Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



New Java 0-Day Vulnerability Being Exploited In the Wild

archatheist Vulnerability? In software? (193 comments)

Yes, yes. Panic! There's a Java 0day! Dear Lord forfend! Of course, as you read this you are probably running Windows, with tons of extensions and software. You're probably using Flash. You probably have a web browser - heck, obviously you have a web browser. Well, not to worry: After disabling Java you will be completely safe.

about 2 years ago

Craig Venter Wants To Rebuild Martian Life In Earth Lab

archatheist Hey! Wait a minute! (142 comments)

Didn't I just read on this very site (or possibly Gizmodo; they all run together) that Jurassic Park was impossible because DNA degrades too fast? So how is this going to work? Because I'm pretty sure DNA (if that was how Martian life worked) would be subject to conditions that were even more harsh.

more than 2 years ago

Teen Suicide Tormentor Outed By Anonymous

archatheist Re:It's all tied together (550 comments)

Okay. I read your blog post at the link. Your definition of rape omits the concept of consent, and randomly includes premarital sex (which would fit the definition in the first line) and homosexuality. Good luck with your mimeographed newsletter; I shall file you under "troll" and carry on. I sine Deus.

more than 2 years ago

Teen Suicide Tormentor Outed By Anonymous

archatheist Re:It's all tied together (550 comments)

Atheism leads to this.

I'm pretty sure you don't need to believe in God to consider rape and murder unethical, immoral, and just wrong. In fact, plenty of people have pointed out (repeatedly) the fallacy of assuming that one needs God and/or religion to be good, so there is no reason to say more on that topic here. Go forth and Google.

The culture of consent and contraception, leads to this.

I'm not sure what the "culture of contraception" is, but I am pretty sure it does not lead to this kind of behavior, either. In fact, I strongly suspect this behavior - in general, minus the Internet - predates the widespread availability of contraception.

more than 2 years ago

Libertarian Candidate Excluded From Debate For Refusing Corporate Donations

archatheist Important Questions (627 comments)

So he's a slashdotter who might end up in Congress. Fine. What I want to know is does he run Linux???

more than 2 years ago

VLC Developer Takes a Stand Against DRM Enforcement

archatheist Re:GPL requires no DRM? (717 comments)



Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.

In short, I think there are problems beyond DRM with GPL software being distributed through the app store.

more than 4 years ago

When I die, I want my body to be ...

archatheist Missing Option (793 comments)


more than 4 years ago

Browser Extension Defeats Internet Eavesdropping

archatheist Re:Excellent!! (194 comments)

This is in the FAQ. From TFA:

Q: But what if an attacker takes over all paths to the destination?

A: There are two answers to that. Please see our academic paper for a detailed security analysis.

1) Perspectives actually keeps a record of the keys used by a service over time. Thus, even if a powerful adversary is able to take over the whole Internet (scenario L_server in the paper), clients can still detect the key as suspicious because the key has recently changed. If the attacker is able to compromise all paths for a long time, then you are in trouble, but then again such a powerful adversary could also fool the so-called "verification procedures" of many certificate authorities, which often consist of a one-time email verification.

2) Even though a powerful adversary can defeat the system, it makes man-in-the-middle attacks much harder. Today an attacker must only be on the path between you and the destination, which isn't very hard. Think about an open wireless network, or the recent DNS attacks which compromise a targeted DNS resolver. Being on all links is much harder, and in the end security is nothing but making an attack harder.

more than 6 years ago



Human Language Gene Changes How Mice Squeak

archatheist archatheist writes  |  more than 5 years ago

archatheist (316491) writes "Researchers at the Max Planck Institute for Evolutionary Anthropology in Leipzig, Germany, have engineered a mouse whose FOXP2 gene has been swapped out for (different) human version. This is interesting because the gene is implicated in human language, and this has changed how mice squeak. Forget planet of the apes... get your tiny paws off me, you darn dirty mouse!"


archatheist has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?