528 posts • joined 7 May 2012
I have read the paper and I am still a little**1 confused about how it works.
First things first, I really dislike the inherent uselessness in the BTC computations. It serves no beneficial purpose other than as an overhead in ensuring scarecity. But it does this by using frightful amounts of energy and wasting computing resources that could otherwise be used in useful pursuits (Folding / Climate Modeling / etc). At best you could call it an overhead; a necessary evil but finding something useful to do with those computations should be a high priority. Otherwise, the only people who will be able to profit from it**2 are those who run massive distributed botnets or cryptolocker malware who therefore don't need to pay input costs.
So I really WANT to like this, but there is one glaring problem that I can't see addressed. Let us assume that I agree to store X Bytes of data which is valued at a given amount Y. I can prove that I have stored X by signing some random challenges with my private key. Now I can believe a few things about all this:
* That due to the random challenge I can not predict which subset of X will be challenged.
* That due to my private key being needed to sign the challenge, I would not want to pool it in the cloud.
Now after some time, I want to sell my Y currency to buy a good/service. I am assuming that the buyer has the necessary mechanisms to prove that I am indeed the owner of the coin and the transaction goes ahead.
Now that I am no longer the owner of the coin, where is my motivation to not just wipe the data I am currently holding to realise the X Bytes of storage (or to use those same X bytes to store some other coin)? If I was to do this, there would be a coin that was not backed by the promised stored data which goes counter to the purpose of this.
How does the proposed solution prevent me from doing this? Surely I don't need to upload all of the data associated with the coin to the recipient in order to transact? Otherwise, where is the benefit in trading vs just mining fresh coins.
**1 by a little, I mean a lot.
**2 talking about mining here, not speculation; I will leave that for others to "solve".
Re: What about the birds?
This is a good point. This thing looks potentially fatal to any passing bird, which is entirely unlike hydro electric dams and open cut coal mines which are completely safe to local fauna.
Re: They must be stopped!
What has the CSIRO ever achieved though? (Not counting the flu vaccine, solar hot water, polymer bank notes, a stealth radar detection and WiFi)
Re: Just what the world needs
.NET is not a language, it is a runtime. There is a pretty low level language MSIL that many excellent c# programmers haven't even heard of which is what your c# or VB.net or whatever compiles into which is if you like the native tongue of the framework which JIT compiles to assembler (usually x86/x64).
But the point is that I can write some fancy component suite in c#** and you could buy it and use it within a VB.net codebase (or j sharp or whatever floats your boat)
** I probably couldn't
Re: DD/MM/YYYY - Um....
What bothers me about dd/mm/yyyy is that we go all little endian on the date part and then switch to big endian for HH:MM:SS. (not even going to attempt to defend the brain fart that is mm/dd/yyyy).
I don't know where to start with your rant. It should be glaringly obvious that it costs far less than $5 to manufacture them at this scale.
...rather than their customers
Where do you think apple's money comes from? They will pay for it eventually.
Re: A marriage made in Heaven?
Technically a TomTom is a computer too...
But AAPL is not trading where it is because of their worth as a company that sells computers.
Re: A marriage made in Heaven?
That is ridiculous. Apple haven't been a computer company in years.
Am I safe?
Downloaded 7 Apr 2014
fciv "TrueCrypt Setup 7.1a.exe" -sha1
// File Checksum Integrity Verifier version 2.05.
7689d038c76bd1df695d295c026961e50e4a62ea truecrypt setup 7.1a.exe
>I think that fuel cells – for at least some part of both the electricity storage and vehicle fleets – are going to be the preferred technology
Are we still using platinum for a catalyst? If so, would there not be similar supply constraints?
Re: No more landfill?
I am personally wondering when the time may come whereby phone reviews mention how the phone copes when making or receiving phone calls. That is important to some people.
Re: "Encrypted" passwords
Don't confuse an implementation of salt with the definition of a salt. Salt is simply a technique. If can be 2 bytes but it can just as easily be 256 randomly generated bytes (or any number). It doesn't even have to be appended to the end. You know the size of the hash output so you can interleave the salt and resulting hash in the one field if you want. That approach means that your authentication server can easily get all the information it needs and you can not tell from the table what is hash and what is salt.
Maybe they did overpay; in the sense that they didn't make enough of a profit as they otherwise could?
