Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:We're all giant security flaws from birth (Score 1) 65

I'm generally small-L, practical libertarian (not one of the psycho variety you describe above) who supports the free market and civil liberties, but I'll absolutely stand by my original statement: if you have knowledge of a serious exploit in a critical medical device like a pacemaker or artificial heart, and you choose NOT to report that information so you can instead profit from it, you should go to jail, and for a long time. Most sane, mainstream libertarian-leaning folks acknowledge that some amount of regulation is necessary for the common good. The ultra libertarians need to grow up a little and stop looking the other way when someone does something as completely immoral as this.

Comment Re:We're all giant security flaws from birth (Score 1) 65

My Dad has a STJ pacemaker with the Merlin at home communication device in question. Merlin is a monitoring device that the implantee sets up next to their bed, and it wirelessly monitors the pacemaker while they sleep. In case of a cardiac event, it notifies the central monitoring facilities and also send info about the status of the patient's heart and pacemaker (kind of like a burglar alarm system). It is a real game-changer and has saved many peoples' lives. Merlin operates over old-school POTS (not WiFi or even Ethernet) which these days is likely a bit more secure than going over the Internet anyway. I don't know enough about the attack vector but it sounds like the Merlin station wasn't suitably hardened, which is incredibly common in so many of these first gen in-house technologies. I doubt a hacker could remotely turn off a pacemaker, and that likely wouldn't kill my Dad anyway, but obviously this issue needs to be fixed (and it will).

Having said that -- hackers gonna hack, and I get it. However, it should be illegal to have knowledge of this type of vulnerability with a medical device and to choose not to report it so you and your pathological buddies can short stocks. I can't think of much that's more greedy and immoral than that. This isn't some server to be taken over -- you're potentially messing with real peoples' health so you can make a quick buck. There is no place in any civilized society on earth for those types of inhuman pieces of shit.

Comment This is what the NSA and FBI *should* work on (Score 1) 65

Instead of wasting time and money doing dragnet email and phone surveillance and conducting bullshit entrapment stings to create fake "terrorists," the TLAs should absolutely exterminate these kinds of human garbage. Seriously, they need to identify and prosecute these fucks with the most extreme prejudice possible. Human greed has no boundaries.

Submission + - BleachBit stifles investigation of Hillary Clinton

ahziem writes: The IT team for presidential candidate Hillary Clinton used the open source cleaning software BleachBit to wipe systems "so even God couldn’t read them," according to South Carolina Rep. Trey Gowdy on Fox News. His comments on the "drastic cyber-measure" were in response to the question of whether emails on her private Microsoft Exchange Server were simply about "yoga and wedding plans."

Perhaps Clinton's team used an open source application because, unlike proprietary applications, it can be audited, like for backdoors. In response to the Edward Snowden leaks in 2013, privacy expert Bruce Schneier advised, "Closed-source software is easier for the NSA to backdoor than open-source software," in an article in which he stated he also uses BleachBit. Ironically, Schneier was writing to a non-governmental audience.

Comment Re:massive parallel processing=limited application (Score 1) 102

Also, there is caching, and also, some loads are heavy on longish FPU operations.

So... it doesn't quite work out that way. Also, multicore designs can have separate memory.

One example of multicore design that's both interesting and functional are the various vector processor graphics cores. Lots of em in there; and they get to do a lot of useful work you couldn't really do any other way with similar clock speeds and process tech.

Comment Failed, failed, and failed, so more fail? (Score 1) 187

> They should have been far more aggressive in getting their service in as many places as possible.

Maybe. Or maybe if it didn't sell well in Kansas City, and it didn't sell well in Austin, and it didn't sell well in Provo - it doesn't sell well. More cities would have been more fail.

Kind of like politicians in places that have been 100% controlled by one party, representing one viewpoint, for decades and it hasn't worked, places like Detroit, Chicago, etc. While campaiging the same politicians stand up there and point to the same problems, while supporting the same "solutions" that they've been doing for 30 or 40 years. If it's not working, maybe it's not going to work; maybe try something else.

