Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Why do cats get to run free? (Score 1) 110

Only loosely on-topic, but why is it socially acceptable for many cat owners to simply let them have the run of the neighborhood?

As a dog owner, I have to keep my dogs strictly controlled, but neighbor's cats will shit all over the place and cause my dogs to go nuts as it flaunts across the front porch.

Is it just because OMG DOG ATTACKS?

Comment Re:So 60% positive ? (Score 2) 256

You're misunderstand the point. This is simple logic.

A terrorist can have an affiliation with a group, or act independently.

So, a person can be in three states:
A: not a terrorist,
B: a terrorist without group affiliation
C: a terrorist with an affiliation.

The list contains 60% of the people in group C. 40% are either A or B. All of the ones that are B still fit the criteria for the watch list, so those are valid. There isn't enough info to tell us if the distribution is 60% C, 40% B, and 0% A (which would be perfect), or if there is some other mixture where people in group A are listed but shouldn't be, so we don't know how inaccurate the watch list is.

Comment Re:It's almost sane(really) (Score 1) 502

As EU law would NOT allow me to release that information...

Is that a true statement?
My understanding, which may be wrong, is that EU law would not compel you to release that information. However, if you chose to (because you wanted to be released from jail in the US), then the EU would not prevent you.

Comment Re:It's almost sane(really) (Score 1) 502

Your case is only true if Dutch law PREVENTED YOU from accessing your own system.

You own the computer, therefore your access of the system is legal.

You are in US custody, and can be compelled to provide items under court order.

You then legally access your own system remotely, then retrieve the items in question.

Comment Re:It's almost sane(really) (Score 1) 502

Ok, so we agree. I accept and agree that you could try to gain asylum in Amsterdam as soon as you walk off the plane.

Now, take your analogy to what TFA is actually talking about. You could SSH or RDP to your computer sitting in Amsterdam from a US government computer in the states, and hand it to them after logging in. As you said, the action (the command on the computer you are using) is wholly performed on US soil.

Agree?

Comment Angry Proliferation Game (Score 1) 224

You're missing one critical piece in this example: the red button doesn't destroy the planet, it sends a message to other humans outside the room to destroy the planet.

This is how I understand both the US and Russian system to function, but I don't know about the Chinese system. I would hope the designers of these systems realize that leaving this decision up to a politician alone is not the right answer, as the other systems have recognized.

Comment Re:It's almost sane(really) (Score 1) 502

Let's run with that analogy:

You're presently in the US, the house you own is in Amsterdam.

You'd be correct that the US can't force the Dutch to execute a search warrant.

That is completely irrelevant, though. You're in the US and perhaps in jail awaiting trial. You've been issued a valid order by a US court to permit US law enforcement into your home in Amsterdam. If you interfere, are you not obstructing US justice?

Comment Re:Could be a different route involved for the VPN (Score 1) 398

Perhaps you could just link to the article or a particularly insightful comment you made instead of making a post that adds nothing to the conversation.

Not all of us read every comment on /.

I'm very curious as to why Netflix would degrade their own service and why Comcast and Verizon wouldn't point to this smoking gun every time they're accused of throttling.

Comment Re:aaargh! pinheads in the IT. (Score 1) 234

But the corporate official VPN uses some strange protocol. Once the VPN is connected ALL the traffic from the local machine will go the corporate VPN host.

This isn't strange, it is considering SOP for most corporations to ban "split-tunneling", where only traffic to the corporate network are sent over VPN.
It also isn't a protocol, it is just a default route to send all traffic over the VPN.

The theory is that by allowing someone to have unfiltered access at the same time as they are connected to the internal corporate network, they are creating a security risk.

The reality is that the "crunchy outside, warm gooey inside" security model as been broken for some time, and modern security is to use a zero-trust network model.

TL;DR: It is quite common but agree it is quite stupid.

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...