Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Prviders will be providers. (Score 1) 162

Please, like this kinda thing isn't expected. Security issues makes space for powerful providers (and co-conspirators ). Wait! Conspiracy tin-foil-hat thinking! You don't have to be a bad/evil company. You just have to follow the course(s) of action that prevent you from failing. Anyone that has a hold on the Internet, will want to keep it (and take more). If you want to hang on, you follow suite. You just do your best to cover the fact that you know your helping the bad companies. Otherwise, you seem almost as bad. But, this is only "bad" if conquering the Internet isn't considered "good". Will those that think it's bad still use it? When the greater evils are the only way to use it (likely the eventual case), did we support it on its way to getting there? I don't know if that even matters. There is always going to be enough people, who just use without observing or questioning. The rest of the hamsters stay away from the new food dish, until they get hungry enough. We were sold the Internet, misguidedly thinking it was ours. This whole thing is like getting upset, because your favorite series killed off a likable character. I get that the Internet is more than entertainment. Everyday its going to become more and more of a civil utility. We're gonna end up letting Caesar have that which is Caesar's (it was probably always his). For now, we can still do other things on it. Maybe we should look at finding other ways to network tons of PCs? Although, you'd probably look like someone who supports a shady communications network. Isn't that what we're looking at, with this type of thing? Maybe it isn't, "If you don't expose enough of your users identity, you are a insecure browser". But seems like that is the goal. Doesn't it? You are "probably" secure from others looking at your traffic. But, those you interact will need to know exactly who you are. That way you can be held responsible for your online actions, instead of them. The term, I believe, is "No Trust Security". The idea is that you get no access, unless you are trusted. But, to be trusted, you must be authenticated. That is what Digital ID is. It shouldn't be a surprise that companies are slowing taking it that way. Those that hinder progress, in that direction, will obviously face some turbulence. This issue we're face here isn't Digital ID, yet. But it is no conspiracy, that this is where we are going. I can't blame anyone for not liking it. But I don't know if points can be awarded, for ignoring it. Just look around, a little.

Comment Evidence that we are a near depreciated people (Score 1) 125

Even the archaic Pentium III has plenty of useful "Modern" functionality. Rather you are using Linux on it or WinXP (perhaps with something like One-Care-Api), many modern applications can be ran. Granted, there are less and less Windows applications and Linux distros supporting 32bit systems, or the lack of PAE. But, even without modern software, lots of aging software is still very useful. The fact that no one (in the majority) wants these machines, if they aren't useful on the Internet, shows that the value of the "PC" has almost completely shifted towards a kind of "extroverted computing". Essentially, that the device isn't useful unless it possesses dependency on capacities beyond its own. To me, this say an awful lot about the "majority" user. I can't 100% blanket this statement on "majority" user; because there is an efficiency only needing one device, for all processing activities. Also, the large supply of aging devices and the logistics to supply them to those whom would use them just isn't there. You can probably add to that, that many are ignorant to the capacities of older devices. For example, there are likely plenty of artists and musicians that lack the competency to understand that these machines could meet their needs. Since many may not economically feel like they can purchase a new (or recently new) machine, they go without any machine. A Pentium M device, from 2005, can run a fairly built-out version Guitarix (or a free Windows application of a similar nature) providing the OS isn't itself configured or compiled resource heavy. There are plenty of machines well suited to run Krita. Any person significantly advanced in music or illustration will quickly snub their noise at such "perceivably" under-powered machines. Despite these arguments against my claim, I think "overall" this is a trend more related to us depreciating our own abilities and enhancing/increasing our external dependencies. I guess that probably seems like a well known fact. I think we should watch this trend of Corporations and Linux distros (with the difference between the two getting less every year) slowly deciding that the hardware itself can't be supported. The claim will eventually be, that the hardware itself is a security issue. Actually, if you look at it, that ground work is already there. You combine this with many online services not being available to you, unless you use a fairly recent (and recourse hungry) browser, and the mounting growth of legal liability for online activity, we may see ourselves "one day" being legally bound to using specific "secured" devices for any online activity. As if you hadn't already noticed, the cloud was/is intended to be where users will one day store all of their data. I imagine forcing reliance on remote computing and storage, could only increase "Surveillance" precision. Sorry, I meant "Internet Security" not "Surveillance". What am I even saying? Clearly, I've over exaggerated all of this. Introversion, of any kind, is obviously not healthy. Having the ability to mold and form your internal life is a disease. Making the connection between e-waste and the maturation of a good and properly articulated society is likely the out come of spending too much time exploring personal potentials, outside of the appropriate prescribed norms. That or else it is is blatantly taking advantage of the subject matter, to inject a kind of paranoia propaganda, to satiate some personal agenda. What the heck. Its like I was saying having too much functional e-waste has something to do with us "as a people" reaching a near irrecoverable agentic state. I guess I don't really see the connection, now. Sorry about that.

