Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Great for free software (Score 1) 212

I doubt it's actually possible to enforce encryption backdoors beyond a few major vendors. The result would be similar to exiting attempts to prohibit reverse engineering. It's impossible to outlaw debuggers, disassemblers, logic analyzers, and similar tools. It's like outlawing radios that can tune in to any station. It's been done, but it's not all that effective.

Even if all software from major vendors like Microsoft, Apple, and Google implemented protocols with backdoors, correct implementations of the underlying algorithms are necessary for those to function.

We've seen forced decryption laws in the UK. Forward secrecy basically defeats RIPA, because you can't force someone to decrypt something they never had the key for in the first place.

China has attempted to regulate cryptography, essentially requiring a license to develop, buy, sell, or research encryption. They have mandatory key escrow too. It's useless. Everyone uses encryption all the time. There's no putting the genie back in the bottle.

Comment: Re:Schneier's opinion isn't what it once was (Score 2) 114

by Sean (#49143243) Attached to: Schneier: Everyone Wants You To Have Security, But Not From Them

That's true, but there was no book at the library that listed which articles in the newspaper we decided to read and which ones we decided to skip. The post office didn't make copies of all our letters and the phone company didn't record all our calls. When we used a map to find directions, none of this information used to be recorded. When we had our photographs developed, we could be quite sure the photo lab wasn't making copies of all of them.

Records of our financial transactions were much more limited because most of them were cash. Now we use payment cards for almost everything.

Comment: You don't bite the hand that feeds you (Score 4, Insightful) 305

by Sean (#47356407) Attached to: How Often Do Economists Commit Misconduct?

Who purchases the services of economists? Who consumes their work product?

A lot of economists are paid by central banks one way or another:

One useful tactic for managing the economy is manipulating public opinion. Especially the opinion of those members of the public who manage huge quantities of other people's money. The job of the economist then is not necessarily to discover the true state of the economy, but to convince others that is it in a certain state in order to influence their behavior.

Comment: Here's their spam filter (Score 1) 21

by Sean (#46547847) Attached to: After FOIA, Homeland Security Releases Social Media Monitoring Guides

Note - Analysts are to refrain from generating IOI reports that:
1) Include any form of unauthorized PII
2) Include public reaction to DHS programs, policies and procedures unless they are operationally relevant (e.g., long wait times at TSA checkpoints)
3) Focus on individuals' First Amendment-protected activities unless they are operationally relevant (e.g., protest shuts down I-95 - in which case the report should focus on impact to operations and not the subject of the protest)
4) Overview proposed legislation or legal challenges on enacted legislation
5) Have an obvious political bias or agenda
6) Are predictive or futuristic

Make sure your code does nothing gracefully.