Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Bitcoin

BitInstant CEO Says World Operates "On an Inferior Monetary System" 185

hypnosec writes "BitInstant's CEO Charlie Shrem and Erik Voorhees were invited to speak about virtual currency at the NACHA (the North American Payments Association) Annual Global Payments Forum held in Rio de Janeiro. At the conference the duo stated that the world operates 'on an inferior monetary system'. One of the more interesting parts of the whole forum was how Bitcoin as a currency and transaction system "works within current legal frameworks." A presentation by Senior Legal Counsel to the Federal Reserve titled: 'The Implications of Dodd-Frank Section 1073' sheds light on requirements that need to be fulfilled by "Remittance Payment Company" (RPC) guidelines. This law requires such companies to disclose a lot of information about money transactions. This is where Bitcoin as a currency and system collide head-on with the law."
Security

Unbreakable Crypto: Store a 30-character Password In Your Subconscious Mind 287

MrSeb writes "A cross-disciplinary team of US neuroscientists and cryptographers have developed a password/passkey system that removes the weakest link in any security system: the human user. It's ingenious: The system still requires that you enter a password, but at no point do you actually remember the password, meaning it can't be written down and it can't be obtained via coercion or torture — i.e. rubber-hose cryptanalysis. The system, devised by Hristo Bojinov of Stanford University and friends from Northwestern and SRI, relies on implicit learning, a process by which you absorb new information — but you're completely unaware that you've actually learned anything; a bit like learning to ride a bike. The process of learning the password (or cryptographic key) involves the use of a specially crafted computer game that, funnily enough, resembles Guitar Hero. Their experimental results suggest that, after a 45 minute learning session, the 30-letter password is firmly implanted in your subconscious brain. Authentication requires that you play a round of the game — but this time, your 30-letter sequence is interspersed with other random 30-letter sequences. To pass authentication, you must reliably perform better on your sequence. Even after two weeks, it seems you are still able to recall this sequence."
The Courts

How the Inventors of Dragon Speech Recognition Technology Lost Everything 606

First time accepted submitter cjsm writes "James and Janet Baker were the inventors of Dragon Systems' speech recognition software, and after years of work, they created a multimillion dollar company. At the height of the tech boom, with investment offers rolling in, they turned to Goldman Sachs for financial advice. For a five million dollar fee, Goldman hooked them up with Lernout & Hauspie, the Belgium speech recognition company. After consultations with Goldman Sachs, the Bakers traded their company for $580 million in Lernout & Hauspie stock. But it turned out Lernout & Hauspie was involved in cooking their books and went bankrupt. Dragon was sold in a bankruptcy auction to Scansoft, and the Bakers lost everything. Goldman and Sachs itself had decided against investing in Lernout & Hauspie two years previous to this because they were lying about their Asian sales. The Bakers are suing for one billion dollars."
Data Storage

Ask Slashdot: Best Way To Destroy Hard Drives? 1016

First time accepted submitter THE_WELL_HUNG_OYSTER writes "I have 10-15 old hard drives I want to trash, some IDE and some SATA. Even if I still had IDE hardware, I don't want to wait several weeks to run DBAN on all of them. I could use a degausser, but they are prohibitively expensive. I could send them to a data destruction firm, but can they be trusted? What's the fastest, cheapest DIY solution?"
Iphone

Submission + - Android ported to iPhone (blogspot.com)

anethema writes: iPhone hacker planetbeing, from the iPhone Dev Team has successfully ported the Android OS over to the iPhone. He is doing it on a first generation iPhone, but others may be possible. The port is pretty functional, with data, voice, and many apps working, although it is running a bit sluggish and buggy at the moment, since there appears to be much work left.

Any donations of time, money, or code I'm sure would be appreciated.

Censorship

Why the UK Needs the Pirate Party 363

Barence writes "The UK Pirate Party wants to reform copyright and patent laws, abolish the surveillance state and increase our freedom of speech, and it's just been recognized as a political party. In this interview with PC Pro, UK Pirate Party leader Andrew Robinson explains how he's planning to shake up the political landscape. 'What we really want to do is raise awareness, so that the other parties say "bloody hell, they've got seven million votes this time out," or one million votes, or enough votes to make them care and seriously think about these issues.'"
Security

Is China Creating the World's Largest Botnet Army? 195

david_a_eaves writes "The Chinese government is mandating that all computers sold in China come with Internet blocking software. Rob Cottingham writes an excellent piece noting how the censorship application of this software should be the least of our concerns. This new software may create an opportunity for the Chinese Government to appropriate these computers and use them to create the worlds largest botnet army." Update: 06/11 21:26 GMT by T : J. Alex Halderman writes "My students and I have been examining the Green Dam censorware software. We've found serious vulnerabilities that can be exploited by any web site a user visits with the software installed. We also found that some of the blacklists seems to have been taken from the American-made filtering program CyberSitter. We've posted a report and demo."
Security

