Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Everyone is missing the bigger picture! (Score 3, Informative) 147

For the sake of simplicity and readability, I'm calling these wallets A, B, C, etc.

On 2020-02-25 15:41, wallet A transferred 111857.24579800 BTC, with 5000 BTC going to wallet X and the rest going to wallet B.

On 2020-04-01 13:55, wallet B transferred 106857.24571944 BTC , with 5000 BTC going to wallet Y and the rest going to wallet C.

On 2020-06-26 17:56, wallet C transferred 101857.24568009 BTC, with 5000 BTC going to wallet Z and the rest going to wallet D.

Are you beginning to see that there's a pattern to these transactions? This latest "mysterious" transaction is but a single tree in a forest. Would anyone like to bet me that we won't see wallet D making a similar outgoing transfer sometime around August?

Allow me to suggest that wallets A, B, C, and D are likely all owned by the same person or entity... if that is the case, then what we actually see is that they've spent 5000 BTC on each of those dates. In fact it's entirely possible that they also own wallets X, Y, and Z, and merely wanted an additional layer of transactions to help insulate themselves from when those bitcoins were actually spent.

Comment Re: Some questions (Score 1) 348

The reason for DRM's existence is to limit web content to those users who have the money (resources) to pay for it.

No, no... the reason for DRM's existence is to enable users who have the money to obtain content. Otherwise, the creators could keep it to themselves and nobody would benefit from it! Repeat after me: war is peace. freedom is slavery. ignorance is strength. DRM is good.

I joke, but I think there are must be people who actually believe this. It's the only logical explanation for some people's behavior. The W3C is just the latest example...

Submission + - Charged Superhydrophobic Condenser Surface May Make Power Plants More Efficient (csmonitor.com) 1

_0xd0ad writes: The activities of bantam water droplets in just one region of a power plant could make a significant difference in the output of power plants, scientists say.

Right now, in current condenser designs, water congeals in a thin film on the condenserâ(TM)s surface. Before new water droplets can form there, this water must fall away from the surface and be conveyed back over the boiler. âoeTo have the most efficient condensing surface, you want to remove the droplets as early as possible,â says Dr. Nenad Miljkovic, postdoctoral associate at MIT and co-author on âoeElectrostatic charging of jumping dropletsâ.

When a water droplet forms on a sheet of metal coated with a superhydrophobe, the droplet can camp there only so long as it does not merge with another droplet. As soon as it weds with another droplet, the energy produced is so great that the two will âoejumpâ away from that surface, as if in urgent deference to the surfaceâ(TM)s severe water phobia. Scientists have proposed that this âoejumpingâ could be incorporated into power plant design. But, in prototypes, this âoejumpingâ design is not as efficient as engineers believe it could be. Some of the droplets will just fall back to the condenserâ(TM)s surface, recoating it and slowing the process down.

A newly discovered component to the âoejumpingâ process might allow scientists to eliminate this fall back. In an accidental find, the MIT team found that droplets donâ(TM)t just spring from the surface â" they also rebound from each other, because an electrical charge forms on the droplets as they flee the hydrophobic surface. So, if a charge is applied to the condenser system, the water droplets can be electrically prevented from returning to the surface, he said. âoeIf you utilize the fact that these droplets are charged, you can now create an external electric field, which can attract the droplets away from the surface, and make sure they donâ(TM)t return,â says Miljkovic.

At the moment, these are lab results, but the scientists say that they are confident that the charged âoejumpingâ can be reproduced on a macro-scale suitable for commercial purposes â" those possible applications include not just use in power plants, but also in de-icing technologies for airplanes and wind turbines.

Comment Re:Of course, since it's SCADA... (Score 4, Informative) 34

Actually, it's designed to be web-facing.

Niagara^AX is a software framework and development environment that solves the challenges associated with building Internet-enabled products, device-to-enterprise applications and distributed Internet-enabled automation systems.

Worse, this is a laughably simple exploit of the web-facing interface:

By default, the Tridium Niagara AX software is not configured to deny access to restricted parent directories... An attacker could exploit this vulnerability by sending a specially crafted request to the Web server running on Port 80/TCP

"The system insecurely stores user authentication credentials, which are susceptible to interception and retrieval. User authentication credentials are stored in the Niagara station configuration file, config.bog, which is located in the root of the station folder"

In other words, it's about as simple as GET /../config.bog HTTP/1.1

Comment Re:Hashes list link (Score 1) 271

Also, forgot to mention, isn't the implication of some cracked / some non cracked that whoever originally got their hands on the data only has the hashes, not the full passwords?

Of course, it's also possible that some scavenger started cracking the SHA-1 hashes in a file that someone else released...

Slashdot Top Deals

The difference between reality and unreality is that reality has so little to recommend it. -- Allan Sherman

Working...