Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Back for a limited time - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×

Comment Re:Next stop, outsourcing drone pilot (Score 2) 70

Re 'Next stop, machine-learning drone pilot" That is the end design. Entire section of nations will just become free fire zones for US drone AI systems.
The US mil is thinking back to Vietnam and the Strategic Hamlet Program and even the UK experience in the Boer War
The AI will just patrol 24/7 and interdict in any movement it its grid.
Until then its more of the (Nov. 20 2015)

Comment Build vs buy (Score 1) 274

With build you can find good quality parts at low local prices.
Find the good RAM, CPU, GPU with features and a quality power supply. A motherboard with the modern fast storage options and amount and quality of fast connections without going over budget. Run power as needed and for later upgrades. Fit well made fans that are well designed for air flow and at a low sound level.
Depending on the brand you have the option not to pay a premium for over clocking support.
When you buy your avoiding the need to install a cpu, fit a better cooler and that press down feel.
Go for a self build just to save on quality parts and get exactly what is needed at a fair price. Buy if a system needs to be ready and tested without the need to install a cpu. Ensure that the product is well supported for the price.

Comment Re:Hypocrite (Score 2) 215

France did this back in the day of the Minitel networking services
Different groups (university reforms in the mid 1980's) could gather protesters from all over France in the using national, easy to connect to French networking telco systems.
The main thrust for France is to quell domestic protests and stop leaking of information eg French gov staff or press background to a Rainbow Warrior like event.
Been able to track the formation of protests or the press, track gov/mil whistleblowers talking to the French press before publication is interesting under new powers.
"Powers to pre-emptively detain key activists" is chilling.

Comment Re:Security services vs VPN? (Score 1) 83

The issue is that your isp ip from the VPN ip could be discovered at a low cost and by a lot of different interested groups.
A good wired modern router with OpenVPN support will often offer a fast, newer dual core cpu that can support the needed encryption.
That should cover any leaking from within the users OS, apps, software, malware.

Comment Re:Bigger problems (Score 1) 83

For that a list of who kept the IP would be needed so the product offered can be better understood.
Is it having all servers in one nation under one brands internal control?
Servers in a lot of nations but under total control of the brand?
Some internal network with a way in and a totally different server network out?
An external wired router passing the totality of all OS, app network traffic to a VPN should not be leaking any ISP ip.

Comment Re:Is that a secret? (Score 1) 83

The "anonymizing" part is that the VPN becomes your IP for that session.
The ip found on the net should always stop back at the VPN provider. Thats the idea of the router for a system like openvpn. Your entire OS, all apps, web use can only connect via the VPN, no leaking an ISP IP out. The idea that anyone looking back from the VPN IP can see the users ISP is not the best news.

Comment Re:and i should believe this... why again? (Score 1) 131

re "So what difference does "credibility" make?"
Global purchasing power. Re think that next bulk imported upgrade and consider an all local product at a different price factoring in security as been of value.
Might need more power, cooling, be slower and not have a fancy bezel that complements the looks of the hardware but staff finally totally understand what they are
buying in to and supporting.
Experts can finally go to the top of their departments and show a list of junk encryption, bad standards, weak math, failed hardware imports and consider internal or
better domestic options away from the expensive big brand that ships with trap door and backdoor junk over every version..
The other factor is that a generation of crypto experts cannot say they did not know anymore, did not expect the scale and ability of domestic "collect it all" or thought the "legal" department or "legal protections" or "brand" or "private sector" would always be in place to protect from domestic "collect it all".
Good crypto is now every experts problem to fix and get working to protect users, ideas, science, profit, local jobs, accounts, databases from a list of other competing nations reading everything for free thanks to decades of weak standards.

Submission + - Did scientists pick up their first intelligent radio waves from aliens? (

schwit1 writes: Astronomers have picked up five mysterious unidentified radio signals that could originate from outside the Milky Way.

The "fast radio bursts" included one "double signal" never heard before and have left astronomers buzzing with excitement over the possibility of it being a message with alien origins.

Only 11 of the unidentified transient radio pulses have been recorded before around the world.

And it is the curious new double blast — which was accompanied by four "singles" — which has baffled astronomers analyzing data from the Parkes radio telescope in New South Wales, Australia.

Comment Security services vs VPN? (Score 2) 83

Ideas like this show why VPN use was not a huge issue "Revealed: how US and UK spy agencies defeat internet privacy and security" (6 September 2013)
".. decode the encrypted traffic certified by three major (unnamed) internet companies and 30 types of Virtual Private Network (VPN) – used by businesses to
provide secure remote access .."
or under the new UK net laws "Snooper's Charter: Why aren't VPNs and Tor mentioned in the Investigatory Powers Bill?" (November 5, 2015)
".. but surprisingly, nowhere in the proposal does it mention the use of Virtual Private Networks (VPN)."

What can be done? Some creative way for an internal double VPN?
This could also show that VPN use is vulnerable at a city, state, private sector or federal level/budget rather than just a shorter list of advanced nations with a domestic collect it all capability.

Submission + - Expose tax evaders, go to jail. (

An anonymous reader writes: Hervé Falciani, the whistleblower who exposed wrongdoing at HSBC’s Swiss private bank, has been sentenced to five years in prison by a Swiss court.

The former IT worker was condemned in his absence for the biggest leak in banking history. While working on the database of HSBC’s Swiss private bank, Falciani downloaded the details of around 130,000 holders of secret Swiss accounts. The information was handed to French investigators leading to the prosecution of tax evaders including Arlette Ricci, heir to France’s Nina Ricci perfume empire, and to pursue Emilio Botín, the late chairman of Spain’s Santander bank.

HSBC was fined £28m by the Geneva authorities earlier this year, after investigators concluded that they had allowed money laundering to take place at its Swiss subsidiary.

Falciani is currently living in France, where he sought refuge from Swiss justice, and did not attend the trial.

Comment Re:Read the article comments (Score 2) 290

The global tech community knows what standard weak, junk encryption allows for over every generation of device and network they have to fix and clean up after.
Slowly governments and nations can understand what having junk encryption for their political leaders is costing their trade and national development.
Allowing huge national contracts to be set over junk encryption with a few bidding nations listening in is slowly been fully understood locally.
A government with their top officials using smart phones on all the time is not great policy. Trusting sensitive data on foreign owned and designed computer networks, junk weak crypto, clouds is no the best idea.
Re the comments, a lot of nations spend big on shaping comments on tech sites when ideas surrounding good national encryption policy is a topic.
The traditional talking points was that encryption was perfect, cheap, safe and secure, that data sets globally would be too big for any national domestic "collect it all" policy.
The new talking points are more direct after junk encryption standards and domestic "collect it all" was fully understood.

Comment Re:But why? (Score 1) 290

Re "What's the point? This detracts from their own goals of safety for USA."
Think back to all the Overseas interventions of the United States
The US gov and mil needs vast networks of free flowing cash, hardware support and propaganda globally to spread US policy around the world.
The ability to set, sell, then break weak standard encryption as a policy tool helps. Every call, fax, email, bank transaction, shipment, communication, draft report, database is open to US policy makers in near real time.
Re "What is the ends here?"
To have and keep the 5 eye nations in on every part of all telecommunications globally.

To restore a sense of reality, I think Walt Disney should have a Hardluckland. -- Jack Paar