Forgot your password?

Comment: Re:So if TOR nodes can easily do it (Score 0) 115

by Burz (#48225749) Attached to: Researcher Finds Tor Exit Node Adding Malware To Downloads

Who's to say that your friendly ISP or government agency isn't doing the same? Or even better yet, how about for OS updates.

Your OS should already check binaries before installation; This is done with digital signatures (i.e. GPG and such) so HTTPS isn't required for protection.

The threat TFA is about is when the user/admin uses an installation method that circumvents or ignores the signature check.

In the Linux realm most popular distros are reasonably secure, but I noticed that Fedora's signature regime is incomplete and so is open to a MITM attack where any number of packages can be selectively prevented from receiving security updates.

OSX and Windows give the appearance to doing proper signature checks, including when you double-click an installer from the desktop. But they use a PKI model that leaves me wondering just who is vouching for the signatures.

The Internet

The Inevitable Death of the Internet Troll 544

Posted by samzenpus
from the sticks-and-stones dept. writes James Swearingen writes at The Atlantic that the Internet can be a mean, hateful, and frightening place — especially for young women but human behavior and the limits placed on it by both law and society can change. In a Pew Research Center survey of 2,849 Internet users, one out of every four women between 18 years old and 24 years old reports having been stalked or sexually harassed online. "Like banner ads and spam bots, online harassment is still routinely treated as part of the landscape of being online," writes Swearingen adding that "we are in the early days of online harassment being taken as a serious problem, and not simply a quirk of online life." Law professor Danielle Citron draws a parallel between how sexual harassment was treated in the workplace decades ago and our current standard. "Think about in the 1960s and 1970s, what we said to women in the workplace," says Citron. "'This is just flirting.' That a sexually hostile environment was just a perk for men to enjoy, it's just what the environment is like. If you don't like it, leave and get a new job." It took years of activism, court cases, and Title VII protection to change that. "Here we are today, and sexual harassment in the workplace is not normal," said Citron. "Our norms and how we understand it are different now."

According to Swearingen, the likely solution to internet trolls will be a combination of things. The expansion of laws like the one currently on the books in California, which expands what constitutes online harassment, could help put the pressure on harassers. The upcoming Supreme Court case, Elonis v. The United States, looks to test the limits of free speech versus threatening comments on Facebook. "Can a combination of legal action, market pressure, and societal taboo work together to curb harassment?" asks Swearingen. "Too many people do too much online for things to stay the way they are."
Open Source

Lennart Poettering: Open Source Community "Quite a Sick Place To Be In" 993

Posted by samzenpus
from the let-the-flamewar-begin dept.
An anonymous reader writes "Free software programmer Lennart Poettering has been part of his fair share of controversy in the open source community, and his latest essay may raise the most eyebrows yet. Poettering takes on the idea that the community is one big happy family and has some harsh words for the loudest and most obnoxious members. He says in part: "I don't usually talk about this too much, and hence I figure that people are really not aware of this, but yes, the Open Source community is full of a#@&oles, and I probably more than most others am one of their most favourite targets. I get hate mail for hacking on Open Source. People have started multiple 'petitions' on petition web sites, asking me to stop working (google for it). Recently, people started collecting Bitcoins to hire a hitman for me (this really happened!). Just the other day, some idiot posted a 'song' on youtube, a creepy work, filled with expletives about me and suggestions of violence. People post websites about boycotting my projects, containing pretty personal attacks. On IRC, people /msg me sometimes, with nasty messages, and references to artwork in 4chan style. And there's more. A lot more."

Comment: Re:If Bill Gates likes it (Score 1) 130

by Burz (#48064453) Attached to: Bill Gates: Bitcoin Is 'Better Than Currency'

Then clearly there are problems.

You say that in jest. But Gates did help invent the high-consumption culture we have today, or at least he brought it to computing. For much of his reign at Microsoft, the average lifespan of a PC was 3 years.

Bitcoin appears to have its own 'consumerist innovation' built-in, in that it takes escalating amounts of computing power (and therefore, resources) to 'mine' the currency and validate its transactions (which aren't even anonymous or proof against establishment meddling as many have claimed).


Conservative Groups Accuse FCC of Helping Net Neutrality Advocates File Comments 283

Posted by samzenpus
from the no-cheating dept.
jfruh writes Conservative groups opposed to net neutrality have a beef with the FCC, claiming the commission helped pro-net neutrality advocates file comments on the subject without similarly helping opponents. In other news out of this camp, it turns out American Commitment, an advocacy group with ties to the Republican billionaire Koch brothers, sent out 2.4 million letters to Congress opposing net neutrality but only collected about 814,000 signatures. The group then generated three letters to Congress for each person signing the petition, one letter to each of the signer's two senators and one to each signer's representative.
Data Storage

Bangladesh Considers Building World's 5th-largest Data Center In Earthquake Zone 65

Posted by samzenpus
from the whole-lot-of-shaking-going-on dept.
An anonymous reader writes with news about a government plan to build a Tier IV data center in an earthquake prone district of Bangladesh. The Bangladesh Ministry of Information is considering the establishment of a Tier 4 data centre in Kaliakair, in the Gazipur region, an ambitious build which would constitute the fifth largest data centre in the world, if completed. And if it survives – the site planned for the project is prone to earthquakes. Earthquake activity in the environs is discouraging, with one nearby earthquake seven months ago in Ranir Bazar (3.8), and no less than ten within the same tectonic zone over the last three years, the largest of which measured 4.5 on the Richter scale.

