Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Australia

Submission + - Copyright enforcement leads to artist's suicide. (theage.com.au)

freddienumber13 writes: The MPAA, RIAA, and every other entertainment industry body tells us how copyright enforcement is for the benefit of the artists. What they don't tell you is that nearly all musical art is based on other work, be it conscious or subconscious. The chase for money as a result of 2 bars from a folk song being used in a rock song led to the untimely and completely avoidable passing of a member of the band that recorded "Down Under". Congratulations to those that chase and enforce copyright — you ultimately brought about the passing of those whom you profess to serve through those very actions. Is it not yet time to rethink the purpose and pursuit of copyright? Or do we need to destroy the lives of more artists?
Australia

Submission + - 2 year data retention for Australian ISPs (theage.com.au)

freddienumber13 writes: Following similar acts passed by foreign governments, the Australian government is now seeking feedback on its plans to bring into law the requirement for ISPs to retain user data for up to 2 years. They're also seeking changes to the law that would allow undercover ASIO agents and its sources to commit crimes which would include, for example, hacking into your computer.
Robotics

Submission + - Laser Powers Lockheed Martin's Stalker drone For 48 Hours (suasnews.com)

garymortimer writes: "Lockheed Martin (LMT) and LaserMotive, Inc., recently demonstrated the capabilities of an innovative laser power system to extend the Stalker Unmanned Aerial System (UAS) flight time to more than 48 hours. This increase in flight duration represents an improvement of 2,400 percent.

Stalker is a small, silent UAS used by Special Operations Forces since 2006 to perform intelligence, surveillance and reconnaissance missions."

Australia

Submission + - Australia to review Copyright Fair Use (computerworld.com.au)

freddienumber13 writes: The Australian Government has announced a review of the copyright act to look at the provisions of fair use and exceptions with a view towards considering whether or not the law has kept pace with technology and thus if further provisions are required to ensure the act remains relevant and effective.
Privacy

Submission + - Does HTTP "Referer" give away too much privacy? 3

freddienumber13 writes: When browsing movie torrents on piratebay, it is common to see links to imdb and other websites run by commercial entities for information on a movie. However when you click on those links, your web browser sends along the URL of the web page that you saw the link on in the "Referer" header. Thus someone like Amazon can gauge pirate interest in a movie or other item without actually having to monitor piratebay traffic directly. For imdb, which is owned by Amazon, Amazon can get information on what movies you are interested in pirating as well as what movies you buy. Is it time that the "Referer" header was discarded completely because of how it compromises your browsing security?
Australia

Submission + - Australia: ACCC seeks injunction against Apple for iPad advertising (theage.com.au)

freddienumber13 writes: The Australian Competition and Consumer Comission (ACCC) has filed in an injunction against Apple for misleading advertising surrounding its latest iPad. In Australia, the latest iPad does not work on the 4G networks yet the advertising for the iPad continues to tout it as an available feature. Refunds for consumers and corrected advertising are being sought.

Submission + - Open hardware/source digital camera?

freddienumber13 writes: As many slashdotters will know, the firmware in digital cameras is often rather buggy. Often times it is also does not make full use of the hardware capabilities (GH2). And in almost every case, after a few short years, we're left with a small computer with a digital sensor with which we can do nothing but throw out because there's no documentation for the hardware or SDKs. This then begs the question: what if an open source digital camera could be developed? What would it take to design the board, lens, purchase a sensor, design/fabricate a case and controls, all of which is documented openly, allowing us to put whatever software we wanted in it. Would it sell? Would it reach critical mass in a developer community? Could it attract enough VC to make a viable plan? Could a plugin architecture be implemented? And most importantly, would the user interface not suck?

Comment Text based secure syslog already solved (Score 1) 248

There are RFCs that cover the transmission of syslog messages in a secure fashion. 5424, 5425, etc.

There are tools that store syslog messages - in plain text - in a secure fashion.

syslog-ng is just one of them.

This post is "old" and nothing more than a group of people reinventing the wheel.

