Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Some Smart Meters Broadcast Readings in the Clear

hashless Add noise to the signal (138 comments)

If it's possible to distinguish when someone is home from when they are not home based on their electricity usage, a countermeasure would be to install a device inside the home that draws electricity according to a pattern that is indistinguishable from the "at home" usage pattern. Then when you'll be away from home for an extended period, turn on this device. With the noise generated by this device, it will always appear that someone is at home based on real-time electricity meter readings. The device would not need to use much electricity to make the difference between "at home" and "not at home" indistinguishable. If the device serves the purpose of charging a large battery in your basement, you could recover most of the device's small electrical draw.

about 2 years ago

Man Digs Out Basement Using Radio Controlled Toy Tractors

hashless Inspiring story (169 comments)

This type of do-it-yourself story is what we like to see on slashdot. Inspiring, nerdy, and a bit over the top.

more than 2 years ago

Symantec Looks Into Claims of Stolen Source Code

hashless Re:Security by Obfuscation (116 comments)

The implication is that exploits will be released based on the source code. When software source code is first released, there are many potential errors to be exploited. If the software were available for various eyes to see from the beginning, most of the exploitable bugs would have been patched long ago. Now, the user base is much larger than for newly released code. Therefore, the potential impact of a hypothetical resulting exploit is greater than if the software's source code had been publicly available from the start.

more than 2 years ago

Symantec Looks Into Claims of Stolen Source Code

hashless Security by Obfuscation (116 comments)

This is yet another reason why reliance on closed-source security software is risky.

more than 2 years ago

Verizon Backtracks On $2 Convenience Fee

hashless Re:Blatant Theft vs Your New Expanded Statement (281 comments)

I expect $3.50 will show up in mysterious voodoo charges now.

And then they can offer a $3.50 discount for switching to auto-pay. It's all a matter of positively marketing the fee increase.

more than 2 years ago

Car Produced With a 3D Printer

hashless Re:Getting a little sick of this... (257 comments)

Furthermore, why are electric cars marketed in terms of "miles per gallon"? "Miles per kilowatt hour" is a more useful measure for a truly electric car. Even for hybrids, "miles per gallon" alone does not provide an accurate measure of energy usage.

more than 3 years ago

Google Doodle (hacked?)

hashless Re:I guess not. (3 comments)

I stand corrected.

about 4 years ago

Google Doodle (hacked?)

hashless HTML5 demonstration (3 comments)

The Google doodle is a demonstration of the HTML5 tag.

about 4 years ago


hashless hasn't submitted any stories.


hashless has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>