Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Businesses

The Comcast/TWC Merger Is About Controlling Information 107

An anonymous reader sends this excerpt from The Consumerist: "Comcast and proposed merger partner Time Warner Cable claim they don't compete because their service areas don't overlap, and that a combined company would happily divest itself of a few million customers to keeps its pay-TV market share below 30%, allowing other companies that don't currently compete with Comcast to keep not competing with Comcast. This narrow, shortsighted view fails to take into account the full breadth of what's involved in this merger — broadcast TV, cable TV, network technology, in-home technology, access to the Internet, and much more. In addition to asking whether or not regulators should permit Comcast to add 10-12 million customers, there is a more important question at the core of this deal: Should Comcast be allowed to control both what content you consume and how you get to consume it?"

Comment Re:I dropped Dropbox (Score 1) 76

[D]epending on your use of Dropbox there are far better services. If you are simply storing and sharing files with a select few then Google drive gives you 15 GB which is a huge amount of storage in comparison.

Plus with someone like Rice onboard, how long before Dropbox ends up in an incestuous relationship with the NSA?

You claim to be concerned about "incestuous relationship[s] with the NSA," yet you recommend another corporate partner in NSA's PRISM spy-ring in favor of another. Why not find/try a tool or service that hasn't already been implicated in NSA-produced documents in serving as a front-end for one or more of their "collect it all" programs? In my view, that one of these corporate partners allows you to hand over more data to the NSA than a competitor isn't a compelling argument for its use — especially when that corporation makes their billions in part by scrutinizing and monetizing anything you give them in the first place.

15GB may be "huge" in comparison to another service willing to oh-so-charitably take ownership of your data for you, but 15GB represents a mere ~1% of a typical modern HDD, or about a seventh of what I upload daily via BitTorrent. Add in end-to-end encryption and a good-availability residential Internet connection, and you can share data without utilizing surveillance-state honeypots. For tools and services that allow you to do this, the website PRISM Break is a great place to start looking for a solution that has had at least some effort put forth in protecting users' privacy.

Technology

The Graffiti Drone 126

tedlistens writes: "KATSU is known for his adventurous and speculative vandalism, but his new project is not fake or hypothetical, though it does elevate his work to new heights. He has developed a system to attach a spray can to a quadcopter, creating one of the world's first graffiti drones. The drone is capable of spraying canvases or walls hundreds of feet high, granting the artist access to spaces that were previously inaccessible. At the Silicon Valley Contemporary art fair, which opened Thursday, KATSU is showing a series of drone-painted canvasses — and preparing to take the drone out on the town. 'There are a lot of disadvantages to drones, you know. It's not like, "oh, I'll slip off the edge of this bridge and die,"' he tells the Center for the Study of the Drone at Motherboard, which also has a video. 'Its like, "I might have the drone drift off and I might kill someone."'"

Comment Re:I need electricity. I need it for my dreams. (Score 2) 214

Is it to do with wanting to reduce emissions? I'd have thought it was a much more pragmatic requirement. Fossil fuel extraction costs are going to keep increasing. The costs of alternatives are going to keep decreasing. At some point, they will cross over and at this point the value of stocks in a fossil fuels will suddenly drop. Currently, they are quite high and probably will be for quite a few more years (although increased difficulty in extraction is going to make expensive accidents more common, which won't help). Harvard expects endowments to last a period measured in hundreds of years. Now is probably a good time to start selling off the shares in fossil fuel companies, while there are still people who want to buy them at a high price.

Comment Re:This is how America ceases to be great (Score 2, Insightful) 133

I was thinking about this the other day. The core problem is not lobbying, because it's perfectly sensible that people with an interest in a particular topic would want to talk to their elected representatives about it. The problem is unequal access to lobbying, and that comes from the massive wealth inequality in the USA and the fact that lobbying is expensive. Perhaps a better solution would be for each member of the electorate to have allocated a certain amount of their representatives' time.

For example, each member of the House of Representatives is responsible for approximately 500,000 people. Assume that they spend on average two hours a day talking to their constituents and the rest is spent in committees, or on holidays (since we're talking about an average). That's 2628000 seconds per year, or around 5 seconds per constituent per year (10 seconds per term). If you want to have a five minute conversation with a representative, then you must find 60 people all willing to give you their time allocations. Or 300 all willing to give you 20% of their allocation. If you want to have an hour-long meeting, then that's 720 people who must give up all of their allowance, or 3600 who must give up 20% (or any breakdown).

Comment Re:Not malicious but not honest? (Score 2) 447

I'm not sure what testing OpenSSL does, but most protocol tests include a fuzzing component, and if the fuzzer didn't generate heartbeat packets with an invalid length then it's not doing a good job. This sort of code is routinely run by people outside the OpenSSL team to look for vulnerabilities, so I'd hope that they'd do it themselves. Generally, any field that contains a length is used in guided fuzzing, because it's easy to get wrong.

Comment Re:Doesn't seem to be on purpose (Score 5, Interesting) 447

The date that it was added to the OpenSSL codebase is very close to the time when the leaked NSA documents claim that they had a 'major breakthrough' in decrypting SSL. I would imagine that they are not responsible for introducing it, but do have people doing very careful code review and fuzzing on all changes to common crypto libraries, so I wouldn't be surprised if they'd known about it (and been exploiting it) since it was originally released.

Comment Re:He's sorry now ... (Score 1) 447

It always amuses me when GPL'd software contains a clickthrough insisting that you press an "Agree" button, when the licence specifically says that no such agreement is necessary.

In fact, by placing the requirement that someone agrees to the license before using a derived work of the GPL'd software, they are violating the GPL...

Comment Re:Sue FSF, relicense all GNU software ... (Score 1) 447

The FSF requires copyright assignment for all of their projects, so they do have some quite valuable assets. They provide the original author with a license to sublicense their contributed code under whatever license they choose, but they are the only ones that can relicense the whole. For example, if someone else managed to gain control of the GNU assets then they could legally relicense GCC under an MIT license, allowing its code to be used anywhere.

Comment Re:Not malicious but not honest? (Score 4, Insightful) 447

The point is not that a general malloc() would catch it, but that there are security-focussed malloc() implementations that will. Even valgrind will - it knows that malloc() has special properties and so will object if you derive a valid pointer to the wrong allocation by running off the end of another one. You don't need to use the security-focussed malloc() in deployment (unless you're really paranoid), you just need to support testing with it. Running this code with a malloc() that did aggressive bounds checking would have caught it immediately. That's something a continuous integration system and a test suite ought to have caught.

Slashdot Top Deals

"It's the best thing since professional golfers on 'ludes." -- Rick Obidiah

Working...