Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - How Broken Classroom Discussions Contribute to Our Vitrilioc Political Climate (

jyosim writes: If colleges can’t lead productive discussions of sensitive topics in their classrooms, can we expect the discourse in future elections to be any better than the election we just suffered through?

At Harvard Law School, where admission is a veritable pass to a life of leadership, longtime professor Charles Nesson says the Internet has been “crippling” for classroom discussions. “Even when laptops are closed, you still feel the danger of being in a completely connected environment,” he observes. “People are cautious on issues that engage real diversity and real difference. I think it’s tremendously challenging to law teachers, to socratic teachers. A lot of faculty are feeling that we weren’t trained for this.”

Nesson recently started experimenting with an approach he hopes will help. He's asking his students to enter an anonymous online chat room — while sitting together in class — so they can speak freely.
Others, though, say the secret is to push students to be braver in facing tough subjects in the classroom, so people can work through issues before they hit the real world.

Submission + - UK Government Warns Growth Of AI Increases Reidentification Risk

An anonymous reader writes: A new report from the UK’s Government Office For Science warns that the explosive growth in artificial intelligence, driven by Big Data, could make anonymised individuals in datasets extraordinarily easy to re-identify, due to the interlinking of vast semi-supervised systems and sets. Chief Scientific Adviser Professor Sir Mark Walport wrote in the report: 'As the volume of publically available data increases...and more powerful artificial intelligence techniques are developed, what was a ‘remote’ chance of re-identification may become more likely, and organisations will periodically need to revisit the protection they have in place.'

Submission + - Ask Slashdot: Totally private, anonymous browsing 2

An anonymous reader writes: In an age of evercookies, zombie cookies, and always expanding efforts to track browsers, devices, and people — is there any way to browse totally anonymous to the sites you are visiting? How can a user today browse with confidence that they can't be tracked or identified, avoiding even being identified anonymously as a returning user or device?

Submission + - More Than 50% of All Pages in Chrome are Loaded Over HTTPS Now

Trailrunner7 writes: After years of encouraging site owners to transition to HTTPS by default, Google officials say that the effort has begun to pay off. The company’s data now shows that more than half of all pages loaded by Chrome on desktop platforms are served over HTTPS.

Google has been among the louder advocates for the increased use of encryption across the web in the last few years. The company has made significant changes to its own infrastructure, encrypting the links between its data center, and also has made HTTPS the default connection option on many of its main services, including Gmail and search. And Google also has been encouraging owners of sites of all shapes and sizes to move to secure connections to protect their users from eavesdropping and data theft.

That effort has begun to bear fruit in a big way. New data released by Google shows that at the end of October, 68 percent of pages loaded by the Chrome browser on Chrome OS machines were over HTTPS. That’s a significant increase in just the last 10 months. At the end of 2015, just 50 percent of pages loaded by Chrome on Chrome OS were HTTPS. The numbers for the other desktop operating systems are on the rise as well, with macOS at 60 percent, Linux at 54 percent, and Windows at 53 percent.

Submission + - Federal regulators give Turkey Point nuclear expansion plan a key environmental (

mdsolar writes: Federal nuclear regulators have wrapped up a seven-year environmental study partly clearing the way for two new reactors at Turkey Point, just as work gets underway on a massive cleanup of leaking cooling canals connected to the plant’s old reactors.

In a two-volume 1,200-page review, the U.S. Nuclear Regulatory Commission found the use of cooling towers to operate the new reactors perched on the shores of Biscayne Bay between two national parks would do no damage to the fragile ecosystem. The approval comes as Florida Power & Light begins tackling ongoing problems at the aging cooling canals that over the years pushed an underground plume of saltwater miles inland, threatening drinking water supplies, and leaked water tainted with a radioactive tracer into Biscayne Bay.

Submission + - U.S. Government Launches Open Source Repository (

An anonymous reader writes: The U.S. federal government has announced the launch of, an open source repository of original code developed for government projects. U.S. CIO Tony Scott demonstrated at this week’s Code for America Summit, an annual civic technology meeting held in Oakland, CA. is starting with the code resources from 50 different governmental projects across 10 different agencies. It's intended to help the government curb spending on specialized code, since the federal government spends over $6 billion USD per year on over 42,000 transactions on federal software development. Sharing code between departments in an open source environment is intended to help separate agencies avoid paying for original code when a modification of existing code could be done in-house. Scott said: "This is consistent with the Digital Government Strategy’s “Shared Platform” approach, which enables Federal employees to work together—both within and across agencies—to reduce costs, streamline development, apply uniform standards, and ensure consistency in creating and delivering information."

Submission + - Facebook, WhatsApp, Twitter, and YouTube Banned in Turkey Again (

An anonymous reader writes: Turkey has once again banned several online services, including Facebook, WhatsApp, Twitter, and YouTube, as part of a media suppression effort that’s believed to be related to the detention of several leaders of opposition political party HDP.

