Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Yes. What do you lose? But talk to lawyer first (Score 1) 656

by IamTheRealMike (#49197229) Attached to: Ask Slashdot: Should I Let My Kids Become American Citizens?

Unfortunately the amount is fixed in dollar terms and does not automatically adjust for inflation. When that exemption was set it was considered a large amount. However currently it's $97,000. The dollar is not an especially strong currency. That's about 60k GBP+. You can earn more than that just by being a decent computer programmer in London. And of course the OPs kids don't have to worry about the threshold today but rather in 20 years. There is zero incentive for Congress to be lenient here because now they have FATCA they can actually collect tax from anywhere in the world - it's taxation without representation which is ideal for them.

Comment: Re:Yes. What do you lose? But talk to lawyer first (Score 1) 656

by IamTheRealMike (#49197189) Attached to: Ask Slashdot: Should I Let My Kids Become American Citizens?

The USA charges its citizens for evacuation, unlike all other countries in the world who also evacuate their citizens from trouble zones ..... for free.

Will the U.S. government pay for my travel? How much will it cost?
Departure assistance is expensive. U.S. law 22 U.S.C. 2671(b) (2) (A) requires that any departure assistance be provided "on a reimbursable basis to the maximum extent practicable.” This means that evacuation costs are ultimately your responsibility; you will be asked to sign a form promising to repay the U.S. government.

These costs have bankrupted people in the past, leaving them wishing they had not been "rescued".

US citizens are in many places treated better as a result.

US citizens are becoming systematically toxic and are treated like shit as a result, especially by the financial system. FATCA is a completely insane law and has resulted in banks around the world terminating accounts and refusing to make loans just because someone is a US citizen or has a green card. And unfortunately what many don't realise is you cannot get out of US citizenship just by paying a few thousand dollars as the summary suggests. There is a crippling exit tax that forces you to pay tax on the assumption you just sold all your assets. It's a form of capital control, except one you cannot escape from due to the long arm of the US government. Even better, USA can decide that the citizenship revocation is invalid if they think it was done for tax reasons. They can just keep forcing you to pay taxes forever, if they want to. It's basically modern slavery.

My advice to the story submitter - don't do it!!. US citizenship is already dramatically worse than citizenships in other civilised countries and it's getting worse every year. In fact it's akin to a form of slavery. US citizens abroad have no functioning representation in Congress and they are routinely exploited as a result, citizenship based taxation being only one example.

Swedish and Belgian citizenship together is a perfect combination! Why would you want anything more?

Comment: Re:Their two biggest mistakes (Score 1) 212

by IamTheRealMike (#49197007) Attached to: Mozilla: Following In Sun's Faltering Footsteps?

The important thing about Electrolysis isn't performance, it's that it will allow them to finally sandbox. My respect for Mozilla has lessened over time (and I used to be a minor contributor, back in the early days), partly because they don't seem to care about security as much as the Chrome team do. Chrome prioritised sandboxing over many other things and is a lot more robust as a result. Firefox is still just one JS engine exploit away from total ownage of the running system.

Comment: Re:Do pilots still need licenses? (Score 1) 346

by IamTheRealMike (#49186799) Attached to: Would You Need a License To Drive a Self-Driving Car?

That article says the autopilot was disconnected and "[The investigation] will help us to understand whether there was a problem with the Airbus or in the training received by flight crew in manual aircraft handling at high altitude."

In other words they don't know what happened, but at the time of the near stall the plane was no longer under the control of the auto pilot. BTW if a plane suddenly finds itself overspeeding, climbing to lose speed is the right thing to do.

Comment: Re:Do pilots still need licenses? (Score 2) 346

by IamTheRealMike (#49185845) Attached to: Would You Need a License To Drive a Self-Driving Car?

Do pilots still need licenses in the age of autopilot? Well yes because machines aren't infallible.

Not quite. It's "yes" because most people would be unable to get over their fear of flying in an entirely autonomous plane, not because we need heroic pilots to override the computer when things go wrong.

Consider that about half of all aviation accidents are traced to pilot error. The percentage of crashes caused by autopilot error is zero.

Comment: Hashes not useful (Score 5, Informative) 323

by IamTheRealMike (#49157781) Attached to: Ask Slashdot: How Does One Verify Hard Drive Firmware?

Seagate is correct. Putting a hash on the website doesn't improve security at all because anyone who can change the download can also change the web page containing the hash.

  The fact that this practice is widespread in the Linux world originates from the usage of insecure FTP mirrors run by volunteer admins. There it's possible for a mirror to get hacked independently of the origin web page. A company like Seagate doesn't rely on volunteers at universities to distribute their binaries so the technique is pointless.

A tool to verify the firmware is poetically impossible to write. What code on the drive would provide the firmware in response to a tool query? Oh right ..... the firmware itself. To make it work you need an unflashable boot loader that acts as a root of trust and was designed to do this from the start. But such a thing is basically pointless unless you're trying to detect firmware reflashing malware and that's something that only cropped up as a threat very recently. So I doubt any hard disk has it.

BTW call a spade a spade. Equation Group == NSA TAO

Comment: Re: Great, fully owned by Silent Circle (Score 4, Interesting) 59

The issue with Silent Circle isn't their jurisdiction. It's that their code is of deeply questionable quality. They recently had a remote code execution exploit that could be triggered just by sending a text message to their phone. It's been literally years since one of these affected mainstream software stacks, so how was that possible?

Well, they wrote their own SMS parsing code, in C, and used JSON to wrap binary encrypted messages and there was a bug that could cause memory corruption when the JSON wasn't exactly in the form they expected.