It may be very wise for Google to say "well, that didn't work, we'll try something else" rather than doing more failure faster.

Comment Opposite (Score 1) 129

The nanny-state would tend to mandate the WiFi stay locked for security reasons, or at least make sure people unlocking the WiFi were properly punished later by whatever means the state has (which are many).

In this actual case, it's private citizens calling for other private citizens for devices to be unlocked...

Comment More reliable, not less (Score 1) 154

One vector of "unreliability" the article talked about was iPhones "failing to connect to WiFi".

Let's just put aside the problem with equating network reliability with hardware reliability... there's a big difference in HOW both devices connect to WiFi, by design.

Apple in the last year or so changed iOS so that it will prefer to stay on a cell connection if it seems like the WiFi is going to be flaky or unreliable.

So the "WiFi failing to connect" is a result of the software making the network connection (you know, the whole reason why you are trying to connect to the WiFi in the first place?) MORE reliable for the user, not less... we all know by now sometimes the cell network is vastly better than a sketchy WiFi node.

Comment Convenience for ALL (Score 1) 31

Closed source, open source, half-way open source - they all have holes the size of the Titanic, and are casing our privacy to sink to the bottom of the ocean.

Are you trying to say, governments haven't spied on and persecuted opponents before these modern-day conveniences appeared?

The problem is our dependence on these "conveniences" we can now not live without.

We can live without them, but the life will be, wait for it, less convenient.

They make living more comfortable. For everyone — including the spies.

Comment Re:Climate Non-Science (Score 1) 422

1 degree of global warming isn't enough for you?

No, it is not enough. Because there are legitimate questions as to how it is measured, how the measurements are calibrated (including the scandal of some raw data disappearing), and what swings are normal. For example, Tasmania used to be connected to Australian mainland not too long ago. It is now an island. Do you think, the shamans of the aborigines living there blamed the sins of their contemporaries for the rising seas back then? Same question about Kodiak archipelago — it used to be reachable from Alaska, but is not any more. The Kodiak bears are now considered different species from mainland grizzlies... Is humanity to blame for that?

And there is a big difference in falsifiability

You try to find a prediction by "climate scientists", that uses a falsifiable "will" instead of the evasive non-falsifiable "may"... The scarcity of such statements itself is an indication, of the state of this sorry non-science... What you can find is as scientific and meaningful as the Geico's commercials: "15 minutes could save you up to 15% or more..."

If you ever found a point where the teachers told you the equivalent of 2+2=5, you could point that out to the world

I don't need to find errors — the purported "scientists" need to demonstrate, their discipline is really a science. And the only way to do that is by showing useful predictions, that have come true. I'm yet to see any.

Try it yourself: assemble a list of link-pairs:

  1. The first link in each pair shall be to the prediction.
  2. The second link each pair shall be to confirmation of the prediction materializing within, say 20% of the predicted value(s), if quantifiable.
  3. The link-targets in each pair must be several years apart — predicting tomorow's weather, for example, would not count.
  4. The prediction must be somewhat meaningful: a promise, that it will get hotter or colder, is not acceptable.

Give it your best... Can you offer at least 3 such link-pairs?

Submission + - Making one-on-one meetings actually USEFUL

Esther Schindler writes: All too often, managers and team members reject a regular check-in because they think it's a waste of time. But when done well, one-and-one meetings are a great way to build trust and rapport. That weekly time slot is a predictable time for feedback and coaching. Even when a manager and team member get along well, a regular one-on-one is an opportunity to impart information privately, to raise emotional issues before they fester, to address career challenges, and to help managers make better decisions with team input.

But way too often, those manager-and-team-member meetings are a waste of time. Here's three ways they go wrong.

Slashdot Top Deals

He's dead, Jim.

Working...