Comment Always good for a laugh. (Score 1) 113

You are not safe on Christmas, without completely accepting that we need to have total access to private conversations. Everytime you enforce privacy, a terrorist has a Christmas gift waiting for you.-- While the common person views "Whatsapp" as a pyramid of privacy, what good terrorist would believe the same? So What kind of terrorist are we talking about here? One that trusts Facebook and Whatsapp? If this is the case, there are likely tons of bread crumbs for tracking this fool.-- Love me some good old propaganda once in a while.-- If anything, this is just an attempt to get below average wrong doers convinced that whatsapp isn't already totally open to higher level law enforcement. Maybe not even all that high of level law enforcement.

Comment Maybe they do (Score 2) 307

A good place for people to start is Bash, Zsh, Yash, or Powershell. Notepad, Nano, and Vi are often pre-installed.

One large difference is the complexity and undocumented nature of the hardware.

What might be more interesting is a system not much more complex than a Amiga or AtariST (and they are complex enough), but only a good bit faster. That way you can do some useful things with it. There are projects like the Standalone Vampire Amiga like systems. And the Atari has the Firebee. The Vampire v4 is said to have H264 playback. And these machines are very compatabile with their dated origins.

For C64 there is the Mega64, which can use a pie zero for more power and memory. There is the ZX Spectrum Next too.

I personally would like to see Vampire make something for the Atari systems. It has plenty of opensource tools, like a bootable multitasking OS.

Comment Depends (Score 1) 408

It all depends on the type of programmer you are looking to breed.

To me, it looks like we are heading in the direction of extreme compartmentalized programming. You only need to know how your code relates to the other parts of the project. You learn more and more about what your specific role as a developer is. Then you are used to duplicate that role from project to project. Understanding the detailed ins and outs of the entire system, would then be kind of a distraction. That was one of the goals behind OOP. We are not totally there right now. But unless you are blind, you can see that this is where we will be going. For the sake of "security" systems programming will become a very esoteric art, and not what we commonly refer to when we say programmer. If you look at the closed nature of most devices used today, you see that the average user is very seperated from the OS. For all intents and purposes most UIs are not much different than a webbrowser. Soon that difference will not exist. The system will present the use with a UI that connects them to a cloud stored userspace. You will have that same userspace from device to device, and will not have access to that userspace without a network connection (network based workstations basically). Your device will have a high powered GUI and the cpu crunches local JIT code like javascript or python does now. But all of that code comes from a cloud like service. So development in large, will manly take place in very high level programming environments. Essentially programmers will be basically writing scripts. There will still be people writting compiled code. But more and more we are going to see scripting as the default meaning behind porgrammer.

So to understand how to write scripts, you just need a very limited knowledge on the systax used to write in the scripting language you are using, and the commands relevant to the task you are performing. So you could walk in knowing almost nothing about programming, and write a simple GUI or task, and what you need to know most is how to access the information that provides you with the commands you need. In a more specific and complex senario, you'll need to know how to work with a database or utilized a graphics engine.

