Please create an account to participate in the Slashdot moderation system


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Former MLB Pitcher Doxes Internet Trolls, Delivers Real-World Consequences

Submitted by Anonymous Coward
An anonymous reader writes "When Twitter trolls began posting obscene, sexually explicit comments about his teenage daughter, former MLB pitcher Curt Schilling responded by recording their comments and gathering personal information readily available to the public. He then doxxed two of them on his blog, resulting in one being suspended from his community college and the other being fired from his part-time job as a ticket seller for the New York Yankees. There were seven others in Curt's crosshairs, all college athletes, but although he hasn't publicly doxxed those individuals he hints, 'I found it rather funny at how quickly tone changed when I heard via email from a few athletes who’d been suspended by their coaches. Gone was the tough guy tweeter, replaced by the "I’m so sorry apology used by those only sorry because they got caught.'"

+ - Either everyone is cyber-secure or no one is

Submitted by Presto Vivace
Presto Vivace (882157) writes "Bruce Schneier on The Democratization of Cyberattack

When I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose was QUANTUM. This is the NSA's program for what is called packet injection--basically, a technology that allows the agency to hack into computers.

Turns out, though, that the NSA was not alone in its use of this technology. The Chinese government uses packet injection to attack computers. The cyberweapons manufacturer Hacking Team sells packet injection technology to any government willing to pay for it. Criminals use it. And there are hacker tools that give the capability to individuals as well.

All of these existed before I wrote about QUANTUM. By using its knowledge to attack others rather than to build up the internet's defenses, the NSA has worked to ensure that anyone can use packet injection to hack into computers.


+ - US Gov't funded internet privacy tools

Submitted by Presto Vivace
Presto Vivace (882157) writes "Internet privacy, funded by spooks: A brief history of the Broadcasting Board of Governors

The BBG was formed in 1999 and runs on a $721 million annual budget. It reports directly to Secretary of State John Kerry and operates like a holding company for a host of Cold War-era CIA spinoffs and old school “psychological warfare” projects: Radio Free Europe, Radio Free Asia, Radio Martí, Voice of America, Radio Liberation from Bolshevism (since renamed “Radio Liberty”) and a dozen other government-funded radio stations and media outlets pumping out pro-American propaganda across the globe. ... ... Between 2012 and 2014, Radio Free Asia’s Open Technology Fund poured more than $10 million into Internet privacy projects big and small: open-source encrypted communication apps, next-generation secure email initiatives, anti-censorship mesh networking platforms, encryption security audits, secure cloud hosting, a network of “high-capacity” Tor exit nodes and even an anonymous Tor-based tool for leakers and whistleblowers that competed with Wikileaks.

Though many of the apps and tech backed by Radio Free Asia’s OTF are unknown to the general public, they are highly respected and extremely popular among the anti-surveillance Internet activist crowd. OTF-funded apps have been recommended Edward Snowden, covered favorably by ProPublica and The New York Times’ technology reporters and repeatedly promoted by the Electronic Frontier Foundation. Everyone seems to agree that OTF-funded privacy apps offer some of the best protection from government surveillance you can get. In fact, just about all the featured open-source apps on EFF’s recent “Secure Messaging Scorecard” were funded by OTF.


+ - Dan Gillmor Says Goodbye to Apple, Google and Microsoft

Submitted by Presto Vivace
Presto Vivace (882157) writes "We are losing control over the tools that once promised equal opportunity in speech and innovation—and this has to stop

Control is moving back to the center, where powerful companies and governments are creating choke points. They are using those choke points to destroy our privacy, limit our freedom of expression, and lock down culture and commerce. Too often, we give them our permission—trading liberty for convenience—but a lot of this is being done without our knowledge, much less permission. ... The tools I use now are, to the extent possible, based on community values, not corporate ones.


+ - Silicon Valley Unionization Starts From The Bottom Up->

Submitted by jfruh
jfruh (300774) writes "Unionization has long been resisted in Silicon Valley, both by management and by tech workers for whom high pay is an acceptable tradeoff for long hours and job instability. But as employees beyond programmers are pulled into the tech industry's orbit, Silicon Valley may have to reckon with workers with different ideas. For instance, the drivers who shuttle Facebook employees to and from the company's campus are now represented by the Teamsters, and just won a pay increase from $18 to $24.50 an hour."
Link to Original Source

+ - Adware Privdog worse than Superfish

Submitted by Presto Vivace
Presto Vivace (882157) writes "Comodo ships Adware Privdog worse than Superfish

tl;dr There is an adware called Privdog that gets shipped with software from Comodo. It totally breaks HTTPS security.

From Naked Capitalism's summary:

So here we have the CEO of a Certificate Authority (CA), Comodo, who is also the CEO of Privdog, whose product subverts the certificate authority system. Oh, and Comodo ships that very product with its software. These bottom feeders make Bill Gates look like St. Francis of Assisi. How deep does the rot in the software industry go, anyhow?

