Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment: they are doing it... (Score 1) 130

by kesuki (#48606523) Attached to: Sony Pictures Leak Reveals Quashed Plan To Upload Phony Torrents

"I wonder why flooding underground markets with phony products isn't widespread."

it is, it's called 'made in china' a bit stereotypical but anytime a corporation convinces one group of people to pay more than fair market value, on come the copiers who make substandard duplicate items.

"Why don't credit card companies manufacture fake lists of stolen credit card numbers, or phony social security numbers, for illegal trading sites?"

credit card number the first 4 id the bank the last 4 the account number with the numbers in between being a 'code' of numbers that are random and which leave fake numbers between real ones. at the time it was 'good enough' because they would use carbon imprints at the wares store which was difficult to make a duplicate of the card just from the store copy (until 3d printers came along) credit cards are horribly insecure the magnetic stripe made it so that they could add three more numbers (also on the back of the card) to have more people with credit cards and supposedly more secure... anyways because of the legacy support issues credit cards releasing fake accounts would be an exercise in futility. as they would then have less possible working numbers from the ones they have available.

"For that matter, would fake ivory, fake illegal porn, and other "false positives" discourage buyers? Or create alibis?"

fake ivory is easy to find. fake illegal porn is out there too i think they were calling it 'child abuse' evidence. and don't think this is something new, magazine photographers from nation geographic, famous images of Vietnam when the usa igniting whole towns and some of the burn victims were children but still got published.

Comment: device boot up won't stop terrorists (Score 5, Insightful) 184

by kesuki (#48578065) Attached to: Are the TSA's New Electronic Device Screenings Necessary?

i have a postage sized mp3 player from china with a tf/sd card slot it boots up shows a menued screen and plays mp3s. a fake phone that has a plastic explosive bomb could easily use a 'fake' power on screen with menu and the menus would be browsable and possibly functional and also be a bomb.

so no this doesn't make airplanes safer.

Comment: Re:Poor Sony... (Score 1) 85

by kesuki (#48545607) Attached to: North Korea Denies Involvement In "Righteous" Sony Hack

but the mass media spin can be used to make north korea the perfect target. for sony it is not about the truth it is about the spin and damage control. their employees are all going to need lifelock until they can change their social security numbers and possibly names. at least the lesser folk might and the upper folk will need new telephone numbers. sony has a credit card company too.

i have already seen the mass media jumping on the 'n korea' has uber hackers who get everything they want etc. these people deal with lies and manipulation. sure sony won't be able to connect and send data because of their reputation hit until the counter resets. just like home depot still is not sure how to do credit cards since using one there automatically makes your card company void you, same with target, now it is sony's turn to get blocked. who next? i don't predict the future, so i don't know.

what i do know is windows doesn't require a password to log in to a computer and not having it internet connected means it doesn't work as promised. i have seen in the wild people who can't figure out a usb port and field techs have just reinstalled for them clean as if that solves the problem. i finally set up an admin account for me on her box, and gave her a new clean account and took away admin on that and her old possibly compromised setup, and i got her a usb keyboard because the built in keyboard was not working right.

some people only deserve a smartphone and a bluetooth keyboard. sadly there is no real test for using anything more complex than a smartphone...

Comment: Re:Wrong conclusion: not "unintended consequences" (Score 2) 118

by kesuki (#48545231) Attached to: How One Man Changed the Ecology of the Great Lakes With Salmon

my biggest problem with the fine article because it jumped around more than inception. it was not written in sequence or with suitable foreshadowing for the 'jumps' it made.

for maximum understanding and widest audience appeal it should only jump around when needed. the story should first use the first two paragraphs to sum the story, for the people who skim. after that it should have a clean flow of events in the order they occur chronologically. this isn't spider-man, and i realize how when writing you might want to simply put things in when you think of it, but the final draft should have those sections cut and pasted to the chronological timeline and then polished into the final draft.

Comment: Re:America, land of the free... (Score 1) 717

by kesuki (#48544887) Attached to: Ask Slashdot: Can a Felon Work In IT?

there has been a movement in many states to fix the problem that in 1972 was caused by the supreme court. prior to then felons only lost the right to vote if they had participated in rebellion, or similar felonies.

"Unlike most laws that burden the right of citizens to vote based on some form of social status, felony disenfranchisement laws have been held to be constitutional. In Richardson v. Ramirez (1974), the United States Supreme Court upheld the constitutionality of felon disenfranchisement statutes, finding that the practice did not deny equal protection to disenfranchised voters. The Court looked to Section 2 of the Fourteenth Amendment to the United States Constitution, which proclaims that States which deny the vote to male citizens, except on the basis of "participation of rebellion, or other crime", will suffer a reduction in representation. Based on this language, the Court found that this amounted to an "affirmative sanction" of the practice of felon disenfranchisement, and the 14th Amendment could not prohibit in one section that which is expressly authorized in another.

But, critics of the practice argue that Section 2 of the 14th Amendment allows, but does not represent an endorsement of, felony disenfranchisement statutes as constitutional in light of the equal protection clause and is limited only to the issue of reduced representation. The Court ruled in Hunter v. Underwood 471 U.S. 222, 232 (1985) that a state's crime disenfranchisement provision will violate Equal Protection if it can be demonstrated that the provision, as enacted, had "both [an] impermissible racial motivation and racially discriminatory impact." (The law in question also disenfranchised people convicted of vagrancy, adultery, and any misdemeanor "involving moral turpitude"; the test case involved two individuals who faced disenfranchisement for presenting invalid checks, which the state authorities had found to be morally turpit behavior.) A felony disenfranchisement law, which on its face is indiscriminate in nature, cannot be invalidated by the Supreme Court unless its enforcement is proven to racially discriminate and to have been enacted with racially discriminatory animus.[citation needed]"

If it's worth hacking on well, it's worth hacking on for money.