Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment SubjectIsSubject (Score 1) 302

May soon? It's already happened.
I just made a new account in September for business use, and before I had time to even put any photos or information in, they locked me out of my account and demanded a photo of my face to verify my identity.
How could that possibly work, when I hadn't even uploaded a picture to compare it to? 3 days later they finally unblocked the account, but then proceeded to do it 4 more time, each taking an extra day to unlock.

There also seems to be more going on, since I edited one of the photos to include the text "stop blocking my f*cking account" and Facebook refused to upload the photo. The site would just idle. Choosing another image, resized but without the text and the same filename did work and I didn't refresh the page or anything.
It's sketchy as hell and I put the absolute bare minimum information I could, with only a couple friends added but I'm sure they still know everything about me anyway.

Comment SubjectIsSubject (Score 4, Insightful) 200

Microsoft will not download install files for new operating systems to a user system's hard disk without a user's consent.

They really need a clear definition of "consent" because from what I remember just hitting the "X" on the upgrade Window instead of "Cancel" was actually considered consent by MS. It's purposefully misleading and you know they'll do it again with Windows 11 or whatever bullshit name they call it.

Comment SubjectIsSubject (Score 1) 118

I know everyone is making fun of the name, but let's be serious here. China's track record for public safety is rather poor with things like falling elevators and collapsing escalators, so all things considered I think we need to consider that there is a good chance this train could Fuxing crash!

Comment SubjectIsSubject (Score 5, Insightful) 214

Of course he can. It's his personal account.
Within seconds of a tweet being posted, he'll have hundreds of replies, almost instantaneously, from the same people consistently, who always manage to get out 6 part tweets within a few seconds of each other.

Spam, essentially. And what do we do with spam? We block it.
Admittedly that's how most people deal with @realDonaldTrump anyway.

Comment SubjectIsSubject (Score 1) 197

Alternatively:

NSA Group That Hacked Hotels Used Russian Attack Code In Attack On DNC

Did the NSA not have a tool that signs malware with the code of known groups as a way of implicating them and not the NSA? This tool simply existing calls into question pretty much any "hacker group did such and such". Unless that group claims responsibility, then we can't be really sure who did what.

Slashdot Top Deals

If a 6600 used paper tape instead of core memory, it would use up tape at about 30 miles/second. -- Grishman, Assembly Language Programming

Working...