Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: You must have the source code! (Score 5, Interesting) 112 112

This so-called bug is only possible because users do not have access to the source code. From the user's perspective it does not matter if this was done because of pressure from NSA or convenience of maintenance techs!

This class of bug is unknown in the free software world because your project will forked.

All corporations are subject to enormous pressure from corporations, and therefore can not be trusted, even if the management wanted to play it straight.

All populations, including the U.S'es are targets of information warfare by the NSA and GCHQ.

There is no security without the source code.

Comment: Bondage and discipline Language (Score 1) 386 386

"Like many of new languages, Rust is walking the path of simplification. I can generally understand why it doesn't have a decent inheritance and exceptions, but the fact itself that someone is making decisions for me regarding things like that makes me feel somewhat displeased. C++ doesn't restrict programmers regarding what they can or cannot use."

This is the definition of a bondage and discipline language. The idea is that the central committee designing the language knows better than the programmer. The central committee will prevent the programmer from making certain "mistakes" by leaving the concepts out of the language.

If only the central committee had control of natural language as well, they could prevent the programmer from committing thought crime by thinking forbidden thoughts.

As it is, the programmer will flee the bondage and discipline language as soon as he figures out what is going on.

Comment: start at the root, we must have securable hardware (Score 3, Insightful) 58 58

Free software, yes. Bug bounties, maybe.

But recent developments have made clear that securable hardware is sine qua non. All firmware must be in socketed memory, so that you can take it out and externally check it. You can't trust an untrusted system to check itself. All firmware must be protectable with a hardware readonly jumper or switch.

I know that this is inconvenient and a revolution on how hardware is currently made. but if people started demanding it en mass, it would not cost very much. And I mean the firmware in disk drives and optical media players and especially routers.

There may be other requirements.

This is sine qua non. Without this we have nothing.

Comment: Assume all proprietary router software compromised (Score 2, Insightful) 57 57

Once and for all: all proprietary router software must be assumed to be compromised. The NSA has been totally committed to ruthless information warfare against the population of the planet. There is no way a corporation can resist them. They consider themselves totally above the law.

Do not buy a router unless OPENWRT supports it.

Always overwrite what ever firmware came with the router with a new install of free software.

The days when Joe Sixpack can just buy a router an plug it in are over! You must do this.

Security experts need to take a close at uboot software commonly used to install alternate firmware. And check if NSA has hacked that up as well.

Comment: systemd runs on my rincky dink Pi just fine. (Score 1) 716 716

I run a service on my Raspberry Pi that distributes hardware random numbers to my lan. For computers that don't have a hardware RNG. Just to see what the fuss was about I converted this Pi to systemd. It worked fine. The unit files were easier to read and write.

On my desktop I run debian testing. and I converted to systemd, with out knowing it, just by doing periodic updates.

Systemd is still free software. All the source is published, and it can be forked at any time. We need this functionality. It is a good thing that it has been redesigned to work smoothly together.

If the complainers really wanted to help, they could do a security audit instead of bellyaching!

If pottering becomes unbearable, the project can be forked. A lot of powerful forces need this project to work, so I suspect it will.

Its just a lot of whining and bellyaching from people who don't want to do anything.

Comment: It is still a freeking rocket! (Score 1) 282 282

The UFOs have space drives. Hundreds of witness, some with scientific credentials, have seen UFOs make extremely high G turns. With nothing being shoved out the ass end of the craft. Total silence.

Our physics if fucking wrong, and space drives are possible!

Instead of fucking with rockets, NASA needs to figure out what is wrong with our physics, and build the fucking space drive!

Comment: cross space by cooperation! (Score 4, Interesting) 272 272

Have a good reputation by practicing ahinsa, and always helping and not hurting the civilizations one visits. Send a copy of your self to other civilizations and get them to build it, giving them detailed instructions. (Use error correcting codes for the instructions.) In return perform same service for others with good reputations! Using this method one can cross space at the speed of light or better. You can cross space at the speed a message can travel.

If you hurt anyone your reputation will be damaged and with it the ability to travel.

+ - Congress passes bill allowing warrantless forfeiture of private communications->

Prune writes: Congress has quietly passed an Intelligence Authorization Bill that includes warrantless forfeiture of private communications to local law enforcement.
http://thehill.com/policy/tech...
Representative Justin Amash unsuccessfully attempted a late bid to oppose the bill, which passed 325-100. According to Amash, the bill "grants the executive branch virtually unlimited access to the communications of every American"

Link to Original Source

The early bird who catches the worm works for someone who comes in late and owns the worm farm. -- Travis McGee

Working...