Forgot your password?
typodupeerror

Submission Summary: 0 pending, 5 declined, 1 accepted (6 total, 16.67% accepted)

Government

+ - Time to Repeal the PATRIOT ACT?-> 1

Submitted by A non-mouse Coward
A non-mouse Coward (1103675) writes "Ashton Lundeby, a 10th grade home schooler with no criminal record, was arrested in his North Carolina home by the FBI replete with tactical gear, suspected of bomb threats made from a Skype account on his IP address. During the raid, no bomb-making paraphernalia was found. Arrested under the PATRIOT ACT, Lundeby was not allowed access to an attorney during initial interrogation and has been imprisoned for over 60 days without an official indictment. Lundeby has what appears to be a valid alibi and his mother believes his Skype account was hijacked by a hacker who has harassed the family for months. Many are calling this a prime example to repeal the PATRIOT ACT."
Link to Original Source
Government

+ - Texas Supreme Court Leaves Obama/McCain on Ballot->

Submitted by A non-mouse Coward
A non-mouse Coward (1103675) writes "We discussed last week that Libertarian Party Presidential Candidate, Bob Barr, filed a lawsuit requesting that Obama and McCain be removed from the Texas Presidential Ballot because they missed the submission deadline. (Not to the surprise of many Slashdotters) The Texas Supreme Court ruled against the suit without explanation, exempting the GOP and Dems from the same rules that attempt to keep independents and third parties off the ticket:

"The Court's one-sentence denial deprived us, and the voters of Texas, of any explanation of the Courts reasons for arbitrarily exempting the Republicans and the Democrats from the clear deadline set forth in the law," Verney [Bob Barr's Campaign Manager] continued. "Third parties and Independent candidates are consistently told that deadlines are deadlines. Texas has somehow determined that deadlines are just suggestions but we are left without the guidance of the Court's reasons."

I guess this proves bipartisan actions are possible."
Link to Original Source

Security

+ - Undocumented Backdoor in PGP Whole Disk Encryption->

Submitted by A non-mouse Coward
A non-mouse Coward (1103675) writes "PGP Corporation's widely adopted Whole Disk Encryption product apparently has an encryption bypass feature that allows an encrypted drive to be accessed without the boot-up passphrase challenge dialog, leaving data in a vulnerable state if the drive is stolen when the bypass feature is enabled. The feature is also apparently not in the documentation that ships with the PGP product, nor the publicly available documentation on their website, but only mentioned briefly in the customer knowledge base (PGP customer account required). Jon Callas, CTO and CSO of PGP Corp., responded that this feature was required by unnamed customers and that competing products have similar "dangerous" functionality. There is still no official word from PGP as to why the public documentation withheld recognition of this risky option."
Link to Original Source
Security

+ - Backdoor in PGP Whole Disk Encryption-> 1

Submitted by A non-mouse Coward
A non-mouse Coward (1103675) writes "PGP Corp's Whole Disk Encryption suite has an intentional backdoor accessible via the command line, whereby administrators or any user who knows the passphrase for a volume key can disable the boot-up passphrase prompt altogether. Apparently this "feature" is not documented in any way beyond the enterprise customer support pages and is kept secret for only those organizations needing an automated reboot process that won't hang on the boot guard screen. Even running the typical " — help" switch to the command line yields no knowledge of its existence. What's worse, that PGP Corp built this intentional backdoor feature, or that they barely documented it, keeping it quiet from their customers who want the highest amount of security for their laptops?"
Link to Original Source
Security

+ - Zero Day Quicktime Flaw affects many browsers->

Submitted by A non-mouse Coward
A non-mouse Coward (1103675) writes "GNUCitizen has published details including POC code regarding a zero day exploit for Quicktime and Chrome/Gecko browsers. People running NoScript in Firefox appear to be safe. The bigger question here is: how long will javascript implementations that ship in popular browsers continue to operate on a general execute-anything-with-the-user's-permissions model? And doesn't it make sense to separate executable code from data objects in memory?"
Link to Original Source
Hardware Hacking

+ - How would you geek out a backpacking expedition?

Submitted by A non-mouse Coward
A non-mouse Coward (1103675) writes "If you were going to go on a several hundred mile, multi-day backpacking expedition across a continent, what would you take? Remember, weight is crucial and there is no electricity except for the occasional overnight in a metropolitan area. At the same time, you can stay "connected" as you near cities with wireless. Would you seek renewable energy for small compact electronic gear, such as solar, hand-cranks, or other generators? Or would you keep it minimalist, visiting a cyber cafe when the wilderness requires you to escape back into the cities?"

Every nonzero finite dimensional inner product space has an orthonormal basis. It makes sense, when you don't think about it.

Working...