Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment haha (Score 5, Interesting) 114

I'm sorry, but as much as North Korea sucks, this hack just gets better and better...

Google’s effort to position itself as a defender of free speech is shameful. Freedom of speech should never be used as a shield for unlawful activities and the Internet is not a license to steal,” said Kate Bedingfield, an M.P.A.A. spokeswoman, in an emailed statement.

That statements so unbelievably ironic... Sony and the MPAA are trying to squash these very document releases with the same tactics they use to try and stop file sharing... but this time it's to hide their own collusion, racketeering, bribery and likely other violations of federal law. I wonder if the other inmates will appreciate her opinion that piracy is stealing when she's in the state pen...

Comment Re:False Falg? (Score 2) 236

You know... I was pretty sure it was NK as well...
But it's really getting fishy.

For example, why was the CIA meeting with Sony just a month prior to this happening?
http://radaronline.com/exclusi...

And it even specifically says the talks were about Sony and other studios helping them with, what can only be described as, propaganda.

Something... and I don't know what... but something, is up.

Comment Re:No, They Haven't Called Me (Score 4, Informative) 246

Until a local hospital calls you to let you know your kids got a broken leg...

I've seen people drive themselves to distraction with your logic. They start sweating when their phone gets to one bar, and refuse to go anywhere with no cell service. Or drive through long highway tunnels. And yet....... somehow we've been able to survive all this time without everyone having instant access to us.

Talk about your first world problems.

First world problems? If you've never been to the 3rd world, you're not allowed to use that line. It just makes you sound like an idiot.

I've been to the 3rd world, specifically Africa. Everyone has cellphones. EVERYONE.
People that don't have homes, cars, a bed... have a cellphone.
Why? So they can keep in contact with their family, in case of emergency. Most people have 2 phones, or at least 2 sim cards so they can be on 2 networks at once, just so they don't miss a call.

You find booths like this on every street corner:
http://en.wikipedia.org/wiki/M...

I had better cell coverage there than I do in the states.

Comment Re:"But it can be circumvented!" (Score 3, Insightful) 75

Cue in the comments on how that security feature is not completely perfect, so therefore it has to be completely useless.

You mean like the fact that Boeing already works very closely with the CIA/NSA and therefor this thing is 100% guaranteed to have a government backdoor per-installed AND the purchase of such a phone would automatically put on a watch list that would result in pretty much all of your traffic getting logged anyway?

Not perfect... more like, this phone likely does exactly the opposite of what it advertises.

Comment Summary is wrong (Score 5, Insightful) 153

The Beach Boys released two copyright-extension sets...

That's not true. "The Beach Boys" didn't release anything. The rights to their work were stolen in the 1960s by their manager and sold to A&M records:
http://en.wikipedia.org/wiki/S...
A&M is owned by UMG:
http://en.wikipedia.org/wiki/U...
The largest Music publishing company in the world who's owned by Vivendi:
http://en.wikipedia.org/wiki/V...
Who's worth nearly $50 billion, and has profits in the $3 billion/yr range...

and you wonder why copyright laws get changed in their favor... lol

When arguing about copyright law, always keep in mind... the people that "own" these copyrights are almost never the artists or their families. Business own then and the attempts to extend copyright into perpetuity has absolutely nothing to do with rewarding the creator of the music. It has to do with extending what was usually a theft from an artist, into a theft from mankind as a whole.

Watch the following movie for more details on that side of the business:
http://en.wikipedia.org/wiki/A...
I don't like 30 seconds to mars, but that movie matches what many of the musicians/bands I've met have said about the industry.

And here's an article written by Courtney Love 15yrs ago... and it's also pretty much dead on:
http://www.salon.com/2000/06/1...

The real pirates are the music labels.

Comment Re:TOR is a fucking honey pot ! (Score 3, Informative) 86

You could be right, but given TOR's design, it doesn't even matter if the feds wrote it, they still couldn't figure out your identity. The feds would have to own all the nodes in the network, which is possible... but if they did own all the nodes, it wouldn't really matter if they wrote it or not now would it?

All that said... there are easier ways to hide your identity on the internet.

Comment Re:Can we stop the embellishment? (Score 1) 177

Really? Apparently they quickly took control of almost every one one of Sony's servers and workstations. Literally took entire control, stole all of the useful data, wiped out all of their servers, and then owned all of the workstations so that they were useless but able to broadcast any message they wanted to them.

That's a *bit* more coordinated than "your average trojan worm". Unless you really think based on extremely limited information you know more than all of the security researchers and government investigators looking into it... (hint: sorry, you don't).

They had access for over a year...
http://www.businessweek.com/ne...

Sony didn't even have rudimentary security established. Pretty much any teenager with basic skills could have taken them out.

Submission + - Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony

wiredmikey writes: Just hours after the FBI and President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise.

While not mentioning Sony by name in its advisory, instead referring to the victim as a “major entertainment company,” US-CERT said that the attackers used a Server Message Block (SMB) Worm Tool to conduct the attacks.

According to the advisory, the SMB Worm Tool is equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool.

US-CERT also provided a list of the Indicators of Compromise (IOCs), which include C2 IP addresses, Snort signatures for the various components, host based Indicators, potential YARA signatures to detect malware binaries on host machines, and recommended security practices and tactical mitigations.

Submission + - New data says volcanoes, not asteroids, killed dinosaurs

schwit1 writes: The uncertainty of science: A careful updating of the geological timeline has strengthened the link between the dinosaur extinction 66 million years ago and a major volcanic event at that time.

A primeval volcanic range in western India known as the Deccan Traps, which were once three times larger than France, began its main phase of eruptions roughly 250,000 years before the Cretaceous-Paleogene, or K-Pg, extinction event, the researchers report in the journal Science. For the next 750,000 years, the volcanoes unleashed more than 1.1 million cubic kilometers (264,000 cubic miles) of lava. The main phase of eruptions comprised about 80-90 percent of the total volume of the Deccan Traps’ lava flow and followed a substantially weaker first phase that began about 1 million years earlier.

The results support the idea that the Deccan Traps played a role in the K-Pg extinction, and challenge the dominant theory that a meteorite impact near present-day Chicxulub, Mexico, was the sole cause of the extinction. The researchers suggest that the Deccan Traps eruptions and the Chicxulub impact need to be considered together when studying and modeling the K-Pg extinction event.

The general public might not know it, but the only ones in the field of dinosaur research that have said the asteroid was the sole cause of the extinction have been planetary scientists.

Comment Re:von Neumann probes (Score 2) 391

I'd like to see your proposal for a device that can "only" do like 25% of the speed of light, take a massive payload to an unknown planet, and can land safely.

We humans already have engines capable of doing it...
http://en.wikipedia.org/wiki/I...
And remember, the probes would be robots, so they could handle hard deltaV that would kill us.

Comment BS (Score 1, Informative) 343

Complete nonsense.
I keep reading about this attack, like it was magical...
Then there's an article on Slashdot today about programming being a superpower?
I'm starting to think this entire thing was designed to have this very affect.

So what's next? The government protects us? We need more electronic surveillance?

Hacks based on Zero-day exploits are hard to protect against. But they are smash and grabs, and once you see the data leaving, you shut things down until you can patch. But this Sony thing? They had basically complete control over their entire infrastructure. No hack would ever result in that kind of control unless Sony basically had no protection or planning at all. Which is what I think this was... Sony being completely irresponsible. The fault here is with Sony. Yea, the hackers are bad guys to... but there's absolutely no reason they should have gotten what they did. In particular the Executive that had the entires companies Salary in an XLS document on their hard-drive should be fired immediately.

Slashdot Top Deals

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...