top Windows 10: Can Microsoft Get It Right This Time?
Windows 3.0 shared DLL code segments in memory. It's the whole point of DLLs.
top Schneier Explains How To Protect Yourself From Sony-Style Attacks (You Can't)
How to protect yourself from Sony-style attacks:
Step 1. Don't be Sony.
top What Happens To Society When Robots Replace Workers?
Socialism: an economic system in which the workers control the means of production. If the workers are all robots, that bodes ill for humanity. I hope you meant "communism" instead.
top Once Again, Baltimore Police Arrest a Person For Recording Them
It should be a felony for a police officer to do this, because they wield so much more power in this equation.
It is a
felony. about a month and a half ago
top Taxi Medallion Prices Plummet Under Pressure From Uber
It's exactly the same thing, except it's
on the Internet, which makes it completely different. And innovative! And high-tech! Which is why these dumb stories about taxi companies should be flooding Slashdot every day, I guess.
top Bad Lockup Bug Plagues Linux
Since every bug this year needs to have a catchy name for the headlines, I propose we call this one "
Davy Jones' Lockup."
top US Says It Can Hack Foreign Servers Without Warrants
It's legal in your own country to spy on foreign powers.
This case has nothing to do with spying on foreign powers. It's about federal agents searching through the private effects of an individual, which is explicitly, specifically, Constitutionally illegal without a warrant.
top Selectable Ethics For Robotic Cars and the Possibility of a Robot Car Bomb
Well said. You saved me the trouble of writing a comment not half so clear and complete.
Ask professional drivers. These "ethical" questions are ridiculous. Avoid obstacles if possible; if not, slow down. It's better to crash into something you can't avoid as slowly as possible. It's also best to maintain control just in case the situation changes.
top UK Government Report Recommends Ending Online Anonymity
So, what are you going to use for ID?
So, in that atmosphere, how any single website would ever be able to "authenticate" your ID, I have no idea.
How about tamper-resistant cryptographic biometric devices? Use your government-issued fingerprint reader to log into Big Brother's system, then each server is required to make sure you have a valid current login certificate from BB before providing any services. Complete records must be kept indefinitely and will be audited against upstream connection logs.
Nobody is required to have government ID, but network service providers are prohibited from communicating over the Internet with anybody who isn't logged in with Big Brother.
Obviously this only works within one jurisdiction. Foreign Internet users would have to be handled separately, if at all.
I guess it would be easiest to manage this at the ISP level -- ISPs would be required to require proof of identity (via secure biometric reader) at regular intervals from all users. Then you don't necessarily have to bother auditing web, email, etc, servers.
top Cable Companies: We're Afraid Netflix Will Demand Payment From ISPs
FYI, the sixth one is fiction, satire.
top EPA Mulling Relaxed Radiation Protections For Nuclear Power
It probably means that the maximum possible lifetime energy production of a photovoltaic panel is less than the energy required to manufacture and deploy it.
I have no idea whether that is true, but I believe it is GP's meaning.
top Dealing With 'Advertising Pollution'
IMO, if ads stopped across all internet sites, or the online advertising industry completely collapsed. The internet as we know it, would be gone.
Correction: The Internet as
you know it would be gone. The actual Internet would be just fine. Universities, stores, hobby sites, government, and people generally interested in communicating with each other would pay their ISP bills and continue without interruption.
top Man Arrested For Parodying Mayor On Twitter Files Civil Rights Lawsuit
Maybe he doesn't want to bankrupt the defendants before extracting maximal settlement value. They can go to prison
after they pay him off.
top The Profoundly Weird, Gender-Specific Roots of the Turing Test
Turing's imitation game was a thought experiment. To explain it simply to an audience unfamiliar with the idea, he started with man against woman, then proceded to man against machine. The specific genders were not important or significant in the thought experiment, just the existence of some difference between the contestants that could potentially be spoofed over a teletype. There was nothing gender-specific or weird about it.
top Intel Announces Devil's Canyon Core I7-4790K: 4GHz Base Clock, 4.4GHz Turbo
That is always true. The longer you wait, the cheaper it gets. If you wait forever, it costs nothing.
