Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Sorry but why is this news? (Score 2) 267

I totally agree. I'm typing this on a Macbook Pro 3,1 (mid-2007, Core 2 Duo 2.4ghz. Upgraded to 6gb ram, installed an SSD, still runs great) running Snow Leopard. I'll upgrade when it dies and not before.

At work I'm running a Mac Pro 1,1, upgraded with two SSDs and 14gb ram, new Nvidia graphics card. I had upgraded it to Lion--wish I had left it on Snow Leopard. Still runs great, however.

Submission + - How a Coalition of Civil Rights Groups Sold Us Out on Net Neutrality (salon.com)

Crayz9000 writes: From The Nation Institute's reporting fellow Lee Fang comes the disturbing news that

[J]ust before the Federal Communication Commission closed its comment period for its upcoming rule on “network neutrality,” a massive coalition of Asian, Latino and black civil rights groups filed letters arguing that regulators should lay off of Internet Service Providers regarding Title II reclassification and accept FCC Chairman Tom Wheeler’s original plan. In other words, something close to half of the entire civil rights establishment just sold out the Internet.

The civil rights groups letters argue that Title II reclassification of broadband services as a public utility—the only path forward for real net neutrality after a federal court ruling in January—would somehow “harm communities of color.” The groups wrote to the FCC to tell them that “we do not believe that the door to Title II should be opened.” Simply put, these groups, many of which claim to carry the mantle of Martin Luther King Jr., are saying that Comcast and Verizon should be able to create Internet slow lanes and fast lanes, and such a change would magically improve the lives of non-white Americans.

The filings reveal a who’s who of civil rights groups willing to shill on behalf of the telecom industry. One filing lists prominent civil rights groups NAACP, the League of United Latin American Citizens, the Urban League, the National Council on Black Civil Participation and the National Action Network. The other features the Council of Korean Americans, the Japanese American Citizens League, the National Black Farmers Association, the Rainbow PUSH Coalition, OCA, Asian Pacific American Advocates, the National Puerto Rican Chamber of Commerce, the Latino Coalition and many more.

He finally concludes that...

Times have changed. Just as Martin Luther King Jr.’s children have embarrassingly descended into fighting bitterly over what’s left of his estate, the civil rights groups formed to advance Dr. King’s legacy seem willing to sell out their own members for a buck.


Submission + - How Many Members of Congress Does it Take to Screw in a $400MM CS Bill?

theodp writes: Over at Code.org, they're banging the gong to celebrate that more than 100 members of Congress are now co-sponsoring the Computer Science Education Act (HR 2536), making the bill "to strengthen elementary and secondary computer science education" the most broadly cosponsored education bill in the House. By adding fewer than 50 words to the Elementary and Secondary Education Act of 1965, HR 2536 would elevate Computer Science to a "core academic subject" (current core academic subjects are English, reading or language arts, mathematics, science, foreign languages, civics and government, economics, arts, history, and geography), a status that opens the doors not only to a number of funding opportunities, but also to a number of government regulations. So, now that we know it takes 112 U.S. Representatives to screw in a CS education bill, the next question is, "How many taxpayer dollars will it take to pay for the consequences?" While Code.org says "the bill is cost-neutral and doesn’t introduce new programs or mandates," the organization in April pegged the cost of putting CS in every school at $300-$400 million. In Congressional testimony last January, Code.org proposed that "comprehensive immigration reform efforts that tie H-1B visa fees to a new STEM education fund" could be used "to support the teaching and learning of more computer science in K-12 schools," echoing Microsoft's National Talent Strategy.

Submission + - The CIA Does Las Vegas (belowgotham.com)

Nicola Hahn writes: Despite the long line of covert operations that Ed Snowden’s documents have exposed public outcry hasn’t come anywhere near the level of social unrest that characterized the 1960s. Journalists like Conor Friedersdorf have suggested that one explanation for this is that the public is “informed by a press that treats officials who get caught lying and misleading (e.g., James Clapper and Keith Alexander) as if they're credible.”

Certainly there are a number of well-known popular venues which offer a stage for spies to broadcast their messages from while simultaneously claiming to “cultivate conversations among all members of the security community, both public and private.” This year, for instance, Black Hat USA will host Dan Greer (the CISO of In-Q-Tel) as a keynote speaker.

But after all of the lies and subterfuge is it even constructive to give voice to the talking points of intelligence officials? Or are they just muddying the water? As one observer put it, “high-profile members of the intelligence community like Cofer Black, Shawn Henry, Keith Alexander, and Dan Greer are positioned front and center in keynote slots, as if they were glamorous Hollywood celebrities. While those who value their civil liberties might opine that they should more aptly be treated like pariahs”

Submission + - Was America's #1 Rocketeer a Communist Spy? The FBI thought so.

IMissAlexChilton writes: Frank Malina masterfully led the World War II effort to build U.S. rockets for jet-assisted takeoff and guided missiles. As described in IEEE Spectrum, Malina’s motley crew of engineers and enthusiasts (including occultist Jack Parsons) founded the Jet Propulsion Lab and made critical breakthroughs in solid fuels, hypergolics, and high-altitude sounding rockets, laying the groundwork for NASA’s future successes. And yet, under suspicion by the Feds at the war’s end, Malina gave up his research career, and his team’s efforts sank into obscurity. Taking his place: the former Nazi Wernher von Braun. Read “Frank Malina: America’s Forgotten Rocketeer”. Includes cool vintage footage of early JPL rocket tests. Disclosure: I am a staff editor with IEEE Spectrum.

Submission + - Programmers: Why Haven't You Joined The ACM? (itworld.com) 1

jfruh writes: The Association for Computing Machinery is a storied professional group for computer programmers, but its membership hasn't grown in recent years to keep pace with the industry. Vint Cerf, who recently concluded his term as ACM president, asked developers what was keeping them from signing up. Their answers: paywalled content, lack of information relevant to non-academics, and code that wasn't freely available.

Submission + - a NEW Road Warrior movie

turkeydance writes: Following more than a decade of gestation and interruptions and coming nearly 40 years after the original film, the latest installment of George Miller’s apocalyptic action series Mad Max will finally see the light of day.
http://www.slate.com/blogs/bro...

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

Slashdot Top Deals

He who steps on others to reach the top has good balance.

Working...