Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Answer To This. (Score 2) 252

Is registering as a business the answer to "confiscate everything in sight that looks like a computer?"

Maybe paying for a business line will frame the cops expectations correctly before they roll up on your residence. Make them more willing to listen to your network setup and only take the publicly accessible _half of your kit.

Comment Re:Unfortunately... (Score 1) 252

What practical physical barriers are there that can prevent "everything vaguely resembling a computer siezed"?

The police will come to your residence, no?

would it have to be as extreme as having a 2nd address with your open WiFi and Tor exit node running? How do hosting companies convince the cops to "only" take one entire rack or server, and not every scrap at their location?

Comment Re:don't let your stuff be used for criminal stuff (Score 1) 252

Keep your gate open for your neighbors, but if there is a crime on your patio - you want the doors to your house to be securely and _clearly locked.

Hardware is so inexpensive now a days; a participatory, community-building point of view suggests you should be running two sets of hardware. One set for your open WiFi and Tor exit node, and the other for your personal use.

With costs as low as they are you should not have to abandon your peers just to protect yourself from heavy-handed law enforcement.

Comment Re:Missing the point (Score 1) 538

Im sorry ... "*If* this site is staffed ..." Can we put some breaks on here, before we go speculating

Is there even more then one former staffer?

Can we get some names here please? - AFAIK wikileaks is a really small team, with only 1 former member, Daniel Domscheit-Berg.

This smells like a non-story to me.

Comment Re:Assange gets arrested - Who Is Behind this? (Score 1) 538

Who is behind this 'breakaway, - "[S]everal key figures"?

Let's have some names please.

To my knowledge Wikileaks is a very small team, and there is only ONE former member (Daniel Domscheit-Berg)
DB seems to have a personal bone to pick with wikileaks,

The fine article reads like a hyped up smear piece trying to puff up the creation of OpenLeaks. Now I only skimmed it, - but Is there any demonstrable evidence out there that openleaks is something more then a non-starter/one-man show born out of a single bad attitude, or unwillingness to commit to the ball that is already rolling quite well?

Comment But what is hardware/software will display it (Score 1) 19

Immediately i wondered if the videos will be hosted locally, or if they'll just slap a PC into a slot in the wall & stream it in a browser.

"presented ... and hosted on the YouTube Website by Google, Inc (“Google”)"
from event details, (linked to from youtube.com url in article)

maybe the physical display set up will be neat. Looks like they are jumping full in on the "gee there is content youtube.com" angle

Comment Wait, but Access other people's Voicemail? (Score 1) 139

The exploit they mention uses two rapid calls, the first one hanging up, to provide the second one access to voicemail without causing the handset to ring.

is it just me or does that not explain how they are able to gain access to the messages?

are they relying on the fact the phone does not ring to quickly brute-force the PIN undetected?
Because that would be illegal in most states, ("Unauthorized use of a computing resource, etc.")

Comment This is not self-monitoring. (Score 4, Interesting) 51

On the face of it proposal #3 seems perfectly fine.

The desire for government agencies to have "situational awareness" in the form of deep-packet inspection of every transaction coming in or out of their network is nothing more then a proactive capability that any responsible Admin might want for their network. (assuming they disclose this capability and have policy dictating its use)

What does worry me are the washington posts comments about Telcom involvement.
This other article make it very clear EINSTEIN 3 is truly NSA equipment installed on the commercial telcom network where the potential exists for it to easily be repurposed to monitor _OTHER_ traffic streams.
http://www.washingtonpost.com/wp-dyn/content/article/2009/07/02/AR2009070202771.html?nav=emailpage

this is a whole different animal from whitehouse.gov's portrayal of responsible network admin.

Comment Re:Kyllo (Score 1) 297

Ah, but parent was referring to warrantless monitoring of hourly electricity usage.

more on topic however is the fact that the power company is the one watching, not the police.

they're not exactly like a phone company though, since in most areas in the US there is only a single, quasi-chartered, heavily regulated utility entity.

Comment ZigBee my friend - 900Mhz ISM band! (Score 1) 1092

I like the solution of a linux machine with GPS and a GSM modem, mostly because of the added ~telephone~ functionality. but that's hardly cool at all, so then i thought - ham radio maybe? any mobile packet radio gear that weighs less then 10kg?

but that requires a license to broadcast on.

What your kid really needs is a little board to speak your custom, encrypted, location protocol over the 900Mhz ISM band! i hear you can get 40mi range for 400usd ;P

Comment More recently MFG'd flash has more writes. (Score 1) 357

For ~3 years now ive been using a swapfile on a 2GB Kingston micro-mmc card with my nokia tablet (only 64meg ram)

after running an 8Meg file as swap i got a scare maybe 6mo back when i was unable to write a new file to the card - I thought, I'd finally done it: id burned through my writability -

after some close inspection though, i'd just hit the FAT file-per-directory limit. oh -ho :P

Recently ive actually increased the file to 64Meg to swap out more stuff for gaming with large Roms.
Honestly Im amazed the card has lasted as long as it has - considering i thrash the system near-constantly - with my new usage patterns, i'd still estimate the card has another 2 healthy years of service.

Comment Only protects from profiling ISPs (Score 5, Insightful) 240

By firing up random connections, this only protects you from an ISP that is profiling your use. The MPAA can still go fire up a bitorrent client, join a swarm downloading content they claim copyright on and start writing down the IP of everyone who is participating. And then they call up your ISP. this 'masking' technique doesnt actually 'mask' anything very well.

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...