Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Ask Slashdot: After TrueCrypt

TechForensics (944258) writes | 1 hour ago

0

TechForensics (944258) writes "(Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?"

Link to Original Source

Nuclear Plants Should Focus on Risks Posed by External Events

mdsolar (1045926) writes | 2 hours ago

1

mdsolar (1045926) writes ""Engineers at American nuclear plants have been much better at calculating the risk of an internal problem that would lead to an accident than they have at figuring the probability and consequences of accidents caused by events outside a plant, a report released Thursday by the National Academy of Science said.

Accidents that American reactors are designed to withstand, like a major pipe break, are “stylized” and do not reflect the bigger source of risk, which is external, according to the study. That conclusion is one of the major lessons from the Fukushima Daiichi nuclear accident in Japan in 2011, which began after an earthquake at sea caused a tsunami."

NAS Report: http://www.nap.edu/catalog.php..."

Link to Original Source

Japanese monkeys' abnormal blood linked to Fukushima disaster

mdsolar (1045926) writes | 2 hours ago

1

mdsolar (1045926) writes "Wild monkeys in the Fukushima region of Japan have blood abnormalities linked to the radioactive fall-out from the 2011 nuclear power plant disaster, according to a new scientific study that may help increase the understanding of radiation on human health.

The Japanese macaques (Macaca fuscata) were found to have low white and red blood cell levels and low haemoglobin, which the researchers say could make them more prone to infectious diseases."

Link to Original Source

Jibo, the friendly helpful robot, nets over $1 million on Indiegogo

mikejuk (1801200) writes | 2 hours ago

0

mikejuk (1801200) writes "After seven days the Jibo project has over $1.1 million. What is surprising is that Jibo isn't a complex piece of hardware that will do the dishes and pick up clothes. It doesn't move around at all. It just sits and interacts with the family using a camera, microphones and a voice. It is a social robot, the speciality of the founder, MIT's, Cynthia Breazeal. The idea is that this robot will be your friend, take photos, remind you of appointments, order takeaway and tell the kids a story. If you watch the promo video then you can't help but think that this is all too polished and the real thing will fall flat on its face when delivered. If it does work then worry about the hundreds of kids needing psychiatric counselling — shades of Robbie in I, Robot. Even if it is hopelessly hyped — there is a development system and I want one. It is the early days of the home computer all over again."
Link to Original Source

Enraged Verizon FiOS Customer Seemingly Demonstrates Netflix Throttling

MojoKid (1002251) writes | 13 hours ago

0

MojoKid (1002251) writes "The ongoing battle between Netflix and ISPs that can't seem to handle the streaming video service's traffic, boiled over to an infuriating level for Colin Nederkoon, a startup CEO who resides in New York City. Rather than accept excuses and finger pointing from either side, Nederkoon did a little investigating into why he was receiving such slow Netflix streams on his Verizon FiOS connection. What he discovered is that there appears to be a clear culprit. Nederkoon pays for Internet service that promises 75Mbps downstream and 35Mbps upstream through his FiOS connection. However, his Netflix video streams were limping along at just 375kbps (0.375mbps), equivalent to 0.5 percent of the speed he's paying for. On a hunch, he decided to connect to a VPN service, which in theory should actually make things slower since it's adding extra hops. Speeds didn't get slower, they got much faster. After connecting to VyprVPN, his Netflix connection suddenly jumped to 3000kbps, the fastest the streaming service allows and around 10 times faster than when connecting directly with Verizon. Verizon may have a different explanation as to why Nederkoon's Netflix streams suddenly sped up, but in the meantime, it would appear that throttling shenanigans are taking place. It seems that by using a VPN, Verizon simply doesn't know which packets to throttle, hence the gross disparity in speed."
Link to Original Source

Adam West approves of Ben Affleck as New Batman

brown784 (3754791) writes | 3 hours ago

0

brown784 (3754791) writes "There are still two years to go before we have seen Ben Affleck take on the mantel of Bruce Wayne/Batman in Batman v Superman: Dawn of Justice, however the argument about the Oscar winner’s suitability for the role rages on. Today one very worthy commentator gave his thoughts on the subject- Adam West, who played Batman from 1966 to 1968 inside a staggering 120 episodes of the eponymous television series as well as the 1966 film."
Link to Original Source

