Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Firefox 20 Arrives With Per-Window Private Browsing, New Download Manager

increment1 Re:like it's 2008 all over again (181 comments)

It sounds a bit different since Chrome supports one private browsing cookie store, and one general cookie store. If you have two private browsing chrome windows (or tabs) they both use the same private browsing cookie store.

Firefox now sounds like it supports multiple private browsing cookie stores, so you could login to the same site 3 or 4 or however many times with different private windows, whereas with chrome you can only login twice at the same time.

about a year and a half ago
top

TVShack Founder Signs Deal Avoiding Extradition

increment1 Re:Insanity (147 comments)

This is not a popular opinion so I am going to be downvoted for pointing this out, but the second definition of steal (at least according to dictionary.com, so apply what worth you will to that) is:

"2. to appropriate (ideas, credit, words, etc.) without right or acknowledgment."

So, at least according to that definition, steal can be applied to cases of copyright infringement.

Other examples of the word steal being used without anything actually being physically taken from its owner:
"The player on first is about to steal 2nd."
"That actor sure stole the show."

Personally, I find the pedantry over the word steal in regards to copyright infringement to not contribute meaningfully to the discussion in anyway especially considering that the loaded nature of the word is not in regards to whether the owner was deprived of something, but more in regards to the ethical nature of the activity. The word steal in this context conveys illicit behaviour, and so one could argue that it begs the question when you believe that copyright infringement is not actually illicit (or should not be illicit).

about 2 years ago
top

Valve Hands Over Its Own Movie-Making Tools To Gamers

increment1 Re:Valve oh how I love you (68 comments)

The tool is not open source, and it is not entirely free of restrictions either (cannot commercialize created videos if they include any Valve assets). This is not a jab at the tool though, it appears to be a wonderful tool from what is a generally wonderful company.

Although it would be nice if Valve would allow their assets to be used in commercial videos (say you wanted to make a cutscene for an indie game), but it is understandable for them to restrict this. You can still use the tool to make such a scene, it would just have to only use your own assets.

more than 2 years ago
top

New Jersey Mayor and Son Arrested For Nuking Recall Website

increment1 Security? (180 comments)

Checked GoDaddy whois, and the domain was registered using their Domains by Proxy service to hide the registrant. This seems to imply that Domains By Proxy was hacked / socially engineered in order to compromise the account. Worse, it appears that this was accomplished by someone with little to no computer or hacking experience.

The article does not go into detail about how the hack was actually accomplished, other than mentioning it was via a reset email. I am curious what this actually means for the security of domain names registered on GoDaddy using Domains By Proxy. Are they truly that easy to hack?

I tend to register all of my domains using the proxy service simply to avoid spam in my inbox.

about 2 years ago
top

Google Accused of Interfering With South Korean FTC Investigation

increment1 Re:"If this was Microsoft" (186 comments)

Thank you for clarifying that. I did mean the Store / app market (as being an online service from which Apple generates revenue it is the most comparable to the Google search service on Android), unfortunately I just tend to lump the iTunes software and online component into just iTunes.

more than 2 years ago
top

Google Accused of Interfering With South Korean FTC Investigation

increment1 Re:"If this was Microsoft" (186 comments)

Whether Google has a monopoly on web search is irrelevant to the issue raised in the article. The present accusations concern their use of Android to drive search, not vice-versa. For that to be illegal / anti-competitive in the US, they would have to have a monopoly on smart phones (it is illegal to use the influence of a monopoly to drive other products, however, it is not illegal to use other products to push your monopoly).

Obligatory Apple comparison: shouldn't the iphone only working with iTunes be similarly anti-competitive?

more than 2 years ago
top

Site Offers History of Torrent Downloads By IP

increment1 Re:Geez, we're down to scare tactics now, huh (340 comments)

I maintain that your position is naive. While I am no fan of how copyright is used by various entities (MPAA, RIAA, etc) and the specifics of the legal implementation (duration, erosion of fair use, etc), I at least can recognize the value it actually creates.

Take the movie or music industries for example (since you already brought them up). The multi multi million dollar budget movies that are produced are only created because of the environment that exists due to copyright. Without those protections, theatres and stores could legally display or sell these titles without having to pay any money to the content creators. No store that paid any money to the creators could compete since their margins would be worse. The end result is that no large budget (or even small budget) titles would be created.

Now, before you say that free titles could / would be created to replace all of these, look at the facts. People can create free titles now and make them copyright free, but they tend not to. Further than that, the overwhelming titles that are downloaded (movie or music) are the ones produced under the copyright exists model. These titles would simply not exist in a copyright free society, and that is the value that copyright creates.

