Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 304 declined, 72 accepted (376 total, 19.15% accepted)

×

Submission + - Why American broadband is slow

Presto Vivace writes: The basic truth about broadband that cable companies want to hide

The American cities that are delivering best-in-the-world speeds at bargain prices are precisely the cities that aren't relying on Verizon, AT&T, Comcast, Time-Warner, etc. to run their infrastructure. In Kansas City, Google built a state-of-the-art fiber optic network largely just to prove a point. In Chattanooga and Lafayette, the government did it. At the moment, the US federal government could issue 5-year bonds at a 1.58 percent interest rate and make grants to cities interested in following Chattanooga and Lafayette down that path. But it doesn't happen, because while broadband incumbents don't want to spend the money it would take to build state-of-the-art fiber networks, they are happy to spend money on lobbying.

Submission + - You destroy basic usability by hijacking the scrollbar

Presto Vivace writes: Facebook vs the news media

Here’s an absolute fact that all of these reporters, columnists, and media pundits need to get into their heads:
The web doesn’t suck. Your websites suck.
All of your websites suck.
You destroy basic usability by hijacking the scrollbar. You take native functionality (scrolling, selection, links, loading) that is fast and efficient and you rewrite it with ‘cutting edge’ javascript toolkits and frameworks so that it is slow and buggy and broken. You balloon your websites with megabytes of cruft. You ignore best practices. You take something that works and is complementary to your business and turn it into a liability.
The lousy performance of your websites becomes a defensive moat around Facebook.
Of course, Facebook might still win even if you all had awesome websites, but you can’t even begin to compete with it until you fix the foundation of your business.

Submission + - Apple and Google attend spy summit in the UK

Presto Vivace writes: APPLE AND GOOGLE JUST ATTENDED A CONFIDENTIAL SPY SUMMIT IN A REMOTE ENGLISH MANSION

The three-day conference, which took place behind closed doors and under strict rules about confidentiality, was aimed at debating the line between privacy and security.

Among an extraordinary list of attendees were a host of current or former heads from spy agencies such as the CIA and British electronic surveillance agency Government Communications Headquarters, or GCHQ. Other current or former top spooks from Australia, Canada, France, Germany and Sweden were also in attendance. Google, Apple, and telecommunications company Vodafone sent some of their senior policy and legal staff to the discussions. And a handful of academics and journalists were also present.

According to an event program obtained by The Intercept, questions on the agenda included: “Are we being misled by the term ‘mass surveillance’?” “Is spying on allies/friends/potential adversaries inevitable if there is a perceived national security interest?” “Who should authorize intrusive intelligence operations such as interception?” “What should be the nature of the security relationship between intelligence agencies and private sector providers, especially when they may in any case be cooperating against cyber threats in general?” And, “How much should the press disclose about intelligence activity?”

The most disturbing part of this is the number of journalists present.

Submission + - GM: That Car You Bought? We're Really The Ones Who Own It.

Presto Vivace writes:

Congratulations! You just bought a new Chevy, GMC, or Cadillac. You really like driving it. And it’s purchased, not leased, and all paid off with no liens, so it’s all yours isn’t it? Well, no, actually: according to GM, it’s still theirs. You just have a license to use it. At least, that’s what an attorney for GM said at a hearing this week, Autoblog reports. Specifically, attorney Harry Lightsey said, “It is [GM’s] position the software in the vehicle is licensed by the owner of the vehicle.”... ...The U.S. Copyright Office is currently holding a series of hearings on whether or not anyone other than the manufacturer of a car has a right to tinker with that car’s copyrighted software. And with the way modern design goes, that basically means with the car, at all.

Submission + - Australian defence controls could criminalise teaching encryption

Presto Vivace writes: How the DSGL covers encryption

The DSGL contains detailed technical specifications. Very roughly, it covers encryption above a certain “strength” level, as measured by technical parameters such as “key length” or “field size”.

The practical question is how high the bar is set: how powerful must encryption be in order to be classified as dual-use?

The bar is currently set low. For instance, software engineers debate whether they should use 2,048 or 4,096 bits for the RSA algorithm. But the DSGL classifies anything over 512 bits as dual-use. In reality, the only cryptography not covered by the DSGL is cryptography so weak that it would be imprudent to use.

Moreover, the DSGL doesn’t just cover encryption software: it also covers systems, electronics and equipment used to implement, develop, produce or test it.

In short, the DSGL casts an extremely wide net, potentially catching open source privacy software, information security research and education, and the entire computer security industry in its snare.

Most ridiculous, though, are some badly flawed technicalities. As I have argued before, the specifications are so imprecise that they potentially include a little algorithm you learned at primary school called division. If so, then division has become a potential weapon, and your calculator (or smartphone, computer, or any electronic device) is a potential delivery system for it.

Submission + - The Myth of Outsourcing's Efficiency

Presto Vivace writes: Why outsourcing winds up producing cost creep over time

Outsouring over time starts to create its own bureaucracy bloat. It’s the modern corporate version of one of the observations of C. Northcote Parkinson: “Officials make work for each other.” As Clive describes, the first response to the problems resulting from outsourcing is to try to bury them, since outsourcing is a corporate religion and thus cannot be reversed even when the evidence comes in against it. And then when those costs start becoming more visible, the response is to try to manage them, which means more work (more managerial cost!) and/or hiring more outside specialists (another transfer to highly-paid individuals).

