Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Comment Re:two thirds of users... (Score 1) 222

It's pretty typical of what you see in a news site running noscript. The big blocking portion of the page, not the crap underneath. I read a lot bouncing around a bunch of sites I've never heard of, but I don't run a lot of javascript. I used to use dev options to make the page readable, until I realized how few keystrokes it took to disable stylesheets. I've been reading a lot of vanilla html ever since. Remember when websites used to choose their sponsers? Those were better days.

Comment Re:privacy? (Score 1) 60

The funny thing about targeted advertising is that I search for things I know nothing about, rather than things I'm interested in. So I get advertisements based on this or that which is related to something someone mentioned and I had no clue about until I googled it. The things I do have an interest in, I find information about from specific sources. Although, when it THINKS it knows what you're interested in, provides those ads as a replacement to one of the "one weird trick" ads. Oh, and as soon as we move to targeted ads on TV, expect to see one weird trick every episode, at a minimum.

Comment Re:I wonder if they're going to use this as "proof (Score 1) 657

My problem with the situation, is that the teachers didn't respond appropriately for EITHER. If it's a ...

bomb - evacuate school, call PD and FD don't touch or in any way fuck with the bomb.
clock - send kid on his merry way.
something I don't understand - confiscate the item, harass the child and send him to the police department in handcuffs(if they make them that small)

Comment Re:Other employees did the same thing (Score 1) 344

Read the summary, it's not that long. "less prominent government employees would have probably been prosecuted for doing the same thing." I can tell you that that sentence is true. But we can argue about Colin Powell and Bush Jr all day, but the fact remains that she broke the law. And many other people who aren't in prominent positions also broke the law, and were prosecuted for it. Just because other prominent people were above the law in the past, doesn't mean we can't enforce it now, and maintain that expectation for future officials. Doing otherwise is a great way to maintain the situation we currently find ourselves in.

Comment Re:30% (Score 1) 329

Most games are.

In fact, I don't recall ever watching a game on ESPN. It's all sports highlights. The previous day's games summarized into a 15 minute loop that plays all day long. I really don't see why they should charge $10 per customer per month. They seriously only produce 15 minutes worth of content, to use the term loosely, per day. How do you like my coverage of ESPN's coverage of anything. Did I mention they loop the same 15 minutes of highlights all day long?

Comment Re:CNNIC (Score 1) 35

I agree. Hopefully more user agents(MUA and browsers) will come with some system of certificate pinning on by default, just to be on the safe side. I'm confident that would offer motivation to keep CAs honest. And it's quite likely that we'd find a few that aren't so honest. Although, there is still what I call the "lavabit attack" (certificate theft by court action) which, if successfully kept silent, would be completely undetectable.

Comment Re:I agree (Score 1) 111

With cash I have to authorize every single transaction by reaching into my pocket. With credit/debit card transactions, I only need to have reached into my pocket at some time in the past to pay. Cash and bitcoin put the power over payment back into your hands, instead of the merchant. You, (or someone who stole your key) has to authorize every single transaction. It is true that it makes takesee backsees harder to pull off. But, they're already a pain anyway. Mastercard doesn't provide any recourse for unauthorized transactions, you have to take that issue up with the merchant. They just make it easier for their paying customer to withdraw your money.
Some form of crypto should be used for ALL digital transactions. The fact that when I make a purchase with my MasterCard provides the party that I'm paying enough information to continue making charges whenever they like absolutely infuriates me. It means I have to trust both the integrity as well as the security practices for every place where I use my card. If only we had a technology that could fit on a credit card that could digitally sign a transaction so that a register never sees the key. Maybe that kind of technology will be made available 10 years ago or so.

Comment Re:Only haters hate, for the most part... (Score 1) 171

Or another option would be to be able to disable IAP on your phone completely. Or on a per app basis. I use android and wish I could individually revoke permissions from any app. There are MANY apps I've chosen not to download because of required permissions. So many that it's become somewhat of an inconvenience. And in addition to that, after I made my last purchase in the app store (It's not very often) I deleted my CC info from my account. I try to make a point to do that. That way if I do slip up, the IAP will fail. I dislike the entire concept of having payment information stored online. I dislike the ability for an entity withdraw money from my account without my knowledge. I dislike the bank systems that do not require a mechanism for my approval for individual transactions. I feel that doing things the way normal people do them is giving these organizations more control of my assets than I have. My bank has the ability to stop transactions(like when my wife tried to use her card while traveling). When I tried to stop a transaction I didn't authorize, I was told to contact the merchant. When I'm given the options to give up control or don't play, I choose the latter.

Comment Re:Why does it broadcast *all* SSIDs? (Score 1) 112

Because it's easier to De-auth 1 visible connected client, and listen to the probe requests as it tries to reconnect. I believe that's called SSID decloaking, or something like that. There are enough of the right tools to be able to do this automagically while driving down the road with a laptop and a gps dongle. If there isn't a tool that does all the magic, I'm know that a mix of them could easily make all the necessary output that could be put together after a 2 hour drive through town. People still make wardriving tools. But we have so much wifi now that most would be wardrivers don't make it past the driveway. Long story short, it's even easier than that.

Comment Re:Well then (Score 1) 251

Oh, but you can. Well it's not exactly the same thing. Have you heard of a femtocell doodad? When I first heard of stingray, I thought back to an interview from a guy at blackhat or defcon, I can't remember which. Anyway, here's a few links. I remember hearing them say that the traffic from the devices communicated w/o encryption to the servers. Supposedly that was fixed, but may very well still have more vulnerabilities like this one.
so 1) they already do sell things with retarded capability to consumers
2) the argument "we don't want the criminal element to know we have this kind of capability because they'll know how we find them" is invalid.



Comment Re:Outside the range? (Score 1) 212

But it's not outside the range of national security as defined by
US Code Title 8 Chapter 12 Subchapter II Part II â Â 1189(d)(2)
the term âoenational securityâ means the national defense, foreign relations, or economic interests of the United States
or you can look it up yourself here

"The most important thing in a man is not what he knows, but what he is." -- Narciso Yepes