If you need a job done now then get the cheapest equipment that can do the job. If you don't need it now then wait; the price of computer equipment only goes down.
top Bill Blunden's Rejected DEF CON Presentation Posted Online
Conversely, the people who *do* have access to the bigger picture stuff, have no vested interest in giving us the unfiltered truth (or any truth at all),
Of course not. If we knew everything they know, then they wouldn't be special any more.
top The Sudden Policy Change In Truecrypt Explained
There's nothing in TFA that hasn't been speculated in great detail already.
No explanation totally makes sense. Here's my working model of what happened (all speculation of course):
The project has been gradually disintegrating over the last few years -- developers leaving and not being replaced, remaining developers having less time to spend on the project for whatever reason, and the perceived reward for fixing increasingly difficult bugs is not enough to keep people interested. It's just not fun any more.
The to-do list has some really nasty bugs that are difficult to fix and could potentially compromise all TC containers. The remaining developers in the project have been grinding away at these bugs, but haven't made much progress for reasons outlined above. They realized that the project was going to fizzle out before they got anything fixed. A cursory look at the 7.2 code suggests that they had committed to some major rewriting of the code, and bit off more than they could chew.
At this point, what can they do? Reporting the vulnerabilities would be irresponsible since no fixes are forthcoming. Lives depend on some of the secrets their software keeps. Best to push people gently away from TC until the problems can be fixed, if ever, while keeping the details of the vulnerabilities as secret as possible, and giving people realistic expectations about the future of TC development (i.e. none).
They probably had a plan for creating a migration plan that actually made sense, but ran out of resources before finishing, and decided to go with what they had on hand. At this point they were probably down to one very part-time developer and maybe a few unreliable volunteers. ("Hey Jim, where's that page you were writing about Linux FDE? Jim? Hello? Anybody there?")
There was really no good way forward with the resources remaining, so they did the best they could.
Why didn't they find someone else to take over the project? I guess they tried, but couldn't find anyone in their immediate circle of trust who was willing and able. Perhaps they felt that expanding their circle of trust would jeopardize their anonymity.
On the other hand....
"WARNING: Using TrueCrypt is *not *secure *as
top Reading Rainbow Kickstarter Earns One Million Dollars In Less Than a Day
Would it kill you to put a short explanation or link in the summary for those of us who never heard of it before?
Reading Rainbow is an American children's television series that aired on PBS from June 6, 1983, until November 10, 2006, that encouraged reading by children. As of 2012, it is an iPad and Kindle Fire educational interactive book reading and video field trip app.
top Why Snowden Did Right
Remember that Edward Snowden was a contractor with Booz Allen Hamilton, and has proven to the world his unimaginable and extraordinary access to the most senstive of NSA programs --- and who owns Booz Allen?
I give up. Who owns Booz Allen?
top German Court Rules That You Can't Keep Compromising Photos After a Break-Up
Wow, that's ten tons of crazy piled into a half-ton pickup.
I've said it before and I'll say it again: Your inability to imagine something is not proof of its non-existence; it's only proof of your limited imagination.
As far as the case in Germany goes... It sort of makes sense to prohibit someone from
publishing compromising photos of their ex, but requiring that certain photos be deleted is impractical, unreasonable, unenforceable, and just plain dumb. Are they also going to demand that he forgets what she looked like naked? As long as he keeps the photo to himself, what's the difference between that and a memory? Nothing.
Keeping a photo as a reminder of a pleasant experience in your past is by no means crazy or immoral. That's exactly what photo albums are for, and why everybody keeps them! Just because you have a picture of someone (naked or otherwise) doesn't mean you obsess or masturbate to it. My shoebox of old travel photos (including various ex-girlfriends) just sits in the closet until I get nostalgic once every year or five and have a look through it. No obsession, no masturbation, no reputations smeared.
Lost Race hasn't submitted any stories.
Lost Race has no journal entries.