Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Winners of First Seized Silk Road Bitcoin Auction Remain Anonymous

ezdiy Re:One stupid question (88 comments)

Coinbase is more like OTC currency exchanger. Retail broker. Indeed moneychangers also often source coins on actual exchanges as their volumes are often skewed only in one direction (very few sell on coinbase).

But your typical bitcoin exchange is a tad bit of different beast - notably, it is not Forex OTC at all, but more like capital markets. In fact very few forex parallels can be drawn. All they care about is volume. Federated digital currency forex networks do exist though - Ripple - but it has it's share of problems and is nowhere near as popular.

about 3 months ago

Cable Companies Duped Community Groups Into Fighting Net Neutrality

ezdiy Re:I really have no choice... (170 comments)

There is no 'free' market, and there never has been.

Luckily life is not that black and white as portrayed, there are often a lot of shades of grey.

Telco situation in the US is failed regulation, as is telco in Korea successful regulation. Both are cases of state monopolies, but it depends who is in power to influence government. Go blame failed US democracy, not free markets.

Free markets for last-mile work more or less in densely populated places. Some european countries and russia have as much as 30% of heavily competing WISP penetration.

about 3 months ago

After the Belfast Project Fiasco, Time For Another Look At Time Capsule Crypto?

ezdiy Possible with PoW blockchain (170 comments)

Taken from gmaxwell's altcoin wishlist: POW which turns the distributed computation into ticking for timelock encryption

  • An infinite sequence of nothing-up-my-sleeve numbers are taken as an infinte sequence of ECC public keys. Searching the pow involves finding distinguished points along a Pollard's rho DLP solution trying to crack the key. When the key is cracked the problem is advanced to the next key.
  • People can then encrypt messages with all of the keys between now and sometime in the future and network will crack them, achieving a timelock.
  • Probably incompatible with merged mining and other POW schemes.
  • Making the difficulty adaptive either makes far in the future messages impossible (because the problem size wouldn't be known long in advance), or requires increasingly big headers as the difficulty would require working on multiple problems concurrently.
  • The obvious constructions using ECDLP as the asymmetric problem are not progress free.

about 3 months ago

Ask Slashdot: In What Other Occupations Are IT Skills and Background Useful?

ezdiy Re: Pen testing and auditing (158 comments)

You may be mistaken. Information assurance is fundamentally a management discipline that requires some technical knowledge

Fitting managerial roles in same field rarely counts as escaping field of expertise - while encountering dilbert-esque opportunist drones is fairly common, good managers have to divide their time equally between the technical world and the beancounters above - they have to be good at both. Hiearchy within same department shall not be confused with different department.

Incidentally, infosec folks often tend to put their skill to good use in other fields once they get burned out by silly corporate theatrics. Private investigators, LEA contractors and even army are suitable for this peculiar way of critical thinking.

about 4 months ago

Ask Slashdot: In What Other Occupations Are IT Skills and Background Useful?

ezdiy Re: Pen testing and auditing (158 comments)

I'm curious exactly how narrow field such as infosec, like pen testing and software audits is not IT. How is that different from say, webdesign?

Sure, there are the usual drones who just preach the common sense policies and oversee that things are by the book (FIPS/ISO). Social engineering is the most common vector after all, but even they need some fairly deep comprehesion of what goes on. Calling it field separate from IT sounds unrealistic, at least for now - the market is too new, basically kindergarten. When there will be actual companies providing insurance plans covering data leaks, hacking would deserve to be called relevant branch of security.

about 4 months ago

Mathematician: Is Our Universe a Simulation?

ezdiy Re:Silly language games. (745 comments)

TLDR: Quantum Turing Machine > Turing Machine. Our parent universe might be just another QC, but also something of even "higher state of being".

Blenders are not turing-complete ("computer") in our universe, but might as well be in the parent one - thus, we should not be discriminating against blenders.

Quantum Turing Machine can simulate both universes, TM or QTM efficiently. However running a QTM machine inside TM simulated universe is awfully impractical, as much are our current Quantum Computer simulators running on present day TM hardware.

