Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Re:Who will get (Score 1) 235

by HiThere (#48655279) Attached to: North Korean Internet Is Down

Not that I don't think the US govt. is abusive enough to do this on no evidence, but why not suspect Sony? They're also abusive enough, and have shown willingness to attack innocent parties without even pertended evidence. (Not that N.Korea is innocent of much, but I've heard of no convincing evidence that they are actually behind this.)

OTOH, it could be a third (unmentioned) group playing "Lets you and him fight.".

Comment: Re: Marketing? (Score 1) 226

by HiThere (#48649409) Attached to: Anonymous Claims They Will Release "The Interview" Themselves

If this was a targeted attack, then forbidding outbound connections isn't sufficient. That keeps data from being transmitted out, but it doesn't keep malignent distorters from operating. Randomly changing a few bits every once in awhile could do quite a bit of damage, even invalidating backups, and be quite difficult to detect.

Comment: Re: Marketing? (Score 1) 226

by HiThere (#48649389) Attached to: Anonymous Claims They Will Release "The Interview" Themselves

More to the point, in a case like this you need multiple nested perimeters. The media *is* the value of the company, so that should be stored on read only media, in multiple copies at different (secure) locations. Possibly encrypted, but then you need a somewhat similar protection for the keys.

Access to the media doesn't need to be available to anyone whose job doesn't involve editing it. So that another perimeter separate from that of the main company. If some management honcho says that he needs access, give him read only access. If he demands read/write access, have him work on a copy.

And, yes, this isn't perfect. Perfection is not available, so you nest near perfection. Now within each perimeter you also need those intrusion detection mechanisms you were talking about, but that doesn't suffice. Too much can happen too quickly.

Comment: Re:Get Out of Your Bubble (Score 1) 258

by HiThere (#48649337) Attached to: Dish Pulls Fox News, Fox Business Network As Talks Break Down

What do you mean "held accountable"? When was the last time a major political figure was prosecuted for his crimes, rather than becaus his opponents found prosecution a convenient stick? The last time I can think of is Nixon, and I'm not certain about that. (I don't consider sex with consenting women that you aren't married to to be a crime. So don't bring up Clinton. That was clearly political action rather than prosecution.)

Comment: Re: Do tell (Score 1) 258

by HiThere (#48649291) Attached to: Dish Pulls Fox News, Fox Business Network As Talks Break Down

He's saying that the phrasing of the headline reveals a bias in the submission. Perhaps he's right. (I don't watch either Dish or Fox, and I haven't followed their dispute, so this is based purely on his argument and your response...with some guidance from other posts both in this story and in past stories.)

It's a reasonable argument whether or not its true in this particular case.

Comment: Re:You forgot something... (Score 1) 258

by HiThere (#48649253) Attached to: Dish Pulls Fox News, Fox Business Network As Talks Break Down

The problem is that if you go back to when unions were relatively powerful, the ones who were powerful were the management of the unions. And they often didn't do well by their members. (Other times they did, but ran afoul of some law or other, some times a reasonable one.)

Centers of power tend to become corrupt, because corrupt people are attracted to them more strongly than those who are not corrupt.

Comment: Re:Supreme Leader (Score 1) 170

by HiThere (#48643889) Attached to: Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony

Sorry, but why am I expected to have the information to provide an explanation? I'm skeptical about what the government says because they have been shown to lie about as often as to tell the truth. Probably more often in publicized statements, but often you can't tell. This doesn't point at anyone else in particular. There are several plausible candidates. Somebody who's mad about how Pirate Bay has been treated is plausible. So is the Russian Mafia. North Korea's name is in the hat, but until there's some real evidence cutting down the size of the hat it would be foolish to believe that they are the perpetrators. Somebody else suggested Sony itslef, and a variation on that, "it was an inside job", is quite plausible. etc. There's really little limit to the number of plausible perpetrators when there is so little constraining evidence. (An anonymous e-mail isn't evidence of anything unless you can show at least where it was sent from.)

The meta-Turing test counts a thing as intelligent if it seeks to devise and apply Turing tests to objects of its own creation. -- Lew Mammel, Jr.

Working...