Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Video only? (Score 1) 222

No rational person would claim the coffee shop has to provide more than 300 gallons of coffee to a single customer.

No rational person would think a person can drink 300 gallons of coffee in a single visit. However much a person might drink outside your silly imaginary world, however, the coffee shop damn well better deliver.

Comment Re:Video only? (Score 2) 222

"With the ISP I work for currently, 0.1% of our customers cost us 50% of the bandwidth. It isn't right that a few punks think they can try to destroy service for everyone else with what looks like an attack."

It isn't right to advertise high speeds only to cripple people's connections for making full use of the advertised bandwidth. If you can't deliver on what you promise, stick to promising 28.8 kbps and see how that works out for you.

Comment Re: Fine. (Score 1) 180

Google not in France Not obligated to do shit for the Frogs Court orders, Just ignore them.

Google does have a French subsidiary, which places them under French jurisdiction. A bigger problem is the fact that Google has been ordered to block the images worldwide. Whether France has the authority to do that or not, I have no idea.

Comment Re:fattening the cow (Score 1) 220

"And we now have a thriving competitive market for phone packages and internet packages at very affordable prices compared to American, Australia and numerous other countries"

Your prices are affordable compared to America, but American phone companies and ISPs are also private. Could it be profitability has more to do with management than with private ownership?

"There aren't 'routes' when it comes to post, and if we want someone to be able to receive post when they live in the middle of nowhere then we either need to allow companies to charge them a fortune or we need to subsidise it in some way."

Then subsidize it.

"The cost to use the service has increased above inflation, which is why Royal Mail is finally profitable."

Government entities don't need to be profitable, and most of them aren't. Taxpayers are not shareholders.

Comment Re:Private browsing (Score 2) 382

"A good proxy server is going to allow your system administrators to decrypt your SSL connection. The proxy feature works for SSL but not before exposing all of the information in your connection to the administrators. So using an external proxy and SSL is not going to provide any security."

This is true, but only if your employer has or otherwise gains access to your computer's certificate store and installs a root certificate whose private key is known by the proxy. The proxy can then sign fake SSL certificates which it uses to decrypt, capture and re-encrypt the connection.

Comment The myth of an open DRM standard (Score 2) 433

You're wrong, Mr. Jaffe. Any website using DRM is "walled off" by design. Adding Encrypted Media Extensions to HTML5 doesn't change that, although it does allow its proponents to falsely claim that, as part of the standard, it opens up protected content to HTML5-compliant browsers instead of being tied to proprietary platforms like Flash and Silverlight.

Standard or not, encrypted HTML5 video will only run on platforms that support whatever proprietary DRM scheme the content producers have chosen. Instead of needing something like Flash or Silverlight, "DRM Flavor X" will be required for content to be decrypted. Since DRM schemes are only effective when users cannot alter them, there will never be such a thing as Open Source DRM. Open Source browsers that wish to be compatible with "DRM Flavor X" will therefore have to either incorporate proprietary code (in object form rather than source code) or rely on proprietary DRM hardware to handle decryption and display. Either way, it's "walled off" and proprietary.

Comment Re: drawings (Score 1) 306

"So that type of drawings and computer generated pictures are currently illegal in the USA."

Not necessarily. The key distinction appears to be whether or not the images are legally obscene according to the so-called Miller test. Obscenity has never enjoyed constitutional protection, so ultimately the PROTECT Act of 2003 changes nothing.

Besides, USA is not the whole world.

Comment Good intentions, but a bad idea. (Score 2) 306

What about borderline content such as non-pornographic nudity, sexually explicit drawings of imaginary minors, and pornographic images of adults who look like teenagers? It's likely these will be branded as "child pornography", leading to images being suppressed that are legal in many jurisdictions including the United States.

Once service providers start censoring content based on third party reports of alleged child pornography, it becomes much easier to supress other content as well. Organizations such as RIAA and MPAA would love to be able to flag arbitrary content as infringing and have ISPs block such content automatically, bypassing even the need to file DMCA takedown notices. Think of how often YouTube videos are incorrectly flagged as examples copyright infringement and extend this to all ISPs who check against Google's database, and you can see the problem.

ISPs who participate in this system delegate the right to make judgment calls on material that isn't obviously illegal to the maintainers of a central database whose judgment may or may not be consistent with local law. Anything in the database is assumed to be illegal regardless of its actual legal status, and the ISPs just follow along instead of deciding individually whether or not the content is likely to survive a legal challenge. Once the system becomes widespread, ISPs may even feel it is necessary to follow it to avoid secondary liability for content posted by their users.

This is yet another example of a worrying trend, where content alleged to be illegal or infringing is removed without due process and often with little regard for the law and relevant jurisprudence. It's no way to run a network that for many has become a primary means of communication.

Internet users deserve better than to have their content blocked according to extralegal judgments with perhaps no bearing on local law, little or no chance of appeal, and no way to establish legal precedents protecting certain kinds of content.

Comment Re:As usual, rubbish article (Score 1) 417

Key disclosure law:

The Fifth Amendment to the United States Constitution protects witnesses from being forced to incriminate themselves, and there is currently no law regarding key disclosure in the United States. However, the federal case In re Boucher may be influential as case law. In this case, a man's laptop was inspected by customs agents and child pornography was discovered. The device was seized and powered-down, at which point disk encryption technology made the evidence unavailable. The judge argued that since the content had already been seen by the customs agents, Boucher's encryption password "adds little or nothing to the sum total of the Government's information about the existence and location of files that may contain incriminating information."[18]

In another case, a district court judge ordered a Colorado woman to decrypt her laptop so prosecutors can use the files against her in a criminal case: “I conclude that the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer,” Colorado U.S. District Judge Robert Blackburn ruled on January 23, 2012.[19]

In United States v. Doe, the United States Court of Appeals for the Eleventh Circuit ruled on 24 February 2012 that forcing the decryption of one's laptop violates the Fifth Amendment.[20][21]

The difference between the two rulings is in previous cases, the courts have held that when the government already knows of the existence of specific incriminating files, compelling a suspect to produce them does not violate the Fifth Amendment's rule against self-incrimination. On the other hand, if the government merely suspects that an encrypted hard drive contains some incriminating documents, but lacks independent evidence for the existence of specific documents, then the owner of the hard drive is entitled to invoke the Fifth Amendment. In the Colorado case, the police had intercepted a telephone conversation in which the defendant, Ramona Fricosu, acknowledged her ownership of the laptop and alluded to the existence of incriminating documents in the encrypted portions of the hard drive. The government successfully argued that this precluded her from claiming Fifth Amendment protection, since she had already acknowledged the existence of incriminating documents in the case. The Tenth Circuit let that decision stand, though it may consider the issue again later in the process.

In the Florida case, on the other hand, the government lacked any specific evidence about the contents of the encrypted hard drives. A forensic expert acknowledged it was theoretically possible that the drives, which were encrypted using TrueCrypt, could be completely empty. Hence, forcing the suspect to decrypt the drive would be forcing him to reveal whether any relevant documents exist, which would be inherently incriminating.

Comment Re:This is why I hate Android (Score 1) 137

Because trojans can use legal API's to do work, and defense in depth means that there is actually depth to your defense.

This, of course, applies to both platforms. How, then, is running programs from outside the Google Play store is any less safe on Android than running programs from outside the App Store would be if iOS permitted it.

Slashdot Top Deals

Always look over your shoulder because everyone is watching and plotting against you.

Working...