Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment CGNAT has nothing to do with End-to-end (Score 4, Informative) 338

The end-to-end principle has to do with where network logic is placed, not which devices are reachable, routeable, or have an IP address. As simply as possible, the end-to-end principle means that we should have smart end hosts and a dumb network. This is why routers don't guarantee packet delivery -- its up to the hosts (with TCP, et al.) to ensure this. This is in contrast to telephony networks, where the network is responsible for almost everything.

There are good reasons to oppose CGNAT, but the "end to end principle" is not one of them.

http://en.wikipedia.org/wiki/End-to-end_principle
or, if you're inclined to primary sources:
http://groups.csail.mit.edu/ana/Publications/PubPDFs/End-to-End%20Arguments%20in%20System%20Design.pdf

Comment Re:Wait (Score 1) 91

Didn't read TFA, per Slashdot tradition, but the system is likely protected by the use of public key crypto.

This system is secure because you can't feasibly obtain IBM's private key. Sure, you can provide an IBM certificate, but you can't complete a key exchange or any other communications if I send it to you encrypted with IBM's public key. Likewise, in theory you can't obtain a new certificate that says that you are IBM with a public/private key that you know from a certificate authority. In practice, obtaining a valid certificate is much less difficult than it ought to be.

Comment Re:Assuming It Is China (Score 1) 122

If they were concerned about national security, they would denounce the culprit (they know what country they're coming from), and work on hardening security.

In most cases, we can't tell where traffic comes from. Between botnets, Tor, and other proxies, the best we can do is say "it looks like the attacks are coming from IP addresses from Karblockistan." Attack attribution is difficult, if not impossible. Hypothetically, I can attack your network and make it look like it came from anywhere in the world. If I want to be extra convincing, I'll use Chinese language tools so that you suspect the Chinese. An attack from Chinese IP's doesn't mean the PRC had anything to do with it.

As for the rest of your comment, have you not seen the flood of news articles on how DoD et al. are trying to hire security experts in droves? Besides, information security is a lot harder than putting bars on the windows. In many cases, you cannot know where you are vulnerable in the software (and hardware!) until after a breach, and in some of the more prominent attacks, the method was spear-phishing -- social engineering. You can't patch (or harden) stupid. Security is, always has been, and always will be a non-trivial problem.

Comment Re:How can this work? (Score 1) 92

The answer is public-key cryptography, where I can send you a message encrypted with your public key, and only you (who knows the matching private key) can decrypt the message. A high-level analogy is sending everyone a box that they can close and lock, but only you have the key to unlock. It's impractical to obtain a private key given a public key. The tags or "secret messages" -- the colored notes in the analogy -- are messages encrypted with the public key of the Telex system in use. The initial analysis by the researchers indicates that it is infeasible to determine if the a tag is actually a tag or just a random number. Only a Telex server can tell if the field that holds the tag is a tag or not. Compromising the tag system in the way you describe would require compromising the private key from the Telex system. This would require quantum computing or espionage (stealing the key from the Telex system). It's a neat solution, actually.
Idle

Submission + - Dubai’s World of Islands is Sinking Into the (inhabitat.com)

An anonymous reader writes: Dubai's dubious building boom has spawned a new architecture of unparalleled excess — one needn't look further than the desert region's ski slope, refrigerated beach and proposed ice cube lodge to find proof. However as of late the emirate's blustery building pace has lost its muster, and the latest megaproject to go south is The World, an archipelago of manmade islands modeled after the seven continents that seems to have sprung a leak. According to a new report issued by a property tribunal, the crumbling series of ill-fated isles is sinking like Atlantis into the sea.

Comment Re:Latency? (Score 1) 187

At GHz speeds, wire delay is pretty significant. Another part of it is electrical noise -- longer wires tend to act as transmission lines. I didn't RTFA, butI think the advantage of optical interconnects is that the throughput that you get beats the loss of waiting for data. You can afford to wait 10 nsec if afterwards you can fill your 1kbyte whole cache. (Not read it 64 bits/4nsec or whatever). Additionally, optical lines are immune to electrical noise (RF).

Comment Re:So should I unplug all my stuff or not? (Score 5, Informative) 220

Not to be pedantic, but telegraph operators did drop dead during the Carrington Flare, if only because they were more or less attached to massive "antennas." Moreover, the usual threat of solar storms is not radiation to people, but to the radio equipment that makes modern life possible. This one should only graze the

Comment Much ado about something... (Score 1) 348

I think Doctorow is starting to sound a little like Richard Stallman. Doctorow is lamenting and predicting the end of user control of our software, much as Stallman predicted loss of control over the operating system. GNU provided an option, while the majority of end users never noticed or cared as proprietary OSs took the dominant market share (at least in the PC market). Those of us who really know enough to care either use proprietary OSs willingly knowing that there is an alternative, or use libre OSs.
The same will be true if/when SaaS becomes dominant. While this generation's hackers will lament this as "the end of computing FOREVER," in reality the libre applications that already exists will still exist thanks to free licenses (and a bit of the Streisand effect, I suspect). Once software is libre and reasonably well distributed, there is little that can be done to prevent its availability. Hackers will continue to use and develop libre software, as they have for the last 20 years or so. Hackers will have the options that they do now.
The picture changes a bit for the average joe. They will have their software served to them, and if they know the difference it will be on a superficial level. Perhaps this is for the best; perhaps not. Perhaps the corporations will take their newfound powers and exploit them for nefarious purposes; there will be an alternative, even if unknown to the average end user.

Comment Done it, don't regret it (Score 1) 1021

It's funny you should ask because I'm actually an American computer engineering student as well. On the side though I've just finished my Spanish minor, and while I haven't used it much in my engineering classes, it has been a much needed break from the hard-core "left-brained-ness" of engineering. It's coming in handy -- I'm working on getting an internship in Mexico next summer. More importantly though, it's helped me to learn to COMMUNICATE, which is something engineers are stereotypically bad at. Moreover, I've taken classes and labs where I was the only person who could understand the instructor -- not because I spoke their language, but because I knew what it was like to be on the wrong side of a language barrier. I've never had a problem understanding a person with some understanding of English, whether they be Chinese, Indian, German, or Egyptian. For that, and that alone, my 3 years in High School and 2 in college have paid off.

Slashdot Top Deals

For large values of one, one equals two, for small values of two.

Working...