Forgot your password?
typodupeerror

Comment: Re:In Soviet Maryland (Score 1) 240

by TheCarp (#47808105) Attached to: In Maryland, a Soviet-Style Punishment For a Novelist

You are both right and wrong. The police yes....however the DA and Sheriff are often both elected positions, meaning that they do have certain "requirements" if they want to be re-elected, and often respecting civil rights is unpopular with the populace; and a LOT of people are willing to give them a pass for violating rights if they come up with even a flimsy excuse.

Comment: Or you could buy a certified box (Score 1) 241

by msobkow (#47805559) Attached to: Ask Slashdot: Linux-Friendly Desktop x86 Motherboard Manufacturers?

Rather than building one from scratch, you could buy a box that's certified to run Linux. Unlike the old days, I find that nowadays you really can't build a box any cheaper than you can buy one from companies like Lenovo or HP, and Lenovo has several boxen that are "Linux ready."

Personally I think my box-building days are over. I no longer play video games, so all I'm really interested in is a fast CPU and a PCI16 slot for my "silent" (no fans) video card, and audio and networking that are supported by Linux (which is pretty much everything Lenovo sells; I haven't looked into HP -- I don't like their reliability ratings.)

Regardless, I couldn't come up with pricing any better than about $800 + tax + shipping no matter how I scrounged, and that was only for a Core i5, not a Core i7. It's about another $150 to bump up to an i7, but I don't *need* a quad i7 for what I do. I'd *like* one, but I don't *need* it.

I think I'd get more of a performance boost out of using my PCI video card to offload the memory access from the CPU channels than I would out of bumping from an i5 to an i7.

Comment: Re:Where are these photos? (Score 1) 290

by TWX (#47802471) Attached to: Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos
Money, important as it is, is impersonal. Any given United States Dollar can be exchanged with any other United States Dollar in the context of being fiat currency and it is irrelevant to the owner, and a perpetrator that steals a Dollar from someone has no further power over the victim and cannot continue to harm the victim after the original theft. In the case of banks, there are laws governing the culpability and liability of a bank to its depositors, to the point that the FDIC forces banks to shut down and merge when they get overleveraged to prevent a complete failure.

As to the personal side of the money angle, if I don't follow good practices like attempting to protect my PIN, then perhaps I deserve the headache associated with having to deal with the bank to get the matter resolved.

On the other hand, naked pictures are personal, and the argument can be made that the continued distribution is further victimization when the pictures were made in private and were redistributed without permission. It gets murkier when one considers the copyright belongs to the photographer, not the subject, but if the distributor is not the copyright holder then in the past, the subject has been considered a victim.

On the same vein, this is not the first time that celebrities have had their personal photos redistributed by someone other than the subject or the photographer. Off the top of my head, Kat Dennings and Scarlett Johansson were recent victims of this, and there have been numerous redistributions of private photos unauthorized by both the photographer and the subject, and more still that were unauthorized by just the subject, such as Paris Hilton and Kim Kardashian.

If they were taken off of an Apple server/service, then yes, Apple might bear some culpability, but based on what I've seen, Apple is no worse than anyone else, they all fail. The entire industry needs an enema, everything from the communications protocols that our data transfers happen on to the user credential policies is flawed, and that includes the servers, services, and underlying code that makes it all work.

Comment: Re:Behavior (Score 1) 290

by TWX (#47802363) Attached to: Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos
I still think that you're describing an asymptote situation, one where we can quantify what we want the situation to be, but where as much a we strive for it we never actually get there.

We'll never get there because fundamentally, we like dirt, scandal, sensationalism, dirty laundry, whatever you want to call it. That fundamental vulnerability will always cause someone to seek-out other vulnerabilities, and every technology has them.

Comment: Re:Where are these photos? (Score 3, Insightful) 290

by TWX (#47802191) Attached to: Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos
I am happy to blame the victim in all circumstances where the victim was presented with the information needed to understand the odds of it and to avoid becoming a victim in advance of it happening. The crux of the matter is that I do not *only* blame the victim.

