×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

How One Man Fought His ISP's Bad Behavior and Won

Jon Stone Re:Use public DNS (181 comments)

If a DNS reply passes DNSSEC validation, I can be confident the response is what the zone administrator wanted it to be and it hasn't been tampered with. DNSCurve provides no such assurance.

Widespread DNSSEC and client-side validation would kill OpenDNS's business model, which revolves around tampering with DNS responses. DNSCurve continues to allow them to do this.

about a year ago
top

Microsoft, BSA and Others Push For Appeal On Oracle v. Google Ruling

Jon Stone Re:Well there you go (191 comments)

However, if someone could develop a drop-in replacement for Windows which was compatible with all the APIs

Have you just described the goal of Wine?

about 2 years ago
top

After Launch Day: Taking Stock of IPv6 Adoption

Jon Stone Re:Privacy Concerns (244 comments)

Remember - we're comparing IPv4 with NAT against IPv6.

Yes the ISP allocates the IPv6 prefix, but then again with NAT every source packet has the same IPv4 address. The real difference is that with IPv6 every single request can be given a different source address. If the source addresses are picked randomly from the /64 pool then it should be impossible to identify individual hosts within the /64 based solely on IP address information. As you rightly point out there are other effective ways of doing this already, but that's not an argument against using IPv6.

more than 2 years ago
top

After Launch Day: Taking Stock of IPv6 Adoption

Jon Stone Re:Privacy Concerns (244 comments)

I've never understood this concern. With IPv6 I have, say, 2^64 addresses to use. I could use a different source IP address for each and every HTTP request I send out. Even at 1000 requests a second we'll all be long dead before you had to reuse a source address.

IPv6 gives you loads of room to hide. This is my concern - address based blocklists will quickly become infeasible.

more than 2 years ago
top

Paul Vixie: 100,000 DSL Modems May Lose Their DNS On July 9

Jon Stone Re:8.8.8.8 (193 comments)

feel free to operate your own resolvers.

Preferably with DNSSEC turned on.

more than 2 years ago
top

Microsoft Redesigns chkdsk For Windows 8, Improves NTFS Health Model

Jon Stone Re:How about making it just faster? (219 comments)

If the filesystem is already marked as clean, then e2fsck doesn't actually check anything. You might want to try timing "fsck -f ..."

more than 2 years ago
top

Bill Banning Employer Facebook Snooping Introduced In Congress

Jon Stone Re:We don't need this law! (199 comments)

Facebook are willing to sue. They don't want people to do this either. It devalues their service (even if the users are the "product", they still need to provide something of value to attract users).

Facebook probably wants to be able to charge companies for access to potential employees' data

more than 2 years ago
top

Zuckerberg Made Instagram Deal Alone

Jon Stone Re:and this is how... (307 comments)

businesses actually have a product if they're offering Cloud services, whereas dotcom companies generally did not.

If there is a Dotcom bubble and if it does burst, how many customers are the cloud services going to have left?

more than 2 years ago
top

Southwest Airlines iPhone App Unencrypted, Vulnerable To Eavesdroppers

Jon Stone Re:Part of this is because of US Export Restrictio (139 comments)

Does the operating system not provide the SSL libraries? Or do you actually have to code the encryption routines into each application on iOS?

I would have thought the export restrictions would only apply to the SSL libraries, not the application that uses them.

more than 2 years ago
top

No More SSL Revocation Checking For Chrome

Jon Stone Re:What? (152 comments)

CRLs are revocation lists which used to be published by CAs and clients were able to periodically download.

As a concept they were replaced with OCSP (online certificate status protocol). Here the client requests the current status of a certificate each time they are presented with it. The idea was that it would be more timely and up to date and meant CAs didn't need to publish a complete list of revoked certificates.

Now it seems Chrome wants to go back to a bodged version of the old way of doing things where Chrome periodically requests the CRL from the browser vendor or Chrome is periodically updated with the latest CRL?

more than 2 years ago
top

Four CAs Have Been Compromised Since June

Jon Stone Re:Bah CA's (87 comments)

The CAs never see the private key material. When you apply for a certificate, you generate the private key and a certificate signing request (CSR). It's the CSR which gets sent to the CA to sign, not the private key. All the CA has a copy of is the CSR and certificate, which is public knowledge anyway.

more than 3 years ago
top

What HP's TouchPad Fire Sale Teaches iPad Rivals

Jon Stone Re:Getting developers (312 comments)

One of Dilbert creator Scott Adam's books covers market segmentation. The market segment every business should aim for is the "stupid rich". The poor rich don't have enough money, and smart people aren't going to buy your company's product anyway. The stupid rich is where the money is made.

more than 3 years ago
top

Most People Have Never Heard of CTRL+F

Jon Stone Re:This is so cool. (567 comments)

What surprises me is the number of people who use caps-lock instead of shift to type a single capital letter, i.e.
caps-lock on
type letter
caps-lock off
every single time.

more than 3 years ago
top

Linus Thinks Virtualization Is 'Evil'

Jon Stone Re:Idiotic, that's what OS's do (330 comments)

Virtualisation is, in many ways, trying to do what the OS should already be doing, namely isolation between processes (though protected memory), providing an abstraction layer for the hardware (though drivers) and allocating resources (through the CPU/IO schedulers).

Unfortunately, a certain OS has been so bad at doing this (historically) that people turn to virtualisation and you end up with a form of inner-platform effect. We have Linux implementing the virtio drivers to interface with the hypervisor which implements real drivers to talk to the real hardware. We have the guest's scheduler trying to manage "virtual CPUs" without any real information about what resources are actually available. We have hypervisors trying to re-implement copy-on-write for memory pages that the OS already does out-of-the-box.

Virtualisation is used as a "one size fits all" sledgehammer, often where it isn't the appropriate solution.

more than 3 years ago
top

Collar-Bomber Tracked By Gmail Accesses

Jon Stone Re:Had this happen in Erie PA (119 comments)

The "poor guy" is believed to have been part of the gang that came up with the plan in the first place. He wasn't, however, expecting it to be a real bomb.

Brian Douglas Wells

more than 3 years ago
top

Anti-Piracy Lawyers Accuse Blind Man of Downloading Films

Jon Stone Re:At least the UK Govt gives a concession.. (302 comments)

In the UK you require a license to watch or record TV as it is being broadcast, or to install TV receiving equipment for the purpose of watching/records TV as it is broadcast.

The requirement is worded to be independent of the technology used - terrestrial, satellite broadcasts, cable, internet etc

You don't require a license to watch recordings, so if you only ever watch DVDs, BBC iPlayer and 4OD you don't require a license. Copyright is a different issue - the TV license is a license to install/use equipment and is nothing to do with copyright.

more than 3 years ago

Submissions

Jon Stone hasn't submitted any stories.

Journals

Jon Stone has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?