Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment: Will likely never work in the USA (Score 1) 145

by Algorithmn (#35493306) Attached to: GNU Free Call Announced, SIP-based VoIP

Congress passed a law requiring US based ITSP's to provide E911 support. If this idea ever went live it would require the same connections to E911. This connection costs money, its not free...

GNU VoIP would have to pay Verizon/Comcast/et cetera to connect to E911 and who is going to pay for that?

Unless congress provides an exemption.. (pfft, yahh)

Comment: Re:Nothing new (Score 1, Flamebait) 152

by Algorithmn (#33556792) Attached to: Burglary Ring Used Facebook Places To Find Targets
I thought the box near my garbage can that said "Mossberg" on it and the 3 empty 50lb bags of dog food were enough? Is my "NRA Inside means you stay out" sticker on my window just for good measure? Stupid crooks like these guys think they're smarter then they are typically die whimpering.. alone.. on my kitchen floor.. and if they don't die fast enough I'll smother them with the book of Job for good measure. If that doesn't work I think Monday Night Redemption is OK too... Long live the Castle Doctrine!!

Comment: Distress Keys and Images (Score 3, Interesting) 500

by Algorithmn (#29038071) Attached to: Encryption? What Encryption?
Some crypto junkies talk about distress keys. Where a user can enter two different keys depending on the situation. The real key loads the real OS. The distress key loads the "fake" OS. There are many ways to detect this in modern experiments. None will work without manipulating low level HD blocking.

Comment: ASCII Delimited Security Issues (Score 2, Insightful) 140

by Algorithmn (#28959217) Attached to: XML Library Flaw — Sun, Apache, GNOME Affected
Seems to me that ASCII delimited protocols always have these types of issues. Its quite easy to write fuzzers for human readable protocols compared to binary encoded protocols. Too bad these developers don't know how to write good unit tests... This could have been avoided..

Comment: Re:P2P and Revered Connections (Score 1) 307

by Algorithmn (#28898119) Attached to: P2P Network Exposes Obama's Safehouse Location
You make an interesting point. The idea of a secure P2P private networks still doesn't sit well with me. The insider threat can still act as the attacker and remove data from their assigned facility. None the less, business requirements "are" business requirements. "Its not the technology that's the problem", its how easy it is to abuse.

Comment: Great, why don't we just give them our laptops! (Score 1) 236

by Algorithmn (#28897295) Attached to: BIOS "Rootkit" Preloaded In 60% of New Laptops
So, the idea was to load "sleeper" software by default on all these machines? Is the URL associated with this "service" always at the same memory location? It shouldn't be that hard for a Malware author to check for this BIOS and try to change the address. Who feels like being monitored by criminals? 10% off sale price?

Comment: Re:Binary Encoded Messages (Score 1) 254

by Algorithmn (#28882811) Attached to: SMS Hack Could Make iPhones Vulnerable
Maybe, maybe not. When was the last time you hear a telecommunications company update their software within a reasonable time frame? It would just be easier and cheaper for the phones to get updated. So the phone manufactures will blame the telcoms while the telcoms will blame the manufactures. I can see where this is going...

Message from Our Sponsor on ttyTV at 13:58 ...