Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Comment Re:just use cash and no cell phone (Score 1) 92

Re 'So how do illegal"?
In the distant past it was simple: One person has photo ID that is acceptable at a state and federal level. Rent it out to a person who has the same basic appearance and they can rent a home in your name. Only do that one time and a steady flow of cash is paid for the cover ID owner, paper work is paid for by a group of people living in that home under the cover name.
It works as different state, city, federal databases could often never be shared as the name is not on any gov list to be reconciled.

"Under the radar with the UK's illegal migrants" (24 September 2015)
"Instead of buying a set of fake documents, he paid someone to share their legitimate national insurance number with him."

What nations need to do is have a set of ID, photo ID at every level of interaction with work, tax, banks, gov services, when seeking any form of accommodation, free gov medical services, post offices services, private sector work, as university students still doing registered (eligible) course work, as tourists, private medical services, gov assistance at a state or federal level, when buying a car or later registration/reporting over the years.
Traditional charities, gov departments and social workers could easily help a nations own citizens or eligible individuals with the new paperwork if they need help to sort, upgrade, apply or request.

The methods are very easy with todays digital gov databases to find the every expanding vast pool of fake and shared ID's.
The other method is to have a system of camera networks to capture face and licence plates on all vehicles at random heavy traffic areas. Does the face match the paperwork and face on the ID, if not a chat down?
The other option is to have long term legal guests who are working, living, or are undertaking a form of real education in a nation, register with the police at set times and if their circumstances change. No need for a "carry at all times" national ID card, just make every aspect of a functional life interact at a city, state and federal level in real time with any issued photo ID. No need for an expensive passport or drivers licence, just offer a "free" state or federal photo ID card based on an interview and a long list of interconnected, supporting documentation.
Why is this not been done in more advanced nations? Too many business leaders like their union free, interchangeable, tax free, no paper work, disposable workers and are allowed to hire such workers by political leaders over decades.

Comment Re:Next stop, outsourcing drone pilot (Score 2) 74

Re 'Next stop, machine-learning drone pilot" That is the end design. Entire section of nations will just become free fire zones for US drone AI systems.
The US mil is thinking back to Vietnam and the Strategic Hamlet Program and even the UK experience in the Boer War
The AI will just patrol 24/7 and interdict in any movement it its grid.
Until then its more of the (Nov. 20 2015)

Comment Build vs buy (Score 1) 313

With build you can find good quality parts at low local prices.
Find the good RAM, CPU, GPU with features and a quality power supply. A motherboard with the modern fast storage options and amount and quality of fast connections without going over budget. Run power as needed and for later upgrades. Fit well made fans that are well designed for air flow and at a low sound level.
Depending on the brand you have the option not to pay a premium for over clocking support.
When you buy your avoiding the need to install a cpu, fit a better cooler and that press down feel.
Go for a self build just to save on quality parts and get exactly what is needed at a fair price. Buy if a system needs to be ready and tested without the need to install a cpu. Ensure that the product is well supported for the price.

Comment Re:Hypocrite (Score 2) 244

France did this back in the day of the Minitel networking services
Different groups (university reforms in the mid 1980's) could gather protesters from all over France in the using national, easy to connect to French networking telco systems.
The main thrust for France is to quell domestic protests and stop leaking of information eg French gov staff or press background to a Rainbow Warrior like event.
Been able to track the formation of protests or the press, track gov/mil whistleblowers talking to the French press before publication is interesting under new powers.
"Powers to pre-emptively detain key activists" is chilling.

Comment Re:Security services vs VPN? (Score 1) 91

The issue is that your isp ip from the VPN ip could be discovered at a low cost and by a lot of different interested groups.
A good wired modern router with OpenVPN support will often offer a fast, newer dual core cpu that can support the needed encryption.
That should cover any leaking from within the users OS, apps, software, malware.

Comment Re:Bigger problems (Score 1) 91

For that a list of who kept the IP would be needed so the product offered can be better understood.
Is it having all servers in one nation under one brands internal control?
Servers in a lot of nations but under total control of the brand?
Some internal network with a way in and a totally different server network out?
An external wired router passing the totality of all OS, app network traffic to a VPN should not be leaking any ISP ip.