The *only* way to solve tampering with log data is to store it on another machine and hope hackers don't get to that.

If a hacker gains access to a system with log files on it, the best you can do is make the logging tamper-evident. This means that if the hacker modifies the data, in any way, it can be detected. This includes hash recalculation.

Making the system tamper-evident with hashes simply means that all hashes require a secret input and that the input is only ever stored on the system for the next entry. If you know the secret input for hash#0, then you can calculate the secret input for hash#n, but knowing the secret input for hash#n does not tell you what it was for hash#(n-1). Similarly, the secret input for hash#0 is not stored on the system.

Submission + - Is copyright stifling Hollywood? 2

freddienumber13 writes: An article about Hollywood continually using 19th century texts for movies on The Guardian's website finishes with a comment about how all of these books and stories being used time and again for movies are out of copyright. Is this something that the Hollywood mafia has overlooked? In their quest for elongating their franchise over old works, are they in fact condemning new work to being ignored because the prospect of using someone else's copyright is too expensive?

http://www.guardian.co.uk/film/2011/may/30/filming-the-classic-novels

Comment Transcript of *FULL* PBS interview with Assange (Score 1) 387

The full transcript of the PBS interview with Julian Assange is online at:

http://wikileaks.ch/WikiSecrets-Julian-Assange-Full.html

If you watch the PBS interview then read the transcript of the interview to see what was really said and in what context.

PBS is alleged to have used and cut the interview to present Assange in an anti-American perspective.

Comment Bit rot does happen. (Score 1) 550

This is not as stupid as it sounds, hence the reason that newer filesystems (such as ZFS) calculate checksums for all data independent of those used by the hardware. Similarly, people use RAID in hardware not only to mitigate hardware failure but data corruption. To a certain extent, storing data in formats such as ZIP/RAR offers you the ability to be aware of data being corrupted through the use of checksums but alas recovery is limited. If/when storage devices have an error rate of 0, then the parent to this is a joke.

Comment Think differently. (Score 1) 105

If I connect my laptop to your Wifi network because you do not have a password, is that connection authorised without you saying I can do it?

If I connect my laptop to your Wifi network because I know your network password (lets say I guess it), is that connection authorised without you saying I can do it?

If I create a "guest" login on a web server that has no password and someone logs into it without my authorisiation, is that against the law or not?

If that "guest" login also has "guest" as a password and a hacker guesses both and logs in without my authorisation, is that against the law or not?

The correct answer to all four of these questions is "no." Accessing a private resource that you have not been given prior authorisation to access is effectively trespassing. Think of it like someone walking onto your property because you don't have a fence. Whilst it maybe careless and inviting trouble, in no instance does that recklessness on the part of the owner give others the right to do what they choose.

Just because the radio data is being broadcast and you can receive it, you are not automatically entitled to access or use hardware that is transmitting it or connected to the transmitter. Consider that when you connect to a wireless network that you are communicating with a wireless access point, not just receiving its data, and thereafter sending data to that network.

It has already been admitted by Google that they received data from wireless networks that in turn required them to actually connect to those wireless networks.

In actual fact, there is only one possible outcome in every case where a government is investigating at that is for Google to be found guilty. If anything else happens then it could be argued that not even encrypted data is private. The question isn't about what form the data takes but whether a 3rd party has a right to access it without authorisation.

Lets say that I collect a month of your encrypted wifi data and then break all of your encryption keys. I then post it all over the web. The data was broadcast over the airwaves, therefore it was public. That it was encrypted was just you believing, foolishly, that the data was private and therefore unable to be accessed by others. How would you feel about that? Whether or not the data is encrypted is beside the point - you're broadcasting it to everyone within about 100', so why should you have any right to privacy as a result of that broadcasting? If you want your encrypted data to be private then data that is not encrypted must also be private. Electromagnetic waves have no specific property that says "I'm private" or "I'm encrypted". The presence (or lack thereof) of encryption is not a representation of whether or not something is or should be private. Start by accepting that all privately transmitted radio data is private unless you're specifically broadcasting for public benefit.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...