Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:It's supposed to be a summary (Score 1) 206

You sound like a privileged white poser.
Around here the cops don't have any time for your nonsense, they're too busy trying to track down the armed group of thugs that attacked and robbed 11 people last night. Or trying to figure out who murdered that girl down by the pet store. Or who cut that guys throat and dumped him in the garbage can by the church.

My interactions with cops consist of "Did you hear the gunfire? Which direction did it come from?" Literally happened like three times in a week.
If I go for a walk at night it's like 50/50 if I hear gunfire. Not off in the distance gunfire, more like do I need to call the cops now or are the neighbors gonna call.
In fact, that was last night.

Are you gonna strap on a gun and fucking patrol my streets? Or are you expecting me to pick up a gun and deal with this myself?
You're such a useless, ignorant, poser. Fuck, you didn't even bother to think that the Raspberry Pi Foundation, a british company, would be hiring a british cop.
You didn't even bother to check. All you wanted to do is posture about things you know nothing about.

Comment Re:Downloaded by 5 million (Score 1) 36

ERRRR! Sorry, you're all wrong. From the summary:

"The app's quick rise to fame made waves, especially in its home market of India, which likely led to a faster-than-usual investigation on Google's part."

It's likely related to recent tensions along the border. Which I'm too lazy to cite.

But they were at war previously over the areas:
https://en.wikipedia.org/wiki/...

Also the government is a Hindu nationalist government and has been pushing made in India.
I can provide citations if absolutely necessary, but, I'm tired so please just google it.

Comment Re:Contact the Linux Foundation (Score 1) 266

I'd probably start by filing a bug report with your distro, it sounds like something release critical. They likely have someone who will be able to fix this bug, and who will be able to get it upstream. They also will be better equipped to test this as they're putting together all the pieces in a distro. They are also probably more end user oriented.

Submission + - Fog clears around encrypted email provider Lavabit court documents (nytimes.com)

snowtigger writes: The New York Times reports that on Wednesday, a federal judge unsealed documents in the case (covered here), allowing the tech entrepreneur to speak candidly for the first time about his experiences. Among other things, a court order required provide the F.B.I. with “technical assistance,” which agents told him meant handing over the private encryption keys, technically called SSL certificates, that unlock communications for all users.

Comment Re:Why bother? (Score 2) 131

I'll take a quick stab at answering your question.

They're not trying to duplicate Mac OS X. The project started before that, to clone nextstep, or the api's at least, which were at one point being billed as a cross platform framework called openstep.

I assume these guys liked Objective-C(which came from nextstep) and liked openstep and you know then the whole thing took on a life of its own.

Now they could stick with the state of openstep when NeXT shutdown, or they could go off on thier own, or they could bring in the new stuff from Mac OS X(which is descended from nextstep).

They seem to want to the last one.

Comment Re: This is why encryption isn't popular (Score 2) 399

No, the key would actually be generated on the card, as it has its own cryptographic processor, and cpu. Its called a smart card.

I have no idea if they are actually doing this, as I am not estonian and am completely unfamiliar with thier ID card issuing process, but he seems to be implying that they do.

Remember, there are two ways to get a key on a smartcard. You can have it generate a key(which CAN be signed without the key leaving the card), or you can generate the key externally and then import it.

Submission + - Looking for non-US based email providers 2

jlnance writes: I don't particularly like the NSA looking over my shoulder. As the scope of its various data gathering programs comes to light, it is apparent to me that the only way to avoid being watched is to use servers based in countries which are unlikely to respond to US requests for information. I realize I am trading surveillance by the NSA for surveillance by the KGB or equivalent, but I'm less troubled by that.

I searched briefly for services similar to ymail or gmail which are not hosted in the US. I didn't come up with much. Surely they exist? What are your experiences with this?

Submission + - Microsoft handed the NSA access to encrypted messages (theguardian.com)

An anonymous reader writes: Secret files show scale of Silicon Valley co-operation on Prism
  Outlook.com encryption unlocked even before official launch
  Skype worked to enable Prism collection of video calls
  Company says it is legally compelled to comply

Submission + - OpenPOWER: an open development alliance based on IBM's POWER microprocessor (ibm.com)

praveenkumar writes: Google, IBM, Nvidia and a couple of other partners have joined hands in working on a next-generation data center development group — the OpenPOWER Consortium. Its an open development alliance based on Big Blue's POWER microprocessor architecture and will include technologies spanning advanced server, networking, storage and GPU acceleration. Initially, IBM will opensource its POWER firmware and will work with Nvidia to integrate the CUDA GPU and POWER ecosystems.

Submission + - Australian state bans IBM from all contracts after payroll bungle (delimiter.com.au)

renai42 writes: If you don't follow Australian technology news, you're probably not aware that over the past few years, the State of Queensland massively bungled a payroll systems upgrade in its Department of Health. The issues resulted in thousands of hospital staff being underpaid or not paid at all, and has ballooned in cost from under $10 million in budget to a projected total cost of $1.2 billion. Queensland has now banned the project's prime contractor, IBM, comprehensively from signing any new contracts with any government department, until it addresses what the state says are IBM's project governance issues. Kind of a big deal for Big Blue. And it's happened before — the US EPA did the same in back 2008.

Submission + - Former NSA chief warns of cyber-terror attacks if Snowden apprehended (theguardian.com)

Okian Warrior writes: The Guardian is reporting Michael Hayden speculating that hackers and transparency groups arre likely to respond with cyber-terror attacks if the United States government apprehends whistleblower Edward Snowden. From the story: "If and when our government grabs Edward Snowden, and brings him back here to the United States for trial, what does this group do? Nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings who haven't talked to the opposite sex in five or six years.

Submission + - MIT Students Release Code To 3D-Print High Security Keys (forbes.com)

Sparrowvsrevolution writes: At the Def Con hacker conference Saturday, MIT students David Lawrence and Eric Van Albert released a piece of code that will allow anyone to create a 3D-printable software model of any Schlage Primus key, despite Schlage’s attempts to prevent the duplication of the restricted keys. With just a flatbed scanner and their software tool, they were able to produce precise models of Primus keys that they uploaded to the 3D-printing services Shapeways and i.Materialise, who mailed them working copies of the keys in materials ranging from nylon to titanium. Primus high-security locks are used in government facilities, healthcare settings, and detention centers, and their keys are coded with two distinct sets of teeth, one on top and one on the side. That, along with a message that reads "do not duplicate" printed on the top of every key, has made them difficult to copy by normal means. With Lawrence and Van Albert's software, anyone can now scan or take a long-distance photo of any Primus key and recreate it for as little as $5.

Submission + - US Phone companies provided call metadata VOLUNTARILY for 4 years 2

Bruce66423 writes: According to http://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_story_1.html p.2
the Bush administration,took “bulk metadata” from the phone companies under voluntary agreements for more than four years after 9/11 until a court agreed they could have it compulsorily.

Slashdot Top Deals

The best way to accelerate a Macintoy is at 9.8 meters per second per second.

Working...