Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Electric is Short-haul & it does it already (Score 1) 273

Tesla co-founder. Perhaps they are working together? ...

frequent-stop drive cycles

[Emphasis mine] - this is not a replacement for the hundred million trucks we see hauling goods world-wide.

Electric (and LNG, etc.) is already a proven applications for urban, stop & go style, short-haul trucking. (Not that Phase2: More Customers, is a bad thing...)

Comment Weasel words, Theyve always sold Aggregate (Score 2) 125

just rent out your super cookie info.

Oh sure, they've never sold "individual" customer data, but Verizon & others continue to sell *aggregate* info: you know, because there's not an entire discipline focused on deanonymizing datasets.

At least now Verizon has paid a fine & agreed to make sure that they, first, *dupe* their customers into agreeing to Supercookie injection & tracking.

Comment no way to do low level customization (Score 1) 319

3. ... In their place will be a WebExtensions API which is only marginally more powerful than what Chrome can do. Many existing addons will never work under the restrictions that system places because WebExtensions offers no way to do low level customization. Several developers of prominent addons have already announced that they will stop development as a result.

Discouraging developers is unfortunate. But Mozilla does not win by freezing old code in place/ensuring 15 years of old tweaks apply to current browser model. What's an old-guard dev to do? They can't move to Chrome.. as you stated it has even less capability.

Fortunately, FF is open source so another browser can resurrect whatever capabilities Mozilla discards. Honestly I think they should shrink dramatically smaller than 9050 employees, light additional fires to further develop & modularize their core technologies. I do use Chromium mostly on the desktop but mobile-Firefox is my go-to, everyday, browser of choice on Android. It is capable, and i'm honestly more curious to see what benefits come from changing APIs then I care what happens to obscure addons like "OmniSidebar".

Comment Re:Tunnels in an earthquake zone! Brilliant! (Score 1) 288

Tunnels in an earthquake zone! Brilliant!

Tunnels are actually extremely safe around earthquakes, because they are in/move with the earth,

Imagine the worst-case tunnel scenario, (essentially the only one where any sort of major collapse is possible): A tunnel somehow constructed parallel to & exactly on a faultline, which then shifts by several meters. That sort of shift also levels all but the most high-tech/expensive above-ground civilization (which also probably should not be constructed *exactly* on top of the faultline).

Modern construction is focused on consideration & compensation for the (relatively minor) damage/danger that could (realistically) occur. Even a tunnel built directly on a faultline but perpendicular to it would likely survive with only localized damage to the meters-long area where the catastrophic shift actually occurred.

Submission + - Neuroscientists Say Simple Mathematical Logic Drives Complex Brain Computation (

hackingbear writes: According to Dr. Joe Tsien, a neuroscientist at the Medical College of Georgia at Augusta University, the brain’s basic computational algorithm is organized by power-of-two-based logic. He and his colleagues from US and China have documented the algorithm at work in seven different brain regions involved with those basics like food and fear in mice and hamsters. “Intelligence is really about dealing with uncertainty and infinite possibilities,” he said, “It appears to be enabled when a group of similar neurons form a variety of cliques to handle each basic like recognizing food, shelter, friends and foes. Groups of cliques then cluster into functional connectivity motifs (FCMs) to handle every possibility in each of these basics. The more complex the thought, the more cliques join in.”

Comment See who voted (Score 3, Informative) 454

Senator, you do know there's a REASON we went to the secret ballot originally, right? Because without it, a political figure who wants to buy votes can easily see if the people he bribed or threatened did what he wanted. (

I've long considered Oregon insane for going to all-mail-in voting, for precisely that reason.

Here in WA ballots are SENT by mail but returning ballot by mail is just one of several options, to include: counties organize to provide large, physical dropboxes you can walk up to & place your ballot in.
The fairly long window for voting also greatly increases the cost needed to approimate the fabled 'thugs pressuring at polling places'. Partisan grousers are just mad their traditional methods of supressing/tampering with votes arent readily applied; "I already submitted my ballot" is a ready excuse to attempted coercion here.

It's my preferred way to vote. Saves me (and the impoverished/the state) from having to pay the $0.50 to mail it back individually.

Comment Re:Try it (Score 1) 91

tried it on Google Maps. If you enter "0, 0" it takes you to the North Pole. There are a couple of Comex drilling rigs there

Protips, the North Pole is "90, 0"

If you zoom out, you'd find that "0, 0" is a little bit further away from the Arctic circle. (And your drilling rigs appear to be humorously mis-located north-american paint stores; Certainly on-topic, as garbage location data goes though : )

Comment Re:Non clear language (Score 1) 58

they don't have a working exploit.

Yes they do. The abstract of the linked paper states clearly: "we exploit this flaw to define a forgery attack"

Their demo exploit is an app, malware, and could be used by any other user, criminal, three-letter agency capable of such advanced techniques as *getting malware* onto target device. The linked article further expands on this to point with comments from the author, highlighting that anyone with a 0-day or known exploit would be able to degrade KeyStore encryption to crackable levels, without first having to trick a user into installing their app.

Comment Re:Qualcomm (Score 5, Informative) 58

To be clear, the issue is a hardware issue in Qualcomm chipsets rather than with Android itself

Incorrect. The threatpost author just threw in the comment regarding Qualcomm at the very end of his writeup, it has entirely nothing to do with the cryptographic weakness the researchers from Orange uncovered.

The uncovered flaw is entirely an Android software issue, wherein an attacker with malware or a 0-day priviledged exploit can silently downgrade the strength of certain symmetric keys apps use to store private/encrypted data to cloud storage services. (Thereby allowing the attacker to swiftly break the encryption of data which previously could be efficiently decrypted only via the unmodified secret key located on the users handset)

Comment Re:Even if this proves to be a meaningless novelty (Score 1) 65

So will the 99% of women who insist on putting their phones in their back pockets and sitting on them.

I'm sure you just typed without thinking (or just have limited life experience), but let the record show I'm male & way back in 2005 my first 5" Nokia linux tablet lasted about 7mo because I had quickly started carrying it in a back pocket (sans bulky hard-cover) as a VOIP phone.

Free wifi calls & 'fast' internet in the palm of my hand was amazing... right until I sat down on a table-edge. Crunch.

Everybody does it, even geeks.

Comment Re:WTF with the spurious Obamacare reference? (Score 1) 607

Your basic health care came from a plan with a $2500 deductible?

I assume by "basic" you meant "cardiac arrest & shattered femur".. because it kind of seems like your wife and you were only paying for a skimpy catastrophic-care plan, and were either ignoring "basic" health care or paying for it out of pocket with cash.

Comment Forgot one tip (Score 1) 117

Recommended addition:
- Encrypt the video transport, even if physical network is wired, armored & hidden as suggested.

Sure, in addition to providing reliability, wiring may provide some incidental reduction in attack surface. But this isn't 1991... CPU is cheap. There is zero reason a modern network should rely on "hardened perimeter"/"gooey, nougat interior" design.

Slashdot Top Deals

Prototype designs always work. -- Don Vonada