More than a decade ago my pickup truck was stolen out of the parking lot of the apartment that I lived in. I didn't have a steering wheel lock or other immobilization device on it and per my parents' advice only had liability coverage, as it was an older truck and only worth a couple-thousand dollars Unfortunately I had also just been laid-off, and couldn't afford to buy another vehicle and left with none. I bore at least some responsibility as I did not make an effort to see how theft-prone these trucks were, did not use anything to make the vehicle a harder target, and didn't have the insurance necessary to deal with it. My parents also accepted some blame in that the insurance situation was their idea, and they let me borrow a vehicle until I found work, then they bought me a cheap vehicle and I paid them back as I could afford to.

Blaming the victim does not mean demonizing the victim. It means there's an understanding that the victim took unnecessary risks and suffered the consequences of those risks when the odds fell against their favor. This is a cruel world that we live in, and while it's nice to think that maybe some day people won't commit acts against each other, that is never going to happen and we all have to do our part to protect ourselves, as again, we can only affect our own behavior, not anyone else's.

Comment: Re:Some outrage motivated by image control/PR/mone (Score 1) 290

by TWX (#47802113) Attached to: Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos
Her words at an awards show where she commented that if she showed a tit she'd break the Internet, then reached up for her decolletage, throws a bit of a wrench in that analysis. The venue was far too public for her to let her guard down, and it flies in the face of a carefully cultivated image of higher standards in a vein like that of Taylor Swift.

Comment: Re:Let me get this straight... (Score 1) 290

by TWX (#47802073) Attached to: Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos

My home is connected to the street network. That doesn't mean I expect anyone with access to the street to have access to my home.

The real issue here is trusting Apple to manage the lock on your front door.

That my house is connected to the street network is why I have locks on my doors, a fence around my backyard, locks on my windows, curtains and blinds on my windows, and a security system. I follow my own due diligence to attempt to keep people out by making it hard for them to know what stuff I have, as difficult as possible for them to get in such that they have to break laws in the act, and I have a means of detecting if they force their way in otherwise.

It's wrong of people to attempt to steal my stuff, but just because it's wrong doesn't excuse me from making an effort to ensure that it doesn't happen.

Comment: Re:"complained about the service" (Score 1) 290

by TWX (#47802019) Attached to: Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos

Stop. This is the fault of allowing users to use devices with no training. Standard I.T. data security ON THE PART OF THE USERS would have prevented this. If you dont understand the device you are using, seek training, or dont put sensitive info on it. Its not ok to be a moron in the Information Age.

I used to feel that way, but I don't think it works that way anymore. There's too much tech to be able to keep up with it, even for computing professionals. There are too many things that we're dependent on that we only get to see as a black box. There are too many vulnerabilities constantly discovered and often times left unpatched (Heartbleed anyone?) that are out of the user's control.

Yes, there are some things that the user can control, but there are plenty of things outside of that control, and plenty of other things that stop working if the user doesn't allow various services to be turned on or available. In some ways it's our own Chilling Effect, but those are the breaks when one wants to foist interconnectivity on everyone and everything. It means now that everything is potentially subject to review by everyone else.

Comment: Re:Alleged leaker already named (Score 2) 290

by TWX (#47801981) Attached to: Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos
the screenshots were probably the biggest mistake though. He identified extra nodes (quite literally with the machine names) that made it much easier to cross-check real-world "networking" to other people and the organization that he works for. Or worked for, as I expect that come tomorrow he won't work there anymore as his sheer presence will be damaging to the company. Heck, if he used company resources and the FBI comes calling, all of those computers in the screenshots will probably be confiscated and the company will effectively wither on the vine.

If he hadn't been showboating he might have managed to stay anonymous enough to be left alone.

"The value of marriage is not that adults produce children, but that children produce adults." -- Peter De Vries

Working...