Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Whatever happened to at-will employment? (Score 5, Informative) 73

This is in Ontario Canada. This is most definitely not an "at-will" jurisdiction when it comes to employment.
The Ontario Labour Relations Act applies, along with common law. (The entitlements written down are not what applies -- it is what is "usual and customary" that applies in Ontario for severance compensation -- and that is *much* more generous than what is written in the legislation.)

Anyone subject to severance (of any kind) in Ontario should consult with a lawyer experienced with the practice of employment law in Ontario before signing anything.

Comment Re:I need a kidney and still think this is good. (Score 1) 295

I hope you get your kidney in time.

I think organ donation should be opt-out. And if you have opted out, you are ineligible to receive an organ transplant. (With at least a 12 month waiting period after opting back in.)

Further, there should be a 3 month waiting period to effect an opt-out. No opting out and then killing yourself out of spite, or having next-of-kin object to an accident victim who has not opted out from donating organs & tissue.

From what I've read, this would solve the organ shortage in most regions.

Comment Re:Hopefully this doesn't result in (Score 1) 72

There are a number of alternatives -- flushing the BTB on ring switch seems a reasonable starting point. It should eliminate most privilege escalations.
Making the address randomization affect bits outside the range seen by the BTB indexing scheme would also make the attack much more difficult. This would require some non-trivial OS kernel changes

The BTBs themselves can be multi-level and pretty large -- they could form part of a process context, but they'd add several kbytes to it. There is no hardware support to save/restore this resource, and it'd have to be *fast* to be of any use. For paranoid people, flushing the BTB on every process (not thread) switch would pretty much stop this attack in its tracks, with a small performance penalty.

It's not clear that making the BTB part of the process context would make things faster overall -- you'd get better prediction, and worse ctx switch overhead. It's not clear to me which would win.

Comment Re:Dumb pipe (Score 1) 225

Let me fix that for you;

-- Rightscorp ALLEGES copyright infringement (with little or no evidence to back up the assertion)
-- Rightscorp notifies ISP, claiming airtight proof, when all they have is some tracker somewhere saying that your IP was part of a swarm at some (unverified) time.
-- ISP tells user to knock it off
-- User continues infringing (assuming they were, or not) and Rightscorp allegedly identifies it again.
-- Rightscorp notifies ISP
-- ISP tells Rightscorp to piss off with their unproven assertions with no evidence.

Comment Data Driven? Bullshit. (Score 3, Insightful) 213

In North America our justice systems are not Data Driven, and they never will be -- they are Revenge Driven. If we were to be Data Driven, we would have a system like Norway -- where recidivism is dramatically lower than what we have here.

The only way to make such a thing happen here would be to persuade the prison industrial complex that it would be more profitable that way. Of course they believe the opposite is true -- lower recidivism would mean fewer prisoners, and that means lower profits.

Comment Re:More specifically, Rice's theorem applies... (Score 1) 116

Indeed they are key -- what they mean is that even if you can come up with an algorithm to prove a property for *all* existing programs, it is possible (and in practice usually *trivial*) to construct a program where that algorithm will provably fail. Remember hackers need only find one hole to siphon off your ether.

This system (or any currency for that matter) needs a mechanism for defining, detecting and reversing fraud, and unmasking those perpetrating it. You have to assume it's only a matter of "when", not "if" fraud will take place.

Computability theory is *fun* :-)
https://en.wikipedia.org/wiki/...

Slashdot Top Deals

Frankly, Scarlett, I don't have a fix. -- Rhett Buggler

Working...