Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Yucki (Score 1) 46

And of course, there is going to be a premium for a new launch CPU. And last gen should be decently discounted... it's a no brainer to stick with 14th gen. Once again, Intel is scared shitless by Arm on Laptops, and thus they put 110% effort on efficiency. What does that leave Desktop with? -5% performance. Woohoo. I'm sorry, I run a 4090, I don't care if my CPU sips less power at idle or under load.

Comment Re:ahhh, civic duty (Score 5, Insightful) 86

Let me have a go at explaining this using your framing so that you might understand why other people think estate taxes are just fine.

Lee isn't being double dipped. That's because Lee isn't paying the estate tax.

His family are paying tax and it's at the time they "earned" it. Which is when they inherited it.

There is no double dip.

Submission + - Maryland To Become First State To Tax Online Ads Sold By Facebook And Google. (npr.org)

schwit1 writes: With a pair of votes, Maryland can now claim to be a pioneer: it's the first place in the country that will impose a tax on the sale of online ads.

The House of Delegates and Senate both voted this week to override Gov. Larry Hogan's veto of a bill passed last year to levy a tax on online ads. The tax will apply to the revenue companies like Facebook and Google make from selling digital ads, and will range from 2.5% to 10% per ad, depending on the value of the company selling the ad. (The tax would only apply to companies making more than $100 million a year.)

Proponents say the new tax is simply a reflection of where the economy has gone, and an attempt to have Maryland's tax code catch up to it. The tax is expected to draw in an estimated $250 million a year to help fund an ambitious decade-long overhaul of public education in the state that's expected to cost $4 billion a year in new spending by 2030. (Hogan also vetoed that bill, and the Democrat-led General Assembly also overrode him this week.)

Still, there remains the possibility of lawsuits to stop the tax from taking effect; Maryland Attorney General Brian Frosh warned last year that "there is some risk" that a court could strike down some provisions of the bill over constitutional concerns.

Submission + - Tesla Wins Lawsuit Against Whistleblower Accused of Hacks (cnet.com)

An anonymous reader writes: The US District Court of Nevada awarded Tesla a win in its lawsuit against a former employee, filed two years ago. You may recall CEO Elon Musk referred to this incident in a previously leaked email calling on employees to be "extremely vigilant." Martin Tripp, who worked at the company's Nevada Gigafactory, was accused of hacking the automaker and supplying sensitive information to unnamed third parties. Reuters reported Friday the court ruled in Tesla's favor and dismissed Tripp's motion to file another reply to the court. Tesla did not immediately respond to a request for comment, but according to Reuters, the court will grant Tesla's motion to seal the case.

Submission + - DuckDuckGo Is Growing Fast (bleepingcomputer.com)

An anonymous reader writes: DuckDuckGo, the privacy-focused search engine, announced that August 2020 ended in over 2 billion total searches via its search platform. While Google remains the most popular search engine, DuckDuckGo has gained a great deal of traction in recent months as more and more users have begun to value their privacy on the internet. DuckDuckGo saw over 2 billion searches and 4 million app/extension installations, and the company also said that they have over 65 million active users. DuckDuckGo could shatter its old traffic record if the same growth trend continues. Even though DuckDuckGo is growing rapidly, it still controls less than 2 percent of all search volume in the United States. However, DuckDuckGo's growth trend has continued throughout the year, mainly due to Google and other companies' privacy scandal.

Submission + - Why passenger jets could soon be flying in formation (cnn.com)

ragnar_ianal writes: Look at the V-shaped formations of migrating ducks and scientists have long surmised that there are aeronautical efficiencies at play. Aerbus is examining this in a practical manner to see if fuel efficiency can be enhanced.

Building on test flights in 2016 with an Airbus A380 megajet and A350-900 wide-body jetliner, fello'fly hopes to demonstrate and quantify the aerodynamic efficiencies while developing in-flight operational procedures. Initial flight testing with two A350s began in March 2020. The program will be expanded next year to include the involvement of Frenchbee and SAS airlines, along with air traffic control and air navigation service providers from France, the UK, and Europe.

"It's very, very different from what the military would call formation flight. It's really nothing to do with close formation," explained Dr. Sandra Bour Schaeffer, CEO of Airbus UpNext, in an interview with CNN Travel.

Bitcoin

Bitcoin Transactions Lead To Arrest of Major Drug Dealer (techspot.com) 169

"Drug dealer caught because of BitCoin usage," writes Slashdot reader DogDude. TechSpot reports: 38-year-old French national Gal Vallerius stands accused of acting as an administrator, senior moderator, and vendor for dark web marketplace Dream Market, where visitors can purchase anything from heroin to stolen financial data. Upon arriving at Atlanta international airport on August 31, Vallerius was arrested and his laptop searched. U.S. Drug Enforcement Administration agents allegedly discovered $500,000 of Bitcoin and Bitcoin cash on the computer, as well a Tor installation and a PGP encryption key for someone called OxyMonster...

