×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Omand Warns of "Ethically Worse" Spying If Unbreakable Encryption Is Allowed

flonker "Likely to end up in an ethically worse position" (390 comments)

I see the "close access work" as a bit of a red herring, and the "ethically worse position" is the real story. Mass surveillance is just too nice to give up. So, I predict that we will be seeing government malware that infects large numbers of computers in order to attempt to maintain the status quo.

3 days ago
top

Doxing Victim Zoe Quinn Launches Online "Anti-harassment Task Force"

flonker Re:Slashdot stance on #gamergate (687 comments)

So, are you saying that Wikipedia is wrong, or just saying that because it doesn't agree with you, that you want to dismiss it?

I'm saying that it's a controversial subject, and as such, anything on Wikipedia should be taken with a grain of salt.

I was not stating my opinion, because I hadn't seen enough of both sides to develop one yet. One side seems normal mixed with a few crazies, and the other seems all crazy. I was looking for the normals on the other side in order to see what their argument was, but have yet to find them. From what I've read here, I think I'm finally starting to understand that they are, in fact, all crazy, and that they have no real disagreement other than that they find the very existence of the first group repugnant for no readily apparent reason, and that they're projecting their thoughts onto the first group.

I apologize for attempting to define "SJW". I thought you legitimately didn't know how the term was being used, and like I said, I now understand your side of this disagreement.

about a week ago
top

Doxing Victim Zoe Quinn Launches Online "Anti-harassment Task Force"

flonker Re:Slashdot stance on #gamergate (687 comments)

FYI, Wikipedia generally isn't the best reference for controversial subjects.

I see the term SJW being used as a pejorative against a group which includes some but not all feminists. In particular, third-wave feminism seems closely intertwined with the social justice movement.

about a week ago
top

Small Restaurant Out-Maneuvers Yelp In Reviews War

flonker Re:The review ecosystem is good and truly broken.. (249 comments)

It would need to be a full on classification system, similar to how Netflix does ratings. That is, it would have to put both the reviewer and the review reader into groups, and weigh the rating based on the reviewer's similarity to the reader.

"People with similar ratings to yours gave this restaurant 2 stars, while the general public gave it 4 stars."

The problem with this is that you would need a whole lot more ratings in order to get any kind of reliability.

about 4 months ago
top

Adobe's New Ebook DRM Will Leave Existing Users Out In the Cold Come July

flonker Re:I think they have to. (304 comments)

First 6 are non-secret, last 4 are non-secret. And one additional digit is a checksum, therefore non-secret. So, a credit card has 5 digits of secrecy.

about a year ago
top

Adobe's New Ebook DRM Will Leave Existing Users Out In the Cold Come July

flonker Re:Netflix has light DRM? (304 comments)

I don't know about anybody else, but the reason I don't find Netflix DRM unpalatable is because I didn't purchase the content. The "rental" is very explicit in the agreement between the Netflix and the consumer. If Netflix were to start to sell movies, I would find that objectionable. I do find Steam objectionable, as well as most DRM.

about a year ago
top

Spoiled Onions: Exposing Malicious Tor Exit Relays

flonker Re:If all it takes is one... (65 comments)

Also, you are then susceptible to the very same MITM attacks by the VPN provider. (Although they do have an incentive to remain honest.)

1 year,3 days
top

Spoiled Onions: Exposing Malicious Tor Exit Relays

flonker Re:If all it takes is one... (65 comments)

The primary development goal of Tor is to prevent the request from being traced back to the requester. (As a secondary effect, it also bypasses various national/regional content blocking schemes.) Malicious exit relays are detrimental, but in theory the user should be aware of the trust issues involved. I would label this as a user education issue.

The major points being:

  • If your traffic is on the Internet, unless it is encrypted (such as by SSL), it can be passively monitored with only moderate effort.
  • If you are using Tor to reach the Internet, your traffic can't be traced back to you, but it still goes out over the Internet; see the previous point for more details. Tor can do nothing once the traffic is back on the Internet.
  • Attacks such as sslstrip exist. Be on guard against them.

1 year,3 days
top

Windows 8 and Windows 8.1 Pass 10% Market Share, Windows XP Falls Below 30%

flonker Re:Glass have water (470 comments)

But hey, at least Win8 beat Congress!

