Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Nope! (Score 1) 409

Even if we believed the lunacy that the US put Saddam up to invading Kuwait, why didn't Saddam get the clue to leave when Bush, Sr. massed hundreds of thousands of US troops on his border? Hell, since, according to you Saddam did whatever Bush wanted, why didn't the "This will not stand" speech do the trick?

Submission + - XKEYSCORE: NSA'S Google for the World's Private Communications (firstlook.org)

Advocatus Diaboli writes: "The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies. Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A secret GCHQ and CSE program called BADASS, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users."

also

"Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.” Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”

Comment Re:Heard that before (Score 1) 359

As another thought experiment, imagine that there was a horse with the following properties:
- Pink in color
- Of appealing physical proportions
- Has a single long, straight horn projecting from its forehead.
- Possesses the ability to fly.

It would undoubtedly have significant value to collectors, and I would certainly want one.

Slashdot Top Deals

"Money is the root of all money." -- the moving finger

Working...