Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Tor and VPN weakness is packet size. (Score 2) 89

Tor works by setting up multiple layers of vpn's between nodes in laters in a way that traffic is passed between nodes without them knowing the contents.
You want to connect to c so you set up a vpn between a and b then b and c and use both of those vpn to set up another vpn between a and c.

That is the a kind of traffic analysis that can be done if you are a government and can monitor enough nodes.
While any one node may not know what is being transmitted and to where you could see that a series of packets came through in to one node and a few seconds later a similar amount of data was transmitter do another node.
If you are unlucky one of these bad nodes could also be an entrance or exit node and they would see what you are sending.

There has also been research that showed that if you monitor a voip call transmitted through a vpn you can guess what they are saying by the traffic spikes as words are spoken.

Comment Re:Complicated (Score 4, Informative) 69

This is something different.
Take the linux kernel, split it into modules such as tcp/ip stack etc.
Now you can create a binary that includes the part of the os that you need that you can include with your binary.
You then link the kernel and your application so you have one binary with the bits of the os you need as well as your program and nothing else.
No init system, no other processes just the os.
You can then run this inside xen as the target so you don't need the hardware support.

Comment Re:"Energy Balance" an overly simplistic view (Score 1) 958

While that makes sense that was the answer ~30 years ago and is completely wrong.

If you calculate the calories you eat and compare it to your usage you only absorb a fraction of what you digest (~1/4 from memory). Reducing the amount of calories in your diet does not reduce the total absorbed as there is a lot of surplus energy in what you eat.

What seems to be useful is looking at what in your food you absorb and eating high fat may actually be good for you as you don't absorb it.
Eating low fat foods is bad as they replace fat with sugar and sugar is what your body turns to fat.

Comment Re:Just in time for another price dive (Score 1) 173

As bitcoin uses public / private key cryptography you could have clients only have the public key until you need the private key.
So the client would be able to see that someone has sent them bitcoin but not be able to use them as they do not have the key allowing a store to validate that someone has sent in the coins.

Paper wallets is one implementation of this idea, where there is a piece of paper with 2 qr codes with your public and private keys.
Give everyone your public key but when you need to send the coins somewhere you need to scan the qr code to import the key.
You could probably come up with a system requiring you to assemble the private key from several parts.

Slashdot Top Deals

The number of computer scientists in a room is inversely proportional to the number of bugs in their code.