Forgot your password?
typodupeerror

Comment: Re:Quote from the article (Score 1) 158

by ultranova (#47578849) Attached to: Unesco Probing Star Wars Filming In Ireland

Likely translation: He tried to shake the movie company down for a few weeks worth of work rather than a day or two, and they told him to piss off, then contacted someone more reasonably inclined. They obviously got the permits, meaning that someone was able to do the work in just a few days.

Or someone pulled the assessment from their ass for quick cash.

Comment: Re:Headline trifecta (Score 1) 66

Tesla scares the bejesus out of the car companies because he could very well come in from the side and own the entire industry because he's already patented all the technology needed to actually build these cars.

Electric cars existed well before Tesla, and continue to exist outside of Tesla. Many of their patents are very niche focused, things like charging plugs (there are plenty of alternatives, used in high power connections for decades) or the like. As far as scaring, Tesla still hasn't turned a profit on their cars - they only "make" money if you include the Government redistribution of carbon taxes - which is set to expire in about 2 years. Tesla not making profit on their cars by then? Good luck after that...

+ - Hackers Can Control Your Phone Using a Tool That's Already Built Into It->

Submitted by Anonymous Coward
An anonymous reader writes "A lot of concern about the NSA’s seemingly omnipresent surveillance over the last year has focused on the agency’s efforts to install back doors in software and hardware. Those efforts are greatly aided, however, if the agency can piggyback on embedded software already on a system that can be exploited.

Two researchers have uncovered such built-in vulnerabilities in a large number of smartphones that would allow government spies and sophisticated hackers to install malicious code and take control of the device.

The vulnerabilities lie within a device management tool carriers and manufacturers embed in handsets and tablets to remotely configure them. Though some design their own tool, most use a tool developed by a specific third-party vendor—which the researchers will not identify until they present their findings next week at the Black Hat security conference in Las Vegas. The tool is used in some form in more than 2 billion phones worldwide. The vulnerabilities, they say, were found so far in Android and BlackBerry devices and a small number of Apple iPhones used by Sprint customers. They haven’t looked at Windows Mobile devices yet."

Link to Original Source

Comment: Reads like a "Modest Proposal" to me (Score 1) 182

by Sloppy (#47578135) Attached to: UK Government Report Recommends Ending Online Anonymity

The techdirt article quotes this delicious excerpt:

From our perspective in the United Kingdom, if the behaviour which is currently criminal is to remain criminal and also capable of prosecution, we consider that it would be proportionate to require the operators of websites first to establish the identity of people opening accounts but that it is also proportionate to allow people thereafter to use websites using pseudonyms or anonymously. There is little point in criminalising certain behaviour and at the same time legitimately making that same behaviour impossible to detect. We recognise that this is a difficult question, especially as it relates to jurisdiction and enforcement.

I can't even say I really disagree with that reasoning. Can't you see how there are two completely different ways to reach a conclusion from that paragraph?

Programming

Peter Hoddie Talks About His Internet of Things Construction Kit (Video) 45

Posted by Roblimo
from the everything-you-own-must-now-connect-to-the-internet dept.
You remember Peter Hoddie, right? He was one of the original QuickTime developers at Apple. He left in 2002 to help found a startup called Kinoma, which started life developing multimedia players and browsers for mobile devices. Kinoma was acquired in 2011 by Marvell Semiconductor, whose management kept it as a separate entity.

The latest creation from Peter and his crew is the 'Kinoma Create,' AKA the 'JavaScript-Powered Internet of Things Construction Kit.' With it, they say, you can 'quickly and easily create personal projects, consumer electronics, and Internet of Things prototypes.' EE Times mentioned it in March, and they're not the only ones to notice this product. Quite a few developers and companies are jumping on the 'Internet of Things' bandwagon, so there may be a decent -- and growing -- market for something like this. (Alternate Video Link)

+ - Ask SlashDot: What should the NSA be able to do without a warrant?->

Submitted by LessThanObvious
LessThanObvious (3671949) writes "We have a general consensus in the U.S. and abroad that says the NSA has overstepped their boundaries in data collection and surveillance. The costs to liberty, free speech, privacy rights as well as economic and foreign policy costs outlined in the New America Open Technology Institute July 2014 Policy Paper — "Surveillance Costs" have been broadly discussed. It seems now that there is enough political inertia post Snowden and enough economic incentive to make changes to protect U.S. competitive position and international trust relationships for real change to come about. It is also pretty much a given that an organization like the NSA with a multibillion dollar budget is not going to simply dry up and blow away.

In a world where we are trying to defend our nation and others around the globe from highly sophisticated cyber-crime, cyber-attack and serious terror threats at home and abroad, it does seem that the NSA and other agencies have a legitimate role to play. Let's imagine a world where the NSA and other agencies rewrite the rules of when and where information could be collected, allowing for adequate transparency and protections for U.S. and foreign individuals rights. How can we find the needle in a stack of haystacks if they are no longer permitted to disturb the haystack?

Now under those circumstances what should the NSA be allowed to do without a warrant?"

Link to Original Source

Comment: Re:Can we just recognize it as currency and be don (Score 1) 167

by UnknownSoldier (#47576615) Attached to: US States Edge Toward Cryptocoin Regulation

As I pointed out I already pay my fair share.

What I have a problem with is allowing the IRS to over-step their idiotic jurisdiction.

If you can show the Blizzard server where I can pay the IRS my WoW gold then I'll pay the "income" I've "earned." Oh wait, they don't have one .. because Blizzard owns ALL their "virtual currency", aka WoW gold.

Likewise for other digital currency -- the IRS can make all the claims they want, but that doesn't make it true. They don't "own" BitCoin, NOR the bits used to represent the currency.

17 trillions in debt and the IRS has done fuck all to help the country get out of debt. If the IRS wasn't so greedy then maybe I'd actually respect them in spite of paying my taxes. But most Americans are too stupid and a bunch of pussies to do anything. They would rather watch their unreality shows such as "Big Brother" then give a dam.

So yea, I have a problem with illegal government over-stepping their pseudo jurisdiction such as the Federal Reserve, which is neither Federal, nor a Reserve.

"If it ain't broke, don't fix it." - Bert Lantz

Working...