Adeona Warns of Instability; OpenDHT Mothballed 82

gbickford writes "Adeona, the first open source system for tracking the location of your lost or stolen laptop, was featured on Slashdot last year. I was stoked when I read about how it worked and I installed it immediately. I just went to look for updates on the site and was greeted with a giant warning message stating, 'Adeona is currently not working.' It seems that OpenDHT, the distributed hash table that stores the location information and photos, has been fairly unstable lately. The developers claim that this is "largely because the back-end OpenDHT system is not able to tolerate the load imposed by Adeona. OpenDHT removed the need for a centralized database with tracking information, which in effect prevents a 3rd party from tracking a user's whereabouts. OpenDHT was Sean Rhea's Ph.D. project back in 2005 and he has decided to officially bow out of maintaining it as of July 1st, which has left the developers of Adeona looking for another back end to store location information and photos. The source code for Adeona is available and they are actively seeking developer contributions on the developer's list. Do any developers have ideas on where to put scads of information in a free, reliable, anonymous, and secure manner?"
Cellphones

Mobile Wi-Fi Hot Spot 202

bsharma writes to let us know about a little goodie that we will be able to buy starting May 17: a battery-powered, rechargeable, cellular, Wi-Fi hot spot that you can put in your pocket. "What if you had a personal Wi-Fi bubble, a private hot spot, that followed you everywhere you go? Incredibly, there is such a thing. It's the Novatel MiFi 2200, available from Verizon starting in mid-May ($100 with two-year contract, after rebate). It's a little wisp of a thing, like a triple-thick credit card. It has one power button, one status light and a swappable battery that looks like the one in a cellphone. When you turn on your MiFi and wait 30 seconds, it provides a personal, portable, powerful, password-protected wireless hot spot. ... If you just want to do e-mail and the Web, you pay $40 a month for the service (250 megabytes of data transfer, 10 cents a megabyte above that). If you watch videos and shuttle a lot of big files, opt for the $60 plan (5 gigabytes). And if you don't travel incessantly, the best deal may be the one-day pass: $15 for 24 hours, only when you need it. In that case, the MiFi itself costs $270." The device has its Wi-Fi password printed on the bottom, so you can invite someone to join your network simply by showing it to them.
The Internet

FTC Backs Off Red Flag Rules Again 43

coondoggie writes to tell us that the Federal Trade Commission has yet again backed off of the new Red Flag Rule designed to protect consumer information. Complaining about cost of implementation, the enforcement date of the rule has been pushed back to August 1, 2009 to give businesses and institutions time to implement identity theft-prevention programs. "The FTC, federal bank regulatory agencies, and the National Credit Union Administration (NCUA) issued the Red Flags Rules as part of the Fair and Accurate Credit Transactions (FACT) Act of 2003. The final rules require financial and credit institutions that hold any consumer account, or other account for which there is a reasonably foreseeable risk of identity theft, to develop and implement an Identity Theft Prevention Program for combating identity theft in connection with new and existing accounts, the FTC said."
Data Storage

Btrfs Is Not Yet the Performance King 117

Ashmash writes "Benchmarks of the Btrfs filesystem have been published by Phoronix that compare it to the XFS, EXT3, and EXT4 file-systems. In the end they conclude that this next-generation Linux filesystem is not yet the performance king. In a great number of the tests, the EXT4 filesystem that was designed to be an interim step to Btrfs actually performs much better than the unstable Btrfs, albeit Btrfs still has more advanced features. Fedora 11 even took longer to boot when using Btrfs than EXT3 or EXT4."
Image

Spider Bite Allows Man To Walk Again 221

Manastorm writes "A man who was wheelchair bound due to a motorcycle accident twenty years ago gained the ability to walk again after being bitten by a recluse spider. 'I can't wait to start dancing,' he said as he looks forward to a full recovery after experiencing what some call a 'true miracle.'" I think we all know how this story is going to end. I hope The Sinister Six have been practicing.
Google

Privacy Group Calls Google Latitude a Real 'Danger' 227

CWmike writes "Privacy International is calling Google's new mapping application an 'unnecessary danger' to users' security and privacy. The criticism follows the unveiling this week of Google Latitude, an upgrade to Google Maps that allows people to track the exact location of friends or family through their mobile devices. Google Latitude not only shows the location of friends, but it can also be used to contact them via SMS, Google Talk or Gmail. 'Many people will see Latitude as a cool product, but the reality is that Google has yet again failed to deliver strong privacy and security,' said Simon Davies, director of London-based Privacy International, in a statement. The group's chief concern is that Google Latitude lacks sufficient safeguards to keep someone from surreptitiously opting into the tracking feature on someone else's device."
Medicine

Valuable Objects Stimulate Brain More Than Junk 118

Roland Piquepaille writes "According to researchers at the University of California at San Diego, visual areas of our brain respond more to valuable objects than other ones. In other words, our brain has stronger reactions when we see a diamond ring than we look at junk. Similarly, our brain vision areas are more excited by a Ferrari than, say, a Tata new Nano car. In this holiday season, I'm sure you've received gifts that excited your brain — and others that you already want to resell on an auction site."

Slashdot Top Deals

If I set here and stare at nothing long enough, people might think I'm an engineer working on something. -- S.R. McElroy

Working...