Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:It was an app on a WORK-Issued Phone! (Score 0) 776

It's a cellphone. Wrapping it in foil means it won't function as anything. You'd be better off a) turning it off, or b) leaving it on your desk (at the office or your home.) If you are "on call" then you are technically working, so that phone needs to be 100% functional and they have the right to track it. If you don't like being tracked on the job, then find a different job.

Comment Re:The GPL (Score 1) 469

You've completely missed the weakness of those initscript function library dependencies. In the handful of debian specific scripts I checked, all of them use at most 2 functions. They are all distro managed scripts, so it's not a surprise they all want to use "daemon" -- the most trivial shit in the world to remove.

The issue with systemd is not in how it starts or stops tasks. It is entirely with it's size, complexity, and the cancer-like scope creep of taking over tasks that aren't "starting and stopping" other subsystems.

Comment Re:The GPL (Score 1) 469

Yes, rcS generally is just a stub to call "rc S", but not in all configurations, which is why inittab isn't: "si::sysinit:/etc/init.d/rc S"

Startup order dependency was "fixed" (for various definitions) by update-rc.d and language in the initscript header, like a thousand years ago. It's not perfect, but it does work. And for servers, a 100% predictable, repeatable, deterministic boot sequence trumps the 1.28s speed boost from the likes of upstart and systemd. For desktops, speed and flexibility are important, but troubleshooting a "random" boot order is a pain in the ass. (even moreso when upstart/systemd is eating all console output "for logging purposes")

Comment Re:The GPL (Score 1) 469

./foo start and ./foo stop, perhaps??? An initscript is just a shell script. 90% of the initscripts I've written will work anywhere you have a somewhat smart /bin/sh. (the other 10% are targeted to specific distro's and will include shit specific to that distro, ugly, but that's what it takes.)

Comment Re:The GPL (Score 1) 469

Plus /etc/rc.d contains /etc/rc.d/rc?.d directories, so the total is ~8x too many... 192 vs. 26 *actual* scripts on my machine. Looking at those 26 scripts, most of them use only 1 or 2 functions defined in the "library", and most don't need a library function for the task.

Comment Re:The GPL (Score 1) 469

Only because inittab (what the traditional init does) lists rcS and rc as tasks. Change that and it can run anything you damn well please.

systemD... good luck purging that, as many other parts of the system are becoming dependent on it in increasingly complex ways. (for another really good example... plymouth in ubuntu.)

Comment Re:The GPL (Score 1) 469

And if you bothered to look at what's in sysv-rc, you'd understand the "dep:". It's what created all the rc.d directories, rcS script, and rc script that actually enumerates and calls the rc.d scripts, and on various systems include the helper scripts update-rc.d and invoke-rc.d. Yes, you can run a system without it. But you'll be replacing it with almost exactly the same shell loop to process rc.d scripts, so why bother? (*cough*file-rc*cough* which is historically how BSD does things)

While we're on this horse... rcS is what calls all the scripts dropped by the initscripts package. (the equiv of a redhat rc.sysinit split into a bunch of files)

Comment Re:Some good data... (Score 1) 434

Exactly. If there's a bug, fix it. Forcing me to "upgrade" to the next release (which may never be available for a particular device) is NOT the answer.

5.0 (and 5.1) have low adoption numbers because many people (me included) simply don't want that shit. I hate the new UI, and refuse to use any of the "new and more like facebook than ever" 5.0 gapps.

Comment No, they are categorically NOT doing that... (Score -1) 164

...and your comment represents the absolutely fundamental misunderstanding that pervades this discussion.

The truth no one wants to hear:

The distinction is no longer the technology or the place, but the person(s) using a capability: the target. In a free society based on the rule of law, it is not the technological capability to do a thing, but the law, that is paramount.

Gone are the days where the US targeted foreign communications on distant shores, or cracked codes used only by our enemies. No one would have questioned the legitimacy of the US and its allies breaking the German or Japanese codes or exploiting enemy communications equipment during WWII. The difference today is that US adversaries -- from terrorists to nation-states -- use many of the same systems, services, networks, operating systems, devices, software, hardware, cloud services, encryption standards, and so on, as Americans and much of the rest of the world. They use iPhones, Windows, Dell servers, Android tablets, Cisco routers, Netgear wireless access points, Twitter, Facebook, WhatsApp, Gmail, and so on.

