Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Some Smart Meters Broadcast Readings in the Clear

hashless Add noise to the signal (138 comments)

If it's possible to distinguish when someone is home from when they are not home based on their electricity usage, a countermeasure would be to install a device inside the home that draws electricity according to a pattern that is indistinguishable from the "at home" usage pattern. Then when you'll be away from home for an extended period, turn on this device. With the noise generated by this device, it will always appear that someone is at home based on real-time electricity meter readings. The device would not need to use much electricity to make the difference between "at home" and "not at home" indistinguishable. If the device serves the purpose of charging a large battery in your basement, you could recover most of the device's small electrical draw.

about 2 years ago
top

Man Digs Out Basement Using Radio Controlled Toy Tractors

hashless Inspiring story (169 comments)

This type of do-it-yourself story is what we like to see on slashdot. Inspiring, nerdy, and a bit over the top.

more than 2 years ago
top

Symantec Looks Into Claims of Stolen Source Code

hashless Re:Security by Obfuscation (116 comments)

The implication is that exploits will be released based on the source code. When software source code is first released, there are many potential errors to be exploited. If the software were available for various eyes to see from the beginning, most of the exploitable bugs would have been patched long ago. Now, the user base is much larger than for newly released code. Therefore, the potential impact of a hypothetical resulting exploit is greater than if the software's source code had been publicly available from the start.

more than 2 years ago
top

Symantec Looks Into Claims of Stolen Source Code

hashless Security by Obfuscation (116 comments)

This is yet another reason why reliance on closed-source security software is risky.

more than 2 years ago
top

Verizon Backtracks On $2 Convenience Fee

hashless Re:Blatant Theft vs Your New Expanded Statement (281 comments)

I expect $3.50 will show up in mysterious voodoo charges now.

And then they can offer a $3.50 discount for switching to auto-pay. It's all a matter of positively marketing the fee increase.

more than 2 years ago
top

Car Produced With a 3D Printer

hashless Re:Getting a little sick of this... (257 comments)

Furthermore, why are electric cars marketed in terms of "miles per gallon"? "Miles per kilowatt hour" is a more useful measure for a truly electric car. Even for hybrids, "miles per gallon" alone does not provide an accurate measure of energy usage.

about 4 years ago
top

Google Doodle (hacked?)

hashless Re:I guess not. (3 comments)

I stand corrected.

more than 4 years ago
top

Google Doodle (hacked?)

hashless HTML5 demonstration (3 comments)

The Google doodle is a demonstration of the HTML5 tag.

more than 4 years ago

Submissions

hashless hasn't submitted any stories.

Journals

hashless has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?