Although specifics are not available at the moment, TurkeyBlocks is reporting that all these services went down on Friday, November 04, 2016 at 1:20AM local time, as they were blocked by the country’s largest ISPs. Users in Turkey have already confirmed huge slowdowns when accessing the aforementioned services and without a VPN, connecting to social media no longer seems to be possible.

Submission + - WikiLeaks: CEO Advised Hillary To Embrace CS If She Wants To Be Elected

theodp writes: If new emails released by WikiLeaks are to be believed, co-founders Hadi and Ali Partovi advised Hillary Clinton to embrace computer science if she wants to be the next President. "Computer Science is about jobs and equity in every state in America, and it wins elections," begins Ali Partovi in a May 2015 email to Hillary for America CTO Stephanie Hannon and others. "Whichever candidate embraces it first will be seen as a visionary leader when it comes to about jobs, economic growth, and America's future." Hadi Partovi, CEO of tech-backed, adds: "One thing to consider, *Any* time Hillary says 'STEM', if she instead said 'Computer science' she'd have more voters understand and support her. Of course, STEM is *critically important* to our country. However, STEM is not where the job growth is or where the gender disparity is. STEM is also not where the H1B skilled immigration problem is." He concludes, "I'd love to work with the Clinton campaign to help sharpen a focus on this issue. Even if it's just participation in a marketing gimmick around the Hour of Code." In June, Clinton unveiled her tech plan, which promises to "engage the private sector and nonprofits to train up to 50,000 computer science teachers in the next decade."

Submission + - SPAM: Apply for Citizenship at Earth's First Space Colony

juanhf writes: For the first time in history a new nation state has been created — not on Earth but in the heavens above. Asgardia is the prototype of a free and unrestricted society which holds knowledge, intelligence and science at its core along with the recognition of the ultimate value of each human life. You can join like-minded people on this new exciting step in fostering an extended future for humankind.
Link to Original Source

Submission + - SPAM: 12 Years Later: Common Configuration Flaw + Internet of Things = Massive Attacks

SecurityJorge writes: A common configuration flaw that has been documented for more than 12 years now affects millions of devices connected to the Internet of Things, and is contributing to large and diffuse attacks aimed at social media sites and other online services, according to a report by researchers at the firm Akamai.
Akamai said in a report released Wednesday that it has observed millions of of Internet connected devices taking part in web-based “credential stuffing” campaigns, a kind of slow motion brute force attack in which attackers leverage stolen (or leaked) user name and password combinations to try to hack into accounts on a revolving list of popular sites. Typically, such low-volume attacks go unnoticed. However, Akamai’s view of more than 30% of the Internet allows it to tie such diffuse activity back to a common actor – like a single host trying to methodically log into 50,000 different web sites.

Here's a link to the original paper (pdf): [spam URL stripped]...

Link to Original Source

Submission + - FBI, DOJ continue using discredited junk science .. (

An anonymous reader writes: .. the DOJ insists its science is solid, something it bases on confirmation bias. The matches determined in its forensic labs are "scientifically certain" because the DOJ's expert witnesses have said so in court. Not only are outside scientists locked out of examining evidence and forensic processes, but defense lawyers are as well.

Submission + - Cloud Hacking Trick Allows Undetectable Changes To VM Memory

An anonymous reader writes: Hacking researchers have uncovered a new attack technique which can alter the memory of virtual machines in the cloud. The team, based at Vrije Universiteit, Amsterdam, introduced the attack, dubbed Flip Feng Shui (FFS) [PDF] and explained that hackers could use the technique to crack the keys of secured VMs or install malicious code without it being noticed. The de-duplication attack enables third parties to not only view and leak data, but also to modify it – installing malware or allowing unauthorised logins. Using FFS, the attacker rents a VM on the same host as their chosen victim. They then write a memory page which they know exists on the vulnerable memory location and let it de-duplicate. The identical pages, with the same information, will merge in order to save capacity and be stored in the same part of memory of the physical computer. This allows the hacker to change information in the general memory of the computer.

Submission + - Should Cloud Vendors Cooperate With The Government? (

An anonymous reader writes: More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance. 35 percent believe cloud app vendors should be forced to provide government access to encrypted data while 55 percent are opposed. 64 percent of US-based infosec professionals are opposed to government cooperation, compared to only 42 percent of EMEA respondents. This demands some form of open debate on the best approach to take in terms of addressing this most challenging issue.

Submission + - Widespread Linux Flaw Allows TCP Session Hijacking, Data Injection

Trailrunner7 writes: The TCP implementation in all Linux systems built since 2012 has a serious flaw that can allow an attacker to terminate or inject data into a session between any two vulnerable machines on the Internet. The bug could also be used to end encrypted connections or downgrade the privacy of connections run through Tor or other anonymity networks.

The vulnerability was introduced in Linux 3.6 and an attacker does not need to be in a man-in-the-middle position in order to exploit it. The researchers at the University of California Riverside who discovered the flaw say that it results from an attackers ability to infer the TCP sequence numbers for the packets flowing between two hosts.

Slashdot Top Deals

I have never seen anything fill up a vacuum so fast and still suck. -- Rob Pike, on X.