Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Why Gmail (Score 1) 186

by He who knows (#36315310) Attached to: Google Uncovers China-Based Password Collection Campaign
why do chinese political aktivists use gmail there are far more secure email systems they can use and why would miltiary and political officials use it when they have acces to government email systems except when they dont want their emails to be read and archived for the public intrest. Also why is it only Gmail that keeps on getting attacked by the chinese are they the only ones who mention it?

Comment: Hidden evidence (Score 1) 371

by He who knows (#34979202) Attached to: UK Authorities Accused of Inciting Illegal Protest
The police also have been shown to hide the evidence collected by the undercover agents if it does not help them lead to convictions or even shows that they are lying to the prosecution. http://policestate.co.uk/articles/109 As well as the undercover police inciting violence the normal police often do it as well at protests. http://www.youtube.com/watch?v=tXNJ3MZ-AUo&feature=related As well as intimidating protestors with FIT teams and questionable tactics including ketteling.

Comment: Wikileaks because? (Score 1) 274

by He who knows (#34948134) Attached to: Espionage In Icelandic Parliament
"A professional would have written any acquired data to a public-key-encrypted disk that would only have been accessible to one who possessed the private key - like with Wikileaks 'insurance' file" This is basically saying that the best way the commentator says of doing it is how wikileaks has encrypted their file. There is not even how the harddrive was encrypted

[Crash programs] fail because they are based on the theory that, with nine women pregnant, you can get a baby a month. -- Wernher von Braun