Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Turn the tables on IM (Score 1) 140

Slightly off-topic: with email delivery times being almost instantaneous these days, wouldn't it possible to write an email client (or app) that provides, for all practical purposes, an IM system based on SMTP and IMAP?

Essentially, conventions like:
1. A set of recipients is a "group"
2. Replies are never quoted
3. The client always shows the full email thread (the "conversation")
4. The Subject line is a magic string to allow filtering on these IM emails

The specialized client would provide a very Whatsapp-like interface, while a normal email client could be used in a pinch as well.

Am I overlooking something obvious?

Comment Missing the point (Score 1) 163

Locked bootloaders are nothing new.

What the new feature in Android N is about is the ability to add cross-block redundancy to the system image so that a few defective flash blocks can be corrected. There was a posting on the official Android Developers blog that went into quite some details about how they reduced the storage overhead and prepared it for the typical failure scenario of Flash memory.

Comment Re:This is slashdot (Score 1) 112

13 marathons in 5 years, 2 of which were 50 milers, 3 sub 3:00 hours, 5 bostons, 7 bqs, so some running experience...
but thru it all, still a slashdot reader and a nerd....

Here: 13 marathons in 14 years, most just under 4:00 hours.

anjrober, it seems our running cred and our Slashdot IDs are aligned.

Comment Re:A month with a Ubuntu phone (Score 5, Insightful) 118

And what is it like to give up all the apps you use on a daily basis and replace them with links to mobile versions of that app's website?

Some would consider this an advantage. I'm quite happy to use the web versions of e.g. Facebook and Twitter on my smartphone, and not their apps.

Obligatory xkcd:

Comment "Erasing" is not good enough (Score 1) 113

I'm pretty sure that the ADB commands will just do a low level format, they will not physically overwrite the sectors holding your personal data (which is difficult on Flash memory anyway).

IMO the only safe method is to use Android's device encryption, but of course it's too late for that once you can't access the tablet any more. I learned this the hard way (a dead Nexus 7 which I probably will end up physically destroying).

Submission + - Slashdot Forgets to Renew SSL Certificate (

jeek writes: It expired yesterday.

Starting Nmap 6.40 ( ) at 2014-05-24 16:01 UTC
Nmap scan report for (
Host is up (0.050s latency).
rDNS record for
443/tcp open https
| ssl-cert: Subject: commonName=* Holdings, Inc/stateOrProvinceName=New York/countryName=US
| Issuer: commonName=GeoTrust SSL CA/organizationName=GeoTrust, Inc./countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2013-04-21T04:25:05+00:00
| Not valid after: 2014-05-23T22:49:50+00:00
| MD5: 485c ed76 9008 56be 3820 849c 2d2e ee73
|_SHA-1: 18f2 bcaa a238 bbf3 429e 6d2b 9d2c bd74 6085 02e4

Nmap done: 1 IP address (1 host up) scanned in 0.41 seconds

Comment Re:I can order "Giga" power... but havent (Score 2) 129

Austinite here as well.

What really pissed me off was that the deep packet inspection requirement is very well hidden on their webpage and promotional material. They only mention that the offer comes with "internet options" (!), and it takes you several clicks to discover what this implies.

While $70 + $5 for a VPN service is pretty competitive pricing, I really don't feel like giving them my money.

Submission + - Ten Steps You Can Take Against Internet Surveillance

Hugh Pickens DOT Com writes: Danny O'Brien writes at EFF that as NSA's spying has spread, more and more ordinary people want to know how they can defend themselves from surveillance online. "The bad news is: if you're being personally targeted by a powerful intelligence agency like the NSA, it's very, very difficult to defend yourself," writes O'Brien. "The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone." Here's ten steps you can take to make your own devices secure: Use end-to-end encryption; Encrypt as much communications as you can; Encrypt your hard drive; Use Strong passwords; Use Tor; Turn on two-factor (or two-step) authentication; Don't click on attachments; Keep software updated and use anti-virus software; Keep extra secret information extra secure with Truecrypt; and Teach others what you've learned. "Ask [your friends] to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node; or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it."

Slashdot Top Deals

"Open the pod bay doors, HAL." -- Dave Bowman, 2001