Forgot your password?
typodupeerror

Comment Phablet? Rugged? Oh pls. Oh pls. (Score 1) 41

These are awesome and I would absolutely embrace the upgradeability and open standards fully if they had the devices I use: a rugged laptop (rain, snow, drop, etc proof, covered ports, washable like my Getacs) with upgradable, fully Linux compatible hardware would be awesome. My trackpad and touch screen are both generic mice according to Linux.

Then, pls, make a phablet with optional LTE/baseband (or none, not a phone at all). Short range radios, but zero base band, otherwise a rugged, reliable, durable, upgradable phone-like form factor, super extra bonus points for interchangeable camera modules. Double extra bonus points for easily removed/swapped battery. Add a LoRa radio instead of LTE, why not?

There have been a few projects to make a good Linux phone and while the PinePhone is impressive engineering, it falls short of being a usable replacement for a flagship phone. There's a solid market for brick/tank phones and they have plenty of room to provide usable, all day battery capacity for a Linux device but the current collection from vendors like Blackview, as nice as they are with very useful features like thermal imagers or NIR illumination/sensors and excellent durability are all Android Certified and the Droidocalypse is going to effectively brick them all in September.

Comment Re:20+ years reading Slashdot (Score 3, Insightful) 75

Any aggregation of radioactive elements is inherently dangerous, always, no matter what safeguards, simply as a material that is hazardous to health. Most radioactive hazards associated with fissile materials represent health risks with atypically, even for poisonous elements, pernicious qualities. Not many people would be sanguine with health-impacting quantities of fissile materials in their environment, unlike say, lead or arsenic, both quite awful but a whole different scale of awful.

Any intentional aggregation of fissile material is intrinsically a risk to human health and safety. Nuclear advocates (many of whom would qualify as frothing fanbois) dismiss such concerns claiming they know of a "safe" reactor design, some of which are quite clever and are, indeed, intrinsically quite safe when operated correctly. Such fanbois will sometimes make the entirely valid point that the rate of death from even older reactor designs is way below the mortality rate induced by burning coal (true) and that nuclear power is much less carbon intensive than fossil fuels (also true).

There are compelling arguments about a diversity of sources, above the reliability of fissile power, about the longevity of investments, and about immunity to a range of possible weather (storms, extended rain) or geopolitical constraints (international fuel shipments), all of which (and more) have merit and should be considered carefully.

I consider four counter arguments that should be considered when contemplating the relative merit of fissile power generation over other methods:

1) Current advanced nuclear power plants have a projected LCOE of $0.11/kWh (DOE) standard new at $0.118-$0.192/kWh (lazard) while solar currently runs $0.05-$0.06/kWh (lazard) and $0.086 (NREL) for battery-backed 24/7 solar, declining to $0.047/kWh by 2050 (NREL). The economic justification for nuclear power is weak in all but a few geographic locations occupied by humans.

2) Uranium is a finite resource, the cost of which is rising and currently $86.8/kg (tradingeconomics). The total proven proven reserves are sufficient for about 2 years of total human consumption in standard light water fission reactors. Breeders and advanced systems have significantly different total reserve values, but such systems come with significant risks, either in proliferation (breeders) or technological (advanced reactor designs). While it is an entertaining speculative argument to discuss technologies that might extend fuel supplies, solar panels and storage (PSH or grid-scale battery) are well proven and widely available today.

3) National security policy: defense against external antagonist: any centralized civilian facility is a target and nuclear reactors, even intrinsically safe ones, are a particularly tempting target. While containment structures are designed to be robust against, for example, the impact of a large passenger aircraft, they are not robust against "bunker buster" style munitions. Consider the consequences of a relatively trivial drone impact with the Chernobyl sarcophagus. As these sorts of attacks are democratized by the proliferation of low cost, long range, difficult to attribute munitions they will inevitably become more common and the only practical mitigation is decentralization. While nanoreactors such as the Zeus (1-20 MW) might make targeting more difficult, they're still vastly more expensive than a few more drones making them juicy asymmetric targets for any NSAG and proliferate the next concern:

