Follow Slashdot stories on Twitter


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Will likely never work in the USA (Score 1) 145 145

Congress passed a law requiring US based ITSP's to provide E911 support. If this idea ever went live it would require the same connections to E911. This connection costs money, its not free...

GNU VoIP would have to pay Verizon/Comcast/et cetera to connect to E911 and who is going to pay for that?

Unless congress provides an exemption.. (pfft, yahh)

Comment: Re:Nothing new (Score 1, Flamebait) 152 152

I thought the box near my garbage can that said "Mossberg" on it and the 3 empty 50lb bags of dog food were enough? Is my "NRA Inside means you stay out" sticker on my window just for good measure? Stupid crooks like these guys think they're smarter then they are typically die whimpering.. alone.. on my kitchen floor.. and if they don't die fast enough I'll smother them with the book of Job for good measure. If that doesn't work I think Monday Night Redemption is OK too... Long live the Castle Doctrine!!

Comment: Distress Keys and Images (Score 3, Interesting) 500 500

Some crypto junkies talk about distress keys. Where a user can enter two different keys depending on the situation. The real key loads the real OS. The distress key loads the "fake" OS. There are many ways to detect this in modern experiments. None will work without manipulating low level HD blocking.

Comment: Re:ASCII Delimited Security Issues (Score 1) 140 140

I've written both ASCII and Binary fuzzers. Binary is harder. My ASCII fuzzer found over 10 million possible mutations while the Binary fuzzer found less then a million. If I had to argue with myself maybe I should have said "harder to write a successful fuzzer".

Comment: ASCII Delimited Security Issues (Score 2, Insightful) 140 140

Seems to me that ASCII delimited protocols always have these types of issues. Its quite easy to write fuzzers for human readable protocols compared to binary encoded protocols. Too bad these developers don't know how to write good unit tests... This could have been avoided..

Comment: Re:P2P and Revered Connections (Score 1) 307 307

You make an interesting point. The idea of a secure P2P private networks still doesn't sit well with me. The insider threat can still act as the attacker and remove data from their assigned facility. None the less, business requirements "are" business requirements. "Its not the technology that's the problem", its how easy it is to abuse.

Comment: Great, why don't we just give them our laptops! (Score 1) 236 236

So, the idea was to load "sleeper" software by default on all these machines? Is the URL associated with this "service" always at the same memory location? It shouldn't be that hard for a Malware author to check for this BIOS and try to change the address. Who feels like being monitored by criminals? 10% off sale price?

Comment: Re:Binary Encoded Messages (Score 1) 254 254

Maybe, maybe not. When was the last time you hear a telecommunications company update their software within a reasonable time frame? It would just be easier and cheaper for the phones to get updated. So the phone manufactures will blame the telcoms while the telcoms will blame the manufactures. I can see where this is going...

"Can you program?" "Well, I'm literate, if that's what you mean!"