Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Actually, ADM Rogers doesn't "want" that at all (Score 1) 399

by Steve B (#49123383) Attached to: NSA Director Wants Legal Right To Snoop On Encrypted Data

If companies want to take the direction of removing themselves from the encryption picture altogether, that is their prerogative.

And yet that is precisely what the government is pissing and moaning and setting its hair on fire about. Showing that sort of contempt for citizens' private prerogatives is what caused them to forfeit our trust in the first place.

Comment: Re:Why don't they know? (Score 1) 87

by RedShoeRider (#48981081) Attached to: Novel Fluorinated Compounds Discovered In Firefighters' Blood
" And if they do then they have their gold plated government funded health care, public union negotiated disability plans and similarly generous pensions to help them cope."

Tell that to the 800,000 firefighters in the USA who are unpaid, non-union, volunteer firefighters.

Comment: Re:If they break into people's homes.... (Score 1) 392

That's another advantage of forcing the snoops back to "direct access" methods -- every so often one of them will get caught red-handed snooping on the wrong (i.e. clearly innocent and rich/influential) target, re-focusing attention on them and forcing another round of retrenchment until it blows over.

Comment: Re:Cost/benefit ratio (Score 1) 392

Now, if a backdoor is found by the bad guys, it will be used almost immediately to destroy a company.

If it's found by really bad guys (e.g. North Korea on a day when Dear Supreme Grand High Panjandrum is feeling especially trollish), it can be publicly circulated to destroy every company.

Comment: Re:And is this a bad thing? (Score 5, Insightful) 392

Forcing them to switch to "direct access" methods puts pressure on them to follow the law. First, as I noted in my earlier comment, the non-scaling time and manpower costs (each tail, bug, etc requires significant additional resources) forces careful selection of targets. Second, "direct access" methods put the snoops at a nontrivial risk of getting caught and/or leaving recoverable evidence each time they use them illegally.

Comment: That's Exactly What They SHOULD Be Doing (Score 2) 392

"Direct access" methods (tailing people, planting surveillance devices, etc) do not scale anywhere near as easily as network surveillance -- each "direct access" target requires a significant fixed cost in resources and manpower. This imposes discipline on the snoops and forces them to pick and choose actual suspects instead of trying to scoop up everything.

Encryption

Tips For Securing Your Secure Shell 148

Posted by Soulskill
from the locking-your-locks dept.
jones_supa writes: As you may have heard, the NSA has had some success in cracking Secure Shell (SSH) connections. To respond to these risks, a guide written by Stribika tries to help you make your shell as robust as possible. The two main concepts are to make the crypto harder and make stealing keys impossible. So prepare a cup of coffee and read the tutorial carefully to see what could be improved in your configuration. Stribika gives also some extra security tips: don't install what you don't need (as any code line can introduce a bug), use the kind of open source code that has actually been reviewed, keep your software up to date, and use exploit mitigation technologies.

+ - Indiana Court Rules Melted Down Hard Drive Not Destruction of Evidence-> 1

Submitted by Anonymous Coward
An anonymous reader writes "An Indiana court has ruled that a hard drive that was sent to recycling was not destruction of evidence. The ruling stems from a BitTorrent file-sharing case filed by Malibu Media where a defendant claimed that his hard drive had failed thanks to heavy use. Malibu claimed that the act was destruction of evidence and filed a motion demanding a default judgement. The court denied this motion suggesting that because the hard drive failed, there was no evidence to destroy in the first place."
Link to Original Source

I do not fear computers. I fear the lack of them. -- Isaac Asimov

Working...