Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Choose protocol before choosing implementation (Score 1) 30

An adversary can coerce a proprietary software producer to compromise the code. That's what we're going to see here.

An adversary cannot time-travel to when a protocol was invented, and compromise the protocol. (Though I guess the NSA can come kind of close to that, by "helping" as it's being developed, w/out the time-travel part.) That's what we're not going to see here.

Ergo, proprietary apps will remain unable to provide secure messaging, but secure messaging will remain available to people who want it.

Comment Re:seen this movie before (Score 1) 276

Selecting office software is not a political statement

That's right, it's not a statement. It's just a position. You either hold the position that it's ok to be dependent on a third party and it's ok to fail if that third party turns against you, or you hold the position that it's not ok and you would prefer to stay up no matter what adversaries want.

It only becomes a statement once you tell someone that security and reliability are among your values. ;-)

Comment Re:Hmm. and what about everything else ? (Score 2) 276

Scale isn't the main problem, interoperability is. If you've solved interoperability (i.e. you've got SPF, DKIM, etc working so gmail.com and outlook.com will receive emails sent from your system) then you're in good shape.

Not that running large systems is necessarily easy, but it doesn't have enemies the way interoperability has enemies. Scale is a merely conventional problem that Google and Microsoft aren't making worse for Linux users. Nobody's pushing back, trying to make you fail; your only foe is savage reality.

And man-vs-savage-reality is a pretty nice conflict to be involved in, compared to man-vs-man.

Comment Re:have interviews ever tested the right thing? (Score 3, Interesting) 85

Data structures and algorithms are used in interviews, not because you'll be expected to implement sorts and linked lists, but because they demonstrate that the candidate can implement and troubleshoot software from specs, using cases they should be familiar with if they have a CS / coding background. Testing for skills rather than knowledge. By the same token, it makes sense to test candidates on the use of AI assistants, if they'll be using those in their work. Though rather than let them produce textbook algorithms with prompts, I'd give them a prompt that produces known faulty output, then ask them to test the result, figure out what is wrong with it, and fix the code and/or the prompt.

Comment How would one measure this? (Score 4, Insightful) 54

How do they measure this? Did all the pirates magically agree to put Google Analytics on their web pages and share reporting with Muso? Or, in accordance with The Pirate Code (?!) do all pirate pages request the browser load http://muso.com/arr-trackme-1x... and (again, in accordance with The Pirate Code, I guess) the visitors configure their browsers to whitelist and load it? I am skeptical of any third parties who claim they "track" pirate site visits.

Slashdot Top Deals

The moving cursor writes, and having written, blinks on.

Working...