Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Researchers Find Problems With Rules of Bitcoin

Adam Back overblown (301 comments)

The selfish mining paper makes sense in mathematically simplified game theory model but does not take into account real-world issues of latency. Anyway simple work-arounds exist eg for pooled miners, the winning miner can broadcast their winning solution to random nodes in the network, which prevents selfish mining (selfish mining depends on keeping the transaction secret temporarily delaying broadcast). Hosted mining is a problem, but people should stop overpaying for hosting mining contracts, and demand to control their own vote. The long-run economic question of fees crossing over with reward is WAY to early to declare defeat. We have large amounts of bitcoin reward for decades, bitcoin can be scaled to handle more transactions, and what do we know now about the bitcoin transaction fees & economic picture 20 years out).

about 4 months ago
top

NSA WhistleBlower Outs Himself

Adam Back wow (860 comments)

Wow, holy moly! He articulated in his video interview better than the newspaper articles why this NSA stasi 2.0 is such a bad idea, they might have good intentions (to catch bad guys) but what they're creating is a MONSTROSITY. They are recording everything for later analysis, from everyone US and non-US. And from what I could tell from reading the articles and EFF untangling obtuse NSA terminology they dont call it "collected" until they come to sift through it later. So that maybe part of the PR spin of how they claim to not collect data. There is a lot of lying and careful PR spun wording about which law, terminology, whether the access is "direct" vs via a relay server, or an API, or done by a defense contractor and not NSA direct etc. You cant trust a word the NSA Clapper guy is saying. Trust Binney, this new leaker and hopefully the google, facebook etc who claim ignorance are not spinning and lying also and if so that they clean house - find the trojan hardware, remove it and fire those who installed it, and have a proper legal review of future requests. I'm thinking the leaker Edward Snowden coming forward makes it a lot harder for NSA Clapper to lie his way out of. Binney also (another recent leaker) deciphered and laid out whats really happening. Terrorism is bad, however they have to note some of it is blowback for interventionist foreign policy by US, UK and others in the middle east. As in physics actions have opposing reactions. Not all actions were particularly just in the first place. And well the world is still pretty safe, despite all that, still more Americans apparently die annually from furniture falling on them. Actions of a government should be proportional to the risk, and balances based on informed consent of the population. What we have here is repeated entrenched lying to US congress, oversight committees, secret (and blatantly incorrect and stretching) interpretations of law. Very very bad. This guy Edward Snowden is a US patriot and an international hero and will go down in history as such.

about a year ago
top

NSA Surveillance Heat Map: NSA Lied To Congress

Adam Back Re:Too Late To Stop It (385 comments)

Yes the link is true, that is I reverse engineered lotus notes back a decade or so ago, and I did see the X509 Organization=MiniTruth and the entity name: DN=Big Brother. And very spooky that was for a surreal moment (fiction blurred to reality orwell's 1984) looking at hex dumps on a green monitor at 1am or something after quite multiple hour reverse engineering stint to find that point! However speculation was those strings were set by a disgruntled IBM / Lotus Notes programmer as I dont think the key itself was certified. Adam

about a year ago

Submissions

Adam Back hasn't submitted any stories.

Journals

Adam Back has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...