Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:The time-honored tradition of... (Score 1) 109

As someone diagnosed with Aspergers/ASD, I would rather be rid of this disorder. It has not been kind to my life, and the disadvantages far outweigh any advantages. No soft skills means your other skills are much more difficult to use and made much less useful since you can't interact with others.
Obviously, vaccines don't cause autism, but I would like a cure to see what it's like to not have a meltdown every other social interaction. It is not a good way to live.

Comment Re:Its all in the gmail terms of use ... (Score 1) 790

My guess is the file hash matched a known file that contained the offending material. Google does scan your email for virii, so it's not unthinkable that images, a possible threat vector, are also scanned and hashed, and can be compared to a database of offending image hashes as well as virii.

Comment Re:Crashplan (Score 1) 983

I agree with this. In addition, you can also backup to local folders, and have different backup sets so the really big stuff will be backed up online, but the smaller, more important things can be backed up both to a folder and online. That, and they let you control frequency of backups, and never delete anything unless you set it to remove deleted files after whatever period of time you say. Lord knows how many TB I have backed up there that is just deleted files and their daily versions.

Comment Re:user acceptance? (Score 1) 111

If it behaves anything like Retroshare, it would have the users exchange keys, and not let them connect until each has the other's keys and allows the connection. Nintendo online players have been doing something similar for a while with friend codes, so I don't see why this needs to be so difficult.

Comment Re:They have *worse* to hide? (Score 1) 383

The problem is his data may also info about legitimate foreign spying operations and info on the people involved. While there probably is still more evidence of wrongdoing in what he has, it's also likely he has his hands on something that could very well put a good deal of people's lives in danger. That data was stolen once, right out from under the NSA's noses. If the NSA couldn't stop it from being stolen, how can a single man ensure it won't be stolen from him as well? Remember, this data is very important, and he's as vulnerable as anyone to the $5 wrench decryption attack if he has it encrypted himself.

So the USA really should try to offer him this, and also offer official protection from other nations who may also be interested in some of the things he's learned. This, of course, all hinges on how many copies of the data he has, and if he's given copies to more than he's told us.

In any case, I see this deal falling through, and him possibly being forced to hand over a copy of the data to one or more third parties that are not the US, which can only end very, very badly if not handled correctly. Also, the more people handling it, the more likely it will fall into the wrong hands...

Comment Re: Missing context (Score 1) 206

Ohh, I think I remember seeing those numbers in the update manager of my Linux Mint VM. Yeah, that makes sense. Although I'm wondering, what do they do about high urgency updates they normally don't do because it breaks things, haven't tested, but still have to be put out to all systems anyways due to whatever, say a major security hole. Where would that fall on the 1 to 5 scale of updates?

Comment Better idea (Score 1) 332

For a website about security, have a warrant canary on every user's page when they login. If it disappears, well, there you go. In addition, add a counter that, for every FISA request you get, increments the counter by 2, afterwards which you add 1 to, to get, say "We have not received 255 FISA requests."

Slashdot Top Deals

Scientists will study your brain to learn more about your distant cousin, Man.

Working...