Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Why 80% (Score 2) 278

Indeed. And that is the extreme risk that the NSA's activities create. And after a while of using real charges (and most people have something...), just make anybody opposing the new regime a drug dealer, a child-pornography user or simply a terrorist. The FBI and many police forces already have started to practice lying to courts under oath with "parallel constructions" when they use data from the NSA. The step to complete fabrication is a small one and, I guess, has already been taken more than once. Prosecutors are also well prepared with making "deals", as in offering 30 years imprisonment if people keep quiet and a sentence exceeding the remaining lifetime of the accused if they decide to fight. This effectively cuts the courts out of the process.

This has all happened before and, for the 3rd Reich or Stalinism can be found in the history books. Unless something dramatic happens very soon to reign the NSA in, that step to pure fascism is pretty much ensured.

Comment Re:Cheap bastards (Score 1) 77

$10'000 gets you something like 4-5 consulting days from good security experts and that is with the $10'000 paid in every case. In that time you can only hack really bad security. Don't expect anybody good to even try this unless they are bored and not interested in the money.

This is a cheap stunt.

Comment Re:So SSL is nothing more than an honor system? (Score 2) 107

Anybody that looked into the SSL certificate system has known that for a very long time. Quite a few people used to use self-signed certificates, as as least there somebody that bothered to find out could be sure it was secure.

I think the fundamental brokeness of the SSL certificate system is because of deep naivety with regard to the trustworthiness of governments and because of active sabotage of by said governments way back. I hope at least that issue is fixed after Snowden. Governments are even more evil than any of their members and cannot be trusted for any purpose.

Books

Book Review: Data-Driven Security: Analysis, Visualization and Dashboards 26

benrothke writes There is a not so fine line between data dashboards and other information displays that provide pretty but otherwise useless and unactionable information; and those that provide effective answers to key questions. Data-Driven Security: Analysis, Visualization and Dashboards is all about the later. In this extremely valuable book, authors Jay Jacobs and Bob Rudis show you how to find security patterns in your data logs and extract enough information from it to create effective information security countermeasures. By using data correctly and truly understanding what that data means, the authors show how you can achieve much greater levels of security. Keep reading for the rest of Ben's review.

Comment Utter stupidity, continued (Score 1) 702

I guess they have never heard of smaller batteries or (for multi-cell cases) step-up converters. It is quite simple to, say, take a 6 cell battery pack and convert one cell to a step-up regulator and retain one cell. Gives you 4 cells (i.e. stainless-steel containers) to fill with whatever you like. The same effect can be had by using smaller batteries than originally in the pack.

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...