the latter approach.

Submission + - Precursor to killing encryption (cnn.com)

Ronin Developer writes: The attached article is probably a clear indication that the fight against end-to-end encryption, privacy, and mandatory back-doors is about to ramp up. The article describes the "probable" use of encrypted apps by the Paris terrorists. It's just another log on the "anti-encryption" fire.

Comment As a former naval officer... (Score 3, Interesting) 350

Celestial navigation was taught in our Naval Science Navigation course. As naval bridge officers, we were required to learn celestial navigation primarily as tradition and to have a working understanding of the mechanics of the process. That being said, one must know where the ship is at all times. Today, we rely on GPS, inertial navigation systems and the gyroscopic compass (as opposed to a magnetic compass). There have been times when we lost GPS or LORAN C while at sea. We did experience loss of the gyroscopic compass in the middle of ocean and our ship didn't have INS. You have a mission to carry out and that entails safely navigating your vessel.

Basic skills such as dead reckoning and visual position fixes are used when near land. At sea, with no landmarks, knowing where you is just as important. Case in point is that there is an underwater mountain in the Pacific that ships still manage to hit. Avoiding those things is pretty important. Murphy's law will ensure that your ship fill find the underwater mountain or shoal waters if you aren't prepared.

Do navigators take celestial fixes every night the skies are clear? No. They do it from time to time to keep the traditions alive. And, should the skills ever be needed, they will have them. The calculations are tedius and no where as accurate as GPS fix. But, it's an interesting exercise and a time honored tradition.

Slashdot Top Deals

In the realm of scientific observation, luck is granted only to those who are prepared. - Louis Pasteur

Working...