4) National security police: defense against extremist state takeover or occupation: "safe" nuclear reactors assume operation remains in the hands of moderately responsible, reasonable people, an assumption not supported by recent history. There is no fission design that does not rely on a concentration of fissile material, intrinsically radioactive. There is no such concentration that cannot be widely dispersed with a properly engineered application of conventional high explosives. Every nuclear reactor, anywhere in the world, is a pre-emplaced nuclear munition. To quote the (poor) AI transcription of Serhii Plokhy from the Economist's Intelligence podcast https://www.economist.com/podcasts/2026/04/24/an-explosion-still-echoing-chernobyl-at-40 "The taboo on the occupation and military attacks on nuclear sites that existed before 2022 had been broken. It is gone. Now, the war in Ukraine is the war of drones more and more. And the non-nuclear country. Can very easily go nuclear by attacking somebody's nuclear facilities like nuclear power plants." Chernobyl is occupied, Zaporizhzhia is occupied, the Ukrainians got close to taking Kursk; if an occupying force is forced out, might they be tempted to salt the earth they're forced to leave with fissile debris? Might one of the many political parties animated by an Armageddonist eschatology consider a nuclear reactor an inexpensive and readily available doomsday munition, a sort of clarion call to whatever deity they are waiting for? Even if they're wrong about the level of doom a conventional detonation of a fissile core might achieve, the consequences would be far more lasting and terrifying than a fuel depot or even grid-scale lithium battery fire.

Comment Re:Computer trespass and identity fraud (Score 3, Interesting) 67

The obvious answer is to simply disconnect regions that impose internet-breaking restrictions. If a region believes the rest of the world is responsible for parenting their dumb children, and in particular they're willing to sue when someone else fails to live down to the standards they think their little sheltered idiots need to engage the world and that they're too incompetent to provision themselves, then merely politely tell them their entire region is insufficiently sophisticated to interact and pull their plug.

We really need a FOSS maintained "Gilead regions" IP block list, v4 and v6, for independent operators and national ISPs and DNS providers engaged to banlist those regions from interacting with the an internet that doesn't work for them. They have every right to decide for themselves, but not for anyone else.

Comment FreeBSD is what all servers should run (Score 1) 107

FreeBSD powers my personal infrastructure and has for decades. It is easy to use, not bloated (too badly, though you now have to take steps to keep that damn Wayland out of a server, WTF, but you can with /etc/make.conf). Having eventually made the shift to Poudriere, the package and code management is very good. Fixes for maintained packages are an overnight thing, but some of the major upstream dependencies have the same level of responsiveness as in Linux - better than any commercial software, but not as good as pure FreeBSD.

Moving from SVN to git kinda sucked, but now it works well enough and gets the job done and keeps the Linux heads happy.

Comment Re:The human brain does the same thing... (Score 1) 182

Yes!

We must build an absolute monopoly on inventions which is permanent and heritable even if by so doing retard the progress of science and the useful arts. Without legislative protection, innovation would be like fire, expansible over all space, without lessening their density in any point; and like the air in which we breathe, move, and have our physical being, incapable of confinement, or exclusive appropriation. Society must give a permanent exclusive right to the profits arising from them, lest they be denied by their nature the status of property.

Comment Don't expect teenage dating apps to be more (Score 5, Insightful) 54

Email is, by far, the best communications modality yet devised. I have never heard a remotely coherent argument against it but am inundated with endless marketing invective and paid articles decrying it and extolling the virtues of yet another short lived, idiotic alternative, inevitably proprietary and VC funded still in the burning OPM stage.

It is a transparently disingenuous hype machine desperately intent to lock up commercial ownership of private communications.

Don't breathe that crappy free air, try our UltraChat brand premium air! All the hip kids have switched, they all hate free air and get so much more done on UltraChat! If you were actually cool you'd already be breathing UltraChat Air, boomer. And your first 10,000 breaths are free*!!!

* $8/month after the first 10k up to 5 Gbreaths, contact your corporate sales executive to continue breathing after 5G.

Don't wait for your contact to "expire"

No seriously, you'll die. Pay up.

What makes a good text coms system:
Global interoperability
portability
adherence to open standards
Reliability
store & forward
Local storage and background sync
fast, indexed search
save draft and resume later
structured formatting
Organizational mechanisms like folders
centralized directory

What has all that and more? email. always has, always will. Chat is for children trying to hook up and well-suited to that level of complexity, but nothing more. I don't get how any company or team can be so flabbergastingly idiotic as to willingly cede control of their core intelligence to strategically misaligned scammers trying to lock it up for profit.

If you want a chat interface with the features of an email backend, try delta-chat. I'm not entirely happy with their PGP protocol, but there is some slow progress: https://support.delta.chat/t/a...