As for your comments concerning currency, it still is an artificial economic construct (which you do not seem to deny?). So I take it that you are backing away or at the very least refining your initial statement opposed to ALL artificial economic constructs (so you only oppose those which you personally believe to not have value)?

Lastly, concerning patents related to the medical field, I am not going to dig up your previous posts as you direct unless your arguments in favor of such are substantially better than the ones you have made here so far.

more than 2 years ago
top

Site Offers History of Torrent Downloads By IP

increment1 Re:Geez, we're down to scare tactics now, huh (340 comments)

Violating laws made to protect an artificial economic construct isn't shameful in the least, which is why its association has actually made "pirate" a positive term.

Currency is an artificial economic construct, so should we allow counterfeiting as well? What about IP laws that are responsible for medical advances (or do you posit that we would have the same advances without these laws)?

Your position is naive, regardless of how much we all may like to pirate.

more than 2 years ago
top

Apple Addresses Factory Pollution In China

increment1 Re:Really? (190 comments)

The somewhat easy answer (well, not really easy), is for countries such as the US to ban the import of goods made in countries (or even by companies) not up to a specific environmental standard.

Enforcement would be extremely difficult, to impossible, but it would prevent most of the large scale environmental problems (a large factory could not pollute egregiously since they would be noticed and caught). Small scale skirting of the regulations would continue and be mostly impossible to stop (but what you could get away with would likely decrease year after year as the major offenders cleaned up their acts and the non-compliant ones stuck out more and more).

more than 2 years ago
top

Apple Addresses Factory Pollution In China

increment1 Re:Really? (190 comments)

Obligatory car analogy: If you get food poisoning at a restaurant, it's the restaurant who is liable, not the shithead who sold them defrosted prawns as fresh ones. Or should I say directly liable, i.e. to you; should you sue the restaurant, they can probably charge the vendor in turn.

When I first read your "car" analogy, I thought, where the hell is the car? But then I thought, how did you get to the restaurant in the first place? *BAM*, you drove. So there is an implied car. Very sneaky.

I think this is the first example of an implied car analogy. Maybe you should patent that or something.

more than 2 years ago
top

Apache Harmony Moves To Apache Attic

increment1 Re:OpenJDK? (120 comments)

There is a field of use restriction on the TCK tools preventing other certified Java implementations from being used in a mobile environment. Ostensibly this would be done because there is money to be made by charging for mobile implementations.

more than 2 years ago
top

Apache Harmony Moves To Apache Attic

increment1 Re:OpenJDK? (120 comments)

To add to the above, I believe the specific disagreements were in regards to licensing clauses of the TCK preventing the use of certified Java implementations in a mobile environment.

The particular licensing restrictions were not in compliance with the Java Community Process rules, but that unfortunately has not resulted in the license being changed. The entire fight seems to be directed specifically at Google, and Harmony is a casualty of the battle Oracle is waging (possibly at the behest of Steve Jobs who was a purported close friend of Larry Ellison).

more than 2 years ago
top

Is Perl Better Than a Randomly Generated Programming Language?

increment1 Re:Next question (538 comments)

The study cited has several biases in favor of the scripted languages that are acknowledge by the author in the references of your supplied link.

Primarily:
- The non-scripted languages (C, C++, Java) were tested under formal conditions in 1997 / 1998 (Java 1.1 I assume), the script programmers wrote their programs at home and self reported their times (and in most cases spent several days thinking about the problem before starting work, time which was not included).
- The script programmers were told that the programmer effort and elegance of their solution was a criterion, the non-script programmers were only told that the program would be judged based on its correctness (accuracy).
- The script programmers had immediate access to a hint (to resolve a misread requirement) which was only available to non-script programmers after they failed an acceptance test.
- The non-script group would have a cost deducted from them each time their program failed an acceptance test, whereas the script group had access to the final acceptance test data.

Overall, the comparison between the languages does not seem fair, or at least not the comparisons of the scripted and non-scripted languages.

more than 2 years ago
top

CERN Experiment Indicates Faster-Than-Light Neutrinos

increment1 Re:Einstein replied "Check your measurements, son" (1088 comments)

Exactly.

This seems more likely evidence for a revision of the value of c or perhaps a measurement of plate tectonic drift.

  60 billionths of a second is far more precise than we can measure distance on the surface of the earth.
Gran Sasso is half way down the Italian boot. Is this area so immune to earthquakes or surface deformation
that they can know the distance that precisely?

We don't measure distance in seconds. But if we do measure the distance travelled at the speed of light in 60 billionths of a second, then we end up with something like 18 meters.

