Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Data Storage

Distinguishing Encrypted Data From Random Data? 467

gust5av writes "I'm working on a little script to provide very simple and easy to use steganography. I'm using bash together with cryptsetup (without LUKS), and the plausible deniability lies in writing to different parts of a container file. On decryption you specify the offset of the hidden data. Together with a dynamically expanding filesystem, this makes it possible to have an arbitrary number of hidden volumes in a file. It is implausible to reveal the encrypted data without the password, but is it possible to prove there is encrypted data where you claim there's not? If I give someone one file containing random data and another containing data encrypted with AES, will he be able to tell which is which?"
Science

Peer Review Highly Sensitive To Poor Refereeing 233

$RANDOMLUSER writes "A new study described at Physicsworld.com claims that a small percentage of shoddy or self-interested referees can have a drastic effect on published article quality. The research shows that article quality can drop as much as one standard deviation when just 10% of referees do not behave 'correctly.' At high levels of self-serving or random behavior, 'the peer-review system will not perform much better than by accepting papers by throwing (an unbiased) coin.' The model also includes calculations for 'friendship networks' (nepotism) between authors and reviewers. The original paper, by a pair of complex systems researchers, is available at arXiv.org. No word on when we can expect it to be peer reviewed."

Comment Re:And when it fails this test too (Score 1) 284

So far so good. But I guess the way I understand the objective of a grand unified theory, it involves the attempt to produce a set of axioms and theorems from which the important results in *both* QM and GR can be derived/proved. I'm as reluctant as the next person to extend Goedel's work into areas where it shouldn't really go (like a lot of the so-called new-age folk wisdom does). But I honestly think that if we spin the universe around and look at it from a different angle, Goedel's work might apply here. Obviously I haven't made a compelling enough case to persuade you or m50d, so I guess it's back to the drawing board for another few years. I also don't think I'm in agreement with making an impermeable barrier between physics and math. I mean, it seems to me that the language of physics *is* math. And for proof of that, I resort to xkcd. http://xkcd.com/435/

Comment Re:And when it fails this test too (Score 1) 284

Thanks for this - I've been struggling for ages to figure out how Goedel's theorem might be applicable to the search for a Grand Unified Theory. If I understand what you're saying, then it does if either General Relativity or Quantum Mechanics involves the use of second order predicate logic. I'm guessing that because they both involve math that is somewhat more complex than arithmetic, that the answer to that is yes, but I'm not sure. So if we pretend that they both do involve second order predicate logic (or that at least one of them does), does it mean that the search for a grand unified theory is doomed? If you've got one theory (QM) that is consistent for small things but not complete (i.e. for heavy things) and another (GR) that is consistent for heavy things but not complete (for small things), does Goedel's theorem prove that neither GR nor QM can be extended to cover the case of small heavy things without sacrificing consistency? Or does it prove that the case of small heavy things is undecidable? Or is it just irrelevant?
Mozilla

A Pointed Critique of Thunderbird 3's Performance Compared to v.2 234

PerfProtector writes "Did you recently install Thunderbird 3 or upgrade from Thunderbird 2 to Thunderbird 3? Did you notice any severe slowdown in your machine or a major decrease in its performance? Well, many people around the world encountered these problems. We wrote a technical analysis about the severe problems that are caused by Mozilla Thunderbird e-mail client. These problems include anomalous usage of CPU, memory, hard disk and Internet bandwidth. You can read the full analysis, including several graphs that show how bad the situation is and what went wrong from Thunderbird 2 to Thunderbird 3. For example, while CPU utilization of Thunderbird 2 is usually between 0% to 10%, with an average of 0.3%, Thunderbird 3 CPU utilization is between 5% to 80%, with an average of 30% — 100 times more than Thunderbird 2. In addition, during long periods of time, Thunderbird 3 used more than 50% of the overall CPU resources.This behavior slows dramatically the whole machine." It's worth noting that this analysis comes from developers who have developed a (freeware) tool they claim will improve Thunderbird's performance, but they explain also how to do so with manual changes.

Comment Which hotels exactly is what I'd like to know (Score 1) 135

I'm reading this story while sitting in limbo waiting for a replacement card to arrive, because my CC issuer recently called to say that my card had been flagged as "vulnerable". Of course the guy I'm talking claims (and I believe him) to have no information about what exactly led them to believe that my card is as vulnerable as they think it is.

So that got me thinking: wouldn't it be nice if I could know which vendor was responsible for the security breach? I'd definitely make it a point not to go back there, at least unless and until they demonstrated to me that they'd taken appropriate measures to reduce the likelihood of another breach happening. I've had probably half a dozen such reports from my cc company over the past five years. I always wondered what was up, because I kind of make a point of not using my card in a place that looks shady. But I do stay in a lot of hotels. So thanks to the originator of this story for helping me make sense of my experience.

I'm sure there would be lots of problems with forcing cc issuers to disclose the name of the vendor when cancelling a card for security reasons. But i'd still like to have that information to guide my future choice of vendors! It would also apply some market pressure to have hotels, or whoever else, get their security acts together.

Crime

Hotels Lead the Industry In Credit Card Theft 135

katarn writes "A study released this year found that, of the credit card hacking cases last year, 38 percent involved the hotel industry. At hotels with inadequate data security, the greatest amount of credit card information can be obtained using the simplest methods. It doesn't require brilliance on the part of the hacker. Most of the chronic security breaches in the hotel industry are the result of a failure to equip, or to store or transmit this kind of data properly, and that starts with the point-of-sale credit card swiping systems."

Comment Re:Both IT and health care value autonomy highly. (Score 1) 1134

Here's an interesting article that you might also enjoy, by one of the foremost thinkers in the field. His theory is that smart people don't experience enough failure: they're too often right, and they're right immediately. If you don't seem so sure of yourself immediately, you have a better chance of attracting collaborators. It's a little like agile development, where you release stuff that you know isn't exactly "it" but it's a good start, works, and makes a meaningful improvement in people's lives. If you've always succeeded in "brilliant loner" or "cathedral" style development, you don't know how to function in the bazaar. http://www.velinperformance.com/downloads/chris_argyris_learning.pdf

Comment Both IT and health care value autonomy highly. (Score 1) 1134

It's interesting to see this debate happening here on Slashdot. I spend my life immersed in the world of health care, and a large part of my job is trying to figure out ways to deal with folks like Dr. House. It's a big, big cultural transformation, or at least it is in health care. One of the reasons that it's so hard to deal with is because in "fixing" a problem like Dr. House you run the risk of treading on people's autonomy. And part of the reason that folks like this get as far as they do is because of all the places in our broad culture where autonomy reigns supreme as a guiding value. Now don't get me wrong, I support autonomy in a big way! I'm just saying that we need to think of some of the unintended side effects that brings along when we perhaps push the dose a bit too much. Ironically, I often use the analogy of an open-source software community to help people envision what health care might look like if we did a good job of improving its culture. If only hospitals had a modding system that allowed flame-bait to be identified and screened out in policy debates!

Slashdot Top Deals

"How many teamsters does it take to screw in a light bulb?" "FIFTEEN!! YOU GOT A PROBLEM WITH THAT?"

Working...