Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:Perhaps half of us are (Score 1) 216 216

Some of them did. The people worst affected, particularly by unemployment, are the young ones who were only children or not even born when that stuff was going on.

The Greek government has a point. The only way out is for the Greek economy to reform and grow. Endless grinding austerity will just cause another revolution. The first one was peaceful, but if it fails the next one won't be. What do young, angry Greeks have to lose?

Comment: Re:David Cameron is actually a genuine idiot (Score 3, Insightful) 141 141

It's the media. When it was pointed out that Twitter informs users who are the subject of data access requests by the government they framed it as Twitter tipping off terrorists that they were being investigated. Not as Twitter protecting its users from over-use of surveillance and being transparent with them, but as colluding with the enemy. It was disgusting.

Also, what kind of bizarro definition of "socialist" implies wanting a surveillance state? If anything, the more socialist states in the EU tend to be the ones that have better protections for privacy and freedom because they understand that the government works FOR the people.

Comment: Re:"Or Tor?" (Score 2) 141 141

Tor isn't compromised, it's secure for what it does. Compromised end points are not something it is designed to protect against. It isn't a substitute for HTTPS or checking certificates. It doesn't stop you being an idiot and giving away your location or software on your computer leaking your real IP address. That's not what Tor is.

Also, passwords on zip files have actually been effective for over a decade now, when AES encryption was added. Zip file encryption is now actually quite good, covering both data and filenames, and using a secure hash to generate the AES key from your password. Essentially it is as strong as the password, and has been since V6.2.

Comment: Re:Not a surprise (Score 4, Insightful) 55 55

When a Government must lie to the populace it is supposed to represent, and must operate in extreme secrecy, it is no longer a Republic.

Just because we are not seeing Government death squads you believe we are still being ruled by the people? If you really believe that, I'd recommend a lobotomy. The West has been gone for at last three decades, only existing as a fantasy for the masses who have enough "entertainment" to maintain the fantasy.

Comment: Re:Nevermind the bollocks, here's David Cameron (Score 1) 141 141

Our democracy is broken. Here are the the numbers of votes each party received, followed by the number of MPs they got:

Party                        Votes                Seats

Conservative Party            11,300,303 (36.9%)    330 (50.8%)
Labour Party                9,344,328 (30.4%)    232 (35.7%)
UK Independence Party        3,881,129 (12.6%)    1 (0.2%)
Liberal Democrats            2,415,888 (7.9%)    8 (1.2%)
Scottish National Party        1,454,436 (4.7%)    56 (8.6%)
Green Party                1,157,613 (3.8%)    1 (0.2%)

So as you can see, 3.8 million people voted for UKIP (a bunch of wankers, but still...) but ended up with just one MP and no power at all. The greens got the same number of MPs with juste 1.1 million votes. Only 1.5 million people voted for the SNP and they got 56 seats.

The system is rigged so that power is always held by either Labour or the Conservatives. No-one else can get a look in, even if like UKIP they manage to gain quite and impressive amount of support. 12.6% of the vote, 0.2% of the seats. See how it works?

So at election time the choice is basically Labour or the Tories. The Tories will sell our freedom off with glee, and Labour aren't much better. But no-one cares about that come election time. Since the system is designed to avoid hung parliaments and any kind of power sharing it tends to produce totalitarian governments who rip away our rights and freedoms (human rights are being flushed away as we speak).

Comment: Re:You know it's not going to work (Score 1) 141 141

Sadly, there will still be a push to outlaw encryption just like there is a push to outlaw guns. Everyone should know the consequences of giving up everything to the Government. Cretins have always been attracted to public offices. Rights for you are expendable as long as their rights are covered. Every government in history has had to be overthrown because of the same damn problems. Too bad we never learn.

Can the politicians! Order the code red! Don your helmets! E... Dang it, I'm out of ideas for my cypher....

Comment: Not a surprise (Score 1) 55 55

You do know that those human rights people can write bad things about the UK Government also right? Not saying the UK was/is correct in them wanting to spy on every goddamn thing they can, just providing their motives. It's so sad that we have supposedly "free" Governments who are behaving exactly like those evil communists and dictatorships..
Communications

UK Government Illegally Spied On Amnesty International 55 55

Mark Wilson writes with this excerpt from a story at Beta News: A court has revealed that the UK intelligence agency, GCHQ, illegally spied on human rights organization Amnesty International. It is an allegation that the agency had previously denied, but an email from the Investigatory Powers Tribunal backtracked on a judgement made in June which said no such spying had taken place.

The email was sent to Amnesty International yesterday, and while it conceded that the organization was indeed the subject of surveillance, no explanation has been offered. It is now clear that, for some reason, communications by Amnesty International were illegally intercepted, stored, and examined. What is not clear is when the spying happened, what data was collected and, more importantly, why it happened.

Comment: Re:Ummmm... (Score 1) 200 200

There's better options than PBKDF2, like scrypt. Also, both require you to chose some parameters; PBKDF2 with a salt of String.Empty, hash algorithm of MD5, and iteration count of 1 is... just an MD5-hashed password. Obviously, those are terrible and stupid parameters, but if people were *good* at choosing secure options then this whole thread wouldn't exist. At least scrypt *only* has the work factor, and it's pretty straightforward.

Comment: Re:Security theater questions (Score 1) 200 200

There's generally no way to send the user a secure (i.e. encrypted) message. All you can do is make the token short-lived and hope that nobody is intercepting server-to-server email traffic (and that the user's email account is secure, both from malicious clients and from server-to-client interception). It sucks, but until email encryption of one sort or another becomes more ubiquitous, it's the only workable option.

Hold on to the root.

Working...