Comment: Re:This idiocy again (Score 1) 602

by Burz (#48012039) Attached to: The Great Lightbulb Conspiracy

Indeed. Believing this garbage is a real black mark on /., IMO, alongside their predilection for publishing climate denier "controversy" alongside quality news about global warming.

The incandescent bulb is a balancing act between efficiency (from high temperature) and longevity. By standardizing on one temperature, they ensured not only that their bulbs wouldn't produce odd color casts, but also no surprises on the electric bill, or surprise blown fuses, or surprise house/workshop fires while trying to get enough lumens for good illumination.

'Techies' have a very tenuous grasp of physics these days.


Putin To Discuss Plans For Disconnecting Russia From the Internet 241

Posted by Soulskill
from the taking-his-e-toys-and-going-home dept.
New submitter GlowingCat writes: Russian President Vladimir Putin and several high-ranking officials will discuss the security of the Russian segment of the Internet at the meeting of the Russian Security Council next week. According to various reports, the officials will make a number of decisions about regulating the use of the Internet in Russia. This includes the ability to cut off the Russian Internet, known as Runet, from the outside world, in case of emergency.
The Military

The Argument For a Hypersonic Missile Testing Ban 322

Posted by samzenpus
from the greased-lightning dept.
Lasrick writes Mark Gubrud has a fascinating piece arguing for the U.S. to lead the way in calling for a ban on the testing of hypersonic missiles, a technology that the U.S. has been developing for decades. China has also started testing these weapons, which proponents optimistically claim would not be used to deliver nuclear weapons. Russia, India, and a few other countries are also joining in the fray, so a ban on testing would stop an arms race in its tracks. The article discusses the two types of hypersonic technology, and whether that technology has civilian applications.
United States

The Executive Order That Led To Mass Spying, As Told By NSA Alumni 180

Posted by samzenpus
from the I-see-you dept.
An anonymous reader writes with this Ars piece about the executive order that is the legal basis for the U.S. government's mass spying on citizens. One thing sits at the heart of what many consider a surveillance state within the US today. The problem does not begin with political systems that discourage transparency or technologies that can intercept everyday communications without notice. Like everything else in Washington, there's a legal basis for what many believe is extreme government overreach—in this case, it's Executive Order 12333, issued in 1981. “12333 is used to target foreigners abroad, and collection happens outside the US," whistleblower John Tye, a former State Department official, told Ars recently. "My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known in government circles as "twelve triple three," gives incredible leeway to intelligence agencies sweeping up vast quantities of Americans' data. That data ranges from e-mail content to Facebook messages, from Skype chats to practically anything that passes over the Internet on an incidental basis. In other words, EO 12333 protects the tangential collection of Americans' data even when Americans aren't specifically targeted—otherwise it would be forbidden under the Foreign Intelligence Surveillance Act (FISA) of 1978.

Climate Damage 'Irreversible' According Leaked Climate Report 708

Posted by Unknown Lamer
from the midsummer-2045 dept.
New submitter SomeoneFromBelgium (3420851) writes According to Bloomberg a leaked climate report from the IPPC speaks of "Irreversible Damage." The warnings in the report are, as such, not new but the tone of voice is more urgent and more direct than ever. It states among other things that global warming already is affecting "all continents and across the oceans," and that "risks from mitigation can be substantial, but they do not involve the same possibility of severe, widespread, and irreversible impacts as risks from climate change, increasing the benefits from near-term mitigation action."

Comment: Re:Why Facebook or Google? (Score 2) 116

by Burz (#47733401) Attached to: NSA Agents Leak Tor Bugs To Developers

Of course, it won't work.

OTOH, Skype and Bittorrent had successful models for scaling up: People were configured by default to add their bandwidth to the pool. In bittorrent's case, your throughput suffered if you were stingy about contributing.

I2P is probably the closest networking layer there is to combining the goals of Tor with the methods of Skype and bittorrent. It is both highly decentralized and onion-like, and has been steadily improving for well over a decade now. If you happen to have a TAILS disc, its included. However, its not designed to access the regular Internet so much as replace it.

Life. Don't talk to me about life. - Marvin the Paranoid Anroid