Day One With the Brand New Oculus Rift DK2: The Good, The Ugly and The Games

muterobert (2927951) writes | yesterday

0

muterobert (2927951) writes "Paul James goes hands on with one of the first next-gen Oculus Rifts in the wild:

"After much hacking (and some kind developer linkage) I stepped into a DK2 enabled version of Technolust and lost myself utterly! The stunning attention to detail, neon on black really lets the OLED panel shine here. In fact, this experience was the closest I think I’ve ever some to presence in virtual reality thus far. Leaning in to check the myriad retro objects, gawking at the lighting and just generally being blown away by the experience. This game was fabulous on the DK1, it’s utterly compelling now.""

Link to Original Source

Soccer Superstar Plays With Very Low Brain Activity

jones_supa (887896) writes | 8 hours ago

Science 0

jones_supa (887896) writes "Brazilian superstar Neymar's (Neymar da Silva Santos Júnior) brain activity while dancing past opponents is less than 10 per cent the level of amateur players, suggesting he plays as if on "auto-pilot", according to Japanese neurologists Eiichi Naito and Satoshi Hirose. The findings were published in the Swiss journal Frontiers in Human Neuroscience following a series of motor skills tests carried out on the 22-year-old Neymar and several other athletes in Barcelona in February this year. Three Spanish second-division footballers and two top-level swimmers were also subjected to the same tests. Researcher Naito told Japan's Mainichi Shimbun newspaper: "Reduced brain activity means less burden which allows [the player] to perform many complex movements at once. We believe this gives him the ability to execute his various shimmies." In the research paper Naito concluded that the test results "provide valuable evidence that the football brain of Neymar recruits very limited neural resources in the motor-cortical foot regions during foot movements"."

Private Data On iOS Devices, Not So Private

theshowmecanuck (703852) writes | 9 hours ago

0

theshowmecanuck (703852) writes "Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week.

The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission.

Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections."

Link to Original Source

The Gene "STAR TREK" Roddenberry Project

Anonymous Coward writes | 10 hours ago

0

An anonymous reader writes "The Gene Roddenberry Project, based on found interview footage of Gene Roddenberry, is a half hour documentary exploring the genesis of Star Trek through the personal insight of its creator. A Kickstarter campaign is raising the funds needed to gather interviews from surviving cast members, Gene Roddenberry's family, and to license footage. Any additional funds will go into financing the biggest cost in a documentary of this nature; additional footage and music licensing.

https://www.kickstarter.com/pr..."

Link to Original Source

Australian government moving forward with website blocks to fight piracy

angry tapir (1463043) writes | yesterday

0

angry tapir (1463043) writes "Australia is moving closer to a regime under which ISPs will be forced to block access to websites whose "dominant purpose" is to facilitate copyright violations. A secret government discussion paper (PDF) has been leaked and proposes a system of website blocking and expanded liability for ISPs when it comes to "reasonable steps that can be taken ... to discourage or reduce online copyright infringement"."
Link to Original Source

Alternative Theories on deadly Washington state landslide

Taco Cowboy (5327) writes | 13 hours ago

0

Taco Cowboy (5327) writes "/. has carried a piece on the deadly Washington State landslide — http://science.slashdot.org/st... — but now alternative theories on the same landslide have surfaces

The new account from the U.S. Geological Survey (USGS) differs from the explanation offered by the Geotechnical Extreme Events Reconnaissance (GEER) Association, which on Tuesday unveiled the first published analysis of the 22 March slide. The accident killed 43 in the little town of Oso at the edge of Washington’s Cascade Mountains

The difference revolves around a critical question:

What caused a hillside with a history of relatively minor landslides to suddenly turn into a tsunami of mud and debris that sped about a kilometer across a valley?