1 year,26 days
top

NASA's LLCD Tests Confirm Laser Communication Capabilities In Space

flonker Re:SETI (107 comments)

A great example of this that I've seen is: Shine a spotlight at the moon (from Earth) and sweep it across the surface. You can move the spot faster than the speed of light, thus the wave moves faster than c, but no individual photon moves faster than c, and no information is conveyed faster than c.

about a year ago
top

DHS Turns To Unpaid Interns For Nation's Cyber Security

flonker Re:FP (174 comments)

The U.S. Department of Labor's Wage and Hour Division allows an employer not to pay a trainee if all of the following are true:

  • The training, even though it includes actual operation of the facilities of the employer, is similar to what would be given in a vocational school or academic educational instruction;
  • The training is for the benefit of the trainees;
  • The trainees do not displace regular employees, but work under their close observation;
  • The employer that provides the training derives no immediate advantage from the activities of the trainees, and on occasion the employer’s operations may actually be impeded;
  • The trainees are not necessarily entitled to a job at the conclusion of the training period; and
  • The employer and the trainees understand that the trainees are not entitled to wages for the time spent in training.

http://en.wikipedia.org/wiki/Internship#United_States

about a year ago
top

Ask Slashdot: How Would You Secure Your Parents' PC?

flonker Re:"frozen" configurations (408 comments)

I'll second this. Another similar option is Sandboxie. It sandboxes the browser, preventing any exploits from escaping into the rest of the system. Also, make sure they are using Chrome or Firefox. And finally, ad-blocking software makes a huge difference.

about a year ago
top

Ubisoft Hacked, Account Data Compromised

flonker Re:The point? (138 comments)

The point is to minimize the amount of information you actually have. You don't need to know the password itself, you only need to know that they know the password. So, you store just enough information to be able to check that the person attempting to log in knows the password.

about a year and a half ago
top

SXSW: Nate Silver Discusses Data Bias, the Strangeness of Fame

flonker Re:silver is honest (136 comments)

Very interesting and insightful troll. I was tempted to mod you up, but I figured a reply would be preferred.

Originally I disagreed with your post, but upon attempting to reply, I found that I agree that "both sides are equally bad/dishonest/wrong" is a cop-out, but I disagree that it's embarrassing. It's only embarrassing if you aren't doing anything to back up your belief, and voting is a good start, but it isn't enough.

about 2 years ago
top

On the end of USPS 1st Class Saturday delivery:

flonker Re:Why not cut even more? (564 comments)

Ever since this first started being discussed, I've been thinking M/W/F and T/Th/Sa makes a lot of sense. (a different route for each.) You could toss in 5 or 6 day delivery for commercial addresses.

about 2 years ago
top

Semi-Automatic Hacking of Masked ROM Code From Microscopic Images

flonker Re:As said this is not really new... (42 comments)

As I've learned, the correct answer is, "Sure, but it'll cost them $n megabucks, and it will take x amount of time." (I'm sure rimcrazy also figured this out since then.)

about 2 years ago
top

Aaron Swartz Case: Deja Vu All Over Again For MIT

flonker Re:Outward Appearances (175 comments)

Thank you, that answers my question perfectly. An immoral act is immoral in and of itself. Someone's suicide does not affect the morality of the original act.

about 2 years ago
top

Aaron Swartz Case: Deja Vu All Over Again For MIT

flonker Re:Outward Appearances (175 comments)

To the dispassionate and disinterested outside observer, a mentally disturbed man committed suicide. The only one at fault is the mentally disturbed man.

I've long believed that suicide is nobody's fault except for the one who committed the act. However, I very much want to blame the DA for pushing him to commit suicide. I realize it's an emotional response, but there must be some basis in fact. At what point does provoking someone who then commits suicide become the moral and ethical responsibility of the provocateur?

I know I'm responding to a troll, but it hits upon an issue I've been thinking about for some time. It's well known how DAs threaten disproportionate punishments in order to get a plea bargain. And it's easy to see how this might get someone who was previously not seriously considering suicide to start doing so. Where should the line be drawn? Online/offline bullying? Threats of imprisonment? Threats of physical violence and/or torture? Or is it never someone else's fault?

about 2 years ago
top

Hacker Bypasses Windows 7/8 Address Space Layout Randomization

flonker Re:Address randomization - security through obscur (208 comments)

security through obscurity

I do not think that means what you think it means.

"Security through obscurity" is being deliberately insecure and relying on other people not knowing about the insecurity as your defense.

Something like this relies on the fact that choosing a random address is much easier than guessing a random address that was previously chosen. This flaw results in forcing the victim to choose a non-random address when they intend to choose a random one. And "address spraying" works by increasing the size of the target the attacker must hit from a single exact address to a large number of ranges which covers most of the available addresses.

about 2 years ago

Submissions

top

What tech companies still make good products?

flonker flonker writes  |  more than 3 years ago

flonker (526111) writes "Members of my family individually bought 3 HP laptops last year. Both the battery and the power supply failed in all three of them very shortly after the warranties expired. HP used to be a great tech company, but I guess things change. My question for Ask Slashdot is: What tech companies still produce good products in 2011?"

Journals

flonker has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?