I totally agree with the article. But that is because I mean something less modern when I say programmer. I'd like to see systems where you still have the freedom to poke and peek memory. But I'd also like "user" to mean someone that can compile their system to their specific CPU in an architecture family, and administer what running services they do and do not need running in the background of their system.

Comment This is funny as hell. (Score 1) 125

So you download it and start sifting through it all to find that O.B.L. era terrorist malware, only to find advanced backdoor contagions that exploit specific vulnerabilities in only Windows 10. I see what you did there, CIA! The malware warning was a good way to give the hacker a nice laugh. One of those inside jokes.

Comment Re:Why not do something interesting? (Score 1) 107

Your right. It isn't very interesting. Just more interesting than temporary hosting, which has been around for quite some time now. There has been a ton of sites offering this service free. I even hosted a node.js site that did it. The niche audience doesn't need a web browser that can do what netcat and socat can do. We already have netcat and socat. But we also don't need our web browser with a built in video player. If you made netcat as easy to use as in browsers videos, the niche would probably just complain about browser bloat. I think Opera tried some interesting things like that anyway. It never took off because the average user doesn't even imagine something like it can be done, and doesn't look for it. Especially today. Everyone is used to a man in the middle, doing for you what your computer could already do without him. I don't think it would take a whole lot of investment either. Its not new technology. Its the basics of the Internet, that have been there since Netscape (with the exception of upnp). One thing I have noticed, is that people do not understand the difference between hosting a file somewhere and sharing it direct IP to IP. It did the same thing right? I know any lightly seasoned user knows the difference. And most people could pick out the difference right away, if they thought about it. But as for Mozilla putting effort into a temp host site, if you're gonna do that why not do something interesting in that comparable range of not very interesting things?

Comment Why not do something interesting? (Score 1) 107

Why not a built in web interface for a upnp encrypted netcat or socat. Then you could serve pages, files, and chats; from your browser to another. If they absolutely must provide a service, they could be the web facing connection helper for those who cannot figure out firewalls or are not allowed direct connections (when upnp is not applicable). Then there is 50% less wasted bandwidth. Upload the file to the actual destination the first time. Allow extensive configurations for allowing resume, close service after completion, continue service until manually terminated, etc. You could even provide a plugin for configuring a central hub. If no one has a computer that is on all of the time, it could be another simple service they offer. Groups of peers connecting, without needing to use fackbook, DC++, Retroshare, etc. Instead lets host your files for you, and just because the link isn't accessible after some time, you can imagine that the file is deleted.

Comment Re:Directory Opus (Score 1) 22

Maybe not a floppy drive. But with the ZX Spectrum Next, using a Rpi Zero as a slave, maybe opus could have something to do with the Spectrum. You can play already back PCM on Spectrums with the AY chip. I plan to buy the ZX Next. But I'm still waiting on some parts to finish my Harlequin 128k clone. The ZX Next has some nice clock speeds. It can also run a few other systems, like the C64. Wifi, 1.5Mb ram, 256 colors per pixel, plus whatever you can do with the ram, cpu, and gpu of the Zero. Right now they have the zero managing sprites. Anyways....

Comment Re:JavaScript enhances some web applications (Score 1) 108

So the real problem is that the device is so locked down that the user can't install IRC. Shouldn't have bought it if you wanted any rights like that. If everyone knew better, eventually they would sell one you could install IRC on. If you are unprivileged because your employer won't allow you to install software, maybe you shouldn't be.

There is already a program or two for chatting. Why do I need it in my web browser?

The real problem is that most of us that know Javascript sucks, are not developing alternatives. And when we do, no one uses them because they don't know why Javascript sucks.

People used to avoid computers because you had to learn in order to do something useful with it.

