Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Oh, the irony... (Score 4, Insightful) 226

The ISS is nothing more than a thinly veiled weapons platform cloaked as a space station. Rods from God is the ultimate weapon, inflicting nuclear scale devastation without the pesky fallout. Within our lifetimes expect to see an attack launched and the USA will claim that they had no part in it, when in reality they will be the instigating party with plausible deniability.

Why would the Rods from God project require a manned platform? Especially an international crew that would be likely to discover the device and report it back to their own respective countries?

Comment Do the study, with unintended consequences (Score 1) 640

Since the language of the law (page 3) requires the task force to plan for "unintended consequences of climate adaptation and mitigation," the study should be completed as requested, and the effect of human activity against the baseline ebb and flow of regional climate should be included on the chart as an "unintended consequence."

Comment Re:And people ask me why I do not like eBook (Score 2) 548

Well, not that i am into erotica, but I dislike being told what I am being allowed to read by private company.

You're not. A private company is deciding which products it wishes to sell and which it does not.

The problem with eBooks, though, is that in most implementations they can reach in and retroactively remove the books you've purchased. So even if they chose to sell a book and you chose to buy it, they can choose to un-sell the book to you if they decide the content is a problem for them.

Comment Re:Just proxy it out at the router. (Score 1) 375

No doubt part of the deal to get parents to accept them was that they would also be locked down at home. Of course, parents could just lock down their network at home too, but how many of them are going to get off their asses and do that when they can just bitch at the school to do the parenting for them instead?

What if the parents didn't agree to the deal? What if parents thought that the school's predetermined whitelist was too much? Or too little? Maybe the parents were parenting, and decided that their kids should have more rights than the school would like them to have.

Comment Re:Just proxy it out at the router. (Score 1) 375

Block vpn at proxy level.

Open only certain ports, that what students really need, like port 80 for www. They may even consider a whitelist of sites students can visit from the school network.

You can proxy over standard https port 443, so blocking proxying is mostly a dead end. You'd have to stick with the whitelist.

Comment Re:Good. (Score 1) 214

Yeah how about trying "We were ordered to do it by the US government and we can't give you details because a) national security and b) gag order". Seems to work for the government, why can't it work for Google?

Because the government will be able to declare in court that they didn't do it, and Google won't have proof that they did?

That's covered, because the gag order gags itself, so you can't show it to the court.

Comment Re:Who cares about battery life? (Score 2) 222

The cellular and phone networks in the US actually have batteries and generators to power them so people can use them when power is out to report those outages. For the POTS network I think the backup is federally mandated, not sure on the cell network.

The cellular backups only last for a day or two, at most. In the northeast we lost power from hurricane Sandy last year for a few days, and the cellular networks didn't last all that long. Fortunately, they're also high on the priority list for restoring power, so they were some of the first things to come back.

Comment Re:It's not just China.. (Score 1) 562

And we in the south have a hard enough time with you yanks!

If you're not from America, a Yankee is someone from America.
If you're in America, a Yankee is someone from north of the Mason Dixon line.
If you're north of the Mason Dixon line, a Yankee is someone from the northeast.
If you're in the northeast, a Yankee is someone from New England. (which does not include New York, thank you.)
If you're in New England, a Yankee is someone from Vermont (though I hear New Hampshire in this spot a lot, too.)
If you're in Vermont (or New Hampshire) a Yankee is someone who eats pie for breakfast.

(Disclaimer: I'm from New Hampshire, and pie makes the best breakfast whenever possible.)

Comment Re:Traitorous NSA (Score 1) 219

Here we see the beginnings of real, hard evidence of just how disastrous the NSA's recent actions are to the best interests of the country.

Sorry, but this is all Snowden's fault. If it hadn't been for him everything would still be working as designed and no one would be (provably anyway) the wiser.

I think this is sarcasm, but my sarcasm and bullshitium detector has been on the fritz ever since Snowden's documents went live and the NSA started the spin machine.

Comment Re:Traitorous NSA (Score 2) 219

Whilst I certainly wouldn't disagree with you over the importance of encryption...well, put it this way: when was the last time you encrypted a letter you dropped in the mailbox?

The point is that it's about as much hassle for somebody at the post office to steam-open an envelope with nobody being none the wiser for it as it is for an ISP to snoop on people's mail.

...

It is just as much hassle to open a letter passing through the post office by steaming it open as it is for a lawyer somewhere to subpoena and get the contents of an email you sent through gmail.

However, it is much easier for the NSA to use their backdoor into gmail to make an automated request for all of a person's emails and all of the emails of everyone that emailed them and store that information. Even if they decide that they don't need that information, it will still get stored, and that stored information could be leaked. Just the other day we heard about how Snowden used the "brilliant" tactic of privilege elevation and masquerading as other users to get data. If the NSA's system is designed such that one person can do this, you can bet that there are plenty more who do it and put the information to their own use without feeling the need to go public with it.

Slashdot Top Deals

"Money is the root of all money." -- the moving finger

Working...