Comment Re:Pen + Paper or Notes (Score 1) 227

I use a livescribe pretty regularly: I have one in my pocket right now. While I agree the form factor of the pens is suboptimal, as are the cartridges, it does the job for me. I've only lost one so far to overzealous inspection at an airport as a spy device because it has audio recording capability. In theory that one might come back, but the office it is stored in is only open a few hours a day, a few days a week at the airport and the release documents have two names on them and... long story.

Anyway, while I appreciate the OP's interest in a fully digital format and read through hoping to find something super cool I hadn't run across yet, the drift in the conversation to pre-digital technologies mirrors my own adoption of the livescribe pen. The books you fill out don't crash and are immediately re-viewable and sunlight readable. The pens are robust and while the cartridges run out of ink far too quickly and without any real warning, it isn't a meaningful cost burden to keep a few spares around.

The form factor of the pen and small note book is time-proven and convenient if you're moving around. It is unobtrusive in meetings, works well in the field, and you can easily have a hand or two free without catastrophic gravitational consequences.

Having a digital copy of my notes is organizationally helpful, even if my writing is not sufficiently legible for useful distribution. The accurate time stamps let me do things like post-correlate a digital picture with the notes unambiguously or a GPS coordinate or any other time stamped media. Occasionally I use the audio recording capability to integrate time-stamped conversational notes when I don't have time to write them all down, just noting a word or two here and there as I can to provide a visual/temporal reference in the converted media.

I am most pleased with myself when I can make a quick sketch on paper and email it out in a few seconds. I have occasionally considered a pen-enhanced phablet as an increasing drift toward virtualization, but that would lose the archival paper copy, the tangible organization of the pages and books, and would be far more fragile and prone to being out of juice when I need it. The pen wakes up in about 3 seconds and even if I haven't charged it in a month, is ready to work - and if the battery is dead, I still take perfectly usable notes I can later digitize by writing over them if I really need to.

For me it solves a few requirements:


  • * Archival (fairly, the notebooks aren't acid free or anything),
    * Reliable (works even if the battery is dead, though the small cartridges undermine this a bit,)
    * Durable (my pen has been in some atypically demanding environments like direct sunlight in measured ambient temperatures of 57C and kept working fine even when digital camera and phone couldn't take pictures because they were too hot,)
    * Time stamped entries,
    * Digital distribution/record keeping is painless,
    * Handles sketches well,
    * Can correlate to other digital media via time stamp metadata fairly automatically,
    * Fully cloudless local operation so you don't have to trust a company full of people you've never met.

But....


  • * I don't use the handwriting recognition tool. It is kind of cool, but not accurate enough with my crappy writing to be worth the cost,
    * I would prefer a more pen-like pen,
    * I wish the notebook software could recognize some simple glyphs so certain notes could be automatically extracted or highlighted (I'm thinking "to do" and "important" etc marks),
    * It'd be awesome if it took standard Fisher cartridges.

Comment Re:Why should I have trusted these people? (Score 2, Insightful) 75

The certificate system is badly broken on a couple of levels. Most obvious and relevant to the OP is that there are 650 root CAs that can issue certs, including some state-run CA's by governments with potentially conflicting political interests or poor human rights records.

It is useful to think about what we use SSL certs for:

1) Establishing an encrypted link between our network client and a remote server to foil eavesdropping and surveillance.

2) To verify that the remote server is who we believe it to be.

Problem 1 is by far the most important, so much more important than number 2 that number 2 is almost irrelevant, and fundamental flaws with feature 2 in the current CA system make even trying to enforce verification almost pointless. Most users have no idea what SSL verification actually means or what any of the cryptic (no pun intended) and increasingly annoying alerts warning of "unvalidated certs" mean anyway.

What I find most annoying is that the extraordinary protective value of SSL encrypted communication is systematically undermined by browsers like Firefox in an intrinsically useless effort to convince users to care about verification. I have never, not once, ever not clicked through the warnings on a web site to access it. And even though I often access web sites from areas that are suspected of occasionally attempting to infiltrate dissident organizations with MITM attacks, I still have yet to see a legit MITM attack in the wild myself. But I do know for sure that without SSL encryption my passwords would be compromised - how many of us get spam from friends with Yahoo accounts? Yahoo still does not SSL encrypt login by default and so accounts are regularly compromised by spammers. Encryption really matters and is really important to keeping communication secure. Anything that adds friction to encryption should be rejected.

