Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:Apple is like a posh handbag (Score 1) 206 206

"My Note 3 has 3GB of RAM but due to all the shit Samsung and AT&T have stuck on the phone it only has about 1GB free." I Cant speak about AT+T firmware. But the Note 3 in UK (EE) a lot of the Samsung Apps aren't installed by default and only install if you select them from the app menu and others can be disabled ( which also un-installs any updates ). This is much better than the S3 which I rooted almost immediately to free space and remove apps. Also as the linux kernel is in use and it (rightly) tries to use all the RAM all the time. Apps you have closed may be cached etc. I think your complaint may be misguided to a degree. Though the bloatware and carrier restrictions seem much worse across the board in the US.

Comment Re:Common sense? In MY judiciary? (Score 1) 457 457

No shit.

I'm all for warning drivers to be legal (Which, it must be pointed out, is applicable to situations besides the police, and can be for all sorts of warnings of road conditions.), but flashing brights at people is *itself* dangerous.

What we need a precedent that turning your lights off for a split second is free speech, not 'driving with your lights off'. (Probably need some sort of threshold of about a quarter second.)

Comment Re:And so, it begins (Score 1) 383 383

Yeah. I always found it funny that the conspiracy theory brought in the British news media. I mean, it's absurd to give anyone a script, but the British news media?

<sarcasm>Because if there's any group that would just fall in line with the Bush administration murdering thousands of people, it's the British news media.</sarcasm>

I remember when the assertion that one of the terrorists was actually still alive showed up...and my response was 'So you assert the US government, instead of just making up Iraqi terrorists to pin this on to invent a war, used pre-existing Saudi terrorists that they could not confirm were already dead?'

And the less said about the 'using missiles instead of planes' theory the better. Man, was that one silly or what?

There are two kinds of conspiracy theories out there. One that postulates plausible causes for actual events. I mean, Jack Ruby _did_ have mob ties, and the Kennedy administration was cracking down on the mob, so if you want to assert that Oswald did a mob hit of JFK, and then was taken out, hey, I don't quite believe you, but you're not _insane_. That is indeed plausible.

The other kind of conspiracy theory is where you take some event and randomly find 'inconsistencies', which are usually just things said in confusion that are untrue, or misunderstandings of what is going on, or things that are completely normal but don't look normal to people who don't understand disaster, and try to build a massive conspiracy using every single one of them. None of which will hold up to the single question of 'Why the hell would anyone running that conspiracy actually do that?'

Which, in the context of the Kennedy assassination, is basically trying to make there be more other active shooters beside Oswald, elaborate conspiracy theories about misunderstanding of physics and bullets instead of just saying 'Yes, Oswald shot him...but _why_?', which is a much better question.

Comment Re:They have *worse* to hide? (Score 1) 383 383

I'm suspecting it's doublespeak. He used other people's credentials...in the sense that they didn't even bother giving each individual person their own login. I'm sure he wasn't technically 'supposed' to have access to some of that information, but that probably means he just copied it directly from some accessible file share instead of using their crappy web UI.

The intelligence infrastructure is a joke. It is a giant uncontrolled operation flailing around randomly sucking up all the data it can, with no controls on anything internally.

And Snowden did a huge service for this country. Not in the information he stole, not in the operations he revealed. That as nice to know, and to all those asshats who assert that intelligence operations need to be kept secret...sure, individual operations should be secret, yes. Not what type of operations and spying exist.

But, anyway, the truely great service is that Snowden demonstrated that literally every intelligence agency in the world already has that information. Trust me, they are, at least, communally, as smart as Snowden, and as it is apparently fucking easy to just be invited to b given access to everything, everyone else already has it.

In fact, considering how shitty the controls apparently are, it makes much more sense for other intelligence agencies to spend their time and effort subverting subdivisions of contractors of our intelligence services than trying to run their own network, letting them use our intelligence resources in real time. Without Snowden, the public at large would have no idea this was happening.

The question is not 'Do you trust our government with all your private information', or even 'Morally, think about how would you feel if you knew the Chinese were doing the esame thing to you, and you'll understand how this makes other countries feel.'...it's 'How do you like the fact that the Chinese are spying on you, right now, using your own tax money and your own government agencies.'

Because they are. Or, at least, could be if they thought you were the least bit interesting. (Incidentally, 'interesting' to intelligence services is not as high a threshold as people think. Do you, for example, work in the technology field and could conceivably be a useful asset to get malware somewhere they want it? Or have access to proprietary business secrets? Or medical information?)

Comment Re:Air Gaps are Evil (Score 1) 107 107

Erm, okay, you're talking about something completely different...

...but still not making much sense to me.

The problem is that 'If you instead had a wire to the machine in the room, you could monitor the transactions over the wire. You could ensure a non turing complete language is used in the wire protocol. You can deny humans access. You can apply defense in depth to a wire. No so much to a room full of humans.' you can do _on an air-gapped machine_.

What you have just proposed doing is to put the UI of the secure machine outside the secure machine, and locking down interactions between it and the secure machine...which is fine, but there's no reason you can't put that UI _inside the air gap_. And in fact that makes much more sense.

You, uh, just need two of them in the room. One that people can physically access, and one, locked behind bars, that they cannot, connected via a wire, with an air-gap between that system and the outside world.

This is a bit of an overkill, though. If you are worried about the people who access the air-gapped computer being a weak link, in actuality you _build the UI with security_ (Just like your hypothetical wire protocol, but much easier.) and then don't let them physically access the CPU or disks. (I recommend a external CD-RW drive.)

And you 'analyze' what they do by simply recording the screen and keyboard. Which you can do by either unidirectional wiring or by literally recording it with a camera. Or having watchers.

Or, alternately, if you want, you can do it like I said and just put a UI computer in the air-gap room also. You can even render the UI computer fairly difficult to hijack by building it solely out of read-only storage. It would be the perfect place for some sort of dumb terminal that is just running a web browser connected to the actual secure machine, which is locked up inside a box inside the air-gap and none of the users can get to it.

If you can't understand it, it is intuitively obvious.