Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:And? (Score 1) 423

The surprise is the number of users today who are screaming "Da fuq? Teh Intuit iz de DEVIL!!!!" who were all of yesterday shrugging off Google's lobbying juggernaut as "just playing the game."

Well, it's not a surprise but it still sucks an ass how Slashdot marches in lockstep to their latest fanboy crush. For people saying how cheep it is to own a politician it seems that most Slashdotters are willing to be bought off for a lot less.

The difference is Google is lobbying to do things that don't dirrectly affect my bank ballence. Additionally many things Google is pushing for actully are in the general intrest like net nutrality.

Comment Re:Almost (Score 4, Interesting) 171

Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'

Traffic sniffing does not require files on the target and this is the biggest source of data for agencies like the NSA. It may protect you from key loggers being installed (unless they were inserted ahead of time).

All traffic sniffing will do is show they are talking to a TOR entree node. Everything is wrapped in multiple layeres of encryption between you and each of the nodes in between. Maybe they could tell from traffic analysis what type of traffic it is based on traffic profiling, streaming your pr0n over to will have a different profile than browseing a webpage wich will in tun be different than ssh, but they still won't know the end point and what the content is.

I'm pretty sure that part of Snowden's leaked information showed that exploits are occurring at the hardware level as well as software. Entry points like LOM modules were explicitly called out in the leaked presentations.

Yes but they would have to have had access to your computer to insert the hardware bugs. If you say pick up a cheap laptop at walmart paid for with cash they won't know who has it, and would not have inserted the bugs as they could not have known who would end up wih the computer.

I'd agree that forensics becomes extremely difficult, if not impossible (memory analysis can still occur).

if they are doing memory analysis thy have the computer in their posesion already and you probably have a much larger issues to worry over.

I don't agree that the systems are immune to malicious software at least in a general sense. Immunity would require a lot of control for the hardware running the OS, and monitoring to make sure things have not been tampered with.

Technically true. However you have to trust something, and as long as there has been know oppertunity to tamper with the computer you can assume your safe for most things.

Relying on a repository build of an OS imaged is still a target for potential a MITM attack feeding a user a kitted image.

That is why we have cryptographic signatures on repositories and iso images. If they can break a 4092 bit key in polynomial time we are f***ed anyway

Comment Re:Good (Score 1) 632

As a taxpayer, I don't want people getting free money for the government at my expense. They need to pay it up in today's dollars - with interest. If your parent or grandparent abused the system, I'm sorry but it's time for you to pay up.

This is about taking money "back" when the government made an accounting error (not people that cheated or lied mind you) but not taking it back from the people they gave it to but rather taking it out of another persons return. If the government accidentally gave me $500 thirty years ago and I died after five years ago long after I spent it, would you be OK with them deducting $500 (plus interest and adjusted for inflation) from your return, simply because you happen to be a relative?

Comment Re:Depends on the apocalypse (Score 1) 737

if the clothing isn't stored properly, it won't last as long. Before air conditioning and modern insulation, cedar chests were the bees knees in providing protection for clothing and papers. so all is not lost and it won't be all that bad.

that may be true, thank god then that much of our clothes are synthetic those not eaten by creepy crawlies.

Comment Re:Some of the oldest trades become useful. (Score 1) 737

The post-apocalyptic world would also need blacksmiths, potters, carpenters, farmers and so on. Not to mention someone capable of swinging a sword and lopping the heads off marauders intent on dragging off the young women and torching the village. The challenge is that scientists and engineers do not necessarily have the skills most critically.

Says the man that has never seen a trebuchet cannon or a ballista.

Comment Re:The magical scenario is "gradual social decay." (Score 3, Insightful) 737

In either a sudden collapse, or gradual decay, much will be lost. Let me remind you that when the Roman civilization decayed, technologies as simple as the making of cement were lost.

Cement.

Not exactly what we'd consider "high tech." It demonstrates just how fragile our scientific advancements are. They can be wiped out by a few generations of relative illiteracy for the great mass of survivors. In three generations, electric lights are a distant legend and those ubiquitous round copper disks find their most frequent use as quick, easily made arrowheads.

Yeah they were knocked back a couple hundred years you knock us back a to 1800 and we would still be able to make electricity Ben franklin was playing with it a decent part of his life. Beyond that the average person in the roman era was illiterate and there has very little written down as apposed to today where every town has at least one public library, the elementary and middle school libraries have a set of one set of encyclopedias each at least, then there is you high schools with chemistry, biology, physics labs and a often a auto shop each with all of the information and much of the equipment need to to bootstrap your way into the early 1900s. Then there are the community colleges which would bring you up to say the 1950 level of tech. Anywhere with a state college or descent sized privet college could probably push you back up to the 1970s if not mid 80s. We despite all of our educations systems failing have at least enough literate people and redundant copies of most enough knowledge to boot strap our tech fairly quickly. Hell anyone with a couple of TB hdd and a few solar cells could mirror more then info information to preserve at elast our access to knowledge.

Slashdot Top Deals

If all else fails, lower your standards.

Working...