Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Australia and NSA Gain Comprehensive Access To Indonesian Phone System

dubist Such a waste of money.. (133 comments)

I didn't mind the odd general discussion on how they compromised Google etc but an awful lot of money has now just gone down the tube for no useful purpose except perhaps to satisfy a Gen-Y's sudden burst of conscience.

about a year ago

NSA Ally Spied on US Law Firm

dubist Ok that makes sense.. (162 comments)

Which kind of explains why senior Australian and American politicians have been in Indonesia recently..

Hate to be the Australian Ambassador to Indonesia at the moment..

Rumour has it that the Indonesians regularly send encrypted birthday greetings for Australian operatives so we will probably just end up with another round of mock outrage and contrition from both sides and then it will be back to the cricket..

I think that its a shame Shirley Temple Black is dead because now there is no one to lead a global round of "Good ship lollypop."

about a year ago

Encrypted Messaging Startup Wickr Offers $100K Bug Bounty

dubist Focus on the host platform. (39 comments)

I support the sentiment of these guys but your code is going to be running on a platform that is largely exploitable by most English speaking foreign governments and possibly well funded crooks.

What this means is that no matter how good your software is it will be ultimately rendered useless by going after the host platform and memory.

Also anything that uses a public key exchange is only secure because certain reversals of transformation are 'hard'. There is no universality to hard, what is hard for me may not be hard for you.. Globally governments and crooks seek out and employ people who are good at working with hard.

Then there are all the other sources of issue, like suitable entropy, which is not to be scoffed if something is 20% less random than is should be then that is a huge advantage.

However most of the above is a bit unfair though because they will not be in a position to do much about it but it does need to be considered by the users though.

1 year,8 days

Chinese Firm Can Now Produce 500 Cloned Pigs Per Year

dubist 500 pigs all subsceptible to the same diseases (156 comments)

Cool, trust the Chinese Generic diversity makes it harder for disease to take hold.
Cloning removes that barrier.

1 year,10 days

Reuters: RSA Weakened Encryption For $10M From NSA

dubist Who else are they going to work for.. (464 comments)

Predictable, irritating but understandable.
When the crypto genie really got going was when home computers became fast enough to generate useful enough prime numbers in times that did not upset domestic home users.
Once this occurred the volume of encrypted "I want to lover you [sic]" traffic would start to drown out potentially useful-to-know-about encrypted traffic.
I am not surprised,

about a year ago

Some Londoners Cut Off As Failed Copper Thieves Take Fiber

dubist Melbourne train network.. (184 comments)

That happens a lot on the Pakenham line in Melbourne Australia.
Idiots take either wire or fiber..

Either way its delayed trains or busses..

about a year ago

Ask Slashdot: Cryptographers, Crowdfunding, and Cluelessness!

dubist See if you can find some professional help? (6 comments)

Have you tried asking about to see if you can get some professional advice on how to promote it..
Given you guys are developers there is probably a whole lot of soft stuff that is being overlooked that could make a difference.
There are bound to be people at the various hubs and co-working spaces in Melbourne like that one in Richmond opposite the train station..

about a year ago

A tale of Cryptographers and Crowdfunding for dummies.

dubist Given the number of users... (1 comments)

Hi All, I think the biggest issue is that BC has succeeded to the point where it is just part of the ecosystem and its actual significance is not so readily apparent to the average developer. BC is a genuinely independent cryptographic api. again... BC is a genuinely independent cryptographic api.

about a year ago

Silent Circle Moving Away From NIST Cipher Suites After NSA Revelations

dubist Remember who uses NIST crypto transformations (168 comments)

For the record the US government uses the NIST cryptographic transformations as recommended by its own NSA so on a global scale of one to broken they can't be that bad. So for generalist every day encryption they should be fine, if your trying to hide something that might have some sort of national security implications then if your legitimately in possession / generating that kind of information then there will be a different set of protocols and standards to follow. People would shit their pants if the world suddenly turned to using ad-hoc unreviewed transformations because at that point all bets are off, no seriously, all bets are off. Cheers

about a year ago

Snowden Strikes Again: NSA Mapping Social Connections of US Citizens

dubist Go Team.. (513 comments)

It just gets better and better..

about a year ago

Ask Slashdot: Is Postgres On Par With Oracle?

dubist For the most part the Oracle stuff works.. (372 comments)

As much as I hate to admit it.. The Oracle stuff for the most part just works and if you have competent DBA's you don't have to worry about it. You may regret using oracle when you get the bill and sometimes it does not have the more esoteric features of the other DB's but you will be glad for its stability and its enterprise focused features in the long run.. And no one will sack you for choosing Oracle.

about a year and a half ago

'CodeSpells' Video Game Teaches Children Java Programming

dubist Might lift the standard of Android apps. (245 comments)

They could have the spells backfire if they put credentials or access tokens in plain text within the applications.

about 2 years ago


dubist hasn't submitted any stories.


dubist has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?