Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Telecommunications (Interception and Access) Ac (Score 1) 236

IANAL but one might argue that "copper wire" isn't a telecommunication system either.

But, like free space (or air as you put it) it might form part of one.

The act doesn't specify how the network is established - only that intercepting communications on it would be in contravention of Section 7 of that Act.

Comment It's connected to the PSTN... (Score 1) 236

IANAL but the mobile system is connected to the landline system (series of systems) which together make up the telecommunications network. I would conclude therefore that the mobile telephone network is not excluded by this provision. An example of an excluded system might be a taxi radio control system or air traffic control.

Comment Telecommunications (Interception and Access) Act (Score 5, Interesting) 236

In Australia, the Telecommunications (Interception and Access) Act 1979 explicitly prohibits this activity.
Section 7 - Telecommunications not to be intercepted

A person shall not:

  • (a) intercept;
  • (b) authorize, suffer or permit another person to intercept; or
  • (c) do any act or thing that will enable him or her or another person to intercept;

a communication passing over a telecommunications system.

This seems like a pretty clear violation to me. (note, that even though it is data traffic between the phone and the cell and not voice, it still violates the above.)

Comment But is it worth chasing lesser quantities... (Score 1) 354

"But is it worth chasing lesser quantities that would result in zero or minimal damage?" If 10X of a bad substance is your damage threshold and 2X is your detection threshold then all Terry Terrorist has to do is smuggle X ten times.... stashing it somewhere after security. On the 10th time he picks up 10X after passing security and boards a plane. Boom.
Science

Submission + - Climategate: My Resignation From The APS (thegwpf.org)

bool2 writes: Harold Lewis is Emeritus Professor of Physics, University of California, Santa Barbara, former Chairman; Former member Defense Science Board, chmn of Technology panel; Chairman DSB study on Nuclear Winter; Former member Advisory Committee on Reactor Safeguards; Former member, President's Nuclear Safety Oversight Committee; Chairman APS study on Nuclear Reactor Safety...

And he is resigning from the APS as a result of ClimateGate. His letter is a great read.

Piracy

Submission + - Second Pirate Bay trial begins today

mikael_j writes: With the Swedish parliamentary elections done the Pirate Bay trial is once again under way. The event is getting coverage from a lot of different sources indicating that the self-imposed media blackout concerning software piracy and the Pirate Party is over in Sweden.

In Sweden industry representative Per Strömbäck is busy writing articles (Swedish) claiming that "internet anarkism" is now officially over, naturally doing so without disclosing that his organisation is directly funded by the large media outfits that oppose The Pirate Bay.
Programming

Submission + - BBC Micros used in retro programming class (bbc.co.uk)

bool2 writes: This is fantastic. Exactly what computer science courses need. From the BBC site: "

Perry Gemmell lamented the lack of friendly interface on the BBC Micro, which presents users with a screen full of text.

"It's easier to find bugs in Visual Basic," he said. "It helps you as you go along."

Visual Basic suggests words while a coder types, highlights syntax errors and makes bug hunts easier by jumping straight to the problematic code — even when the error is one of logic rather than letters.

By contrast, the BBC Micro is a study in imperious indifference. Get something wrong and the program will crash and perhaps throw up an error message. Worse are the cases when it works but not in the way expected leaving the programmer to scratch their head and try to work out why."

Security

Submission + - DefCon Ninja Badges Let Hackers Do Battle (wired.com)

eecue writes: The folks at DefCon, the world's largest hacker convention [previously on slashdot], have been making awesome badges for years. Last year along with the convention badge, a group of hackers known as the Ninjas created an electronic badge for their exclusive party. This year the Ninjas have taken the whole electronic badge thing to the next level with an interactive, wireless, encrypted ninja battle video game badge. I convinved the Ninjas to give Wired.com an exclusive sneak peek, and let me tell you, this thing is awesome.

Submission + - Ultraviolet: A new form of DRM (defectivebydesign.org)

bool2 writes: A soon to be implemented DRM scheme, UltraViolet, is a joint effort between companies such as Sony, Adobe, Cisco, HP, Microsoft and Intel. What seperates UltraViolet apart from other types of DRM is its use of "the cloud." Whereas most other DRM schemes are implemented locally, UltraViolet intends to store the digital media you purchase on a centralized server with the goal of preventing users from storing their digital media on unauthorized devices, sharing and making copies.

More general information can be found at the Ultraviolet website

GNOME

Submission + - GNOME 3.0 delayed until March 2011 (derstandard.at) 4

Julie188 writes: In the ongoing saga of GNOME 3.0, here's another delay. GNOME 3.0 was scheduled to be released in September but during the developers conference, GUADEC 2010 in Den Haag, the organization had to face facts: the much ballyhooed GNOME Shell really wasn't ready. The Shell is supposed to bring "a whole new user experience to the desktop." So now, in September, what users will see is GNOME 2.32, distributed as a new stable release. Next target date for 3.0: March 2011.
Nintendo

Submission + - UK Courts rule Nintendo DS SD Card readers illegal (bbc.co.uk)

CheShACat writes: The UK law court has today ruled that SD Card readers for Nintendo DS are illegal, finding 2 vendors guilty of selling "Game copiers". The ruling by Justice Floyd is quoted as saying "The economic effect on Nintendo of the trade in these devices is substantial as each accused device can store and play copies of many Nintendo DS games [...] The mere fact that the device can be used for a non-infringing purpose is not a defence."

No word in the article as to what law in particular they were found to have broken, nor of the penalty the vendors are facing, but this looks like bad news for all kinds of hardware mod, on any platform, that would enable homebrew users to bypass vendor locks.

Privacy

Submission + - UK ISP TalkTalk Caught Monitoring its Customers (ispreview.co.uk)

An anonymous reader writes: A United Kingdom Internet Service Provider, TalkTalk, has been caught using a form of Deep Packet Inspection (DPI) technology to monitor and record the websites that its customers have been visiting and without getting their explicit consent. The system, which is not yet fully in place, ultimately aims to help block malware websites by comparing the URL that a person visits against a list of good and bad sites. Bad sites will then be restricted. TalkTalk claims that its method is totally anonymous and that the only people with visibility of the URL database itself are Chinese firm Huawei, which will no doubt help everybody to feel a lot better (that's sarcasm) about potentially having their privacy invaded.

Slashdot Top Deals

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...