Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:No proof, no proof (Score 1) 148

Should be an interesting test of the Supreme court. As I understand the Roe V Wade decision had some pretty similar arguments. A lot of it came down to an issue of standing and it was determined that, while by normal standings rules, a person denied an abortion would not have standing to bring a case until injured, but if a pregnancy was life threatening, that would be an effective denial of right to sue.

The term is "capable of repetition, yet evading review".


Comment Responsibility? (Score 1) 45

Bray says unless you plan to unplug from the Internet completely, every consumer needs to assume some responsibility for the security and overall health of the Internet of Everything.

This is not going to be reasonable or even possible when devices are using obfuscated or poorly documented protocols which is becoming more prevalent. The best that the consumer will be able to do is isolate every device from every other (with a VLAN switch or equivalent) and block all incoming connections.

For example with Windows 10 or Windows 7 and later with various updates, how is the consumer to know via traffic inspection what is normal expected traffic and what is not? Even if you shut off all of the privacy destroying features, Windows still generates traffic. How do you distinguish this traffic from other malicious traffic?

Comment Re:The Wire (Score 1) 211

Yes, and it felt fine. They didn't stop me, so I simply drove comfortably below the speed limit. A bit boring, but nothing to worry about. If you want to get rid of them, go even slower and they will pass.

I was once honest to gawd pulled over for going exactly the speed limit. It was in a neighborhood where most people speed through, so I guess the officer found someone obeying the speed limit mighty suspicious.

A compiled list of reasons allowing reasonable suspicion to pull someone over in Texas included traveling slower than the speed limit, traveling at the speed limit, and traveling faster than the speed limit.

Comment Re:Why so complicated? (Score 1) 111

It is not that difficult. The only issue is transmission line stub length.

Use current mode low voltage differential signaling to keep the power down with a termination at either end of the transmission line. Then every transmitter in the middle sees the transmission line impedance divided by 2 because it is driving two transmission line in parallel. The transmitters at the ends see the same transmission line impedance divided by 2 because they are driving a transmission line and an immediately adjacent termination although the termination may be placed remotely.

Receivers are high impedance just like on the old Ethernet 10Base-2 standard.

If the minimum stub length is too long for the baud rate because of integrated circuit packaging and layout, then use the same trick Tektronix used on fast oscilloscopes by using 4 pins instead of 2 pins and route the transmission line on and off of the integrated circuit so the stub length is only on the integrated circuit.

Comment Re:The cars can detect gestures. (Score 1) 236

Absolutely correct. Officers are (normally) trained that they need to allow the person to travel to a location they feel safe, which can mean a lit area or a populated area. Similarly if you are are on a bridge or somewhere with no shoulder, you can turn on your hazard lights, slow down, and continue to a safe area. If someone in the vehicle has a cell phone, they can call 911, describe the situation, and tell dispatch they will stop in a location with light and other people. You can also call 911 to verify the person is a real officer.

They may be trained in this but most officers (and the court) will use your not stopping immediately as evidence against you.

Comment Re:Exceeds state authority (Score 1) 192

The FAA must rely on the grant of power in Art 1 Sec 8 of the constitution to regulate commerce among the several states.

Airliners bound for other states fly over my house every day. I concede the FAA's authority over those airplanes and their flights.

OTOH, a little drone flying barely above the treetops has a far slimmer case to be part of interstate commerce.

Federal jurisdiction over use of the air is not unlimited, and cannot be used to displace state jurisdiction on non commercial uses of airspace in realms that are clearly not part of the commercial airways.

The hook for being relevant to interstate commerce may be as small as "has moved in or that otherwise affects interstate or foreign commerce". I am sure some part or parts of the drone will not have been indigenous to California.

I personally guess that California's right to regulate the use of airspace below 500 feet outside of airport landing zones is constitutional and will be upheld if the law is enacted.

I agree insofar as the California law does not conflict with any federal law.

Comment Re:Trap? Usually its a tarpit of unusable service (Score 1) 184

These days a T1 is painfully slow, even without multiple or even a single other user. I can't think of any reason to still use a dedicated circuit like that unless you absolutely positively need the guaranteed bandwidth and SLA service...or there was absolutely no other option.

Or you want lower latency. My U-Verse service using FTTN has 3 to 4 times the latency to the gateway than my old SDSL had and the SDSL upload speed was half of the current U-Verse speed so it was not that much slower. Upload bandwidth has doubled but latency has increased 4 times.

Comment Re:Microsoft will be stopped (Score 1) 394

This puts business users who run Win10 at significant legal risk, given that they knew (or should have known) that every Win10 machine contains a general-purpose mechanism pre-installed that allows a third-party attacker (Microsoft) to silently collect any information at will.

I have to assume third-party attackers here include Microsoft at the behest of the NSA and FBI which are at best one court order away.

Comment Re:Firewalls? (Score 1) 394

Is it possible to get an Arduino or Raspberry Pi that just acts as a nice little firewall, and that I can modify with pre-set profiles?

Would it be powerful enough?

Sure, the firewall part has been done using a Raspberry Pi. Because of the limitations of using one or more additional USB to ethernet converters, the speed and perhaps reliability is not anything to write home about but it is fast enough for most US internet connections.

Better I think would be to use embedded x86 hardware like from Netgate to run pfsense. Maybe a pfsense plug-in will be produced to handle the Microsoft security violations.

Comment Re:Its a dumb feature (Score 1) 89

The write protect jumpers were originally used because Flash memory at the time required an external high voltage supply for programming and the cheapest way to control this was through a physical jumper.

I agree that controlling this through hardware is a good idea. The programming supply is no longer available for this but the write protect jumper could block the write strobe instead. Unfortunately some newer Flash memories do not have a separate write strobe either.

Comment Re:Readily adapatable to military use is NOT a req (Score 1) 688

Couple points, that decision was flawed. It is well documented that it was one of the worse Supreme Court cases in history. And likely staged...Neither the defendants nor their legal counsel appeared at the Supreme Court. A lack of financial support and procedural irregularities prevented counsel from traveling.[4] Miller was found shot to death in April, before the decision was rendered.[5]

So imagine using as precedent a case that was never even defended against. So what were the precedents established?

1.The Second Amendment protects only the ownership of military-type weapons appropriate for use in an organized militia.

2.The "double barrel 12-gauge Stevens shotgun having a barrel less than 18 inches in length, bearing identification number 76230" was never used in any militia organization.

The situation with Miller is even worse than this:

The Peculiar Story of United States v. Miller

2. Our military now regularly uses short barreled shotguns in door-to-door operations. As such, short barreled rifles would now have to be legal sans the tax stamp.

And even back in the day it was an incorrect decisions as: During WWI, between 30,000 and 40,000 short-barreled pump-action shotguns were purchased by the US Ordnance Department and saw service in the trenches and for guarding German prisoners.


Comment Re:funding the lander. (Score 1) 53

Radiation damage to integrated electronics in satellites was a big problem at the time, and I'm not sure why that's different now, but in any case they decided to use core memory rather than chip memory. (hence the term "core dump" for all you youngsters).

The simplest integrated processes use junction isolation which is susceptible to all kind of additional problems when exposed to radiation compared to integrated circuits which use dielectric isolation.

Comment Re:Next batch includes more interesting emailadres (Score 1) 301

Otherwise, they're going to miss out on all the fun. I mean, the US Army said they didn't like this conduct of their soldiers, so adding a lot of known emailaddresses for high ranking officials could be fun.

Or as a security measure, add lots of email addresses of celebrities and politicians and make sure that emails can be falsified so as to create deniable plausibility in the event that the database is compromised.

This login session: $13.76, but for you $11.88.