Instead of moving people past the barrier of ignorance, we made them ignorant of what their device is doing. Then we locked them into a development cycle scam; so that they would buy new devices to replace ones that could/would likely still function great.

The examples you give are examples created on top of other examples of doing things in a way that we don't need to. But if you want your service or game to get any attention, you have to get it where the people can reach it. So you have to provide it to them in a way that will likely require Javascript.

Bad user experience, means bad consumer experience. Some of us don't want to pay for a locked in commercial playing device that refuses to function because someone decided it was time for you to buy a new one. I agree that this isn't a high quantity of the mass feeling this way. But maybe it should be.

A good but dated computer bogged down with Javascript is a horrible reason to need a new device. Especially if you are just a consumer using it for socializing and shopping. It takes very little to get a device doing that. In the days of Win98 and XP it was millions of system tray apps and unseen services convincing you that you needed a new computer. Now its Javascript.

Those of us that dislike Javascript and Webassembly are not learning fast enough that we need to establish and "USE" alternatives. But it will be like Linux was in the beginning. Only those similarly brave will understand why you just don't buy convenience.

I don't see it happening anytime soon. But even those of us that are fed up are unlikely to subject ourselves to the barren waste land of efficient computing. Most of the younger hobbyists are starting of their adventures inspired by the very technology developments that are locking this into the commercial realm. Since the Internet and computing is more valuable to us than just a tool of commerce, we should be giving more attention to forking the industry. But because there isn't a lot of money in it, it isn't likely to happen. And if it starts, it suddenly becomes a a target of the industry it forked from. Money usually wins.

Even if you limit Javascript down in scale, what it did will just be consumed by something like it. And the drive for innovation will always create insecurity in implantation. This is where the unix philosophy shines some. Do one thing and do it well. If you need some new function, only one piece of software needs to be there for that. Or we can tie a bunch together and load them all at once in one application. Then when ever we mess up a small part, the whole becomes weakened.

Comment Need adjustment to H.A.M. Licensing (Score 1) 168

The first thing is getting the F.C.C. to add a new licensing test and small frequency range for extreme novice operators. The test needs to be online, since in many areas it is hard to find 2 seasoned H.A.M. operators to test you at the current novice level. But with this new restricted operators level, you would still get an operators call sign. Then the hardware needs to be inexpensively packaged, but powerful enough to traverse in hilly or tree infested areas; to reach other persons locally. But reaching a more powerful carrier station would be more helpful. Then the software for the hardware(drivers) and the applications, needs to be under a libre/opensource license. Next is getting the F.C.C. to allow encrypted transmissions in this extreme novice frequency range. Meaning allowance of the intent to obscure the transmissions contents. They could keep the part about making sure that the transmission obscuring code is available to the public. This is aimed at the U.S.. Other countries may have greater or lessor restrictions to overcome. I have also seen some interesting work on UHF networking. But this might be a more complex licensing issue. A few years back people were modifying older linksys routers to operate on frequencies specific to H.A.M. operators. They managed to get some good networking in largely populated areas. But the main turn off was getting the initial license and getting through trees and hills. No one wants to have a huge antenna in their backyard. I really think H.A.M. is a disappearing art. Getting more people involved could produce more interested persons. Many of the bars to entry have already been dropped. You used to build a radio by hand before you could get your first license. That is no longer true. I think a key point would be that the (proposed) Extreme Novice license would need companion equipment that is certified not to break the rules of the (proposed) Extreme Novice license. The only way I see around this is part 15. Which is really bad for distance, unless you goes with point to point transmissions. You'd need narrow focused antenna/dishes. And likely a antenna/dish for every person linked to you in a chain of communication. No very fault tolerant. Many points of failure. Other options include extremely high audio frequencies (bad idea) and powerful transmission of focused light (lazer). Both kinda suck. No matter what method is used, it might be best to think about getting the most out of each transmitted bit. Things like javascript and torrent are nice aims. But realistically the fidonet systems of the dial-up bbs systems would be much better. Some H.A.M. radio hardware even has built in bbs software for message relaying. Since most options for a strong network are going to be aggressively dismissed, by the powers that be; you'll likely need to focus on a system that works around intermittently connected devices. Once connected they exchange a large amount of data for everyone on the network. The more often you connect, the better service you get and provide. But those that don't connect often can still easily get any information that wasn't meant to be private. In a system like this, you can encrypt in any way you'd like. The largest issue is connecting people over long distances. That is going to be the hard part.

