Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Warrants are supposed to be narrow (Score 1) 150

Doesn't need to be interesting. The average ("Three felonies per day") isn't interesting if only by definition. If anything, someone who absolutely couldn't be implicated would be the interesting outlier.

But I'm guessing you had "real" concerns in mind. "Maybe one day law enforcement will scale back and only hunt those," he failed to say with a straight face.

Comment Re:Why is it silly? (Score 1) 435

Are you implying that a bunch of code written for carefully and precisely observing traffic law (driverless cars move like a bus driver shuttling a pope made of glass) with the assumption that the usage environment is simplified by said law (moving in simple lines, road markers, etc), is [a bunch of code which is] going to perform superior to humans in the unpredictable and dynamic environment of a getaway?

I'm willing to accept that this technology could be exploitable or unsafe. It could, just maybe, have a marginally useful application in crime. But I'm not seeing it here, and I'm not expecting it tomorrow.

If anything, LE should be delighted at the idea of remote control, surveillance, etc. when cars are on TIOT.

Comment Re:mnemonics (Score 1) 280

Strong passwords are healthy, and acronyms (which I strongly advocate) deliver extremely high defensive complexity with little increase (now passphrase) in user's complexity; so little they might actually do it.

However, password reuse kills a user whether it's strong or not. If I hack into some photosharing socnet crap and get your password, chances are I now have access to a lot of your services. Even if I don't use the loot directly, I'll sell off the credentials or data (SSN) to others.

Comment Think outside the ivory tower (Score 1) 280

A throwaway password tier is something that legitimately increases the casual's security against the obvious (http://xkcd.com/792/) and might actually catch on. Something like "grandma1!" is perfectly fine if she leaves it down at the facetweets and socnets while using something different (hopefully stronger) for her bank account.

But hey, if you think soccer moms and surfers are just as likely to indulge a "Sandbox-contained PW manager in a secure virtual OS" tutorial as the five seconds it takes to tell them "Hey, use a special password for those super important sites, 'kay?" then knock yourself out.

Good luck fitting it on a billboard, though.

Comment Re:Congratulations? (Score 2) 590

Troof.

But I guess it's okay; "this Thor isn't that Thor" or maybe even "No relation, never heard of him." if that's the case.

More than historical accuracy, what gets me is the parading. It's not even self-righteous parading, it's more like astroturf. If I was one of those social justice zealots, I'd have to ask myself whether I was being pandered to and exploited.

I don't agree with refuting OR supporting a product or media or art because of the creator or other unrelated details. I don't check if my oil change mechanic donates blood, I don't check if my waiter was a (convicted?) sex offender, I don't ask about my barber's stance on gun control - I ask what a haircut costs.

This is all tangential though; Thor's a chick superhero and I take the "Okay - so?" stance. A healthy one IMO.

Comment Unprovidable keys (Score 1) 353

Gag orders and such have already been flaunted; the law comes up with bullshit to try and force childish "you can't do that!" rules and other simpleminded "solutions" that seemingly box things in. Then people circumvent it with deadman canaries that they can't be accused as "responsible" for.

My immediate reaction was a 24-48h deadman that locks up and send the decrypt to someone random on a list. The list includes sythetic names. By nature the message obviously signifies duress (or death) and the messenger will make an appropriate approach.

"I can't decrypt it. That's not a figurative claim; I literally do not have the capability to decrypt it, and I don't know who does."

I'm sure people more clever than I could imagine solutions better than my proof-of-concept.

Comment Re:Why yes, we should blame the victim here (Score 2) 311

The law needs to protect the incapables who can't secure information themselves physically (eg safe, vault) or digitally. The law doesn't need to protect (it can't) those who think distributed information, that is, data in the wild can be owned or controlled. Either it's a secret or it's "compromised", like it has been since the beginning of human communication - it's just faster now. We don't need more cases of plebs getting convicted over public-facing data, over servers with no authentication or credentials, over "private" data that shows up in a GOOGLE SEARCH. I didn't RTFA though; "Photographs she owned" is ambiguous.

Slashdot Top Deals

One way to make your old car run better is to look up the price of a new model.

Working...