Ask Slashdot: Preparing For Windows XP EOL?
So what is the best way to secure this remaining Windows XP systems?
If you can't keep the box permanently offline, then the best way to secure Windows XP after the EOL date is to uninstall it. By believing otherwise you are only fooling yourself.
ICANN Considers Using '127.0.53.53' To Tackle DNS Namespace Collisions
All the people who warned them that they will cause permanent micro- and macro- disasters all over the world have been ignored. Due to greed. Let them be proud of their achievement.
WhatsApp: 2nd Biggest Tech Acquisition of All Time
Are you sure it's really a honest acquisition and not a lame attempt to use a portion of your huge pile of money just to monopolize a market you're afraid of slowly losing?
Porn Will Be Bitcoin's Killer App
I fail to see how Bitcoin is private and confidential. All the transactions are public (inherently by design). And if you buy bitcoins somewhere with your CC or paypal or bank, it is possible to link the bitcoins to your name.
If you buy them with cash, you could as well buy one of those cash coupons that porn sites might accept too. Then, you gain TRUE anonymity and, as a bonus, you and the seller avoid the massive volatility of the currency (100x decrease/increase in value over a day).
Who Is Liable When a Self-Driving Car Crashes?
Maybe in the US where you can settle even criminal offenses out of court if you have the cash.
But in the EU, if you kill someone with a car, you HAVE TO be sued by the government because criminal offenses cannot be settled out of court here.
EU Committee Issues Report On NSA Surveillance; Snowden To Testify
RTFA: The former US National Security Agency worker would testify by interactive video link from Russia, where he has been granted temporary asylum.
Heh. Would be funny if the packets were routed via the US and patriotically "deep-inspected" by the NSA.
Facebook Tracks the Status Updates and Messages You Don't Write Too
Using facebook in any way + caring about your privacy
= mutually exclusive.
IETF To Change TLS Implementation In Applications
Just, please, this time, try to be more careful about who joins your working groups. And especially what their true intentions are.
Sometimes when someone tries to "simplify deployment" or "offers insight to prevent user confusion", etc., you may want to think twice. History repeats itself, you know.
Chrome Will End XP Support in 2015; Firefox Has No Plans To Stop
Only an idiot would run a browser on an OS with unpatched vulnerabilities. Windows XP will not get any security issues fixed after April 2014. If you ignore those simple facts, you deserve becoming a part of a botnet, sending your passwords and credit card numbers to the botmaster.
Ask Slashdot: Can Bruce Schneier Be Trusted?
EU Court Holds News Website Liable For Readers' Comments
A very interesting piece of info is at the bottom of TFA:
since readers were allowed to make comments without registering their names, the identity of the authors would have been extremely difficult to establish. Making Delfi legally responsible for the comments was therefore practical, said the court. It was also reasonable, because the news portal received commercial benefit from comments being made.
RMS On Why Free Software Is More Important Now Than Ever Before
I don't see how that is immune to the chicken-and-egg problem. In other words, unless you write your own C compiler in raw CPU instructions (machine code), you cannot trust ANY compiler binaries.
Did NIST Cripple SHA-3?
The guy calls himself cryptographer, but he doesn't know what he's talking about.
Hashes, and also any ideal random oracles, have only (n/2) security due to so called birthday paradox limit.
That's why SHA-512 has only 256-bit security. This is not weakening of the hash in any form. It is a property of any hash or RNG.
What the slides show is that they want to reduce clutter in reducing dozen options into two options. One high-security (256-bit security) and another fast, medium-security.
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack
Your personal *dream* favorites. You wouldn't survive there more than a few weeks, bud. Because, as you said, "you will not be of interest" there (for instance, when you break a bone and need help, or food, or protection from bandits...)
Ask Slashdot: Can We Still Trust FIPS?
If you have anything above Top Secret to hide, good luck to you, you'll need it (either this, or maybe you're a little delusional).
Lockbox Aims To NSA-Proof the Cloud
Until they are served with a secret order telling them (i) to install key escrow backdoor and/or (ii) until NSA starts implanting torjans onto the suspects' computers (like FBI did with some of the Tor users recently, exploiting an unpatched vulnerability in the TorBrowser - http://yro.slashdot.org/story/13/08/04/2054208/half-of-tor-sites-compromised-including-tormail ).
Canadian Hotel Sues Guest For $95K Over Bad Review, Bed Bugs
Would you be so kind as to post a website or contact info of the company you mention? Many of us might need its services in the future and this one sounds like they really know what they're doing. Thank you.
AOSP Maintainer Quits
and realize that your geeky wet dream of fully open source OS on mobile phones is just that -- a dream.
Samsung, practically the only true major player behind Android, sells more phones to the dumb sheep than Apple does. They don't care about geeks a bit.
Microsoft Will Have To Rename SkyDrive
The arrogance of a big player is punished when deserved. They certainly did have enough money to examine markets as big the UK for potential infringement of a new brand they wanted to introduce.
Google Now Serves 25% of North American Internet Traffic
CDN (Content Distribution Networks) are even more "God-like". They serve most traffic for the biggest players, like Microsoft.
The stats, metadata, and content must be quite interesting.
trifish has no journal entries.