I am reasonably sure that we can measure distances on the earth more precisely than 18m.

The speed of light has been measured many times, and this experiment is not going to change the value of c (this experiment is not measuring c more accurately in as much as it is coming up with a different value for it). If c was different than we think it is, then GPS would not currently work.

So it would seem there is either a new discovery, or a systematic error with their measurements (which could indeed be the distance, or their clocks, or the length of a wire, or who knows).

more than 3 years ago
top

EFF System To Warn of Certificate Breaches

increment1 Re:We'll see (35 comments)

Sounds really good on paper (or, for the literal ones here, on webpage), but we'll see how it works in practice.

I think in practice that the people perpetuating the man in the middle attacks will now just have to man in the middle two connections, instead of just one.

Unless the EFF has some magic special way of getting this data reported to them that isn't also susceptible to MITM attacks.

more than 3 years ago
top

Samsung May Try To Block Next iPhone In Europe Too

increment1 Re:Isn't it great to see (271 comments)

excepting a certain anti-Applie contingent that will always hate and root against Apple even if they're giving away food to starving people in third world countries.

Which is probably balanced by the pro-Apple contingent who will always root for Apple even if they are bbq'ing and eating the starving people in third world countries.

more than 3 years ago
top

Samsung May Try To Block Next iPhone In Europe Too

increment1 Re:The cliche practically coined for this occasion (271 comments)

In theory, in a mature, competitive industry, there should be very very small profit margins. Innovation and barriers to entry, however, can protect profit margins; as can marketing and mind share.

Apple made the first really successful multimedia smart phone, and has been reaping huge profits due to their innovation in this field (even if you think "innovation" here only means bringing everything together in a shiny package). Unfortunately for Apple, the competition is catching up (or has caught up and surpassed, depending on who you ask). This means it will be much more difficult for Apple to maintain their profit margins.

The patent lawsuits by Apple against Samsung are an attempt to maintain a barrier to entry since Samsung's products have caught up functionally with Apple's. How would it look for Apple if the iPhone5 is behind (or merely on par) to the Galaxy SII? They may be able to get away with their margins for one more iteration, but their mind share will start to falter as soon as their products are not unambiguously superior (which they have mostly been in the smart phone market up until now).

In fairness to Apple, from their perspective, they have been buying parts from Samsung who then goes ahead and makes a very similar phone on the side. It is hard to compete with your supplier, and raises trust issues since they know what you are ordering etc. Fortunately, Samsung has enough money to defend themselves from these lawsuits, and clearly the desire to launch a large scale counter offensive.

And no, I am not an Apple fanboi, my phone is actually an SII (which is a great phone, imho).

more than 3 years ago
top

Hackers Break Browser SSL/TLS Encryption

increment1 Re:Javascript (110 comments)

Unless I'm very mistaken, SSL doesn't work like that. SSL is designed to prevent man-in-the-middle attacks. The session key for the encryption has to be signed using Google's public key - which the attacker can't do.

The SSL session is signed, but according to this new attack, if an attacker can inject known plaintext and see the sniffed encrypted text of the same, then they can somehow manage to decrypt some portion (or all) further communication. So it is not breaking the establishment of the SSL connection (as a normal MITM attack would), it is directly decrypting the encrypted communication (the confidentiality component of SSL).

more than 3 years ago
top

Hackers Break Browser SSL/TLS Encryption

increment1 Re:Javascript (110 comments)

I think the idea is to inject the Javascript before the connection goes SSL. So maybe something like:

1. You go visit www.gmail.com
2. They intercept and return an http version of the page to you with the javascript injected
3. The Javascript opens up an https connection with gmail.com, establishing the IV over a persistent connection.
4. The Javascript redirects to the https page, so you don't notice the lack of https.
5. You log in to the https page as normal, using the browsers already established https connection which they can apparently decrypt.

If not for step 4, this attack would be little different than just intercepting and returning a non-https page and hoping that you didn't notice the difference. Depending on how long your browser keeps a persistent https connection open, I wonder if it is possible to have the javascript on an independent page, making the https requests to the target site to establish the connection before you even go to the target site.

more than 3 years ago
top

Atlas Takes Heat For Melting Glacier Claim

increment1 Re:Global warming has become hopelessly politicize (429 comments)

The graph comes from NASA, if you look at the source cited on the Wikipedia page. You can also see it on NASA's site if you click the link from Wikipedia.

So there is nothing wrong with using that as a source in this context.

more than 3 years ago

Submissions

increment1 hasn't submitted any stories.

Journals

increment1 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?