Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re: Comment (Score 1) 302

Of course, this makes discrimination easier and more prevalent. But in many countries discrimination is legal. For instance, many job ads in China will specify "Han only" to make it clear that they don't want to hire any Tibetans, Hui, Uighurs, etc.

And definitely not Greedo. That tricky bastard always tries to shoot first.

Comment Re:Exposing those who store plaintext passwords (Score 1) 126

It's not so bad, fully 50% of the users were actually FBI agents pretending to be 14-year-old girls. The remaining 99.999% were guys pretending to be teenage girls. The one genuine girl on the site has said she's not too fussed since she didn't use it that much anyway, it was too full of FBI agents and guys.

Comment Re:What's the _actual_ algorithm. (Score 1) 77


So what will be the impact of this? Will we see cheaper, lower-power encryption devices? Or maybe quicker cracking times in brute force attacks?


And that's not just applying Betteridge's Law. The answer really is "no", even if someone manages to turn it into a simple algorithmic implementation.

Comment Re:To be fair to google (Score 0) 129

Google has fairly strong competition with Firefox on Android.

Say what? Firefox on Android has market share of half a percent. Shit, desktop Linux had a higher market share than that when Microsoft was prosecuted for monopoly practices. Browsers like Opera Mini have ten times the market share of Firefox on Android. It may as well not exist for all the presence it has.

Comment Re:... formerly most secure computer (Score 1) 126

Oh cool, a developer. Do you have a means for people to submit what-about-X attack questions? Your Security section is a bit too incomplete for me :-). For example it looks like the tamper mesh only covers the two shells that surround the circuit board, what if I penetrate the side of the circuit board, inject PU foam under pressure to lock the switches, and then separate the halves? What if I use a targeted magnetic field to lock the switches? What if I use oil-well perforators to knock out the switches, or disconnect power/signal lines to tamper-responding circuitry? etc.

Comment Re:... formerly most secure computer (Score 1) 126

One thing I'm puzzled about is how they're going to build this for $25K in funding. I've worked on highly-secure computing devices and $25K was the down payment on the FIPS eval, not the development budget. OK, I realise FIPS is a waste of money so it doesn't make for a good benchmark, but you still can't get much engineering out of $25K, particularly not the specialised stuff they're doing.

Slashdot Top Deals

If in any problem you find yourself doing an immense amount of work, the answer can be obtained by simple inspection.