Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:outrageous (Score 2) 363

Except for that you are speaking of what really amount to common carriers which transport bits without much worry about what they are.

Now if Comcast was in the business of advertising they have the best internet pipe for looking for slaves, chemical weapons or terrorists for hire... you might have a point.

There is a big difference between something legitimate being used for illegitimate purposes and something being built explicitly for illegitimate purposes... this is why guns tend to be legal while building a bomb is not.

Comment Re:Just wondering (Score 1) 227

There is also the issue of noise in the signal and filtering of it.

While a good radar system is probably able to pick up a bird or a drone flying about, that also means it could probably see a baseball, a kite, or someone throwing a 12"x12" piece of aluminum foil into the air... and that in addition to general noise which may get picked up.

Rather than have all such items show up on an operators radar, there is likely a threshold that only objects over a certain size or moving at a certain speed (or both) end up being 'visible'.

Comment Re:You seem to talk much like the Prosecutor... (Score 1) 82

So your best/only response is to accuse me of being a paid shill?

Truly now we see the depth of your intellect... though I doubt even a new born could drown in such waters if one were to try.

Never can it be that someone on their own might had a different opinion, no, never that.

Or would you like to cite specific and tangible EVIDENCE of what you claimed? I hear lots of claims of the NSA being involved yet so little to back it up... that must be part of why the judge (another NSA shill?) rejected those claims.

Comment Re:This was a 'Show Trial' at best... (Score 4, Insightful) 82

First off, even getting that laptop was fruit of the poisoned tree because they got it using evidence the NSA gathered through illegal wiretapping programs.

Citation?

Even then, Ulbreit admitted he built the site. He just didn't run it during the period in question. The entire point of the name "Dread Pirate Roberts" is that anyone can use it.

So he admitted buying the gun and evidence puts him at the murder scene... but you are still going to fight the idea that he pulled the trigger? You can be an accessory to a crime without directly taking part.

But then lets just ignore the other evidence on his laptop which did show him being a more active runner of the site than you suggest.

Besides, the site did use Tor correctly.

Really? So you've personally audited it and certified that in your capacity as an AC Tor expert?

FYI: Posting to Stackoverflow with your own name when trying to learn how to setup a Tor hidden service isn't the brightest thing when you are trying to not have the site tied to you.

It didn't help because the NSA has infiltrated Tor, which should surprise no one, because it was originally built by the US DOD anyway.

Like many, I'm still waiting to see/hear of these secret backdoors in Tor that were somehow inserted not through rouge check-ins... but through large checks to the Tor foundation.

Lemme guess... 9/11 was an inside job?

Comment Re:This was a 'Show Trial' at best... (Score 4, Insightful) 82

Secret evidence, discovery denied for obvious things...

When you get a hold of the accused laptop which is logged in and has ample evidence of being an administrator of the site in question... what exculpatory evidence do you think existed that could have gotten him off that he was denied?

And they proved Tor is not secure; arguments to the contrary are just not convincing anymore.

Tor is secure if you use it right... many do not. Bitcoin however we did find is far from anonymous and the evidence in the blockchain could be used against you years or even decades after your illicit purchase.

Comment Re:Very Serious (Score 2) 85

Exactly... and even if they happened to create a perfect system on day one, the training required to get the average person to be able to use it would be herculean task.

It's hard enough convincing many of our parents not to type in their username & password to just everywhere "Look for the lock icon in the address bar" we used to say, until malicious sites started setting the icon of the site to a lock.

PKI is fantastic when it's largely automated and transparent... and I trust my parents web browser and OS's binary signature checking far more than I do their ability to learn how to actively participate in such a system.

Government

Russian Space Agency Misused $1.8 Billion, May Be Replaced 94

An anonymous reader writes: After a pair of high profile launch failures in the past few months, Russian space agency Roscosmos is making headlines again: this time for corruption. A public spending watchdog reported that the organization had misused 92 billion rubles ($1.8 billion) in 2014 alone. Deputy Prime Minister Dmitry Rogozin said their space efforts have been undermined by rampant corruption. "We have uncovered acts of fraud, abuse of authority (and) document forgery. With such a level of moral decay, one should not be surprised at the high accident rate." He also said Roscosmos is to be "abolished," and replaced by a state corporation of the same name by the end of the year. "In its new, corporate identity, Roscosmos will be responsible not only for setting mission goals but managing wages for space industry workers and modernizing production facilities."

Comment Re:Meanwhile OS/2 and Xenix existed (Score 2) 387

Now OS/2 I'll grant you, IBM fumbled hard on that one...

For the kids in the room you'll need to be more explicit, or I can.

One of it's biggest failings was claiming that it was "a better DOS than DOS and a better Windows than Windows"... which is all fine and dandy except for it helps to remove the motivation to build much of anything specifically targeting for OS/2, rather than Windows... and being an 'also runs' OS doesn't get you much traction for adoption.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...