US adversaries now often use the very same technologies we use. The fact that Americans or others also use them does not suddenly or magically mean that no element of the US Intelligence Community should ever target them. When a terrorist in Somalia is using Hotmail or an iPhone instead of a walkie-talkie, that cannot mean we pack our bags and go home. That means that, within clear and specific legal authorities and duly authorized statutory missions of the Intelligence Community, we aggressively pursue any and all possible avenues, within the law, that allow us to intercept and exploit the communications of foreign intelligence targets.

If they are using hand couriers, we target them. If they are using walkie-talkies, we target them. If they are using their own custom methods for protecting their communications, we target them. If they are using HF radios, VSATs, satellite phones, or smoke signals, we target them. If they are using Gmail, Windows, OS X, Facebook, iPhone, Android, SSL, web forums running on Amazon Web Services, etc., we target them -- within clear and specific legal frameworks that govern the way our intelligence agencies operate, including with regard to US Persons.

That doesn't mean it's always perfect; that doesn't mean things are not up for debate; that doesn't mean everyone will agree with every possible legal interpretation; that doesn't mean that some may not fundamentally disagree with the US approach to, e.g., counterterrorism. But the intelligence agencies do not make the rules, and while they may inform issues, they do not define national policy or priorities.

Without the authorities granted by the FISA Amendments Act of 2008 (FAA), the United States cannot target non-US Persons who are foreign intelligence targets if their communications enters, traverses, or otherwise touches the United States, a system within the United States, or, arguably, a system or network operated by a US corporation (i.e., a US Person) anywhere in the world. FAA in particular is almost exclusively focused on non-US Persons outside the US, who now exist in the same global web of digital communications as innocent Americans.

Without FAA, the very same Constitutional protections and warrant requirements reserved for US Persons would extend to foreign nations and foreign terrorists simply by using US networks and services â" whether intentionally or not. Without FAA, an individualized warrant would be required to collect on a foreign intelligence target using, say, Facebook, Gmail, or Yahoo!, or even exclusively foreign providers if their communications happens to enter the United States, as 70% of international internet traffic does. If you do not think there is a problem with this, there might be an even greater and more basic misunderstanding about how foreign SIGINT and cyber activities fundamentally must work.

If you believe NSA should not have these capabilities, what you are saying is that you do not believe the United States should be able to target foreign intelligence targets outside the United States who, by coincidence or by design, ever utilize or enter US systems and services. If you believe the solution is an individualized warrant every time the US wishes to target a foreign adversary using Gmail, then you are advocating the protection of foreign adversaries with the very same legal protections reserved for US citizens -- while turning foreign SIGINT, which is not and never has been subject to those restrictions, on its head.

These are the facts and realities of the situation. Any government capability is imperfect, and any government capability can be abused. But the United States is the only nation on earth which has jammed intelligence capabilities into as sophisticated and extensive a legal framework as we have. When the intelligence committees of both houses of Congress, multiple executive agencies under two diametrically opposite Presidential administrations, armies of lawyers within offices of general counsel and and inspectors general, and federal judges on the very court whose only purpose is to protect the rights of Americans under the law and the Constitution in the context of foreign intelligence collection are all in agreement, then you have the judgment of every mechanism of our free civil society.

Or we could just keep laying our intelligence sources, methods, techniques, and capabilities bare to our enemies.

âMany forms of Government have been tried and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed, it has been said that democracy is the worst form of government except all those other forms that have been tried from time to time." - Winston Churchill (1874-1965), Speech in the House of Commons, November 11, 1947

"The necessity of procuring good Intelligence is apparent and need not be further urged â" all that remains for me to add, is, that you keep the whole matter as secret as possible. For upon Secrecy, Success depends in most Enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.â â" George Washington, our nation's first spymaster, in a letter to Colonel Elias Dayton, 26 July 1777

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...