This can be taken quite far from here. If we are just segment in chain of universes, each subsequent universe is inferior to previous one "for technical reasons". For example, our universes upper bound might be that of time, because creating simulation without flow of time might have been simply technically impractical for our Gods - their universe might have limits of its own to merit that.

about 7 months ago

Reason To Hope Carriers Won't Win the War On Netflix

ezdiy Actually, this is how peering agreements work (213 comments)

"Throttling" between autonomous systems is common.

Think of it as series of tubes, and between some places, the tubes are thinner. Usually wherever AS POP meet and the exchange arrangement is not settlement-free, but capped to some numbers in (either) direction. Or the port is simply running red-hot.

When two big ISPs refuse to reach a compromise on peering terms, it's usually the users who suffer. Think of the Sprint vs. cogent drama.

Commercial internet worked like that since uh ... always. ISP peering is market driven - that is, there is clearly "demand" for data from AWS, but Verizon is a monopoly which can afford to extort AWS to cough up money, and Amazon/whomever are reluctant to cave in.

Net neutrality term is a bit of oxymoron in the light of this, as there was never one to begin with. The problem is simply lack of last-mile competition in the US, as those operators are not pressed by competition to provide quality bandwidth to end users from relevant places as needed.

Refusing to peer with competing service, and offering local service of their own is entirely legit as well. As long the consumer is given choice of different ISP to flee to....

about 7 months ago

Getting Young Women Interested In Open Source

ezdiy Re:Not a question of preference (545 comments)

The sexism IRL is indeed there and hard to deal with.

Online, things are vastly different though. When women take the shortcut online ("look look, i have boobs and know ruby"), it's entirely their fault for watering down her credibility with that in front of predominantly male audience - men are inherently sexist creatures. If a woman wants to avoid that and be judged on actual merit without the "boob bias", how hard is to simply play it cool?

about 8 months ago

Getting Young Women Interested In Open Source

ezdiy Re:from a woman dev (yeah I'm posting anon) (545 comments)

Tech fields are meritocracy at its best, yet most "nerdy" women underestimate the concept, take a shortcut: "look, look, I've got boobs.". And are like "hurr durr, sexism." in turn. If you want credit, simply omit the fact you're a female for a while, and try to garner it on merit alone. The after-shock "A 'mere' girl did $THING?" effect is priceless and will earn you an actual respect/street cred.

C&H explains it well

PROTIP to deal with sexism IRL: Start a rumour you used to be a man until recently. Tranny homophobia can be actually pretty useful.

about 8 months ago

Red Team, Blue Team: the Only Woman On the Team

ezdiy Women are predestined to beat males eventually (247 comments)

Especially when it comes to hacking. Just a conjencture.

Obligatory western gender-equality cliches aside, the scene imploded the second things got commercialized by mid 2000s. From that point onwards, male hackers seem to suck horribly at team work. Trust issues. This leads to a lot of inefficiency and wheel-reinvention (to the point where independent 0day re-discovery is fairly common occurrence, if you wish, academic/famwhoring publishing seems to be lagging behind severely).

Women may be generally not as good equipped with spatial/critical thinking you need to posses in this field, but are much better in the social/information management/opsec aspect. One can expect that ultimately, sheer power of team work and more humble approach might vanquish male arrogance/ego (which is a good driving force, but isolates you a great deal).

about 8 months ago

If UNIX Were a Religion

ezdiy Re:Arch Linux (392 comments)

Noah's ark.

about 9 months ago

Free Software Foundation Endorses a "Truly Free" Laptop

ezdiy Re:Umm, okay, but... (340 comments)

Have you ever actually tried building this 18GB SVN tree?

It's certainly possible after you're forced to be deeply familiar with how it works (and write few custom scripts/makefiles), but obfuscating the process on purpose to prevent forks shows no good faith. This is borderline hostility towards GPL even if they try to be technically compliant. OEM firmware vendors are "compliant" by posting half-assed .rar of some outdated dev tree, dare to ask me to sign NDA (seriously broadcom? what the fuck with those kernel patches) and calling it a day.

