Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Pedestrian problems? (Score 1) 1173

Yes! I HATE the fact they have replaced the really effective Shinfield Rd mini-roundabout with that set of lights. I tend to only drive in Reading for a week, once a year, but know it quite well because I used to live there. Also I question myself every time I have to navigate Winnersh Triangle roundabout and have ended up in Lower Earley more than once instead of Wokingham Rd.

Comment Re:Barracuda (Score 1) 52

I was the team lead on that product for a long time. It's based on a standard XMPP server. Use any standard XMPP client you like, if your administrator lets you install it. (If not, well... I can't really solve that problem.) The shipped client has deliberately been simplified for non-power users, as a result of a lot of feedback from such people. For example, XMPP's resource handling confuses most people, so it has been hard-coded in the client. If you're a power user you should definitely use Pidgin or Trillian or something.

Comment Re:In Soviet Russia... (Score 1) 200

OK gotcha - I failed to adjust my context correctly when reading your comment.

I believe that most of the hassle of identity theft is cleaning up your credit report after the fact and letting the creditors know they've been duped.

I do know that in the UK you can get credit without ID, and you can apply online but they mail a credit agreement for signing which you send back before you get a card.

In the US I wonder how much of the talk of identity theft is the credit agencies selling credit report monitoring services. :)

Comment Re:In Soviet Russia... (Score 1) 200

Actually I was thinking more about doing something like applying for a credit card where I don't think its necessary to supply any ID (not covered by the PATRIOT act). A few years back it was possible (don't know if it is still possible) to apply for a credit card online with not much more than your address and social security number. You could get instant approval and they'd supply the credit card number on the approval screen so you could start spending online immediately! I suspect that if someone applies for credit in your name with your social security number online this would be classed as 'identity theft'. Also if identity theft is generally only large scale operations why is talk of it so prevalent? While not a supporter of national ID cards I definitely see the benefit of a crypto card with a private key stored on it where authentication can be done via RSA or some other asymetrical algorithm. Using insecure methods to 'authenticate' (SSN, name etc) people is absolutely an issue of identity and identification! :)

Comment Re:In Soviet Russia... (Score 1) 200

Does that mean that if a criminal has both those numbers he can sign up online for a credit card in your name? I think that is where a lot of identity theft issues come from: being identified by a number with no form of authentication. I've never experienced identity theft myself but I know from moving house that online credit applications never seem to complain when I give an address that isn't already on my credit file. Anyone have any statistics or info on the most common forms of identity theft are in the US?

Comment Re:Soon, no more call centers (Score 2) 220

You misunderstand in two ways. First, I wasn't hypothesizing. I was actually going from an earlier article about how the machine works. Second, this is a real computer, not a magical computer. It is doing something very hard and it takes many seconds to process a question and come up with an answer. When I say it is possible for a human to flat-out beat the computer, I mean that Alex can read the question, the lights can flash to let a human buzz in, and a human can have the correct answer ready while the computer is still churning away and doesn't even have a hypothesis ready. In fact the human is faster than even that implies because typically a Jeopardy contestant, especially at the championship skill level, already has the answer long before Alex has stopped speaking and now the competition is about who can buzz in correctly; Alex is reading for the benefit of the folks at home.

This computer is state of the art, and consequently and quite expectedly, it is barely capable of playing Jeopardy, basically. Next year, of course, for the same money you could build a machine 50% better for the same price, and next year, 50% better again for the same price, and so on... but this year it's just barely able to compete.

Comment Re:Soon, no more call centers (Score 1) 220

Based on the previous articles, if the machine had to do either of the things you're talking about, it would simply lose. It is basically just fast enough to compete at Jeopardy and to have a chance it needs the advantage of having text fed to it and having a couple of seconds to chew on it before it can answer. And it is still possible for even normal humans to flat-out beat it to the punch on some questions.

Comment Re:New Rule: Detachment (Score 1) 173

But you've ignored my main point which is that no alternative OS protects from this scenario (without using some unmanageable SELinux configuration that you will switch off): User gets program as attachment, authorises the running of said program and program accesses everything user normally accesses. Therefore no privilege escalation. It is not 'more secure' in this scenario.

Comment Re:New Rule: Detachment (Score 1) 173

What privileged operation is required to access resources that are readily available to the user context? None that I can think of. You can read files and connect to the network without root/administrator. This can only be solved with a combination of policy and user education. AV and attachment filtering would be a start. As this was a targeted attack I don't think that security by obscurity would necessarily work (i.e. running a different OS)

Comment Re:Counter-DMCA notice (Score 1) 494

BAD IDEA. Check out the Chilling Effects link: "I understand that I am declaring the above under penalty of perjury, meaning that if I am not telling the truth I may be commiting a crime." Given the analysis posted elsewhere that this really is an infringement, this is a great way to get yourself in a shitload of trouble. Right now, the game will be removed and that will probably be the end of it; filing a counter-infringement notice is asking Namco to come down on you much, much harder. It isn't like asking Namco to come down on you harder, it is an open invitation.

Only counter-file if the DMCA is actually being abused in the legal sense!

Comment Re:Cheaper would be.... (Score 1) 439

You want them to be useful for the other tasks, though. The revolution in education will not come from simply digitizing the old ways of educating, it will come from using computers to do things you couldn't do without them. Kindles won't permit that.

In fact, the studious inability for the education world to realize this and act on it is a significant part of the reason why they disgust me so.

Slashdot Top Deals

It's been a business doing pleasure with you.

Working...