Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Download? (Score 1) 155

I always make a download of any video I watch, and I watch it during download. Firstly, I don't see anything frozen, except EOF, of course. Secondly, I live in Russia. In Soviet Russia, TV watches YOU! - and I cannot be sure that the video I see today will be available tomorrow. And the last: Both Flash and Virii are NOT available for platform I use, so I have no choice except migration to Windows.

Comment Re:He's nuts (Score 2) 133

The last Soviet computer architecture before ES EVM (IBM-360 clone) epoch was BESM-6, 1-megaflops supercomputer designed by academical institution. The first Russian computer architecture after the ES EVM epoch was KRONOS that has been designed EXACTLY by 4 young Russian hackers. It was a 32-bit computer using a AMD 2900 series slices, giving 1.5 MIPS at 3 MHz. Wikipedia has an article about it.

Comment Re:okay lemme get this straight (Score 1) 232

The poppy seed contain negligible amount of morphine that (according to her expert opinion) is impossible to extract, but it's still there. But for any nonzero concentration of morphine there is a size of poppy seed lot that contains a punishable dose. So the importer has imported a punishable dose. And if he didn't imported it yet, FSKN should just wait for the (concentration * total weight) to exceed legal limit. Moreover, FSKN can combine imports from all poppy seed importers as an organized criminal group the expert being the organizer. Kafka rotates in his coffin.

I am Russian and I have read an original Russian article.

Comment What is McDonald's? (Score 2) 1198

I have read somewhere that McDonald's is NOT a corporate entity. It is instead a trade mark and business model that can be licensed by anybody willing to become local McDonald's. If so, it's futile to look for McDonald's representative a.s.o. - they have no relation with this specific McDonald's except collecting the license fees. The local police is the only place to ask for help.

Comment Re:Um, yes. (Score 1) 500

"Citizen Captain, I work in defense institution and I have sworn not to disclose my job information without proper authorization from KGB. And being forced to do it I am obliged to report it to KGB, too.". No law enforcement will ever request such authorization from rival law enforcement without really serious cause.

Comment Re:Huh? (Score 1) 500

I am NOT a TrueCrypt specialist. But I believe that, if the crypto volume is, for instance, 1 GB and 512 MB are used, then law enforcers may try to add 512 MB more. 2 outcomes are possible: Either it will refuse to add data (which means some hidden space exists and you will be subject to recto-thermal cryptoanalysis) or it will add data killing the hidden volume (Nobody wants to use the program that kills their precious data).

Comment Re:Huh? (Score 1) 500

You cannot fulfill BOTH requirements of plausible deniability and absence of secret residual. If you have some invisible cryptocontainer then the secret residual may be forensically found in your swap partition, /tmp directory or in free sectors. The only method against it is the crypto file system which obviously cannot be denied.

But you can boot from micro-SD if you are really paranoid.

Comment Re:Huh? (Score 1) 500

... or USB key-holding micro with an encrypted I2C EEPROM, which is cheaper. Every press of a hidden button will produce a new random key making the contents unreadable. Battery to allow offline key erase as well as break-in sensor optional.

Comment Re:What I want (Score 1) 554

Our Russian law states that the expert should make an exact copy of HDD in question and operate with it, having original HDD intact. British law should have the same provision. So they shall immediately find the self-destruction key and retry.

I sincerely believe that Russia under You Know Who has more freedom than Britain.

Slashdot Top Deals

BLISS is ignorance.

Working...