The amount of fail in that sentence is just amazing. They're a company which justifies its entire existence with security, writing software to run on a smartphone where the OS itself is written in a memory safe language (Java) and yet they are parsing overly complex data structures off the wire ..... in C. That isn't just taking risks, that's playing Russian roulette over and over again. And eventually it killed them. Remote code execution via SMS - ye gods.

After learning about that exploit and more to the point, why it occurred, I will strongly recommend against using Silent Circle for anything. Nobody serious about security should be handling potentially malicious data structures in C, especially not when the rest of the text messaging app is written in Java. That's just crazy.

Comment: Re:When groups like this attack you... (Score 0) 99

I think the Gemalto response seems reasonable, actually. The documents suggest they weren't doing anything more sophisticated than snarfing FTP or email transfers of key files, which Gemalto say they started phasing out in 2010. And the documents themselves say they weren't always successful.

NSA/GCHQ are not magic. They do the same kind of hacking ordinary criminals have been doing for years, just more of it and they spend more time on it. If Gemalto are now taking much better precautions over transfer of key material and the keys are being generated on air gapped networks, then it seems quite plausible that NSA/GCHQ didn't get in. Not saying they could NEVER have got in that way, but these guys are like anyone else, they take the path of least resistance.

Besides, it's sort of hard for them to do something about a hypothetical hack of their core systems that they can't detect and which isn't mentioned in the docs.

Comment: Re:Ugh. Just ugh. (Score 5, Insightful) 406

by IamTheRealMike (#49121137) Attached to: NSA Director Wants Legal Right To Snoop On Encrypted Data

It's hilarious. For a moment I wondered if the transcript is even real. This makes Eliza look sophisticated.

Q: Which of those countries should we give backdoors to?

MR: So, I’m not gonna I mean, the way you framed the question isn’t designed to elicit a response.

AS: So you do believe then, that we should build those for other countries if they pass laws?

MR: I think we can work our way through this.

AS: I’m sure the Chinese and Russians are going to have the same opinion.

MR: I said I think we can work through this.

He seems to believe, "I think we can work through this" is an acceptable answer to a simple yes/no question. The guy doesn't even have a coherent answer to one of the most basic and obvious questions he could possibly be asked. I thought Comey did a poor job of explaining his position but this takes it to a whole other level.

Comment: Re:Terrorists steal registered SIMs (Score 1) 134

by IamTheRealMike (#49119617) Attached to: Pakistanis Must Provide Fingerprints Or Give Up Cellphone

Why would people not report a SIM as stolen currently? They have every incentive to. They'd need to do so, to get their old number back anyway.

But seriously, if you're a terrorist, you're not going to be fazed by just doing some street muggings to obtain cell phones first. It doesn't matter much if the cards get de-activated a day later. Heck, just point a gun at a SIM vendor and force them to activate the cards with fake data. If the vendor doesn't have the IMSI codes for every SIM in their inventory, they can't even report them as stolen.

Comment: Yes, a variety of ways (Score 1) 183

by IamTheRealMike (#49101113) Attached to: Ask Slashdot: How Can Technology Improve the Judicial System?

The judicial system is, at heart, a method of resolving disputes. Sometimes those are disputes between civilians (civil suits) and sometimes they are criminal cases, disputes between people and the state.

The most obvious and easy place to start is with small claims courts. Commercial arbitration handles many disputes that would otherwise end up in small claims courts, but we don't exploit this anywhere near enough. Most people just rely on their bank to act as a dispute mediator via the credit card chargeback mechanism, but this is a one-size-fits-all solution and banks are often not good at mediating disputes. There's lots of fraud and problematic outcomes.

The place where most of the better-law-through-tech research is happening right now is the Bitcoin community, because of the general focus on decentralisation, global trade and frequent desire to avoid relying on government. So we have for example BitRated which is a platform for doing dispute mediated Bitcoin transactions, where anyone can be the dispute mediator. So you can get a fluid, international market of specialised judges who are experts in very particular types of transactions, like software contracts etc where "I didn't get software of sufficient quality" is not a dispute that makes sense to handle via a chargeback. And it can all happen over the internet.

That's a very simple example. More complex examples involve specifying a contract in the form of a computer program and then effectively having the program be the "judge". I wrote about how to implement this, again with Bitcoin, several years ago. The technology is not that complicated actually. The hard part is figuring out the right user interfaces to make it easy. Presumably only very simple and precise contracts could be managed that way, so there's still open research in how to craft these digital contracts such that you can escape back to human judgement if there's an exceptional case.

When it comes to criminal rather than commercial cases, probably the best way to apply technology to reduce costs is to allow remote lawyering. That is, you should be able to outsource your legal representation to someone who isn't physically present. They may be rather good and experienced, but just lives out in rural areas or in a country where the cost of living is cheaper. The issue here is not really technical but rather just institutional inertia.

The UK is putting its judicial system under tremendous financial pressure at the moment, to the extent that some criminal cases are just being abandoned because there's insufficient money to run them. They're (finally!) starting to experiment with allowing small claims court cases to be resolved over the phone, and also looking at decriminalising TV license violations to reduce pressure on the system. But you get the idea - the judicial system innovates extremely slowly even when being sliced to the bone. So don't hold your breath.

Comment: Re:Where does Snowden get all this information fro (Score 1) 192

by IamTheRealMike (#49093689) Attached to: How NSA Spies Stole the Keys To the Encryption Castle

Snowden hasn't had any access to the NSA since he fled to Hong Kong.

However, the amazing thing about this dude is he was able to do full blown web crawls of the entire NSA and GCHQ intranets, including dumps/crawls of data he didn't have access to .... all without getting noticed or caught. He appears to have provided the journalists with what is quite literally a snapshot of their internal networks at the time he was operating. It's taking them years to go through it.

Matter cannot be created or destroyed, nor can it be returned without a receipt.

Working...