Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment this seems a bit overhyped (Score 1) 81

The established theory held. The gold exploded as expected.

The only interesting thing about this finding seems to be that they have a very fast thermometer, so fast it could get a reading of temperature within the trillionth of a second window as the gold was in the process of exploding.

Also, can anyone envision a "spaceflight" application of this? I wasnt aware speedy thermometers were a major barrier to space flight development.

Comment Re:The writing is on the wall (Score 5, Insightful) 179

if a hackathon amounts to gluing together a hosted 3rd party api with python... and only using its canned features in the most trivial way... it wasnt much of a "programming" contest in the first place.

It almost seems more like an advertisment for a hosted web service ... turns out thats exactly what it was...

Comment not a chance (Score 1) 113

> Every doctor youâ(TM)ve met could probably become a software engineer. Same for most lawyers.

I dont know how many doctors or lawyers this guy has met, but I'm guessing zero.

I have yet to find a single doctor or lawyer who could learn to code.

Comment Re:152000 mph sounds a lot (Score 2) 67

The sun is hurtling around the solar system at ~230 kps (relative to the local standard rest frame), but so is the asteroid.

Since both objects can be considered to be orbiting the milky way at the same speed, we generally consider that speed to be zero for the purposes of comparison, and only compare the two objects motion relative to each other.

Comment Re:Google Deepmind has a definition (Score 1) 41

> Google Deepmind has a definition for AGI,

Thats not a definition, its just a set of subjective heuristics for measuring. And its not even as useful as the basic turing test, which is a much more concise yardstick.

Definitions of AI all seem to come down to "we'll know it when we see it" which is the exact same thing as saying "we have no idea what it is"

Comment Re:"user friendliness" (Score 1) 286

lol, no, unicode is not broken. Human languages are just complex things, and there is no universal way to upper/lowercase things.

Changing the case of a string is language specific, and thus should not and cannot be well implemented at this filesystem level, because a file system should work for any language.

Linus is right.

Comment Re:It's not WhatsApp isn't secure... (Score 1, Troll) 59

> So Signal knows where you are, at what time, and your phone number.

exactly; its a mass invitation to get spied on while thinking you are secure.

Signal also has truly terrible user identification design, as the recent war planning leak shows. Instead of requiring in person exchange of certificates, and having any kind of external certificate validation system, its basically "blindly trust someone based on their phone number".

i dont think there is any safe way to operate signal, due to the lethal combination of closed source parts, centralized servers, and extremely bad user identification and authorization practices.

Comment Re:What goes up (Score 3, Insightful) 33

look at the price of the dollar over the last 110 years. It went up exactly once and almost destroyed the country.

Thats what microstrategy is betting against: the US dollar.

Considering the limits of fed policy, its pretty much a guaranteed win.

Unless the government bans bitcoin or somehow prevents microstrategy from holding it, they cant really lose. The dollar cannot change its stripes.

Comment Re:I would rather eat grass (Score 1) 300

> LN isn't all that it's cracked up to be. From a strictly technical PoV, a chain that can achieve high throughput on the main chain without sidechains or "payment channels" is going to win out.

Lol, this is such an insane comment.

You think every single micro-purchase of a coffee needs to be memorialized on a world-wide extremely replicated immutable ledger for all of time?

If you dont see why that is a bad idea, then you arent really qualified to have an opinion on the matter.

Obviously, only the most important and largest transactions truly belong there, and mostly everything else small and ephemeral belongs on a second or third layer above that.

Nothing is going to beat bitcoin, ever. Bitcoin is not a thing or even a specific technology even; its an economic concept with a continuously evolving and adapting set of supporting technologies.

Comment Re:Good and bad (Score 1) 29

> there always needs to be less secure means of authentication because hardware-based authentication must be replaced, sooner or later.

Thats not the case; there is a much better approach which doesnt require a security compromise: spare passkeys pre-configured as fallbacks apriori.