Submission + - UK Intelligence officers given immunity from hacking laws

Presto Vivace writes: Legislative changes exempting law enforcement officers from ban on breaking into people’s digital devices were never debated by parliament, tribunal hears

The unnoticed rewriting of a key clause of the Computer Misuse Act has exempted law enforcement officials from the prohibition on breaking into other people’s laptops, databases, mobile phones or digital systems. It came into force in May.

The amended clause 10, entitled somewhat misleadingly “Savings”, is designed to prevent officers from committing a crime when they remotely access computers of suspected criminals. It is not known what category of offences are covered.

I would love to know how much malware is government sponsored.

Submission + - How the NSA Converts Spoken Words Into Searchable Text

Presto Vivace writes: Dan Froomkin reports:

Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest.

I am torn between admiration of the technical brilliance of building software like this and horror as to how it is being used.

Submission + - Bernie Sanders, H-1B skeptic

Presto Vivace writes: Will the Vermont senator raise the visibility of the visa issue with his presidential run?

The H-1B visa issue rarely surfaces during presidential races, and that's what makes the entrance by Sen. Bernie Sanders (I-Vt.) into the 2016 presidential race so interesting. ... ...Sanders is very skeptical of the H-1B program, and has lambasted tech firms for hiring visa workers at the same time they're cutting staff. He's especially critical of the visa's use in offshore outsourcing.

Submission + - Software, tractors, and property rights

Presto Vivace writes: We Can’t Let John Deere Destroy the Very Idea of Ownership

In a particularly spectacular display of corporate delusion, John Deere—the world’s largest agricultural machinery maker —told the Copyright Office that farmers don’t own their tractors. Because computer code snakes through the DNA of modern tractors, farmers receive “an implied license for the life of the vehicle to operate the vehicle.”

Submission + - TPP: Toward Absolutist Capitalism

Presto Vivace writes: Naked Capitalism

There are many excellent arguments against the Trans-Pacific Partnership (TPP), two of which — local zoning over-rides, and loss of national sovereignty — I’ll briefly review as stepping stones to the main topic of the post: Absolutist Capitalism, for which I make two claims: 1) The TPP implies a form of absolute rule, a tyranny as James Madison would have understood the term, and 2) The TPP enshrines capitalization as a principle of jurisprudence. ...

... So, what Madison warned of is exactly what ISDS does: The judge is the legislator, leading to “arbitary control.” And arbritary control is absolutism, just as surely as it was in the age of the divine right of kings.[2] And for bonus points, the judges and the legislators are conflicted, open to corruption, and accountable neither to the voters nor to any system of precedent.

Submission + - FTC calls for comments on the sharing economy

Presto Vivace writes: The FTC wants to talk about the ‘sharing economy’

And now the Federal Trade Commission wants to talk about what it means for consumers. The agency announced Friday it will host a public workshop to "examine competition, consumer protection, and economic issues raised by the proliferation of online and mobile peer-to peer business platforms" in June.

“We are seeing a dramatic growth in products and services that are built on peer-to-peer platforms, such as ride-sharing and property rentals, as more entrepreneurs harness the power of technology to reach more consumers,” said FTC Chairwoman Edith Ramirez in a press release. “Through our workshop, we want to better understand the competitive impact of these new business models, as well as their interactions with existing regulatory frameworks.”

Submission + - Voting industry pushes online voting with assist from the Pentagon 1

Presto Vivace writes: As states warm to online voting, experts warn of trouble ahead

WASHINGTON — A Pentagon official sat before a committee of the Washington State Legislature in January and declared that the U.S. military supported a bill that would allow voters in the state to cast election ballots via email or fax without having to certify their identities.

What could possibly go wrong>

Submission + - The e-voting machine anyone can hack

Presto Vivace writes: Meet the e-voting machine so easy to hack, it will take your breath away

Virginia election officials have decertified an electronic voting system after determining that it was possible for even unskilled people to surreptitiously hack into it and tamper with vote counts.

The AVS WINVote, made by Advanced Voting Solutions, passed necessary voting systems standards and has been used in Virginia and, until recently, in Pennsylvania and Mississippi. It used the easy-to-crack passwords of "admin," "abcde," and "shoup" to lock down its Windows administrator account, Wi-Fi network, and voting results database respectively, according to a scathing security review published Tuesday by the Virginia Information Technologies Agency. The agency conducted the audit after one Virginia precinct reported that some of the devices displayed errors that interfered with vote counting during last November's elections.

Submission + - JP Morgan banks on surveillance

Presto Vivace writes: JPMorgan Algorithm Knows You’re a Rogue Employee Before You Do

JPMorgan Chase & Co., which has racked up more than $36 billion in legal bills since the financial crisis, is rolling out a program to identify rogue employees before they go astray, according to Sally Dewar, head of regulatory affairs for Europe, who’s overseeing the effort. Dozens of inputs, including whether workers skip compliance classes, violate personal trading rules or breach market-risk limits, will be fed into the software.

Now if we only had a program for rogue CEOs.

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...