Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Comment Re:Hypocrite (Score 2) 137

France did this back in the day of the Minitel networking services https://en.wikipedia.org/wiki/...
Different groups (university reforms in the mid 1980's) could gather protesters from all over France in the using national, easy to connect to French networking telco systems.
The main thrust for France is to quell domestic protests and stop leaking of information eg French gov staff or press background to a Rainbow Warrior like event. https://en.wikipedia.org/wiki/...
Been able to track the formation of protests or the press, track gov/mil whistleblowers talking to the French press before publication is interesting under new powers.
"Powers to pre-emptively detain key activists" is chilling.

Comment Re:Security services vs VPN? (Score 1) 61

The issue is that your isp ip from the VPN ip could be discovered at a low cost and by a lot of different interested groups.
A good wired modern router with OpenVPN support will often offer a fast, newer dual core cpu that can support the needed encryption.
That should cover any leaking from within the users OS, apps, software, malware.

Comment Re:Bigger problems (Score 1) 61

For that a list of who kept the IP would be needed so the product offered can be better understood.
Is it having all servers in one nation under one brands internal control?
Servers in a lot of nations but under total control of the brand?
Some internal network with a way in and a totally different server network out?
An external wired router passing the totality of all OS, app network traffic to a VPN should not be leaking any ISP ip.

Comment Re:Is that a secret? (Score 1) 61

The "anonymizing" part is that the VPN becomes your IP for that session.
The ip found on the net should always stop back at the VPN provider. Thats the idea of the router for a system like openvpn. Your entire OS, all apps, web use can only connect via the VPN, no leaking an ISP IP out. The idea that anyone looking back from the VPN IP can see the users ISP is not the best news.

Comment Re:and i should believe this... why again? (Score 1) 100

re "So what difference does "credibility" make?"
Global purchasing power. Re think that next bulk imported upgrade and consider an all local product at a different price factoring in security as been of value.
Might need more power, cooling, be slower and not have a fancy bezel that complements the looks of the hardware but staff finally totally understand what they are
buying in to and supporting.
Experts can finally go to the top of their departments and show a list of junk encryption, bad standards, weak math, failed hardware imports and consider internal or
better domestic options away from the expensive big brand that ships with trap door and backdoor junk over every version..
The other factor is that a generation of crypto experts cannot say they did not know anymore, did not expect the scale and ability of domestic "collect it all" or thought the "legal" department or "legal protections" or "brand" or "private sector" would always be in place to protect from domestic "collect it all".
Good crypto is now every experts problem to fix and get working to protect users, ideas, science, profit, local jobs, accounts, databases from a list of other competing nations reading everything for free thanks to decades of weak standards.

Submission + - Did scientists pick up their first intelligent radio waves from aliens? (express.co.uk)

schwit1 writes: Astronomers have picked up five mysterious unidentified radio signals that could originate from outside the Milky Way.

The "fast radio bursts" included one "double signal" never heard before and have left astronomers buzzing with excitement over the possibility of it being a message with alien origins.

Only 11 of the unidentified transient radio pulses have been recorded before around the world.

And it is the curious new double blast — which was accompanied by four "singles" — which has baffled astronomers analyzing data from the Parkes radio telescope in New South Wales, Australia.

Comment Security services vs VPN? (Score 2) 61

Ideas like this show why VPN use was not a huge issue "Revealed: how US and UK spy agencies defeat internet privacy and security" (6 September 2013)
".. decode the encrypted traffic certified by three major (unnamed) internet companies and 30 types of Virtual Private Network (VPN) – used by businesses to
provide secure remote access .."
or under the new UK net laws "Snooper's Charter: Why aren't VPNs and Tor mentioned in the Investigatory Powers Bill?" (November 5, 2015)
".. but surprisingly, nowhere in the proposal does it mention the use of Virtual Private Networks (VPN)."

What can be done? Some creative way for an internal double VPN?
This could also show that VPN use is vulnerable at a city, state, private sector or federal level/budget rather than just a shorter list of advanced nations with a domestic collect it all capability.

Submission + - Expose tax evaders, go to jail. (theguardian.com)

An anonymous reader writes: Hervé Falciani, the whistleblower who exposed wrongdoing at HSBC’s Swiss private bank, has been sentenced to five years in prison by a Swiss court.

The former IT worker was condemned in his absence for the biggest leak in banking history. While working on the database of HSBC’s Swiss private bank, Falciani downloaded the details of around 130,000 holders of secret Swiss accounts. The information was handed to French investigators leading to the prosecution of tax evaders including Arlette Ricci, heir to France’s Nina Ricci perfume empire, and to pursue Emilio Botín, the late chairman of Spain’s Santander bank.

HSBC was fined £28m by the Geneva authorities earlier this year, after investigators concluded that they had allowed money laundering to take place at its Swiss subsidiary.

Falciani is currently living in France, where he sought refuge from Swiss justice, and did not attend the trial.

Comment Re:Read the article comments (Score 1) 272

The global tech community knows what standard weak, junk encryption allows for over every generation of device and network they have to fix and clean up after.
Slowly governments and nations can understand what having junk encryption for their political leaders is costing their trade and national development.
Allowing huge national contracts to be set over junk encryption with a few bidding nations listening in is slowly been fully understood locally.
A government with their top officials using smart phones on all the time is not great policy. Trusting sensitive data on foreign owned and designed computer networks, junk weak crypto, clouds is no the best idea.
Re the comments, a lot of nations spend big on shaping comments on tech sites when ideas surrounding good national encryption policy is a topic.
The traditional talking points was that encryption was perfect, cheap, safe and secure, that data sets globally would be too big for any national domestic "collect it all" policy.
The new talking points are more direct after junk encryption standards and domestic "collect it all" was fully understood.

Comment Re:But why? (Score 1) 272

Re "What's the point? This detracts from their own goals of safety for USA."
Think back to all the Overseas interventions of the United States https://en.wikipedia.org/wiki/...
The US gov and mil needs vast networks of free flowing cash, hardware support and propaganda globally to spread US policy around the world.
The ability to set, sell, then break weak standard encryption as a policy tool helps. Every call, fax, email, bank transaction, shipment, communication, draft report, database is open to US policy makers in near real time.
Re "What is the ends here?"
To have and keep the 5 eye https://en.wikipedia.org/wiki/... nations in on every part of all telecommunications globally.

Comment Re:I see what you did there... (Score 1) 272

Re 'The greatest facilitators in the most intrusive and pervasive surveillance programme in history are the IT giants themselves."
Yes its like the UK too, collect all for the UK gov but want the media to stop reporting that collection for the gov 24/7 is policy and routine.
"UK ISP boss points out massive technical flaws in Investigatory Powers Bill" (Nov 27, 2015)
"....which forbid ISPs from revealing what snooping is being carried out on their systems."
"The Home Office revealed that it was the larger telecom companies that asked for gag orders to be imposed."
All Snowden did was expose the vast US domestic unconstitutional surveillance networks to the public via the US constitutionally protected press.
Junk encryption been sold as a standard, low quality education endorsing and creating weak crypto standards over decades, useless standards, poor quality code, data connections within telcos own systems for gov (splitters), "collect it all" domestically without warrants.
The "Communications Assistance for Law Enforcement Act" and the standards it set should have been understood for what big telcos would do to all US and global (peering) telco systems and standards.
The "Silicon Valley's privacy policies" never existed, every connection and system set up by big US telcos was always and will always be gov intercept ready as deigned and by default.

No problem is so formidable that you can't just walk away from it. -- C. Schulz