Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re: Murder (Score 1) 190

> Europe kills about 50,000 of it's citizens because of lack of AC

You pinned 50K deaths on AC, that's not an accurate view of the situation.

Think about it more generally, there are many factors at play - diminishing tree coverage in the cities, lack of freely available water sources scattered around the city, rigid work schedules that force people to be outside at a time where they could have stayed at home, lack of regulations that allow only energy-efficient homes to be built, lack of subsidies for upgrading the insulation of existing houses, subsidized or free public transport, etc.

If you rely on AC to solve the problem, then what happens during a power outage (such as the recent one in the Iberian peninsula)?

Last, but not least - powering an AC requires energy, that costs money. What about the people who cannot afford AC? Climate change affects unprivileged people to a larger extent.

Comment Re:It's not only websites that use TLS (Score 1) 114

> Protocols like ACME do exist, but really only exist for web servers.

That's not so, an example I mentioned in another thread is the Certificate Management Protocol (CMP, RFC 4210 and its follow-up RFC 4210bis), it is versatile and applicable in context other than web-servers. There are open source CMP client implementations, even OpenSSL 3.x has one - so it is easy to start prototyping and automating your workflow by wrapping `openssl cmp` into scripts.

Start with https://docs.openssl.org/maste...

Comment Re:This is largely irrelevant (Score 1) 98

> studies that show homework is less than worthless

Can you point to your favourite studies that look into this matter? I am intrigued and surprised by your assertion. I was under the impression that the amount of time spent on a problem is positively correlated (at least up to a point) with the likelihood to solve it.

Comment Re:I saw comments on Hacker News yesterday (Score 2) 37

My understanding is that the model is not a program that can execute any logic on its own, open network connections, etc. The model is a huge data file, which is then loaded by another program (like Ollama or llama.cpp) that deals with the user.

Some software that uses neural networks has functionality to perform HTTP requests and fetch some data that are then used to enrich the prompt for the model (e.g., OpenWebUI, if I recall correctly), or execute commands in the system (e.g., the Cline plugin for VSCode). However, that is not the jurisdiction of the model itself, but the jurisdiction of the software *you* choose to run it with.

Perhaps a model can be designed to take advantage of these real-world connections (e.g. make HTTP requests or run commands) if it detects that it is in an environment that has them. It could use some obfuscation techniques to squeeze in additional commands (e.g., phone home, download remote access software and set it up, modify your SSH authorized keys file, etc.) which the users would approve without thinking or understanding.

Comment Re:How? (Score 1) 214

Social media can make things worse in several ways. First of all - the bully doesn't have to do it in person anymore, it can be done remotely. Second - anyone can get onboard, some random people on the Internet can press "like" or type mean messages, scripts can automate it. If a teen's life is centered around social media - they are much more exposed than they were before. To summarize:

Real World interactions
- embodied
- synchronous
- primarily 1 to 1, or 1 to several, with only one interaction happening at a time
- take place within communities with a high bar of entry and exit

Virtual world
- disembodied
- async (except video call)
- many one-to-many interactions, several can take place at a time
- low barrier of entry and exit

Comment A slow UX is against their own interests (Score 1) 307

One of the reasons why such sites are profitable is that users are hooked via means like infinite scroll, or autoplay. This fast and smooth UI is what keeps users glued to their screens, nudging them towards mindlessly watching whatever comes next and spending way too much time on the site.

Slowing it down deliberately could drive people away from the platform, because they will have more opportunities to reconsider why they are on the site and potentially break the loop of mindless surfing.

Comment Re:Any day now ... (Score 2) 45

> I fully expect in the next two years to see industry pushed via tweaks
> to existing security standards document to perform wholesale switch
> from a RSA key exchange to PQC.

I think it is a false dilemma. You can take a hybrid approach, where a system combines PQC and classic algorithms to achieve its purpose. If you don't have full confidence in post-quantum crypto algorithms yet, you can use them without letting RSA go.

Of course, it comes at the cost of some complexity in the software, but you still get to use RSA as a battle-tested primitive.

Discussions about this approach are here: https://www.ietf.org/archive/i...

Comment Re:most cherished of rights? (Score 1) 119

The certificate can be printed on paper. It contains a QR code which holds digitally signed data about the person, the vaccine and some other metadata.

One can read the code off the paper using specialized software, verify the signature and make a pass/reject decision. You don't need any digital thing for it to work, as a traveler. The institutions need to have an infrastructure and legislation that stipulates how electronic digital signatures are used - the EU has had this for ~2 decades now.

Comment Re:Fake Vax IDs within 24 hours. (Score 1) 119

I don't think your prediction is reasonable, because the certificates are digitally signed.

The electronic signature is easy to verify, so the forgery is trivial to detect. As long as the respective institutions do a good job at protecting their private key, that is. If the key is compromised, the signer's certificate can be revoked using standard procedures in PKI (e.g., CMP - a protocol for certificate management, OCSP - another protocol for verifying whether a certificate has been revoked or not).

If you had the technical means to fake such signatures, there would be many ways to leverage that in a much more profitable manner.

Comment Re:Those Apps Are Bullshit (Score 1) 134

Thanks for your elaborate feedback, I greatly appreciate it.

You might be interested in this paper http://www.jtle.net/uploadfile... (I am a co-author). Table IV summarizes a list of recommendations for insurers, where R18 is related to worse driving, R16 is about giving users a way to challenge the results; R4 and R5 are about turning these programs into a coach that helps drivers get better (rather than maintain an unforgiving attitude, where a single deviation results in a "no soup for you!" verdict).
Our results are based on data collected from users of European insurance companies, but as you can see - the main complaints are the same.

If anything else comes to mind, feel free to provide more feedback and we'll incorporate it into our work. At the moment we're building prototypes that improve user satisfaction and the transparency of the system (so one can easily understand how the scores are calculated). Basically, we're integrating our own recommendations into a prototype, then run usability tests, to produce an evidence-based "this is how you should do it" UX model.

Comment Regulation is necessary (Score 1) 17

This is a good idea, but regulation is necessary to make it work.

We have a solution from Apple, and one from Google - they're different, but these things should be presented to users in a consistent format, like "nutrition facts" labels.

Another concern is the lack of regulation around it - what happens if a program violates the declared rules? They're going to get kicked off the play|app store, and that's it? There must be more serious consequences, otherwise there's no incentive to change your practices.

I advocate the adoption of "privacy facts" labels for phone apps, web services, IoT devices and other systems that collect data and can potentially undermine people's privacy. The labels should be legally binding, such that any deviation from the declared terms can have consequences that go beyond a slap on the wrist.

You can have a look at the proposed design and the research behind it at http://privacy-facts.eu/

Slashdot Top Deals

If you are good, you will be assigned all the work. If you are real good, you will get out of it.

Working...