×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Google Ups Bug Bounty To $20,000

lostchicken Re:A failure of conventional hack-ism ? (53 comments)

I'd love to see a more vibrant market for this. The cost paid per bug (perhaps normalized by product revenue) would be a really useful measure of software reliability.

about 2 years ago
top

Ask Slashdot: What's the Best Way To Deal With Roving TSA Teams?

lostchicken Re:Here's what you say (1059 comments)

This is not correct. An officer may briefly detain a suspect if he has reasonable suspicion of criminal activity, even if he does not have grounds to arrest the individual. (Terry v. Ohio: http://en.wikipedia.org/wiki/Terry_stop)

more than 2 years ago
top

Whither the Portable Optical Drive?

lostchicken Re:Photos (440 comments)

Okay, so buy two. Still cheaper and smaller.

more than 2 years ago
top

Details About Raspberry Pi Foundation's $25 PC

lostchicken Re:what textbook ? (349 comments)

The authors get practically nothing from textbook sales, depressingly. Almost all of the money goes to the publisher.

more than 2 years ago
top

Jailbroken Devices Compromised By Charging Stations

lostchicken Re:Duh (93 comments)

Really, you'd just need to put enough series inductance on the D- and D+ lines to foul up any data transfer. That way systems like the iPhone's charge sensing resistor trick would still work.

more than 2 years ago
top

Computer De-Evolution: Awesome Features We've Lost

lostchicken Re:I would say: Self-modifying code (662 comments)

Self-modifying code, like the JVM is using all the time on my local machine, as we speak? Sure, I have to do memory protection carefully, and a whole page at a time, but self-modifying code is most certainly not dead.

more than 2 years ago
top

AppleCrate II: Apple II-Based Parallel Computer

lostchicken Re:Cool but... (126 comments)

If you really wanted cheap and simple, a network of AVRs would be approximately what he has here. Meanwhile, I can use the Apple IIe boards to restore more Apple IIe's...

more than 2 years ago
top

AppleCrate II: Apple II-Based Parallel Computer

lostchicken Re:Supercomputer? (126 comments)

Of course, nowadays the generic PC is a cluster computer. How many single-core machines do you see these days? Factor in the GPU, and you pretty much are hacking on a mid-80s vector computer.

more than 2 years ago
top

Self-Wiping Hard Drives From Toshiba

lostchicken Re:Law enforcement... (268 comments)

There are very strict rules of evidence that require you to PROVE that you didn't tamper with data. Mounting a disk read/write certainly violates those rules. Attaching the disk to a computer that CAN mount the disk read/write (as opposed to using a hardware write blocker) probably violates them.

about 3 years ago
top

Cisco Ditches Flip and $590 Million

lostchicken Re:Can I be the first to say... (121 comments)

The brilliance of this is that even if the Flip itself flops, Cisco still wins in the long run. As long as the Flip and the insane marketing hype surrounding it increased the popularity of HD video sharing on the web, people are going to need more routers in the network itself. I wonder who the ISPs and YouTubes of the world will be going to then...

Cisco never needed to sell the Flip as a physical product, they just needed to sell the idea of shooting LOTS of video and sharing it across the web. It seems like they've succeeded.

about 3 years ago
top

Good Open Source, Multi-Platform, Secure IM Client?

lostchicken Re:Pidgin with OTR (308 comments)

OTR doesn't actually use the keys it stores for the encrypted message. When you start a new conversation, both sides generate a new set of session keys randomly. The stored key is then used to sign the session keys so that the other party can trust that the session key is valid, and from you.

If you lose your keys, an attacker can pretend to be you until you update the public keys that your friends will be looking for, but previous messages aren't compromised. In that way, it's a fair bit safer than PGP.

more than 5 years ago

Submissions

lostchicken hasn't submitted any stories.

Journals

lostchicken has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...