Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Schneier's opinion isn't what it once was (Score 2) 99

by Sean (#49143243) Attached to: Schneier: Everyone Wants You To Have Security, But Not From Them

That's true, but there was no book at the library that listed which articles in the newspaper we decided to read and which ones we decided to skip. The post office didn't make copies of all our letters and the phone company didn't record all our calls. When we used a map to find directions, none of this information used to be recorded. When we had our photographs developed, we could be quite sure the photo lab wasn't making copies of all of them.

Records of our financial transactions were much more limited because most of them were cash. Now we use payment cards for almost everything.

Comment: You don't bite the hand that feeds you (Score 4, Insightful) 305

by Sean (#47356407) Attached to: How Often Do Economists Commit Misconduct?

Who purchases the services of economists? Who consumes their work product?

A lot of economists are paid by central banks one way or another:
http://www.huffingtonpost.com/...

One useful tactic for managing the economy is manipulating public opinion. Especially the opinion of those members of the public who manage huge quantities of other people's money. The job of the economist then is not necessarily to discover the true state of the economy, but to convince others that is it in a certain state in order to influence their behavior.

Comment: Here's their spam filter (Score 1) 21

by Sean (#46547847) Attached to: After FOIA, Homeland Security Releases Social Media Monitoring Guides

Note - Analysts are to refrain from generating IOI reports that:
1) Include any form of unauthorized PII
2) Include public reaction to DHS programs, policies and procedures unless they are operationally relevant (e.g., long wait times at TSA checkpoints)
3) Focus on individuals' First Amendment-protected activities unless they are operationally relevant (e.g., protest shuts down I-95 - in which case the report should focus on impact to operations and not the subject of the protest)
4) Overview proposed legislation or legal challenges on enacted legislation
5) Have an obvious political bias or agenda
6) Are predictive or futuristic

Comment: Re: Open Source? (Score 1) 156

by Sean (#45976623) Attached to: Phil Zimmerman Launching Secure "Blackphone"

Really? It's not safe if you're using any common software such as Linux, Windows or OS X. Nor is it secure if you're running it on any modern hardware with a CPU from Intel or AMD. And forget about any arm based mobile!

Secure, real time communication is difficult right now.

What do you think you can run that is secure from the likes of the NSA?

Dreams are free, but you get soaked on the connect time.

Working...