Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Re:Why didn't the old logo work? (Score 1) 120

I'm with you, I don't see how their new logo conveys how people "interact with Google products across many different platforms, apps and devices-sometimes all in a single day" any more or less than the old one did. It's a logo. It says "Google." Nothing about the old logo or the new one infers usage from a desktop PC, a phone, a tablet, or anything else, and they could have added the new microphone icon and whatever else without changing the logo. It's their brand to play with, but the justification doesn't make sense, they could have just said "we thought we needed a crisp new look."

Comment Re:Murder is a petty crime? (Score 1) 211

The one example the summary gives is murder because that was the most egregious attempt at covering up the Stingray's use. The examples of smaller crimes begin in the first sentence of the article.

BALTIMORE - The crime itself was ordinary: Someone smashed the back window of a parked car one evening and ran off with a cellphone. What was unusual was how the police hunted the thief.

There are a few more.

Police in Tallahassee used their stingray to track a woman wanted for check forging [...] Tacoma, Wash., police used theirs to try to find a stolen city laptop [...] Other departments have acknowledged that they planned to use their stingrays for solving street crimes.

And they're not just going after suspects; if you might have witnessed a robbery, your phone is apparently fair game, too!

Usually they were searching for suspects, but occasionally, the records show they used the devices to track down witnesses. The most common use by far was solving robberies.

Comment Re:Federal law (chap 206) says a court order is re (Score 1) 211

Except YOUR device explicitly connects to their tower and tells them everything.

If I pick up a tapped or pen-registered landline phone and start dialing, my device is explicitly sending a series of tones that tells them everything, but they need a warrant to use that equipment. Why should it be any different just because we're discussing cellphones instead of landlines? "But, it's [new technology]!" does not obviate the need for a warrant.

Comment Re:Can't trust LOCKS anymore (Score 1) 89

It's like governments have abrogated their duty to protect people from this kind of shit and companies like Uber and Lenovo are having a field day.

Governments love this shit. The more data Uber and Lenovo and Samsung and Spotify collect about you, the more data the government can subpoena (or just take without a subpoena). These companies have become, in effect, agents of the government.

Comment Re:Is "Snowden document" a new English word now? (Score 1) 54

I remember read it somewhere that many later leaking documents only named after Snowden to cover the real sources.

We can reasonably assume that any documents containing dates or references beyond June 2013 didn't come from Snowden. He himself denies providing the documentation of NSA's spying on Angela Merkel. Bruce Schneier has a blog entry making the case for multiple individuals. It seems likely to me that there are at least three, counting Snowden (and not counting Manning).

In any event, the NYT article about the latest set of documents says "AT&T's cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013" and goes on to explicitly source them to Snowden.

Comment Re:Forced Updates-- What could POSSIBLY go wrong? (Score 3, Insightful) 203

I'm sick and tired of seeing that a new version of an app is available, and the sole contents of what the update changes is "bug fixes."

Well if they were honest and said "Fixed more edge cases where ads weren't displaying" or "Increased the frequency of GPS coordinate tracking," nobody would install the update...

Comment Re:Challenge accepted (Score 1) 134

No kidding, reminds me of the LifeLock CEO putting his social security number on billboards claiming nobody can steal his identity. It's been stolen, what, 13 times now? I'd never heard of this Hirshon fellow but now he's painted a giant bullseye on himself, Streisand-style. Everyone who encounters him is going to be sneaking a photo.

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...