Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:"unknown unknowns" (Score 1) 85

When I was designing circuits boards for a living, I had a rock solid estimation algorithm for a board from concept to deliverable product.

6 months. Regardless of the size and complexity of the board.

This takes into account that most of the time will be spent waiting on manufacturing for prototype turnaround.

You can do it quicker if you don't have a customer or certifications or need a production quality product, but we were a consulting design house.

Comment Re:Translation (Score 4, Interesting) 51

Prove it.

Look back to past back door behaviour (Dual EC DRBG for instance) - they attack the RNGs through standards first.

For the 140-2 era, look at the CRNGT
For the 140-3 era (I.E. Today) look the frankly odd and highly suspect SP800-90A DFs. The guy at NIST in pure political speech said "there were too many cooks making that broth" meaning the NSA were all over it.
For entropy extraction, look how the 90B non IID tests over-estimate the entropy when there is very low entropy from the source. Cross correlate that with the very low entropy claimed in Apples ESV submissions for the RNG in all their current products.
Watch as the government stood back and made no attempts to address the brain dead approach to entropy extraction and entropy estimation in the Linux kernel, following the well known principle of not trying to stop the enemy when they are making a mistake.

The back doors are there to be seen if you care to look. They go for the RNGs first, because if they can bork the RNG, the rest of the cryptosystem fails.

Comment Re:Implementation Skills Issue (Score 1) 88

If it is in the cache, it will not be loaded on the other site. So slashdot can load a https://trackingcompany/slashd... and a https://trackingcompany/pornsi... and the trackingcompany can measure if one of them or both are accessed from your ip. The content of the files is irrelevant for that.

The content is not irrelevant if it's executable and not signed.
The mitigation of side channels is best done with quantization and trace synchronization prevention. But those might be not in the skill set of the average web programmer.

The blasted wasteland approach is to not cache. The googles will whine about the wasted bandwidth, but then they shouldn't have spent decades putting insecure constructs into web technologies.

Comment Re:Implementation Skills Issue (Score 1) 88

This would do not help reduce the cache misses and save network bandwidth, though.

If the excess bandwidth is the downloading on first visit of a file you previously downloaded, then that's the cost of security.
You could mitigate by first sharing hashes of the code you are linking so the browser can make a choice about downloading or not. A filename is not a secure hash.
If it's say a common jquery library, then there's very little information leaked by not downloading it.
If it's something more specific to singular websites, then go ahead and download it.

Comment Re:Just call it ECMAScript (Score 1) 68

The point is that people call it JavaScript

And they can continue to do so.

The trademark doesn't mean you can't call JavaScript "JavaScript".

It just means you can't call other things "JavaScript".

Why would anyone need to do that?

I'm not so sure that's how a trademark works. As I understand it, a trademark is valid in a specific product category or categories, and does not prohibit using the same name elsewhere. Assuming the mark is valid, you can't call a new programming language JavaScript since it would be confusing, but could call an airplane JavaScript because no one would confuse a plane with a programing language.

Like my new movie "Javascript" about an author stuck on the island of Java and he needs to write a best seller to get the money to leave.

Comment NoNoHellYes (Score 1) 112

>Is there any benefit to migrating this codebase to a more modern PHP framework, like Laravel?
No
>And is there an easy and minimally intrusive way this can be done en-masse, across dozens of applications and websites?
No
>Or at this point should I just stick with vi?
Hell yes

Frameworks are a pox on coding, forcing many layers of stuff between your code and what it does. HTTP is not complicated. It doesn't need a complicated framework.

Slashdot Top Deals

The reason computer chips are so small is computers don't eat much.

Working...