Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:13 deaths? (Score 1) 518

They also have parents who are responsible for their well-being. Letting your child run off to hide behind parked cars is foolish, and the parent should either watch their child if they aren't able to comprehend the danger, or should educate their child about the dangers if they are. This is technology being used to solve a social problem; Kids playing around cars.

Comment Re:13 deaths? (Score 1, Insightful) 518

You're forgetting the non-zero cost to the economy of people who would ordinarily be stripped from the gene pool by their own idiocy, by standing behind a car, below the sight line of the driver, while the car is reversing.

Anyone who ties their shoes in front of or behind a car with a running engine and a driver at the wheel is in line for a Darwin award. There's only so much stupid you can legislate around before it becomes harmful to the majority.

Comment Re:Sweet revenge (Score 1) 109

It depends, was the Credit card statements laying out where anyone could see them, on the coffee table, that is the only way yoru analogy works.

They weren't public, there just wasn't any extra authentication / authorisation required to access the data. There's a difference between given permission to access files and being technically able to access files. Yes AT&T are on the hook for not securing their files properly, but that's a different issue. I'm pretty sure you could walk into HR at your employer and physically open a filing cabinet and start looking at the personnel records, but I wouldn't like to comment on the permanence of your employment afterwards. You don't, because you know you shouldn't.

What if I put up a website, thaylin.net, then you go to it, can I then claim you hacked my system and went to the page without authorization ?

If I go to thaylin.net and notice that your server is poorly configured and susceptible to directory traversal, have I hacked your system? If all we're doing is manipulating the URL, "../../../" is just part of the string. All of your files are open for me to access, I just noticed how to do it. Is your permission to access the files implied, just because I can?

Comment Re:Sweet revenge (Score 1) 109

He got it for accessing information which, while pathetically "secured", he did not have permission to access.

An analogy I like is that you invite a guy around to your house to play Xbox, and instead he goes and looks through your credit card statements. He hasn't been told he can't, and they're not necessarily locked away, but he knows damn well he shouldn't be doing it. He definitely shouldn't post them to the local press.

Comment Re:Not trying to steer the car this car off the ro (Score 1) 367

Because they can get away with it.If it were my kid, it would be a different story.

Then again, I'm not aware of the whole facts of the case. I'm also sat behind a computer in a different country. I have no children with a Facebook account on which to post negative comments, as I have no children.

Comment Re:Unsurprising ... (Score 1) 300

I hate to be a pedant (I don't really), but monetising everything is the point of business. Facebook is given your information, either by your interaction with them directly (You make use of a Facebook account) or via a third party (tracking on websites, friends sharing details etc); It's not like they're calling your bank and asking for receipts of all the purchases you've made to offer you adverts, or opening your mail and suggesting friends based upon the contents ("Writing to your ageing grandparents? Be friends with Dignitas!").

I agree with the sentiment; I wish they weren't so ubiquitous or underhanded in their collection methodologies, allowing a "GTFO Facebook" service; A generic cookie which either discards or bundles your data with other such cookie users. Just pointing out that you're angry at a business for doing business things.

Comment Re:How can you search data (Score 1) 90

Exactly what I was getting at. I was including op mode, iterations etc in "encryption" for brevity. Very few here (including me) understand what it actually does, just that it's part of good "encryption". The fact that it is reversible by definition is all I was getting at. If you couldn't recover the plaintext, it would be more like a hashing algorithm.

Comment Re:How can you search data (Score 1) 90

Why is this even a thing? All reversible encryption (which in itself is a tautology) is searchable.

Plaintext record ID > Encryption+key+salt etc > Cyphertext record ID. Search for the cyphertext record ID. Bring encrypted record back from database. Encrypted record > Encryption > Plaintext record.

How is this a marketable product?!

Slashdot Top Deals

System going down in 5 minutes.

Working...