Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Could make sense (Score 4, Insightful) 217

The telco (unless it is third world) will have massive diesel generators (and a stock pile of diesel) to keep things operational in an emergency. As long as there is electricity or diesel the phones should continue to work.

That's true. Although, in reality I think 9/10 households will be using a cordless phone which will be useless in a power outage, regardless to how you're hooked into the phone network. Speaking of which, can you even buy non-cordless phones these days?

Comment Re:Suck it up Zuck. (Score 1) 218

Consider the stupidity of giving Facebook your email username and password, so that Facebook can log in to your email account as you, and scrape all your contact info. (While they are at it, why don't they get your emails too...) They've conned people into doing just that.

Facebook may have done this once, but they had stopped doing it a while ago and instead started to use Google Contact's API via OAuth -- that's what started this all off, Google changed the terms/conditions of their API preventing Facebook from using the system.

Deciding to not take this lying down, Facebook then instead directly linked users to the Google Contacts Export page, then Google modified said export page to throw up that big scary warning described in the article.

That said, Facebook still happily logs into webmail for sites which don't use OAuth like user's ISP webmail, exactly how you described.

Comment Re:Technology / Hacking Laws (Score 4, Informative) 432

I know this sounds very arrogant, but I would love to see trials change so you're actually judged by your peers instead of members of the public, so for example doctors by doctors, network admin by other network admin, and such. That way you can get a bunch of people who know how far this person has stepped out of line. .

You're not the first to think of such an idea, it actually has a name. I learnt about it way back when I was doing Legal Studies as a subject during my VCE (Victoria, Australia's version of your typical high school certificate).

So anyway, we did a unit on Juries and the different types and how we ended up with the one we have today in our legal system. One of the jury types that were turned down was exactly how you described and I recall thinking "that actually sounds like a good idea". The reason that it's not used (at least, according to my text book) was that juries who were in the same line of work as the defendant tended to be unfairly harsher then your stock standard jury.

For example, say that in this case, all the jury members were IT networking professionals (yes, I realize in this case one of them did have a CCIE). There's the tendency that all the jury members would think "Well, this guy just brought down our entire industry and did something I would never do -- let's give him [insert harsher verdict/sentence than a standard person would give]"

I know, for example, if I were put on a jury for some guy who allegedly made a botnet and was hiring it out for the highest bidder, I would certainly be giving a very harsh verdict/sentence.

That all said, I can't for the life of me recall what this jury type was called, and my 30 seconds on Google didn't find a result, so please take this post as [citation needed].

Comment Re:How can they assume the wrong password though? (Score 1) 486

they will assume they've been given the wrong password and continue torturing you

That's only true if they know for sure that data is what they were looking for.

But they must have some idea of what they're looking for. It seems unlikely someone thug is going to break into my house or police detain me for 'no reason whatsoever', find an encrypted volume and ask me for the password.

What seems much more likely is that police detail you for suspected tax evasion or securities fraud and go looking for your second set of books. When they ask for your password and open up the volume to find a set of books which are completely legitimate they're going to go "Well, obviously he gave us the wrong password" when in fact maybe you did give them the real password and you've been falsely accused.

Comment Re:Alternate Partition? (Score 1) 486

One of the great features of TrueCrypt is the whole alternate partition/segment idea. One password gives access to real data, while another (a duress password) would give some other access to an alternate segment. Put some benign documents in the alternate partition, and then under threat of water boarding, hand out the duress password. Assuming this all works, they find nothing, you go home.

But all this just brings you back to the random data vs. encrypted data dilemma. If you give them the duress password and they don't find what they're looking for, they will assume they've been given the wrong password and continue torturing you.

What's even worse is if you're really innocent and give them the "real" password but they incorrectly conclude you gave them the duress password 'cos they can't find incriminating files and continue torturing you to give them the "real" password.

PC Games (Games)

Vista Games Cracked to Run on XP 376

Next Generation is reporting that Vista PC games have been cracked to run under XP. Hacking groups who apparently wanted to play new titles like Shadowrun and Halo 2 with driver support have taken it upon themselves to open up the playing field a bit. "The news is sure to irk Microsoft who may now face an increased delay in some consumers adopting Vista at this early stage. However, it shouldn't come as a surprise. Earlier this month Falling Leaf Systems said in a press release that it believed Microsoft was deceiving consumers by stating that the titles would only work on Vista, and announced its intentions to release compatibility software to disprove the claim. 'Microsoft has, in typical Microsoft fashion, decided to launch their forced migration onslaught in full force with the release of two games that will only run on Windows Vista,' said Falling Leaf Systems CEO Brian Thomason in the press release." Relatedly, Mitch Gitelman of the (now closed) FASA Studios has taken exception to negative reviews of Shadowrun.
Announcements

Submission + - A Day of Silence!

saveonweb writes: Internet Radio is Down! " .....along with most Internet radio sites, is going off the air in observance of a Day Of Silence. We are doing this to bring to your attention a disastrous turn of events that threatens the existence of Pandora and all of internet radio. We need your help."
Patents

Jury Rules That H.264 is Not Patented 111

Dr Kool, PhD writes "According to Bloomberg, a jury ruled against Qualcomm in their patent lawsuit against Broadcom. Qualcomm had sought $8.3 million in damages for patent infringement stemming from Broadcom's H.264 encoder/decoder chips. From the article: 'The patents, covering a way to compress high-definition video, are unenforceable in part because Qualcomm withheld information from the U.S. Patent and Trademark Office, jurors in San Diego said today after deliberating less than six hours.' This ruling clears the way for H.264 to become a widely adopted open standard."
Security

Submission + - Trojan pre-installed on Point&Shoot Video Camc

Bill Wood writes: We got the new Pure Digital product ' Point&Shoot Video Camcorder PSV-351' from Amazon around December 14th for Christmas. When we loaded it up to our PC to download the videos via USB, AntiVir Personal detected one of the files as a trojan. Symantec AV detected it as well on my laptop. Symantec identifies it as W32.Looked.P. I tried to email the infected file as RAR archive to puredigital support, and Google Mail prevented it from going out as it was detected as a virus laden file. The offending file is called 'View Your Files.exe' on the root directory of the device. AntiVir calls it TR/Philis.A

Slashdot Top Deals

Suggest you just sit there and wait till life gets easier.

Working...