Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Politics Too? (Score 1) 385 385

Doesn't Robin Hood Theory go for bad politics as well as bad energy? And would not be limited to only one area of life.

Take the money from those lousy, good for nothing, bad politicians in office, and all kinds of good can be done!

Why limit yourselves to only fixing energy? Get those ignorant, self-serving, A#%holes out of office! The rest will fall into line at the same time.

Comment: Re:Wait a minute... (Score 1) 152 152

.... /. claim MS gives the (favorite three letter agency goes here) backdoors to all of their clients machines?

That was in the era where software was delivered/obtained and installed on the users computer. This is the age of server based subscription applications. They were only allowing back doors into other people's equipment, never MS server total access if they could help it.

Do unto others, never me. -- MS

Comment: They were working for/with NSA for one of the long (Score 1) 547 547

They were one of the earliest companies working for/with the NSA on snooping their customer base, that was listed on some of the timeline graphics leaked. They did what they could to get camera and mic in all their customers' homes. They could upload firmware to the unit under secret-non-court orders to enable live recording/viewing. The "gate" of everyone visiting said customer's home can be collected for future identification off security cams. Facial recognition collections. Voice ID. All of this would be considered meta-data in the business they are in, to be collected in the big data bin of Utah.

Comment: Data-Rendition...? (Score 1) 262 262

They will always deny US spying on US citizens. The same as with torture, as they are not the party directly spying on US citizens. The same technology companies providing the "foreign-spy" tools are used by allies. UK using the same tools and feeds can profile all US citizens without law coming into play. The US just shares intelligence with the UK, giving them all they produce without actually spying on their own citizens. Do we call this "Data-Rendition"?

Comment: Filibuster how? (Score 3, Interesting) 213 213

This will give the old ones in power a means of censoring or silencing unpopular (to them anyways,) rants from either the other side of the aisle or freshmen seats. "He is not following Majority Rules! Cut that guy's feed!" C-SPAN cannot even keep a feed coming during "public" events, and you think this will change?

This is just adding a new power to those in charge that would directly effect our governing. A switch to silence instead of a gavel and pleading.

Comment: Only one piece of Evidence Exists? (Score 1) 306 306

None may get standing unless the case with standing only has a single piece of possible evidence.

If there is more evidence, regardless of case details, other evidence will be obtained by using the purloined information from illegal spying. Something will be found through legal means, and be presented in court with no need to mention the illegally obtained information.

There will be no standing.
There will always be illegal snooping.
The genie is out......

Comment: Sue the school for "not intruding" (Score 1) 349 349

Sue the school for "not intruding" into the personal lives of every other cussing student. Why did they open themselves up to liability of enforcing students private speech? How many have been victim to one of their students on a rant in a public place, virtual or real, where nothing was done?

One of the only ways to get past this undesired practice of intrusion into personal life by the schools is to hold them accountable and show them what they stepped in with their new practice. They enforced their whim in an area they should not be intruding. It does not matter who owned the pipes used by the punished. If they want to play full time nanny, hold them to it for all students. They do not get to apply a policy to only a single student they have in their sights.

Comment: Must Wipe It (Score 5, Insightful) 385 385

No decision needed. Look all you want, but the liability is on you if someone decides your computer is of interest and data is questionable. Unless you report it to vender in a verifiable way, data on the drive, even if it was not yours, is now yours in any examination. Report it in writing or no evidence will exist to point in someone else's direction for liability.

Wiping beyond technological limits of retrieval is important with both criminal liabilities and civil copyright liabilities. The odds of old data being a problem in your life may be low, but it would be icing on the cake with any situation bringing your drive to the attention of some types of investigations.

Call it paranoia if you like, but why drive around in your new used-car with a suitcase in the trunk that came with the car without knowing precisely what is inside. Remove the suitcase, or examine every square inch of it looking for contraband..

Comment: Re:nice hack (Score 1) 647 647

With such an easy "hack" for loss, one would think the drone has STUXNET level trojans in the chips code and data, and then rfid or radioactive dust/nano-structures distributed all over and inside the device. The dust could mark everyone that comes into contact with any part of it. Movement analytics would be very useful even with the original low end soldiers/agents that hauled it in, and of the upper staff that later examines in detail.

Yes, a bit of a movie story-line, but why not? Of course this is a bit doubtful considering the idiots we have in charge.

Counting in binary is just like counting in decimal -- if you are all thumbs. -- Glaser and Way