Self-signed certs and community certs (like CACert.com) should be accepted without any warnings that might slow down a user at all so that every website, even non-commercial or personal ones have no disincentive to adding encryption. HTTPSEverywhere. Routers should be configured to block non-SSL traffic (and HTML email, but that's another rant. Get off my lawn.).

Verification is unsolvable with SSL certs for a couple of reason, some due to the current model, some due to reasonable human behavior, some due to relatively legitimate law-enforcement concerns:

Obviously the OP makes clear that the current model is badly broken because the vast majority of issuing companies have every reason to minimize the cost of providing a cert which means cutting operational costs and increasing the risk of human error. Though even at a well run notary, human error is likely to occur, especially as notaries in different countries, speaking different languages can issue certs for companies in any other location. Certificate issuance by commercial entities is fail. A simple error can, because registrar certs are by default trusted, compromise anyone in the world. One mistake, everybody is at risk. Pinning does not actually reduce this risk in advance, though rapid response to discovered breaches can limit the damage.

But even if issuance were fixed, it wouldn't necessarily help. Most people would happily click through to www.bankomerica.com without thinking twice. Indeed, as companies may have purchased almost every spelling variation and point them all toward their "most reasonable" domain name, it isn't unreasonable to do so. If bankomerica.com asked for a cert in tashkent, would the (or even should they) be denied? No - green bar, wrong site. Even if they were non-SSL encrypted, it isn't practical to typo-test every legit URL against every possible fake, the vast majority of users would never notice if their usual bank site came up unencrypted (no cert at all). This user behavior limitation fundamentally obviates the value of certs for identifying sites. But even a typo-misdirection is assuming too much - all of my phishing spam uses brand names in anchortext leading to completely random URLs, rarely even reflective of the cover story, the volume of which suggests this is a perfectly viable attack. This user problem is mostly an issue for average users and below, but (hopefully) less so for dissidents or political activists in democracy challenged environments that may be subject to MITM attacks because (one hopes) they might actually pay attention to cert errors or use perspectives or crossbear. User education can help, but in the end you can't really solve the stupid user problem. If people will send bank details to Nigeria to assist in the transfer of millions to help a nationality abandoned astronaut expatriate his back pay, there is no way to educate them on the difference between https://www.bankofamerica.com/ and http://www.bankomerica.com./ The only viable solution is distributed trust as implemented by GPG (explicit chain of trust) or Perspectives (wisdom of the masses); both of these seem infinitely more reliable than trusting any certificate registry, whether national or commercial and both escape the cert mafia by obviating the need for a central authority and the overhead entailed.

Further, law enforcement makes plausible arguments for requiring invisible access to communication. Ignoring the understandable preference for push-button access without review and presuming that sufficient legal barriers are in place to ensure such capabilities protect the innocent and are only used for good, it is not rational to believe that law enforcement will elect to give up on demanding lawful intercept capabilities. Such intercept is currently enabled by law enforcement certificates which permit authorized MITM attacks to capture encrypted data without tipping off the target of the investigation. Of course, if the US has the tool, every other country wants it too. Sooner or later, even with the best vetting, there is a regime change and control of such tools falls into nefarious hands (much like any data you entrust to a cloud service will sooner or later be sold off in an asset auction to whoever can scrape some residual value out of your data under whatever terms they way, but that too is a different rant). Thus it is not reasonable for activists in democracy challenged environments to assume that SSL certs are a secure way to ensure their data is not being read. Changing the model from intrinsic, automatic trust of authority to a web-of-trust model would substantially mitigate the risk of lawful intercept certs falling into the wrong hands, though by making such certs useless or far harder to implement (LE would have to go to specific sites to get either a cert copy or to directly gather decrypted traffic, which would tend to favor US-based LE over foreign entities that might have a harder time convincing a US-based company to give up user data, though big cloud players with an international presence don't have a choice about this).

There is no perfect answer to verification because remote authentication is Really Hard. You have to trust someone and the current model is to trust all or most of the random, faceless, profit or nefarious motive driven certificate authorities. Where verification cannot be quickly made and is essential to security, out of band verification is the only effective mechanism. Sadly, the effort to prop up verification has made at the compromise of encryption, most recently Gmail rejecting self-signed certs for POP. That's insanely stupid. False security is being promoted at the expense of real security.

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...