In addition to his role with the site, agents had identified OxyMonster as a major seller of Oxycontin and crystal meth. "OxyMonster's vendor profile featured listings for Schedule II controlled substances Oxycontin and Ritalin," testified DEA agent Austin Love. "His profile listed 60 prior sales and five-star reviews from buyers. In addition, his profile stated that he ships from France to anywhere in Europe." Investigators discovered OxyMonster's real identity by tracing outgoing Bitcoin transactions from his tip jar to wallets registered to Vallerius. Agents then checked his Twitter and Instagram accounts, where they found many writing similarities, including regular use of quotation marks, double exclamation marks, and the word "cheers," as well as intermittent French posts. The evidence led to a warrant being issued for Vallerius' arrest.

U.S. investigators had been monitoring the site for nearly two years, but got their break when Vallerius flew to the U.S. for a beard-growing competition in Austin, Texas. He now faces a life sentence for conspiracy to distribute controlled substances.

Comment Re:How to get into 3D? (Score 2) 198

Don't pay money for a course -- Youtube has TONS of tutorials and learning videos people do. During a stint of unemployment, I self-taught Maya this way. I am a programmer by paycheck, but I have a large interest in the 3D rendering world. It's a lot to learn (new concepts / terminology),but it's very enjoyable IMO.

At least when I used it, Maya did not use any CUDA cores, and the GPU didn't really matter as long as it had openGL. (At one point I was doing 3D modeling on my netbook). I am not familiar with 3D printing, so I can't answer those questions.
Privacy

When It Comes To Spy Gear, Many Police Ignore Public Records Laws 78

v3rgEz writes What should take precedence: State public records laws, or contractual agreements between local police, the FBI, and the privately owned Harris Corporation? That's the question being played out across the country, as agencies are strongly divided on releasing much information, if any, on how they're using Stingray technology to collect and monitor phone metadata without judicial oversight.

Comment Re:I like the idea (Score 1) 292

Perhaps. But it's hard to say. Let me construct a scenario, and tell me how you (or anyone!) would notice:

Some ciphers work on blocks of fixed size, and add padding to reach this length if message is shorter. (example: message must be n*16 bytes, if not, pad message with random bytes at the end, until it is.)

Let's say I've backdored a program implementing such a cipher. The backdoor is this: Instead of padding with random bytes, I do this:

1) Take as much of the secret key as will fit in the padding-space. (if 9 bytes of padding is needed, I take the first 9 bytes of the secret key)

2) I encrypt this (using a algorithm that can encrypt any-length messages) using a second hidden backdoor-key.

3) I swap the last n bytes of the ciphertext with this encrypted partial-key.

Result: Message-size is unchanged. Encryption and Decryption works as specified. n-last characters (the padding) looks like random noise, and is supposed to BE random. How do you notice ? How do you detect that the last n characters is really part of the key, encrypted, and NOT random noise ?

(To make this more fun: I left one big flaw in the scheme there IS a easy way to detect that this shit is going on -- but there's also a way to patch that flaw, I'll explain that in the next message if you find the flaw)

Comment Re:I like the idea (Score 1) 292

That still only works if you trust the hardware and software of that computer. The problem is that if the software you used to encrypt stuff was backdoored, it could leak the key (or fractions thereof) in the ciphertext.

It could do this only sometimes, so no amount of analyzing the ciphertext could convince you that it's honest. Perhaps it only leaks the key if run on a friday the 13th. You simply don't know.

The leaked key, could itself be encrypted so that only the entity planting the backdoor is able to "open" it.

Comment Re: I like the idea (Score 1) 292

AES256 is entirely public. Furthermore, that's an *algorithm* not a piece of software -- the algorithm has been *implemented* hundreds of times, by hundreds of independent organizations, some implementations are open source, some are closed.

Furthermore, AES256 says precicely *nothing* about how to create a key, what it DOES say is how, given plaintext and key, you create ciphertext, and how, given ciphertext and key, you create plaintext.

Your claim that government could "have their own key" is thus nonsensical -- you can, if you like, create your aes256-keys by tossing a coin.

Comment Re:Poor people are poor because they're lazy (Score 1) 459

Precicely, and statistically plain dumb LUCK is the biggest of those factors. 95% of all Norwegians are wealthier than 95% of all people born in Ghana, yet where you're born is just luck.

The odds of staying in the top quintile if that's where your parents are, is something like 85% (in USA), the odds of climbing to the top quintile if your parents are in the bottom one, are about 11%. In other words, 8 times as good odds if your parents are already wealthy.

That's not to say impossible: 11% still does mean some people make it. But it says it's damn hard, and probably -also- requires luck (in addition to the hard work).

I'm fairly wealthy, me and my wife pull about $200k/year, and sure we've worked for it, but at the same time a LOT of it is just luck: Born in Norway and Germany. Educated parents. Good health. Quick learners. All of these things helped us enormously, yet we have them just because we lucked out in the lottery of life.

If we worked equally hard, but where born in a slum in Nairobi, odds are we'd be living on 2-3 magnitudes less. So while hard work matters, it's pretty arrogant to go around talking as if hard work is the ONLY thing that matters.

Slashdot Top Deals

"A mind is a terrible thing to have leaking out your ears." -- The League of Sadistic Telepaths

Working...