Become a fan of Slashdot on Facebook


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:I don't see the problem. (Score 4, Interesting) 667

The plane was 10km up. It wasn't shot down by something bought for $50,000 from Bob's Quality Used Implements of Death and Destruction and delivered to you by a courier van. The suspected weapon system requires at minimum one tank sized tracked launcher vehicle, and for full capability it requires three such vehicles. This is way out of Bob the arms dealer's league. Although I'm pretty much guessing here, the missile alone I expect would cost over a million dollars to manufacture.

You mean something like http://www.mortarinvestments.e...

Comment Slow news day? (Score 1, Informative) 55

What kind of non-story is that? One link points to some guy writing about how some other guys went to study waves at different locations. It doesn't say anything about how they did it, or has any technical information. The other link is a PDF scanned from a paper from 1982. Slow day when you have 32 year old news?

Comment Re:This is awesome (Score 2) 217

Is it messed up to add sensitive information to an entropy pool? From choice of wording it seems everyone should immediately and without reservation know better this is a stupid thing to do.

Question is this actually a valid position or more knee jerk based on unfounded fear, ignorance of operation of an entropy pool?

When functioning properly you shouldn't be able to extract anything except entropy from pool.

Emphasis mine. Putting it in the pool is yet another attack vector, and a great way to increase the chance of something going wrong down the line. Either by mistake or by a planned malicious code change in parts of the code that doesn't seem to have anything to do with the private key.

Comment Re:Simple. (Score 1) 876

Actually, they are called movies. And I bet that on average, people watch a lot more movies than they read books.

(This is however not a statement of quality, and I guess there are hundreds of nerds who thinks that anectodes equals data which will reply to this and proudly proclaim that they read more books than they watch movies.)

Comment Re:Officials learn terrorist and criminals use cas (Score 1) 411

You only need to do that here (Sweden) if you want to deposit large enough sums, I don't know exactly how much should be a couple of thousands of your so-called quids.

I expect this to gradually change within the next 10 years or so, though. I mean, handling cash in this day is suspicious enough when you might as well use a debit or credit card of some sorts, or pay with your phone bill.

Comment Re:Officials learn terrorist and criminals use cas (Score 3, Interesting) 411

Actually, a better "analogy" is that they work hard on making sure that cash can't be used anonymously. Each transaction must be monitored (serial numbers on every bill, cameras in every ATM and store), and controlled (demanding proof of ownership for depositing cash at a bank, removing the possibility to actually use cash for buying travel documents).

Much like they are working hard on trying to make sure Tor can't be used anonymously.

Slashdot Top Deals

For every complex problem, there is a solution that is simple, neat, and wrong. -- H. L. Mencken