Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:How do you square that with the first amendment (Score 1) 401

I did a bit more research and thinking about this. The First Amendment doesn't apply here. The government doesn't care about the artistic, persuasive, or expressive character of the works, just their function. There is no First Amendment right to speech that can actually make a gun just as there is no First Amendment right to speech that can actually hire a hitman. In cases where artistic expression or persuasion is significantly burdened, there might be an as-applied challenge on First Amendment grounds.

Comment How do you square that with the first amendment (Score 2) 401

Is there any recognized exception to the first amendment that allows the government to prohibit the distribution of accurate information on the grounds that it's dangerous to use or misuse? If not, and they're asking for a new exception to the first amendment, the minimum we should expect is a precise description of the contours of the exception.

Comment Re:Simple solution: (Score 1) 273

So how do you buy a car if no bank or financial institution is willing to do business with you? If the government is going to pass laws requiring you to do business with banks and FIs to live a normal life, surely they can't continue to allow banks and FIs to pick and choose their customers arbitrarily.

Comment Sorry, that makes no sense (Score 1) 227

> This averages out to a shocking 215 kilowatt-hours (KWh) of juice used by miners for each Bitcoin transaction (there are currently about 300,000 transactions per day). Since the average American household consumes 901 KWh per month, each Bitcoin transfer represents enough energy to run a comfortable house, and everything in it, for nearly a week.

That's just being silly. Imagine a company that has three vice presidents and spends $1 billion per year. I can say that company spends "over $300 million per vice president per year". But, of course, that's nonsense because there's no sensible reason to divide the yearly cost by the number of vice presidents. They can't fire one vice president to save $300 million per year nor would it cost them $300 million to add another vice president. So what's the sense of this?

Similarly, there is simply no sensible reason to divide the energy cost by the number of transactions. Reducing the number of transactions won't reduce the energy cost and increasing the number won't increase it. The energy used by bitcoin mining and the number of bitcoin transactions performed are pretty much completely independent and there is simply no reason to divide one by the other.

Comment Re:Somebody has to (Score 2) 549

Actually, incitement of violence is protected speech in the United States. There's a very limited subcategory of incitement that's not protected, but it's not nearly as broad as you are implying. One can, for example, say "All left handed people should be killed as soon as we know they're left handed" and that is not incitement. On the other hand, if you're surrounded by a mob of people who are likely to kill left handed people, you cannot shout, "That guy in the blue hat is left handed, get him!"

Comment Re: Going against Betteridge (Score 1) 199

> In the case of Hutchins, his product is by design intended to be used in a way that is always illegal, so creating it in concert with someone who intends to use the product is being part of a conspiracy to commit illegal acts.

What if a court authorized the use of the malware to gather evidence? In what way is the malware's design not perfect for that type of use too?

Comment Re: Going against Betteridge (Score 1) 199

> If someone is selling a tool that has only illegal uses, it is pretty certain that the mind of the customer is known.

I don't think there's any such thing as "a tool that has only illegal uses", unless you're talking about something that's illegal to possess. A person might want malware to:

1) Test their skills at analyzing malware.

2) Test their own defenses against malware.

3) Perform lawful intercepts on their own equipment.

4) Analyze to fingerprint to add additional detection patterns to existing malware detection systems.

5) Own for bragging rights.

6) Use by law enforcement pursuant to a warrant.

Slashdot Top Deals

We want to create puppets that pull their own strings. - Ann Marion

Working...