Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment: wife's device is Quad-band GSM 850/900/1800/1900 (Score 1) 246

by bjamesv (#42722091) Attached to: Ask Slashdot: Best Pay-as-You-Go Plan For Text and Voice Only?
The C15 page indicates the Optional phone module is GSM, Quad-band 850, 900, 1800, 1900 MHz

The manual indicates it is only Optional on the C15 because a non-RF model of the C15 is available. So it would seem that any network that can provide voice service over those bands and will provide SIM-only service is fine.

in the US that would be both AT&T and Tmobile (850/1900 MHz). I believe even Verizon will sell you a SIM, but only for overseas roaming.


Comment: Answer To This. (Score 2) 252

by bjamesv (#37217720) Attached to: The EFF Reflects On ICE Seizing a Tor Exit Node
Is registering as a business the answer to "confiscate everything in sight that looks like a computer?"

Maybe paying for a business line will frame the cops expectations correctly before they roll up on your residence. Make them more willing to listen to your network setup and only take the publicly accessible _half of your kit.

Comment: Re:Unfortunately... (Score 1) 252

by bjamesv (#37217652) Attached to: The EFF Reflects On ICE Seizing a Tor Exit Node
What practical physical barriers are there that can prevent "everything vaguely resembling a computer siezed"?

The police will come to your residence, no?

would it have to be as extreme as having a 2nd address with your open WiFi and Tor exit node running? How do hosting companies convince the cops to "only" take one entire rack or server, and not every scrap at their location?

Comment: Re:don't let your stuff be used for criminal stuff (Score 1) 252

by bjamesv (#37217636) Attached to: The EFF Reflects On ICE Seizing a Tor Exit Node

Keep your gate open for your neighbors, but if there is a crime on your patio - you want the doors to your house to be securely and _clearly locked.

Hardware is so inexpensive now a days; a participatory, community-building point of view suggests you should be running two sets of hardware. One set for your open WiFi and Tor exit node, and the other for your personal use.

With costs as low as they are you should not have to abandon your peers just to protect yourself from heavy-handed law enforcement.

Comment: Re:Missing the point (Score 1) 538

by bjamesv (#34517754) Attached to: OpenLeaks — 'A New WikiLeaks'
Im sorry ... "*If* this site is staffed ..." Can we put some breaks on here, before we go speculating

Is there even more then one former staffer?

Can we get some names here please? - AFAIK wikileaks is a really small team, with only 1 former member, Daniel Domscheit-Berg.

This smells like a non-story to me.

Comment: Re:Assange gets arrested - Who Is Behind this? (Score 1) 538

by bjamesv (#34517682) Attached to: OpenLeaks — 'A New WikiLeaks'
Who is behind this 'breakaway, - "[S]everal key figures"?

Let's have some names please.

To my knowledge Wikileaks is a very small team, and there is only ONE former member (Daniel Domscheit-Berg)
DB seems to have a personal bone to pick with wikileaks,

The fine article reads like a hyped up smear piece trying to puff up the creation of OpenLeaks. Now I only skimmed it, - but Is there any demonstrable evidence out there that openleaks is something more then a non-starter/one-man show born out of a single bad attitude, or unwillingness to commit to the ball that is already rolling quite well?

Comment: But what is hardware/software will display it (Score 1) 19

by bjamesv (#33658666) Attached to: YouTube Videos On Display At the Guggenheim

Immediately i wondered if the videos will be hosted locally, or if they'll just slap a PC into a slot in the wall & stream it in a browser.

"presented ... and hosted on the YouTube Website by Google, Inc (“Google”)"
from event details, (linked to from url in article)

maybe the physical display set up will be neat. Looks like they are jumping full in on the "gee there is content" angle

Comment: Wait, but Access other people's Voicemail? (Score 1) 139

by bjamesv (#31933482) Attached to: Legal Spying Via the Cell Phone System
The exploit they mention uses two rapid calls, the first one hanging up, to provide the second one access to voicemail without causing the handset to ring.

is it just me or does that not explain how they are able to gain access to the messages?

are they relying on the fact the phone does not ring to quickly brute-force the PIN undetected?
Because that would be illegal in most states, ("Unauthorized use of a computing resource, etc.")

Comment: This is not self-monitoring. (Score 4, Interesting) 51

by bjamesv (#31346408) Attached to: White House Declassifies Outline of Cybersecurity Plans
On the face of it proposal #3 seems perfectly fine.

The desire for government agencies to have "situational awareness" in the form of deep-packet inspection of every transaction coming in or out of their network is nothing more then a proactive capability that any responsible Admin might want for their network. (assuming they disclose this capability and have policy dictating its use)

What does worry me are the washington posts comments about Telcom involvement.
This other article make it very clear EINSTEIN 3 is truly NSA equipment installed on the commercial telcom network where the potential exists for it to easily be repurposed to monitor _OTHER_ traffic streams.

this is a whole different animal from's portrayal of responsible network admin.

Comment: Re:Kyllo (Score 1) 297

by bjamesv (#30153368) Attached to: Smart Grid Could Pose Threat To Privacy
Ah, but parent was referring to warrantless monitoring of hourly electricity usage.

more on topic however is the fact that the power company is the one watching, not the police.

they're not exactly like a phone company though, since in most areas in the US there is only a single, quasi-chartered, heavily regulated utility entity.

Committees have become so important nowadays that subcommittees have to be appointed to do the work.