I am beginning to believe that Richard Stallman is right, living in freedom means using free and open software."

+ - IT'S NOT RACE, IT'S NOT SEX, the tech world's real discrimination problem is age->

Submitted by bricko
bricko (1052210) writes "IT’S NOT RACE, IT’S NOT SEX, the tech world’s real discrimination problem is age.

The Tech Industry’s Darkest Secret: It’s All About Age
They don’t prepare you for this in college or admit it in job interviews. The harsh reality is that if you are middle-aged, write computer code for a living, and earn a six-figure salary, you’re headed for the unemployment lines. Your market value declines as you age and it becomes harder and harder to get a job.

What the tech industry often forgets is that with age comes wisdom. Older workers are usually better at following direction, mentoring, and leading. They tend to be more pragmatic and loyal, and to know the importance of being team players. And ego and arrogance usually fade with age."

Link to Original Source

+ - Gadgets that spy on us

Submitted by Presto Vivace
Presto Vivace (882157) writes "It’s not just Samsung TVs — lots of other gadgets are spying on you

But Samsung’s televisions are far from the only seeing-and-listening devices coming into our lives. If we’re going to freak out about a Samsung TV that listens in on our living rooms, we should also be panicking about a number of other emergent gadgets that capture voice and visual data in many of the same ways. ... .... Samsung’s competitor, the LG Smart TV, has basically the same phrase about voice capture in its privacy policy: “Please be aware that if your spoken word includes personal or other sensitive information, such information will be among the Voice Information captured through your use of voice recognition features.”

It isn't just TVs, Microsoft's xBox Kinect, Amazon Echo, GM's Onstar, Chevrolet’s MyLink and PDRs, Google's Waze, and Hello's Sense all have snooping capabilities. Welcome to the world of Stasi Tech."

+ - What Intel's $300 million diversity pledge really means->

Submitted by itwbennett
itwbennett (1594911) writes "Intel’s Rosalind Hudnell responsible for implementing the company’s much-publicized $300 million initiative to bring more women and under-represented minorities into its workforce by 2020. But even with Intel’s renewed commitment to diversity, the company’s workforce will still be just about 32 percent women in five years, Hudnell estimated. Here's a rough breakdown of how the money will be spent: The funds will be applied over five years to change hiring practices, retool human resources, fund companies run by minorities and women, and promote STEM education in high schools."
Link to Original Source

+ - Technology that empowers citizens

Submitted by Presto Vivace
Presto Vivace (882157) writes "A System Changing Technology: Interactive Voter Choice System

The Interactive Voter Choice System (IVCS) enables voters to insert a new layer of voter-controlled online voting blocs, political parties, and electoral coalitions (BPCs) into electoral and legislative processes that can build electoral bases large enough to win elections.

Since the system will run on a single computer platform accessible by any voter via the website, it enables voters to autonomously create and manage their BPCs online — in most cases without having to first pass or reverse any laws, regulations or rules governing electoral and legislative processes.

A Step by Step View

Voters create personal accounts and profiles on and use IVCS agenda setting tools and databases to set individual legislative agendas. Voters connect with like-minded voters across the political and ideological spectrum on with similar agendas. Like-minded voters with similar agendas join forces to build online voting blocs, political parties and electoral coalitions (BPCs), and negotiate and vote on common agendas using the IVCS voting utility.
BPCs surmount partisan differences and legislative deadlocks by setting transpartisan legislative agendas that cross political and ideological lines. BPCs nominate transpartisan slates of candidates and build winning transpartisan electoral bases larger than the electoral base of any single political party, enabling their candidates to run for office without needing special interest campaign contributions to build a winning electoral base.
BPCs use IVCS outreach tools to recruit new members, merge BPCs to increase their electoral strength, and plan and implement get-out-the-vote campaigns to vote their candidates into office.
BPCs use their agendas to provide legislative mandates to their elected representatives and oversee their legislative actions.
BPCs pressure elected representatives to enact their agendas by signing online petitions, holding online referendums and conducting online straw recall votes using the IVCS voting utility.
BPCs evaluate and compare their agendas to their representatives' legislative track records in deciding whether to support them in the next election or run candidates to defeat them.


+ - Breaking into Smart TV surveillance my be deemed a felony->

Submitted by eedwardsjr
eedwardsjr (1327857) writes "Smart TV providers may try to use the DCMA to label anti-surveillance actions a felony. From the article.

Samsung’s privacy policy raised concerns with privacy activists who spotlighted the warning: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.” Now there are concerns that tinkering with the software by tech-savvy customers may run afoul of the Digital Millennium Copyright Act.


Link to Original Source

What the world *really* needs is a good Automatic Bicycle Sharpener.