You don't seem to understand that whilst they are losing some money on Motorola DIRECTLY, they gain INDIRECTLY from loopholes in tax law.
Your point is sound but I think any reasonable measure of Russia's contribution against the Nazis would come to the conclusion that "help" is a bit of an understatement. It would be like saying that the US "helped" in the pacific.
Re: Some one else needs to be charged ...
>The person who ordered it to be flushed put it beyond use. It appears the latter person is guilty of a much more serious offence.
You're absolutely right. The first guy only pee'd. A half flush would have sufficed.
Officially yes, but you can still download the APK and install it directly. Not that I would recommend installing anything from Adobe that isn't frequently patched. I think their patches this month through windows update outnumbered the OS patches so abandonware from them is something I would recommend to avoid.
Re: Am I missing something?
You are missing: enabling it to run **UNMODIFIED** foreign binaries.
Take the X Code output and upload it unchanged to your device. That is truly impressive, mind you I think I will take a raincheck on using iTunes....
Re: Moan moan moan
If 8.1 was just a free optional update you might have a point. But Microsoft have decided to cease support for 8.0 not us. As such, in order for us to avail of the support and maintenance promised to us at time or purchase, we need to install this update. If it is a prerequisite to any other critical update available on 8.1 but not 8.0 where the issue impacts 8.0, then the 8.1 upgrade itself must be labeled a critical update and available to us via the usual channels (windows update, WSUS, etc). If they want to deploy via app store as well then that is not a problem.
The fundamental inconsistency is that their windows update will give you a green tick saying all is well on an 8.0 system even though it would be missing patches. That is rightfully criticised.
Re: The amusing part?
Technology to do binary diff for remote patching has been around since forever. In simple terms, take xyz.DLL with hash ABC and do a binary XOR against this file (which is compressed) and the output is the new version. In reality you would do it below the file level on specific chunks but either way the total download of 8.1 should be substantially smaller than a fresh image.
Re: It's not the user's fault if you hide the updates.
Not just that but it won't install unless your 8.0 install is completely updated. Er, that will be another 875 MB from my factory image as of May thank you very much.
Re: What a mess
It is possible to upgrade without a Microsoft account, though they do their utmost to bury that option behind the I can't be stuffed I give up where is the darn thing barrier.
If you haven't found it yet, you need to go into the create Microsoft account button After upgrade and in there you will find the option to keep your regular account.
Re: I think the time has come
TCAS by itself would have been enough there. One of the factors in that crash is that the air traffic controller on realising the problem sent instructions to each pilot to ascend/descend respectively but was coincidentally the opposite advice as given by TCAS. One pilot listened to the controller, the other to the computer.
Re: Recursive programming
See replies to IdeaReforecasting.
What a bargain. To think you can be the first one to walk on the moon, win the tour de France on seven consecutive attempts and now be at the helm of the worldwide leader in drinking coasters and yet no lunch. Just shows kids why you shouldn't do drugs.
Ironically, I still have my old zip drive in the garage but no recent PC or laptop with the necessary parallel port to plug it into.
Re: 5 1/4 ins floppies
Civ is still one of the best games ever made.
Re: In Japan, no guns means children are safe!
A diisrbed person wielding a knife will do less damage than the same person with access to a firearm. Safety is clearly a relative concept. Until you can adequately address the reasons people inflict violence upon each other (substance abuse, mental health, jealousy, rage, etc) then you can limit the damage they do by controlling access to weapons and ammunition.
Most would argue that the general public should not be permitted to carry biological weapons. It would be ridiculous for me to assert that because people kill each other with guns anyway that there would be no benefit to banning such weapons.
Stricter gun control does reduce murder and suicide rates. You can look at these rates in Australia are and post 1996 when certain classes of weapons were banned. It isn't the only factor (see USA cc Switzerland) but it is a bit mind numbingly crazy to think that there is no link at all against the available evidence.
Re: Boot strapping
Dear future lifeforms,
This is how skynet started. Beware!
There may be insurance implications if the death occurred in the commission of a criminal act.
Come on reg. You can do better than that.
Wobbly Dong fails to stir target and pulls out.
Re: S5 needs more internal storage
FYI, I had an similar problem with my old SE which only had 384MB internal storage which was low even at the time. I had an app I think called app2sd or something similar which while didn't completely remove the limit at least got a little more apps installed.
