Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:No, it's psychological (Score 1) 497

==
Most proposals for UBI would fund it by dramatically reducing current entitlements. So someone getting a $1500 social security check, would see it reduced to the "universal" $500 or so. That chance of this being politically feasible: 0%.
==

Even if there was enough money to maintain the same average amount, some would get less and some more than now, because the idea is to get rid of detailed bureaucracy.

That is also the problem with making realistic experiments. It is difficult to select 10000 random people and give some of them $1000 more than they got before, and some $1000 less.

Comment Debian (Score 1) 233

My experience tells me that if my hardware is not running Debian, then at some point there will be no more updates.
And hackers is not the only problem, often the hardware just becomes useless.

E.g., I have a perfectly good old WiFI IP phone, but it only works on open networks or networks encrypted with WEP.
I have some devices that I would like to use to browse the internet. But they fail on websites with newer certificates.

Comment Re:a quick answer (Score 1) 201

"Secondely the EU cj does not define hate speech, individual countries do"

But does that mean that EU is now demanding that Twitter censors speech that is forbidden in just one EU member state even if it is legal in the other 28 EU states?

So EU are unhappy with Twitter only blocking 38 percent of flagged content.
They acknowledge that not all content flagged by users isn't prohibited by law.
But how much is that really? Maybe it is 70 percent and then Twitter is blocking "to much".

Who actually decides what should be blocked? Because it is certainly not the European court of Justice or any other court that is reviewing all the tweets.

We are some European citizens that believe that we have the right to seek information without being blocked by some German company hired to oversee some code-of-conduct policy made by bureaucrats supposedly based on some member-state laws that are never tested in courts.

Comment Re: Not A Mistake (Score 1) 159

Eventually you can get Linux to boot on UEFI just fine. But it is harder than before.

It used to be that you could just put a DVD in a computer and click OK to install Linux, and that was it.

Now people people ask me for help when Linux installation fails. Usually the installation seem to succeed, but the computer cannot boot. I usually install Boot-Repair on a live USB disk, boot the computer and fix it. Boot-Repair is a nice toot but really, it should not be necessary.
    And sometimes it does not work. Early versions of the Intel NUC would fail starting Ubuntu because if expected the executable to be named uefi.exe, not grub.exe. Intel fixed it in a later firmware version. But it is telling that they created something so complex, that not even Intel could get it right.

Comment Re:What part of this is hard to understand? (Score 1) 183

So when every yahoo on your segment fires up BitTorrent your VoIP stops working? No thank you.

Basic prioritization:
1. Realtime Communications Traffic (VoIP)
2. Remote interactive sessions (RDP/SSH/Games/etc..)
3. Streaming Video ...
6. Downloads ...

Except that my VoIP works just fine without any prioritization.
Prioritization will just be a way of making sure that just my kind of VoIP will become unusable.
And how are they going to determine which traffic is VoIP anyway? Port numbers?

Then again, my downloads through SSH-tunnels will be faster.

Comment Re: Duress print (Score 1) 224

IANAL, but setting up such a system could not be illegal. At the time you set it up, you cannot know who will be forcing you to unlock. It could be a member of an Armenian gang.

What happens when you are required to unlock is less clear, IMHO.

==
“Unlike disclosing passcodes, you are not compelled to speak or say what’s ‘in your mind’ to law enforcement,” Gidari said. “ ‘Put your finger here’ is not testimonial or self-incriminating.”
==

But are you required to warn them about "bad" fingers?
And you might not have told you girlfriend which of her finger, will start the self-destruct.

And even if you are required to warn them, if you _do_ believe that your rights are being violated, now they have to prosecute you, and you can argue they had no right in the first place.

Comment Encryption uses (Score 1) 43

The USB gadget support seems to be difficult.
But if you get it to work, you could e.g., have several encrypted and unencrypted filesystems on the SD-card.

Give it to someone and let them see a USB flash drive with the unencrypted data, or give them the password to some files.

Or you could have filesystems, where you can write unencrypted, but not read (from e.g. cameras)

Comment Re:i feel sorry for the poor guy. (Score 1) 461

It might not have to be unattended.

In 1992 I traveled through Moscow airport with a pressure cooker with a slide projector inside it (I had trouble keeping my luggage in one suitcase).

When they put it through the airport scanner there was a lot of shouting and they made me take it apart in a corner with concrete walls while three guys was pointing rifles at me.

Comment Re:Pretty much. (Score 1) 225

==
  GPL2:
>You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.

Note that if anyone with copyright over the kernel wins such a suit, the rights to use the kernel are lost for all time ("terminated").
==

That is not what that clause means. For example GPL also says that they not have to accept the license.

What it means, is that they then have distributed the kernel without permission from the GPL.
And they could get in trouble for that.

Slashdot Top Deals

Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy.

Working...