Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment: Re:The enemy of my enemy != my friend (Score 1) 73 73

Jim,

If this were a turf war, the spoils of the compromise would not have been laid out on the lawn for the world to see. The contents would have been used against the Hacked Team to disrupt their business and then added to the attackers own product catalog. In this scenario the market value of the stolen intellectual property has been nullified.

Comment: Phillips not the first with harebrained schemes (Score 1) 240 240

What are all those scientists, engineers and business experts at a huge multinational corporation thinking?

Probably they're thinking, "I really like this paycheck. The product we're developing has no chance of gaining traction in the marketplace, but that's my boss' fault for coming up with this idea in the first place."

Do you really think those people are going to argue with management that they shouldn't have a job developing this concept?

Comment: Re:Real Apologies (Score 2) 428 428

Dan's completely accurate here. It makes me wonder if this (avoiding 'I' and using 'we') isn't the type of product that comes from Crisis Management PR firms who are brought in by CEO's in similar situations. As a consultant, their #1 goal is to please the person who signs their paychecks. When they craft apologies like this, the priorities might not be so much to soothe the audience as it is to present the boss with a response that's palatable to the boss. It would be unnatural for them to go into a meeting and kick Ellen Pao in the butt and say, "You need to grovel and beg the internet to take you back!"

Instead, the PR Crisis Consultants wrote an apology that didn't at all make nice with the Reddit community, but it certainly tricked Ellen Pao into thinking it would. Her inability to anticipate these backlash responses to her decisions are exactly why she is not a good fit to lead a community-based organization like Reddit.

Comment: Re:Find the source code on GitHub (Score 1) 94 94

They are to explain the reasoning behind the code.

This is a huge purpose for comments. Also, maybe I can interpret the code perfectly well without comments. How well can I depend on everyone else who is modifying the code to be able to interpret it properly.

Well-documented code helps protect it from the introduction of bugs by later contributors.

Comment: Re: ssh into kpcli (Score 1) 206 206

anything else i can do?

Modify SSHD config to listen on non-standard port. It will greatly diminish the log traffic you'll see of failed attempts. This could be important if you're using fail2ban as well and don't want your iptables to bloat unreasonably.

Stay away from configuring port-knocking. It becomes a real pita when you want to scp a file at the spur of the moment.

Comment: no training?? (Score 3, Informative) 385 385

You're talking about a profession that in many cases has either no training or dubious training.

This is a field that requires a masters degree and certification.

You're probably thinking of faith-based social organizations that attempt to provide counseling services. Those agencies do not provide effective treatment for the ailments you mentioned. At best they might be able to provide some marriage counseling assistance.

Comment: Re:Five stars for.. (Score 1) 246 246

I agree with all your examples. However, I recoiled during a couple of moments where the story was being read out loud, perhaps at the demand of a producer, as if the audience needed the plot points fully highlighted and underlined.

Obviously the beginning carries a lot of narration that heavy-handedly prepares the setting for the story. Entirely unlike the first 20 minutes of "There Will Be Blood"-- masterful storytelling by Paul Thomas Anderson.

The big shocker to me was near the end where Max fully explains the strategy of attempting to retake the Citadel while the boss is away, then THE BOSS EXPLAINS THE STRATEGY again. This is in stark contrast to the switcheroo ending of Road Warrior where the audience learns of the clever ruse at the absolute very end of the film. Why couldn't George Miller have Furiosa spontaneously turn around with everyone confused about the agenda? Because the strategy is totally explained to the audience, the last 15 minutes of the film is kind of a foregone conclusion.

Comment: Re:false positives aren't what you think (Score 1) 164 164

Maybe I wasn't clear about how these tools help ferret out networks of freedom-haters. This line could have been more prominently stated--

...to see who else might be a solid villain candidate. Even just monitoring internet traffic to known jihadist websites can likely get the filters applied to a person's communications to see if they might be a person-of-interest.

That type of work is more than forensics. It's proactively chasing up the networks to make their leadership accountable. Those are vague terms for drone strike.

I'm not cheerleading the NSA here, either. Just commenting on the data science.

Comment: false positives aren't what you think (Score 4, Insightful) 164 164

In all likelihood, the false positives suggested by the OP and others in this discussion are unlikely to trigger any such NSA attention.

Coming from a data science background, I suspect they are transcribing and indexing all conversations as best as is possible with their elite voice recognition technology. Once it's in ASCII stored in a database, they can datamine the conversations of known radicals and jihadists. The algorithms that are generated don't so much emphasize specific keywords, but they generate a scoring system across a bunch of conversations by known haters-of-American-Freedom.

With filters in hand, they can look at who talked to the known villains and score them and run down the trails of phone calls, emails, text messages, and internet chats to see who else might be a solid villain candidate. Even just monitoring internet traffic to known jihadist websites can likely get the filters applied to a person's communications to see if they might be a person-of-interest.

Keywords will come into play AFTER an attack like the Garland Draw Mohammed contest. The NSA is right now filtering recent past conversations among suspected jihadists looking for relevant keywords such as 'Garland', 'American Freedom Defense Institute', 'Pamela Geller', and 'Elton Simpson'. Any conversation leading up to the attack including those keywords would absolutely put someone on a watchlist. And everyone who that person is talking to would be suspect as well.

Bottom line is, these tools are being used retroactively to bolster detective work. Talking about bombs and the President's name doesn't do anything because there are a thousand-million conversations using those words everyday.

Comment: Re:Subs as aircraft carriers (Score 1) 75 75

Cruise missiles work great for blowing stuff up, but there are a great many operations that call for extraction of soldiers or intelligence. Submarine-based aircraft could do this very well.

Some security strategists have proposed the florida-man-piloted-gyrocopter was allowed to land safely on the capitol lawn in order to give the North Koreans a false sense of confidence in their secret submarine-based gyrocopter assault project currently under development near PoonYang.

Comment: Re:This is fucking stupid. (Score 2) 279 279

Of course, I haven't read the article, but I think the summary has applied the word "troll" in a different way than this. I think the researchers are seeking to reduce the racist, homophobic, etc. trash comments frequently posted to YouTube video comments.

As you note here, a sophisticated troll is not easily detectable via AI.

Your mode of life will be changed to EBCDIC.

Working...