Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Kick them out (Score 2) 53

The more decentralized mining is, the harder the 51% attack

Therefore, you want mining that is about as efficient on a current CPU as it is on a high end GPU or even ASIC. That way big server farm investments scale up with a low integer factor -- compared to a Bitcoin ASIC farm which can be (IIRC) dozens of millions of times more efficient per dollar than your PC CPU.

Various strategies were considered and tested. The end result was really clever: create a simple virtual machine with specific characteristics (such as non-halting totality, and a syntaxless bytecode). The one-way function is simply to run the random input program to completion, and provide the output. In other words, be a CPU.

The algo was specifically released as a separate standalone so others could pick it up. But there is only one crypto that uses it. It's the one that actually encrypts the data on the blockchain, has hundreds of .onion nodes run to this day independently by true believers (and yes I am one), so that actually it would be really hard for even a major government to shut down its untraceable transactions.

I just checked, for the first time in probably 2 years. Huh. It's not even in the top 25 market cap anymore. But it's the only coin that IMO for better or worse matches the original Tim May style cryptoanarchist vision that Satoshi was gesturing towards. And I don't need to say its name because you know which one it is.

Comment Root cause: just part of current lowgrade WWIII (Score 1) 17

Hackernews Aug 12 2025 on the Salesforce hack: Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses

I bet anything China, Russia, and Iran are those so-called cybercrime groups. Check this BlackHat talk about catching the (at the time) biggest ever card fraud guy. Russian oligarch son. Guess what, he was one of those returned to Russia in an exchange with the Trump admin as part of "peace negotiations".

Cyberattacks are part of the low level war they are also waging via dragging anchors to cut Internet cables, throwing drones and jets into NATO airspace, and ofc disinformation campaigns.

So yeah they are leveraging the cybercrime aspect to further weaken USA / NATO / The West / Tolerant Inclusive Democracy.

Comment Re:The Way around all these hacks (Score 1) 63

Before flash was even practical, computers kept BIOS on true ROM and used a small persistent storage commonly called CMOS for configuration. It could be a pain because the button battery that maintained it could die.

These days, you could use a small flash for configuration and a larger one with write disabled in hardware for the boot code.

Comment Re:All bets are off if you have physical access (Score 2) 63

On the other hand, by far the greatest threat to your laptop is someone wanting to steal it outright and sell it off. They're not going to bother with anything on it, just blow it away with a bootleg copy of Windows and call it a day.

The people looking to profit from information on your laptop will do it from half a world away while you are using it.

Comment On the other hand (Score 1) 63

This can be used to regain access to laptop you won that has been hijacked by DRM you don't want. Since it requires physical possession of the laptop, it doesn't pose much risk to the end user.

I just disable secure boot. If the device leaves my control long enough for someone to do something with it, it has to be treated as potentially compromised with or without secure boot. Why create an additional recovery roadblock for myself? Security is a funny thing if you think about it carefully enough.

Always lock your car so when someone steals your $5 flashlight they also break your $500 window. Always install security lights so criminals can see what they're doing when they break in.

Comment Re: Cloud hw wo subscription is accelerated e-was (Score 1) 90

The upshot of my comment is that OEMs do have an easy option to not chain their devices to their cloud. They WANT to chain the devices, but then don't want to maintain the server and cry about the cost of their own self-imposed obligation as an excuse to brick features.

It's a scam.

ESP32 isn't all that new, and has never been expensive. Most of the OEMs doing rug pulls these days had the option easily available at design time.

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...