Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:The police are above the law (Score 1) 78

No, the world is not fucking different! The world has never been fucking different! All that happened was that a few assholes got lucky on 9/11 and then dumbasses like you shit themselves and then let Bush et al. turn the US into a goddamn fascist police state! Being a dumbass is one thing, but being a dumbass in a way that screws over everybody else is not acceptable.

YOU LET THE TERRORISTS WIN, YOU GODDAMN MORON!

Comment Re:Law does not equal justice (Score 1) 149

Why? It perfectly fits the government's 1984-inspired naming convention, just like the Department of Defense (née War*) and the Department of Homeland Security.

(* It was renamed in 1949 in an amendment to the National Security Act of 1947, which was the law that established the CIA, among other things. Coincidence?)

Comment Re:Banned from our approved vendors list (Score 4, Insightful) 266

It also wouldn't affect the corporate world because business-grade PCs were never infected with it in the first place.

However, the real issue -- the one that makes competent companies completely justified in shit-listing Lenovo -- is the argument that if a company is capable of exercising such poor judgement now, then who knows what other poor judgement they might show in the future. Maybe the next "oops" will be a hardware keylogger in Thinkpads or a compromised WiFi firmware or something.

Lenovo may have backpedaled this time, but the malware only happened to begin with because somebody at Lenovo thought it was a good idea. That, by itself, poses an unacceptable risk to any sane customer.

Comment Re: Any ideas how long these exploits have existed (Score 1) 144

(Note: I'm the grandparent AC.)

Right, half the point of this would be to defeat the Ken Thompson hack (which is what you're talking about) by cross-compiling with three different, independently-developed systems, or "ideally... by writing a simple bootstrapping C compiler in assembly (and an assembler in machine language) yourself." Maybe I wasn't clear above: the goal is not to compile three different sets of software using the three machines; the goal is to use disparate hardware and software to compile bit-for-bit identical sets of software that can be trusted because three different machines are telling you it's correct.

In other words, the hope is that even if one of the systems is infected with a compromised compiler, not all three are and thus you can detect that it's trying to insert the backdoor in the output by comparing it against the compilers whose output is clean.

Comment Re:WTF? (Score 1) 114

The answer to both those questions (and more!) is the same: users are stupid, so make the router as easy as possible to configure even at the cost of security (assuming the programmer even notice that the security got fucked up).

I'm surprised the damn things don't have public-facing telnet or UPnP (and for all I know, they might).

Comment Re:Isn't slashdot's reaction interesting... (Score 4, Insightful) 65

As an American, I have the right, duty and obligation to complain about the NSA's illegal bullshit because they're (ostensibly) claiming to represent me as a citizen, while acting against my interests as a citizen. France, on the other hand, is a sovereign foreign nation, in which I have no standing to complain.

The spying is bad no matter who's doing it, but it's the French citizens' job to fix France's spying, not mine, just as it's American citizens' job to fix the USA's spying, not theirs.

Slashdot Top Deals

Any sufficiently advanced technology is indistinguishable from a rigged demo. - Andy Finkel, computer guy

Working...