Follow Slashdot stories on Twitter


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×

Comment Re:Post-attack 'responsibility' NOISE (Score 1) 728

"If any 'claim of responsibility' emerged hours or days after a terrorist attack it would be treated with the utmost suspicion. Even if transmitted directly to them, news networks would notify the authorities of course, but they might not even report it publicly. Unless a phone call or fax was received at the moment of breaking news, some times even minutes before, the information was deemed to be zero-credible or less than zero, more likely than not the work of a crank. And news sources were generally averse to being cranked."

Some times yes, some scepticism is in order. In the case of the downed Russian plane, I'd even agree. But in this case, no. If you can't tell the difference too bad for you. It's obvious the IS claim is genuine, at very least it's a similar islamic group. Who do you want to blame? The Russians?

Comment Re:Why is the Left so fiercely defending Islamism? (Score 1) 728

Mod this guy up, this is one of the most maddening aspects of western society. Why must this fascist religion be defended so fanatically by the left?

There are 13 countries in which atheism is punishable by death. They are all muslim states!

Islam is religious fascism.

Comment Re:I wouldn't put it past Putin (Score 2) 289

why are the British and Americans so certain of evidence of a bomb declaring they detected a heat flash and cancelling flights and so forth?

If the heat flash had been a bomb they should've seen another one when the plane crashed into the ground and the fuel ignited. So seeing one heat flash would actually suggest to me it wasn't a bomb.

Cancelling flights is exactly what you expect to happen in the aftermath of MH17. The authorities will be overly careful.

Same happened after the failed attack on the Thalys high speed train. The next time somebody hid in a toilet everyone immediately assumed it was another terrorist. This is the way of public servants.

Comment Remember China Airlines flight 611 (Score 5, Interesting) 289

Don't discount the possibility of an accident. Something very similar happened to China Airlines flight 611

A tail section badly repaired after a minor accident came off in mid-air. The airplane spun out of control and disintegrated before crashing into the ground. That fits this accident very well.

Without conclusive evidence of a bomb, I would be very careful to scream terrorism. Terrorists claiming responsibility doesn't mean a thing without evidence.

Comment Re:Pretty Amazing Really (Score 2) 32

Again AFAIK these schemes install a trojan on your system which generates a unique private/public key pair. The private key is sent to the C&C server and stored while the public key is used to encrypt the data and discarded after use. They could even use symmetric encryption since key exchange is not a big problem in this scenario. In any case a new key is generated for each victim and sent back to the C&C server. If this is true, the 15000 keys would correspond to the number of victims (not files).

Comment Re:Excellent. (Score 1) 674

"yet I still enjoy being productive"

Yeah sure, I'll bet you're selective in what you want to do and how long you want to do it, though. It will be a very Utopian society in which we all just do want we find interesting at that moment and get paid anyway.

Utopian as in impossible...

Comment Re:Pretty Amazing Really (Score 4, Insightful) 32

"While it's a worthy effort, I suspect that it's mostly just a PR stunt though since I doubt very many people will actually be able to use these keys to avoid paying the ransom, given that the criminals will indeed switch to new keys pretty much overnight, potentially re-encrypting any data on PCs they have already compromised in the process if they can re-establish control via other C&C servers."

AFAIK the guys who did it are now in jail, which makes it a lot harder to change keys. Evene if they didn't catch them all, the remaining bad guys may want to lay low for a while.

So, it looks pretty much like a success to me. Locking these guys up and retrieving the keys is pretty much the best you can do in such a case.

Comment But How??? (Score 1) 88

Let's put the political stuff aside for a moment and look at the technical side. How did the attackers operate? A fake mail/vpn server? How is that supposed to work?

Or are we talking about standard script kiddie attacks (seeen by every site on the web) interpreted by Trend Micro as Russian government attacks? Let's not forget that this is a great commercial message for Trend Micro. Is this stuff for real or is someone trying to scare us?

Obviously there are lots of Russian hackers/script kiddies who are angry enough at the west to start something like this on their own. No real need for a big Russian government conspiracy.

(Never thought I'd be defending Poetin some day. You owe me one Vladimir!)

Comment Re:Either that or... (Score 1) 336

"The Swedish authorities, against all reason and without explanation, have refused to come question him. Why do you think that might be? -PCP"

That's just what governments do, really. Mine does many things that I find unreasonable.

I find it highly unlikely that the Swedes (unreasonable or not) would extradite him to the US. Much more likely that they would charge him with sexual assault. (they're -un-reasonably fanatical in that area)

Comment Either that or... (Score 1, Insightful) 336

"He believes that once he is in Sweden, he will be extradited again to the US where he could face espionage charges"

Hold on. That's what he says he believes. It's also quite possible that he believes he will be convicted for the sexual assault charges, but that he stands a better chance claiming that he's the victim of a conspiracy.

Everybody loves a free speech martyr. Sexual predators are usually not so popular.

e-credibility: the non-guaranteeable likelihood that the electronic data you're seeing is genuine rather than somebody's made-up crap. - Karl Lehenbauer