Comment Re: Systemd! (Score 1) 372

Good thing they can be checked since it's open source

You can also check all of the code that suddenly relies only on systemd as a init system. If the systemd code alters the system in a way you don't like, you can fork systemd to a way that works the way you'd like. But then you will, in most cases, need to fork all the programs that depend on systemd working the way you don't like. Being opensource doesn't do you any good, when the design being implemented is what some people are wary of. Have access to the code only lets you read how they are doing exactly what you do not like. Fixing it would mean designing in a different direction. Its not the same as checking to see if you you can trust the code they are writing. Its that you don't trust the direction that the code is going, as it will slowly alter the direction of everything that relies on that code. Then you won't have a choice. You'll just have to take it, or do tons of coding to work around all of the things that have altered your system by the inclusion of systemd reliance. It is a large undertaking, and I am glad someone forked Debain to do it.

Comment Some changes come at a cost not acceptable by all (Score 2) 388

This could easily be likened to things like Systemd and Pulseaudio. Both are really great. But not if they get in the way by aiming for only a select audience use needs. There are some that just like what they already know. Some just complain because someone else did. But some changes force a direction that can't be see, as a limitation, by those that like the change. They can't see why anyone would want to do it any different. In some cases you can change some compile flags and adjust applications to your needs. In other cases, you get unwanted bloat, or you have to work around an improvement that works against your use case. Just because it makes sense to you, and gets implemented, doesn't mean that you have made it better for everyone. Some innovations make things easier for people that are not as experienced. The end result can be narrowing the innovations of the experienced. Expression could be used as an example here as well. Not everyone can make out what is being expressed in a philosophical discourse. If you change the language to reach a larger audience, you'll possibly lose depth and potency. The "command line interface vs graphical user interface" is another good example. You can be fishing around clicking your way through someones idea of an intuitive graphical work flow; or pipe a few commands together that do exactly what you need. Both are different versions of simplicity. Users of either side may find the opposing alternative way annoying.

Comment Re:A slightly too secure tool? (Score 1) 227

Additionally, I've noticed this being compared to the firearms debate. The idea of "only useful to kill" has come up. In that comparison I would say that the government no longer considers the firearm, you and I can get, as a threat to its capacity to govern. But at some point in history it had been established that we should have guns to protect us from our own government. I think it is pretty obvious that you and I having weapons that can protect us from our own government is a thing of the past. If you did manage to get your hands on something, you would legally be a criminal. If not immediately, as soon as the possession became a known governing insecurity. It wasn't that long ago that the "red scare" had persons persecuted as a result of their voiced personal opinions. Opinions are not firearms or remote network tools. But it could be we are looking at something very similar anyway.

Comment A slightly too secure tool? (Score 1) 227

Could it be that the tool is too secure? Is it better to attack on the face of the tools negative attributes, rather than say they are trying to discourage the, possibly powerful, positive attribute(s)? Someone asked, "Why aren't the legal users of the tool using some other VPN tool?". I think the question was asked to support the idea that those users were only using the software with negative intentions. Just a silly way to look at the whole thing and I apologize for it. But I can't deny the simple logic, that individual security is a governing insecurity. When we speak of security, in a political way, it means that the government isn't prevented from governing. So eventually, providing a tool that prevents awareness of activity is very similar to hacking. You are hacking the governments security.

Slashdot Top Deals

The reason computer chips are so small is computers don't eat much.

Working...