Google already implements this by requiring 2 passkeys when you enable their highest security settings. One is the active/primary, and the other serves as a backup in case your primary passkey gets lost or destroyed. So you can leave one at home in a safe place and keep your primary with you. You can be confident the hardware passkeys have zero ability to export secrets whatsoever, so cannot be cloned nor leaked. And you are not limited to one spare, you can have many spare passkeys if you suspect you will need them.

Allowing secret exports utterly undermines the very foundational security of passkeys in the first place. If a secret can be exported, it can be intercepted. People are going to get phished of their passkeys via the backup mechanism - because a big part of the design of passkeys was that average users are not smart about handling secret keys so they should neither need nor have the ability to leak them.

And the vast majority of passkey hardware devices are not set up with the needed mechanisms to even enable advanced users to do such an export safely. (basically a on-device dedicated screen and keyboard would be needed to safely export with zero risk of intercept)

The real motive for backups is of course to allow centralized service providers to have the option to spy on the secrets and/or monitor user activity across sites for ad farming.

Comment Re:Why not just look to past stories? (Score 1) 14

> I mean we talk about linux ransomware very very very frequently.

Oh we talk about it a lot, almost like we wish it was a thing. People do *make* linux ransomware, but it doesnt do much. By by and large, there just isnt much of a real market for anti-ransomware for linux.

Its like trying to sell a special helmet that prevents you from getting your head stuck in a bucket.

People do sometimes get their head stuck in a bucket, its just not very common. And there are no shortage of bucket makers. But most people arent really interested in an anti-bucket helmet, and many of them would argue the helmet is worse than the bucket in the first place.

Comment This is beyond idiotic (Score 1) 90

You either can do a job or you cannot. It does not take 15 years of working at a company to figure out of someone is incompetent unless your company is incompetent from top to bottom.

Lying about credentials is barely a crime; at most it should result in a firing for dishonestly. This prosecution is political revenge for making them look bad and revealing their their promotion track is entirely divorced from merit.

If he worked there for so long and rose through the ranks with no education or skill, the people going to jail should be the executives and/or politicians in charge of the agency, the ones who promoted him and gave him internal evaluations. They are the ones who defrauded the public, not him. He was not in charge of his own promotions nor in charge of evaluating his own work.

The Daniel guy could fake his resume, but he cannot fake 15 years of work. His work record is what it is. Not liking it now suddenly because it was based on a lie makes them look utterly corrupt.

Comment Re: Lock them up. (Score 0) 276

> That *something* should be done is fairly clear, but just what I find much less certain.

Its pretty obvious, imo, and not hard to do. Fix what you broke.

The penalty for stealing is to pay back what you stole, to the person you stole it from (not the government), plus reasonable damages plus reasonable punitive penalties if applicable.

If you cannot pay it back, you are offered a voluntary live-on-site labor job, including a payment plan to make up for the harm you caused. Typically something like undoing the harm you caused, cleaning up streets, removing grafitti, etc.

If you refuse to pay it back, or skip out on your payment plan, or you are a chronic repeat offender, then you are declared an outlaw, and lose your human rights.

Easy, costs the taxpayers nothing, and solves the problem.

Comment Re:I respectfully disagree that Signal was hacked. (Score 1) 98

> Please do not confuse document retention with actually being hacked.

You are missing the point, utterly.

In a secure system, documents stored either sit behind high entropy or do not get stored at all. Signal defaults to storing all messages sent, and doesn't require anything more than trivial entropy protecting them. To be secure, it should either default to deleting old messages, or else require a high entropy local password. It does neither, so most people have zero privacy with signal.

And, you blithely ignored the arguable more important points about centralized key swap , and a fundamentally insecure phone platform being used.

Security can be dead easy; it can be so easy anyone can do it. It does have some hard prerequisites however, which most people just dont bother with or even have awareness of.

To wit: Knowing how to remember a 128bit password, knowing of the need to exchange keys in person, and strictly using secure open source platforms that do not use have closed source or centralized servers.

Slashdot Top Deals

"Show business is just like high school, except you get paid." - Martin Mull

Working...