Comment Re:Is that a secret? (Score 1) 91

The "anonymizing" part is that the VPN becomes your IP for that session.
The ip found on the net should always stop back at the VPN provider. Thats the idea of the router for a system like openvpn. Your entire OS, all apps, web use can only connect via the VPN, no leaking an ISP IP out. The idea that anyone looking back from the VPN IP can see the users ISP is not the best news.

Comment Re:and i should believe this... why again? (Score 1) 136

re "So what difference does "credibility" make?"
Global purchasing power. Re think that next bulk imported upgrade and consider an all local product at a different price factoring in security as been of value.
Might need more power, cooling, be slower and not have a fancy bezel that complements the looks of the hardware but staff finally totally understand what they are
buying in to and supporting.
Experts can finally go to the top of their departments and show a list of junk encryption, bad standards, weak math, failed hardware imports and consider internal or
better domestic options away from the expensive big brand that ships with trap door and backdoor junk over every version..
The other factor is that a generation of crypto experts cannot say they did not know anymore, did not expect the scale and ability of domestic "collect it all" or thought the "legal" department or "legal protections" or "brand" or "private sector" would always be in place to protect from domestic "collect it all".
Good crypto is now every experts problem to fix and get working to protect users, ideas, science, profit, local jobs, accounts, databases from a list of other competing nations reading everything for free thanks to decades of weak standards.

Submission + - Did scientists pick up their first intelligent radio waves from aliens? (

schwit1 writes: Astronomers have picked up five mysterious unidentified radio signals that could originate from outside the Milky Way.

The "fast radio bursts" included one "double signal" never heard before and have left astronomers buzzing with excitement over the possibility of it being a message with alien origins.

Only 11 of the unidentified transient radio pulses have been recorded before around the world.

And it is the curious new double blast — which was accompanied by four "singles" — which has baffled astronomers analyzing data from the Parkes radio telescope in New South Wales, Australia.

Comment Security services vs VPN? (Score 2) 91

Ideas like this show why VPN use was not a huge issue "Revealed: how US and UK spy agencies defeat internet privacy and security" (6 September 2013)
".. decode the encrypted traffic certified by three major (unnamed) internet companies and 30 types of Virtual Private Network (VPN) – used by businesses to
provide secure remote access .."
or under the new UK net laws "Snooper's Charter: Why aren't VPNs and Tor mentioned in the Investigatory Powers Bill?" (November 5, 2015)
".. but surprisingly, nowhere in the proposal does it mention the use of Virtual Private Networks (VPN)."

What can be done? Some creative way for an internal double VPN?
This could also show that VPN use is vulnerable at a city, state, private sector or federal level/budget rather than just a shorter list of advanced nations with a domestic collect it all capability.

Submission + - Expose tax evaders, go to jail. (

An anonymous reader writes: Hervé Falciani, the whistleblower who exposed wrongdoing at HSBC’s Swiss private bank, has been sentenced to five years in prison by a Swiss court.

The former IT worker was condemned in his absence for the biggest leak in banking history. While working on the database of HSBC’s Swiss private bank, Falciani downloaded the details of around 130,000 holders of secret Swiss accounts. The information was handed to French investigators leading to the prosecution of tax evaders including Arlette Ricci, heir to France’s Nina Ricci perfume empire, and to pursue Emilio Botín, the late chairman of Spain’s Santander bank.

HSBC was fined £28m by the Geneva authorities earlier this year, after investigators concluded that they had allowed money laundering to take place at its Swiss subsidiary.

Falciani is currently living in France, where he sought refuge from Swiss justice, and did not attend the trial.

Comment Re:Read the article comments (Score 2) 294

The global tech community knows what standard weak, junk encryption allows for over every generation of device and network they have to fix and clean up after.
Slowly governments and nations can understand what having junk encryption for their political leaders is costing their trade and national development.
Allowing huge national contracts to be set over junk encryption with a few bidding nations listening in is slowly been fully understood locally.
A government with their top officials using smart phones on all the time is not great policy. Trusting sensitive data on foreign owned and designed computer networks, junk weak crypto, clouds is no the best idea.
Re the comments, a lot of nations spend big on shaping comments on tech sites when ideas surrounding good national encryption policy is a topic.
The traditional talking points was that encryption was perfect, cheap, safe and secure, that data sets globally would be too big for any national domestic "collect it all" policy.
The new talking points are more direct after junk encryption standards and domestic "collect it all" was fully understood.

All Finagle Laws may be bypassed by learning the simple art of doing without thinking.