I was just trying to add my language translation of the webui and ended up soldering serial to debrick my device few times.

OpenWRT is what GPL should look like, free, super easy to mod and test out changes, bloated and not very user friendly.

Sad truth is DD-WRT offers best stock features (luci is certainly lacking in some areas), especially on 4M flash devices.

PS: Eventually ended up compiling custom /etc/web and /usr/bin/httpd and fmk'ing existing binary image. Both files are interlocked to "prevent rebranding on ebay" causing major pita. </soapbox>

about 9 months ago

'Approximate Computing' Saves Energy

ezdiy Re:Analog (154 comments)

They live strong, reincarnated in MLC NAND flash cells exactly because flash was first thing to reach litography cost limits. It's not actually true analog, but close enough to keep precision.

about 9 months ago

'Approximate Computing' Saves Energy

ezdiy Overclocked GPUs, ASIC, analog? (154 comments)

SHA256 double hash applications were probably first who used this on massive scale. It's actually ok to ramp clock/voltage up 50%, get 30% more rate at cost of 5% of wrong answers (and halving MTBF). ASIC miner chip giving wrong answers now and then because of imperfect mask process (even before OC) is common too.

However numbers for standard-cell ASIC design don't seem much favourable, certainly not "doubling", much less energy saving (on the contrary, at ballpark 10-30% of OC you reach point of diminishing returns, and only if you dont care much about MTBF).

Now what would be interesting is actual "analog" computers, ie number of states anywhere between 4-inf - there is literally too much of wasted "potential" nowadays. NAND flash chips do it already because they are about to hit limits of cost-effective litography (10nm?).

about 9 months ago

Killing Cancer By Retraining the Patient's Immune System

ezdiy Obligatory (175 comments)


about 9 months ago

Ask Slashdot: Best Open Source Project For a Router/Wi-Fi Access Point?

ezdiy Re:OpenWRT on good commodity home ap (193 comments)

Anything you can't do in GUI.
Agreed, both DD-WRT and OpenWRT GUI can pretty much do the same thing, and I did recommend DD-WRT to amateur users in the past as it appeared to be somewhat more consumer focused.

Like custom samba settings. Or just want to use stuff which is up to date, not 3 years old binaries. Or openvpn server with authentication against remote ldap database. Geeky stuff. Scary, scary command line :)

Optware stuff falls a bit short in that regard, mainly because I want the router functioning without unreliable external storage and it is basically just a hack - making custom DD-WRT is messy (FMK? really?). Openwrt supports baking images nicely from day 1 using buildroot.

about a year ago

Over 100 Missing Episodes of Doctor Who Located

ezdiy Re:Interesting. (158 comments)

When you are forever alone, everything is possible! Ganbatte!

about a year ago

Ask Slashdot: Best Open Source Project For a Router/Wi-Fi Access Point?

ezdiy Re:Consider a Microtik Router? (193 comments)

I love MikroTik as much as nearly any other eastern european do - the gui/cli is just plain awesome and dumb proof - even people unfamiliar with networking are able to pick it up quickly, compared to the "horrors" of linux routers or cisco-cli.

Sadly, your point is somewhat moot - AR9132 chipset of RB2011UAS is just home ap SoC and that is it. Routing performance is generally god-awful to make any use of BGP or OSPF. People generally just buy high-end RBs or run routeros on PC to do any kind of ISP networking.

RouterOS comfort comes at a price too - it is just linux kernel inside, but 3 years outdated, undebuggable corner cases etc etc. It works ok most of the time, but only very brave people are running eBGP on RouterOS or any core backbone for that matter. Wiping low-end routerboard and installing openwrt there won't help much either - people do that all the time with the very same SoC chipset, from tplink, edimax etc plastic boxes which come 30% cheaper and are the same utter crap reliability-wise (usually PSUs).

about a year ago


ezdiy hasn't submitted any stories.


ezdiy has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>