Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:grain of salt, but sound advice (Score 2) 70

There's a part I disagree with him on. From TFA:

"Thereâ(TM)s a reason its called and advanced persistent threat; we'll poke and poke and wait and wait until we get in."

No. It's called that because it sounds scarier than "got past my mediocre defenses".

If they did not have to burn a zero-day (or rappel through a skylight) to get in then it is plain-old "cracking". People just prefer to call it "APT" because no one can defend against an "APT attack".

If they could defend against it then it would be a regular-type-attack that was successfully defended against.

The rest of his advice is good enough.

Comment Re:Questions. (Score 1) 301

Anything they were going to upload they could upload while the users were reading the "explanation" about the "drive failure".

The same with anything they might be able to download from the users' machines.

Easier still would be to set up a junk Twitter account and ask those users to follow it for updates on the "repair" work. Then get a warrant and ask Twitter for the details of anyone following that account.

Comment Questions. (Score 4, Insightful) 301

... accessed such sites through encrypted addresses.

Do they mean Tor and such? Because if so, then how did they get addresses even when they were running it?

Also, why not just remove all the images so that the links show errors. You'd achieve the same end results but you wouldn't be hosting or DISTRIBUTING kiddie porn. Claim it was a drive failure or whatever.

Not to mention possibly being able to track the people who complained about the images being broken. Get them to use another, non-Tor, way to check when the images would be fixed.

Comment Re:Why a surprise? (Score 1) 464

I think the surprise part is that it's a 5x jump in interest from just three years ago.

It's a survey. That means it comes down to which questions are asked.

From the available material it seems that they were asking about "childproof" guns. And that would be a sub-set of the "smart gun" functionality. But it may not be the same question that was asked 3 years ago.

Kind of like a survey asking if people preferred a "strong military" and then then claiming that Candidate X's support had gone up 5x. While Candidate X may be campaigning on a "strong military" platform that does not mean supporting a "strong military" equates to supporting Candidate X.

Comment Re:How smart? (Score 5, Insightful) 464

It's even better than that. From TFA:

Among the findings: Fifty-nine percent of all respondents said they would be willing to consider a childproof gun if they were to purchase a new weapon.

Who would NOT be in favour of a "childproof" gun?

The issue is when it comes down to the specific technology. Will the gun function when you need it to?

Comment Re:Haven't seen this one in a while (Score 1) 68

Not only that but something does not sound right in TFA:

Craig Williams, a senior manager at Talos, said the amount of snowshoe spam has more than doubled in the past two years and now accounts for more than 15 percent of all junk messages distributed globally.


Unsolicited junk mail accounts for 86 percent of the world's e-mail traffic, with about 400 billion spam messages sent a day, according to Talos, a digital threat research division of Cisco Systems.

So 15% of 400 billion is ... 60 billion messages a day.

And from the two examples in TFA, one is 5,000 messages and the other is 169 messages ... let's just go with 5,000 being average for the moment.

That means 12 million "artisanal" SPAM runs every day. Each of 5,000 messages (on average).

Or is my math off? Because it sounds like it should be pretty easy to spot the ISP's that are funnelling that much SPAM onto the Internet every day.

Comment Re:Basically no (Score 1) 532

Stupid First Amendment.

Why can't we be more like China and Russia and Iran? Who wouldn't want to live under a government that could track everything about you?

Or, without the sarcasm, why the fuck does Erik Barnett have a job in our government? Wouldn't opposing the First Amendment be seen as a negative during the interview process?

Comment Re:Press space to wipe and reenable OS verificatio (Score 1) 167

Sorry for the (partially) offtopic reply, but I just saw your question about Trusted Network Connect here.

I haven't been hearing much new news about Trusted Computing or Trusted Network Connect recently. Ordinarily I'd consider that a good sign that it wasn't moving forwards, however it's looking more like a successful slow-quiet-rollout strategy. Both Microsoft and Google make the Trust chip mandatory on phones, and Microsoft has declared that it's mandatory on all desktops and other devices in a few months. all new devices and computers must implement TPM 2.0 and ship with TPM support enabled , starting one year after the Win10 release. (Apparently August of this year.) The whole design of Win10 is to force rolling updates. It could get ugly if Microsoft simply pushes out all sorts of Trusted Computing crap as non-declinable "routine updates".

The phone lockdowns are definitely leading the way. Microsoft says phone manufacturers must prohibit users from turning off secureboot, and it looks like Google is also enforcing enforcing secure boot which (so far) permitting you to then drop to an eternal-nag non-Trusted mode. Sigh. Not good. I wouldn't be surprised if desktops also use a transition step of enforcing an eternal-nag-mode if you try to opt-out of Trusted Computing. At some point support can simply be ended for the nag-mode option. Then there's no opt-out at all.


Comment Re:I have a better idea (Score 1) 284

Watch some of our political rallies. And the calls for war. No matter what the cost. We even have politicians talking about nuclear attacks against "them".

It's not an "ISIS" thing. It's a human thing. ISIS is just getting the media attention right now.

And that is the core problem with this "Anti-Terrorism Hypothetical". There will always be a new "terrorist" out there. Or some other "enemy".

It is more about spying on people with less power so that the people with more power can keep that power.

Comment Mod parent up. (Score 4, Insightful) 284

Would the government as with a foreign enemy, we should be discussing capabilities, not intentions.

To be clear on this ... while you may trust President A not to abuse this, that means that you must also trust Presidents B, C, D, etc. Eventually there will be someone elected that you really do not agree with.

And that person will have all the authority you supported for the people you did agree with.

And none of the inhibitions on abusing that authority.

Slashdot Top Deals

fortune: cpu time/usefulness ratio too high -- core dumped.