Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Re:If they break into people's homes.... (Score 1) 385

That's another advantage of forcing the snoops back to "direct access" methods -- every so often one of them will get caught red-handed snooping on the wrong (i.e. clearly innocent and rich/influential) target, re-focusing attention on them and forcing another round of retrenchment until it blows over.

Comment: Re:Cost/benefit ratio (Score 1) 385

Now, if a backdoor is found by the bad guys, it will be used almost immediately to destroy a company.

If it's found by really bad guys (e.g. North Korea on a day when Dear Supreme Grand High Panjandrum is feeling especially trollish), it can be publicly circulated to destroy every company.

Comment: Re:And is this a bad thing? (Score 5, Insightful) 385

Forcing them to switch to "direct access" methods puts pressure on them to follow the law. First, as I noted in my earlier comment, the non-scaling time and manpower costs (each tail, bug, etc requires significant additional resources) forces careful selection of targets. Second, "direct access" methods put the snoops at a nontrivial risk of getting caught and/or leaving recoverable evidence each time they use them illegally.

Comment: That's Exactly What They SHOULD Be Doing (Score 2) 385

"Direct access" methods (tailing people, planting surveillance devices, etc) do not scale anywhere near as easily as network surveillance -- each "direct access" target requires a significant fixed cost in resources and manpower. This imposes discipline on the snoops and forces them to pick and choose actual suspects instead of trying to scoop up everything.

Encryption

Tips For Securing Your Secure Shell 148

Posted by Soulskill
from the locking-your-locks dept.
jones_supa writes: As you may have heard, the NSA has had some success in cracking Secure Shell (SSH) connections. To respond to these risks, a guide written by Stribika tries to help you make your shell as robust as possible. The two main concepts are to make the crypto harder and make stealing keys impossible. So prepare a cup of coffee and read the tutorial carefully to see what could be improved in your configuration. Stribika gives also some extra security tips: don't install what you don't need (as any code line can introduce a bug), use the kind of open source code that has actually been reviewed, keep your software up to date, and use exploit mitigation technologies.

+ - Indiana Court Rules Melted Down Hard Drive Not Destruction of Evidence-> 1

Submitted by Anonymous Coward
An anonymous reader writes "An Indiana court has ruled that a hard drive that was sent to recycling was not destruction of evidence. The ruling stems from a BitTorrent file-sharing case filed by Malibu Media where a defendant claimed that his hard drive had failed thanks to heavy use. Malibu claimed that the act was destruction of evidence and filed a motion demanding a default judgement. The court denied this motion suggesting that because the hard drive failed, there was no evidence to destroy in the first place."
Link to Original Source

Comment: Cooperative Game... With Possible Exceptions (Score 1) 155

by Steve B (#48713709) Attached to: Designing the Best Board Game

That's one advantage of mostly cooperative board games where there might be a hidden "traitor" among the players who wins if the group loses (e.g. Shadows Over Camelot, Battlestar Galactica). With that possibility on the table, players can't just trust somebody else to make decisions and have to pay attention to what everyone else is doing (usually in these games, exposing the traitor has some reward, at least insofar as it curtails his ability to continue undermining the group).

Comment: Re:Rolls Royce of cat litter boxes (Score 1) 190

by RedShoeRider (#48660997) Attached to: An Automated Cat Litter Box With DRM
"Epson used to make printers that used pigment based inks....."

Used to?

http://www.epson.com/cgi-bin/S...

For the home market, they might not use their new UltraChrome HDR inks, but for the semi-pro and pro markets, they do. We have a 4900 here in the lab; amazing is a fair word to describe the output.

Comment: Re: Maybe we need to vote in a 3rd party? (Score 2) 424

by Big Boss (#48234813) Attached to: Law Lets IRS Seize Accounts On Suspicion, No Crime Required

That's a nice idea, but the majority has been brainwashed into believing that any vote that's not D or R is "wasted". Ridiculous, but that's what happened.

Sadly, even the 3rd parties don't give some of us much to work with. I generally like Libertarian ideals, but the reality is that if they got everything they want we would end up with a government by and for the corporations. Which is basically what we have now, other than that they wouldn't bother to try to hide it. Greens would do basically the same, but only for corporations that support environmental causes. Those are the ones with the most support. Constitution party might be good, but are relatively unknown.

The first thing we need is term limits across the board. All the way down to local government.

Then we need to do away with the ridiculous idea that corporations have rights other than those we specifically give them. Corporate personhood needs to be abolished.

Asset forfeiture needs to be abolished as well. I don't mind the idea that you can seize property, but it needs to be in the punishment phase of a trial, not before someone is charged with a crime. And any proceeds from such seizures must not be directly available to enforcement agencies. That's an obvious conflict of interest and they were insane to allow it in the first place.

So, any parties that support such notions? The Pirate party sounds closest.. Not sure that's a good thing.. :)

Comment: Re:It's a TRAP! (Score 2) 175

by Steve B (#47630105) Attached to: Yahoo To Add PGP Encryption For Email

webmail kinda implies that the provider will either be storing the key or at the very least be able to access it

Obviously they need access to the PUBLIC keys in order to encrypt messages to the designated recipient. The whole point of public-key cryptography is that revealing the public key doesn't compromise security.

Comment: Re:War of government against people? (Score 1) 875

by RedShoeRider (#47204415) Attached to: America 'Has Become a War Zone'
"You're a complete fucking idiot if you think your well regulated militia (which you ignore anyway) armed with assault weapons is any match for the government's military-spec hardware."

Funny.
The Russians thought the same thing about Simo Hayha: http://en.wikipedia.org/wiki/S...

Never underestimate the power of one man defending what he believes in.

The sooner you fall behind, the more time you have to catch up.

Working...