The findings could influence what signs scientists look for when trying to detect other potentially explosive slides"
Link to Original Source

Cable companies: We're afraid Netflix will demand payment from ISPs

Dega704 (1454673) writes | yesterday

0

Dega704 (1454673) writes "While the network neutrality debate has focused primarily on whether ISPs should be able to charge companies like Netflix for faster access to consumers, cable companies are now arguing that it's really Netflix who holds the market power to charge them. This argument popped up in comments submitted to the FCC by Time Warner Cable and industry groups that represent cable companies. (National Journal writer Brendan Sasso pointed this out.) The National Cable & Telecommunications Association (NCTA), which represents many companies including Comcast, Time Warner Cable, Cablevision, Cox, and Charter wrote to the FCC:

"Even if broadband providers had an incentive to degrade their customers’ online experience in some circumstances, they have no practical ability to act on such an incentive. Today’s Internet ecosystem is dominated by a number of “hyper-giants” with growing power over key aspects of the Internet experience—including Google in search, Netflix and Google (YouTube) in online video, Amazon and eBay in e-commerce, and Facebook in social media. If a broadband provider were to approach one of these hyper-giants and threaten to block or degrade access to its site if it refused to pay a significant fee, such a strategy almost certainly would be self-defeating, in light of the immediately hostile reaction of consumers to such conduct. Indeed, it is more likely that these large edge providers would seek to extract payment from ISPs for delivery of video over last-mile networks.""

Link to Original Source

FBI studied how much drones impact your privacy, & then marked it secret

v3rgEz (125380) writes | yesterday

0

v3rgEz (125380) writes "When federal agencies adopt new technology, they're required by law to do Privacy Impact Assessments, which is exactly what the FBI did regarding its secretive drone program. The PIAs are created to help the public and federal government assess what they're risking through the adoption of new technology. That part is a little trickier, since the FBI is refusing to release any of the PIA on its drone project, stating it needs to be kept, er, private to protect national security."

The Amazon Fire Is the Dirtiest Smartphone

Jason Koebler (3528235) writes | yesterday

0

Jason Koebler (3528235) writes "The biggest thing that sets the Amazon Fire Phone apart from its Android and Apple competitors probably isn't the clean interface or the unlimited photo storage—it's the dirty power behind it. When Fire users upload their photos and data to Amazon's cloud, they'll be creating a lot more pollution than iPhone owners, Greenpeace says.
Apple has made a commitment to running its iCloud on 100 percent clean energy. Amazon, meanwhile, operates the dirtiest servers of any major tech giant that operates its own servers—only 15 percent of its energy comes from clean sources, which is about the default national average."

Compromise struck on cellphone unlocking bill

NotSanguine (1917456) writes | yesterday

0

NotSanguine (1917456) writes "The US Senate has passed a bill (S.517) today allowing users to unlock their phones when moving to another provider.

From a recent article at thehill.com:

“Consumers should be able to use their existing cell phones when they move their service to a new wireless provider,” Leahy said in a statement. “Our laws should not prohibit consumers from carrying their cell phones to a new network, and we should promote and protect competition in the wireless marketplace,” he said. Grassley called the bipartisan compromise “an important step forward in ensuring that there is competition in the industry and in safeguarding options for consumers as they look at new cell phone contracts.” “Empowering people with the freedom to use the carrier of their choice after complying with their original terms of service is the right thing to do,” he said. The House in February passed a companion bill sponsored on cellphone unlocking from House Judiciary Committee Chairman Bob Goodlatte (R-Va.).

"
Link to Original Source

Congressman Mistakes U.S. Officials For Indian Ones

PolygamousRanchKid (1290638) writes | yesterday

0

PolygamousRanchKid (1290638) writes "Rep. Curt Clawson, a freshman Republican congressman from Florida, mistook two senior U.S. officials for representatives of the Indian government during a House hearing on Friday.

“I am familiar with your country, I love your country,” Clawson said to Nisha Biswal and Arun Kumar, addressing fellow U.S. citizens who hold high-ranking positions in the State Department and Commerce Department, respectively.

After a lingering silence, Clawson smiles slowly. Kumar appears to grin, while Biswal echoes Clawson’s sentiment, informing him it should probably be directed to the Indian government. It’s unclear whether Clawson realized his error."

Link to Original Source

Mark Zuckerberg now richer than Google co-founders and Jeff Bezos

Anonymous Coward writes | yesterday

0

An anonymous reader writes "Facebook's Chairman Mark Zuckerberg is now richer than Google co-founders Larry Page and Sergey Brin; not letting Amazon's CEO Jeff Bezos out of the picture.

The 30-year old Facebook founder is now worth $33 billion after he earns $1.6 billion on Thursday(today) after his company went up from $71 per share on Wednesday to $73 per share on Thursday. Facebook, on the other hand, is now valued at $205.57 billion"

Link to Original Source

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...