Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment *SIR* Tim Berners-Lee (Score 0) 207

This is the same assclown who thought llittle-endian hostnames would be a great idea so now we're stuck with shit like:

store.mysite.com/some-category/some-product

instead of the more sensible:

com.mysite.store/some-category/some-product

for the rest of eternity. (Not to mention the brilliant idea to stuff a couple of slashes after the protocol name for no fucking reason.) What the fuck was this guy doing before he thought of adding pictures to gopher? Because it couldn't have been anything important...

Comment Sketchy as hell rooting / flashing process (Score 1) 215

I've never installed a custom ROM, in spite of being very tempted to do so, because the tools to get one installed are largely Windows based and are seemingly universally closed source.

Using closed source software to do something "they" don't want you to do seems like a great way to invite malicious code onto your system.

I'd run it from a VM but then there's the whole USB passthrough issue and I'm concerned about bricking my device.

Even the god damned Nexus phones don't have a hidden switch the enable root. Nope, have to use some kind of exploit.

If there was some way to install a custom ROM *through the front door* I'd do it.

Comment Re:From a security perspective... (Score 1) 924

Actually, if, on a Mac running OS X, you do nohup blahblahblah >/tmp/blahblahlog 2>&1 & in a Terminal window in a GUI session, and then log out and log back in again, blahblahblah will still be running (verified experimentally on an El Camino (virtual) machine just now).

Shouldn't that read: "Disclaimer: verified using hacked OS image in an unsupported environment, your mileage may vary."?

Comment Secret ballot (Score 5, Insightful) 75

This is why Voting needs some sort of ID system to allow you to track your vote. Each year a new hash should be given to each person, which should remain valid until a few weeks after the election. You should be able to log in and see that your vote was correctly registered and counted. I'm pretty sure people will be quick to flock to social media if their hash result doesn't match who they voted for.

But this would break ballot secrecy. If you can prove how you voted then your vote can be bought or coerced.

Slashdot Top Deals

Artificial intelligence has the same relation to intelligence as artificial flowers have to flowers. -- David Parnas

Working...