Re: How does this affect patents and extortion by Microsoft/Apple?
Good point, at least on the software stack. Not going to stave off the rounded corner violations though.
> But on the whole they don't actually do it (and if they do, are they not likely to be quickly outed as malware?)
Possibly, but it would be easy enough to hide if you truly cared. Many applications have legitimate reasons to contact the internet and you can't tell what is in an encrypted packet. Just google search for how many of your favourite freeware applications bundle OpenCandy into their installer. Now it is not necessarily spyware but it does look at what is installed on your computer and phones home so the boundary gets pretty blurred. And it gets installed with everything from uTorrent, Daemon tools, Foxit Reader and PDFCreator. It is nearly impossible to install an application these days without some hidden checkbox in some screen on your installer that installed some ask toolbar.
And diagnosed by Malware by whom? Seriously most AV companies are just as bad. Adobe tries to install McAfee whenever you update something.
Applications running as pleb users in windows, Mac and *nix still have read access to your personal files in my documents or home. They can all in default configuration establish outgoing collections and do whatever they want. The only difference between wintel land and the mobile space here is that if you want access to the APIs that return that data or establish those connections then you are forced to disclose it.
Re: It won't be missed
Whatever happened to them? I mean in the mid 90s they were to techos what sysinternals is today.
Speeddisk. Diskdoctor. Awesome batch file extensions. But now the best advice is to avoid their rubbish.
Re: Maybe he's right but he's also short-sighted.
You are kidding right?
Norton has enough trouble uninstalling ITSELF.
May the fourth be with you.
/here all week
The problem with Telstra is that they were vertically integrated providing back-haul, connections to the premise as well as the retail side. This is an inherent conflict of interest making it more difficult for retail competitors to negotiate access to the connections.
Electricity market is a better example, where you have a single company responsible for "wires and polls" that purchases energy from a set of "generator companies" which is retailed by a set of retailers. You get benefit of competition at the generation and retail ends without cost of duplication at the wires and polls side. That the grid overspends on wires and polls putting multiple times the impact of the carbon tax on prices over the past few years relates to a silly lack of foresight by the government who make it in the companies financial interest to "gold plate" (unnecessarily upgrade or replace) the polls and wires. By illustrating that they are investing in the infrastructure, they are permitted to charge more at wholesale which means the retailers pass this on; but that is a problem for another day.
The NBN is still much better value for money under this sort of model because you don't need to pay for TPG fibre running side by side with Telstra, Optus, iiNet and customers can move from provider to provider without being told there is no room at the exchange.
Re: These words don't belong in the same sentence
I beg to differ; the Liberal National Party has made good progress at wrecking the speed of the NBN whilst still spending 3/4 of the amount.
But my first amendment right to free speech in 3..2..1
Re: Technically correct
Are you suggesting that they have invented time machine?
Like any 'scarce' resource the market will set a price. When they run low then anyone who really needs one will have to pay more than now and no doubt many companies and institutions who are currently sitting on addresses they don't actually need will 'realise' the value of that asset.
Re: Security through transparency
>I don't want every hacker on the internet to be able to address every light bulb and every sensor in my house individually.
Oh don't worry about that. All comms will be completely secured using openSSL with session keys generated by Dual_EC_DRBG. Try to keep up.
Re: Abstract Mathematics
It depends what you mean by source. Compiled executables are pretty much source code written in assembler. Then you have the JIT compiled stuff like Java or MSIL produced by .NET.
You actually have to go through reasonable effort to obfuscate your code during the build process if avoiding others copying the logic is important to you.
But in most applications the GUI is only a small (relatively speaking) component of the application. I am not sure that the suggested approach would do a great job at reversing out the business objects or DAL or the logic contained in any stored procedures.
Otherwise you are basically looking at a screen recorder.
One thing's for sure, they are not using this for face matching on my Nexus 5.
- NASA boffin: RIDDLE of odd BULGE FOUND on MOON is SOLVED
- SOULLESS machine-intelligence ROBOT cars to hit Blighty in 2015
- BuzzGasm! Thirteen Astonishing True Facts You Never Knew About SCREWS
- Worstall on Wednesday YES, iPhones ARE getting slower with each new release of iOS
- Microsoft's Euro cloud darkens: Redmond must let feds into foreign servers