Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
The Internet

Why the Trolls Will Always Win 728

maynard writes: Kathy Sierra spent a tech career developing videogames and teaching Java programming in Sun Microsystems masterclasses. Up until 2007, she'd been a well regarded tech specialist who happened to be female. Until the day she opined on her private blog that given the crap-flood of bad comments, maybe forum moderation wasn't a bad idea. This opinion made her a target. A sustained trolling and harassment campaign followed, comprised of death and rape threats, threats against her family, fabricated claims of prostitution, and a false claim that she had issued a DMCA takedown to stifle criticism. All of this culminated in the public release of her private address and Social Security Number, a technique known as Doxxing. And so she fled from the public, her career, and even her home.

It turned out that a man named Andrew Auernheimer was responsible for having harassed Sierra. Known as 'Weev', he admitted it in a 2008 New York Times story on Internet Trolls. There, he spoke to the lengths which he and his cohorts went to discredit and destroy the woman. "Over a candlelit dinner of tuna sashimi, Weev asked if I would attribute his comments to Memphis Two, the handle he used to troll Kathy Sierra, a blogger. Inspired by her touchy response to online commenters, Weev said he "dropped docs" on Sierra, posting a fabricated narrative of her career alongside her real Social Security number and address. This was part of a larger trolling campaign against Sierra, one that culminated in death threats."

Now, seven years later, Kathy Sierra has returned to explain why she left and what recent spates of online harassment against women portend for the future if decent people don't organize. The situation has grown much more serious since she went into hiding all those years ago. It's more than just the threat of Doxxing to incite physical violence by random crazies with a screw loose.
Read on for the rest of maynard's thoughts.
United States

US Says It Can Hack Foreign Servers Without Warrants 335

Advocatus Diaboli tips news that the U.S. government is now arguing it doesn't need warrants to hack servers hosted on foreign soil. At issue is the current court case against Silk Road operator Ross Ulbricht. We recently discussed how the FBI's account of how they obtained evidence from Silk Road servers didn't seem to mesh with reality. Now, government lawyers have responded in a new court filing (PDF). They say that even if the FBI had to hack those servers without a warrant, it doesn't matter, because the Fourth Amendment does not confer protection to servers hosted outside the U.S. They said, "Given that the SR Server was hosting a blatantly criminal website, it would have been reasonable for the FBI to 'hack' into it in order to search it, as any such 'hack' would simply have constituted a search of foreign property known to contain criminal evidence, for which a warrant was not necessary."

Comment Re:waiving my consultancy fee today (Score 1) 124

First translate the algorithm into Perl, and then run it on a Perl interpreter written in BrainFuck, of which the BrainFuck interpreter is written in APL, which runs on a machine language written for a drum-based OS from the early 1960's.

You shouldn't knock Visual BASIC like that...

Electronic Frontier Foundation

Hundreds of Police Agencies Distributing Spyware and Keylogger 72

realized sends this news from the EFF: For years, local law enforcement agencies around the country have told parents that installing ComputerCOP software is the "first step" in protecting their children online. ... As official as it looks,ComputerCOP is actually just spyware, generally bought in bulk from a New York company that appears to do nothing but market this software to local government agencies. The way ComputerCOP works is neither safe nor secure. It isn't particularly effective either, except for generating positive PR for the law enforcement agencies distributing it.

As security software goes, we observed a product with a keystroke-capturing function, also called a "keylogger," that could place a family's personal information at extreme risk by transmitting what a user types over the Internet to third-party servers without encryption. EFF conducted a security review of ComputerCOP while also following the paper trail of public records to see how widely the software has spread. Based on ComputerCOP's own marketing information, we identified approximately 245 agencies in more than 35 states, plus the U.S. Marshals, that have used public funds (often the proceeds from property seized during criminal investigations) to purchase and distribute ComputerCOP. One sheriff's department even bought a copy for every family in its county.
Graphics

Euclideon Teases Photorealistic Voxel-Based Game Engine 134

MojoKid writes Not many would argue that current console and PC graphics technologies still haven't reached a level of "photo-realism." However, a company by the name of Euclideon is claiming to be preparing to deliver that holy grail based on laser scanning and voxel engine-based technologies. The company has put together a six-minute video clip of its new engine, and its genuinely impressive. There's a supposed-to-be-impressive unveil around the two minute mark where the announcer declares he's showing us computer-generated graphics rather than a digital photo — something you'll probably have figured out long before that point. Euclideon's proprietary design purportedly uses a laser scanner to create a point cloud model of a real-world area. That area can then be translated into a voxel renderer and drawn by a standard GPU. Supposedly this can be done so efficiently and with such speed that there's no need for conventional load screens or enormous amounts of texture memory but rather by simply streaming data off conventional hard drives. Previously, critiques have pointed to animation as one area where the company's technique might struggle. Given the ongoing lack of a demonstrated solution for animation, it's fair to assume this would-be game-changer has some challenges still to solve. That said, some of the renderings are impressive.

Comment Wrong Channel (Score 1) 200

Knowing what both the NSA and Snowden claim to have known during the discourse, why would Snowden use such an insecure channel of communication as email to voice objections? Other countries' government agents would likely have taken notice if he'd used something as insecure even as "internal" email.

Comment Re:Doom by boredom (Score 1) 170

It was hard and required some skill. Thats what made it enjoyable.

It was easy and required less skill than its precursors like Everquest, Ultima Online, and Anarchy Online. That's what made it enjoyable to players under the age of 8. About the only thing at the time requiring less skill and with less difficulty was Asheron's Call.

Cloud

Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos 336

swinferno writes with news about the leak of hundreds of private celebrity photos over the weekend. Hundreds of revealing pictures of female celebrities were leaked overnight after being stolen from their private collections. Hunger Games actress Jennifer Lawrence, Kirsten Dunst, and pop star Ariana Grande were among the celebrities apparently shown in the pictures, which were posted on infamous web forum 4chan. It's unclear how the images were obtained, but anonymous 4chan users said that they were taken from celebrities' iCloud accounts. The accounts are designed to allow iPhone, iPad, and Mac users to synchronize images, settings, calendar information, and other data between devices, but the service has been criticized for being unreliable and confusing. Earlier this year, Jennifer Lawrence herself complained about the service in an interview with MTV.

Slashdot Top Deals

Systems programmers are the high priests of a low cult. -- R.S. Barton

Working...