Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:If they break into people's homes.... (Score 1) 392

That's another advantage of forcing the snoops back to "direct access" methods -- every so often one of them will get caught red-handed snooping on the wrong (i.e. clearly innocent and rich/influential) target, re-focusing attention on them and forcing another round of retrenchment until it blows over.

Comment Re:Cost/benefit ratio (Score 1) 392

Now, if a backdoor is found by the bad guys, it will be used almost immediately to destroy a company.

If it's found by really bad guys (e.g. North Korea on a day when Dear Supreme Grand High Panjandrum is feeling especially trollish), it can be publicly circulated to destroy every company.

Comment Re:And is this a bad thing? (Score 5, Insightful) 392

Forcing them to switch to "direct access" methods puts pressure on them to follow the law. First, as I noted in my earlier comment, the non-scaling time and manpower costs (each tail, bug, etc requires significant additional resources) forces careful selection of targets. Second, "direct access" methods put the snoops at a nontrivial risk of getting caught and/or leaving recoverable evidence each time they use them illegally.

Comment That's Exactly What They SHOULD Be Doing (Score 2) 392

"Direct access" methods (tailing people, planting surveillance devices, etc) do not scale anywhere near as easily as network surveillance -- each "direct access" target requires a significant fixed cost in resources and manpower. This imposes discipline on the snoops and forces them to pick and choose actual suspects instead of trying to scoop up everything.

Encryption

Tips For Securing Your Secure Shell 148

jones_supa writes: As you may have heard, the NSA has had some success in cracking Secure Shell (SSH) connections. To respond to these risks, a guide written by Stribika tries to help you make your shell as robust as possible. The two main concepts are to make the crypto harder and make stealing keys impossible. So prepare a cup of coffee and read the tutorial carefully to see what could be improved in your configuration. Stribika gives also some extra security tips: don't install what you don't need (as any code line can introduce a bug), use the kind of open source code that has actually been reviewed, keep your software up to date, and use exploit mitigation technologies.

Submission + - Indiana Court Rules Melted Down Hard Drive Not Destruction of Evidence (freezenet.ca) 1

An anonymous reader writes: An Indiana court has ruled that a hard drive that was sent to recycling was not destruction of evidence. The ruling stems from a BitTorrent file-sharing case filed by Malibu Media where a defendant claimed that his hard drive had failed thanks to heavy use. Malibu claimed that the act was destruction of evidence and filed a motion demanding a default judgement. The court denied this motion suggesting that because the hard drive failed, there was no evidence to destroy in the first place.

Comment Cooperative Game... With Possible Exceptions (Score 1) 155

That's one advantage of mostly cooperative board games where there might be a hidden "traitor" among the players who wins if the group loses (e.g. Shadows Over Camelot, Battlestar Galactica). With that possibility on the table, players can't just trust somebody else to make decisions and have to pay attention to what everyone else is doing (usually in these games, exposing the traitor has some reward, at least insofar as it curtails his ability to continue undermining the group).

Comment Re: Maybe we need to vote in a 3rd party? (Score 2) 424

That's a nice idea, but the majority has been brainwashed into believing that any vote that's not D or R is "wasted". Ridiculous, but that's what happened.

Sadly, even the 3rd parties don't give some of us much to work with. I generally like Libertarian ideals, but the reality is that if they got everything they want we would end up with a government by and for the corporations. Which is basically what we have now, other than that they wouldn't bother to try to hide it. Greens would do basically the same, but only for corporations that support environmental causes. Those are the ones with the most support. Constitution party might be good, but are relatively unknown.

The first thing we need is term limits across the board. All the way down to local government.

Then we need to do away with the ridiculous idea that corporations have rights other than those we specifically give them. Corporate personhood needs to be abolished.

Asset forfeiture needs to be abolished as well. I don't mind the idea that you can seize property, but it needs to be in the punishment phase of a trial, not before someone is charged with a crime. And any proceeds from such seizures must not be directly available to enforcement agencies. That's an obvious conflict of interest and they were insane to allow it in the first place.

So, any parties that support such notions? The Pirate party sounds closest.. Not sure that's a good thing.. :)

Comment Re:It's a TRAP! (Score 2) 175

webmail kinda implies that the provider will either be storing the key or at the very least be able to access it

Obviously they need access to the PUBLIC keys in order to encrypt messages to the designated recipient. The whole point of public-key cryptography is that revealing the public key doesn't compromise security.

Comment Re:War of government against people? (Score 1) 875

"You're a complete fucking idiot if you think your well regulated militia (which you ignore anyway) armed with assault weapons is any match for the government's military-spec hardware."

Funny.
The Russians thought the same thing about Simo Hayha: http://en.wikipedia.org/wiki/S...

Never underestimate the power of one man defending what he believes in.

Slashdot Top Deals

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...