Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment wife's device is Quad-band GSM 850/900/1800/1900 (Score 1) 246

The C15 page indicates the Optional phone module is GSM, Quad-band 850, 900, 1800, 1900 MHz

The manual indicates it is only Optional on the C15 because a non-RF model of the C15 is available. So it would seem that any network that can provide voice service over those bands and will provide SIM-only service is fine.

in the US that would be both AT&T and Tmobile (850/1900 MHz). I believe even Verizon will sell you a SIM, but only for overseas roaming.


Comment Answer To This. (Score 2) 252

Is registering as a business the answer to "confiscate everything in sight that looks like a computer?"

Maybe paying for a business line will frame the cops expectations correctly before they roll up on your residence. Make them more willing to listen to your network setup and only take the publicly accessible _half of your kit.

Comment Re:Unfortunately... (Score 1) 252

What practical physical barriers are there that can prevent "everything vaguely resembling a computer siezed"?

The police will come to your residence, no?

would it have to be as extreme as having a 2nd address with your open WiFi and Tor exit node running? How do hosting companies convince the cops to "only" take one entire rack or server, and not every scrap at their location?

Comment Re:don't let your stuff be used for criminal stuff (Score 1) 252

Keep your gate open for your neighbors, but if there is a crime on your patio - you want the doors to your house to be securely and _clearly locked.

Hardware is so inexpensive now a days; a participatory, community-building point of view suggests you should be running two sets of hardware. One set for your open WiFi and Tor exit node, and the other for your personal use.

With costs as low as they are you should not have to abandon your peers just to protect yourself from heavy-handed law enforcement.

Comment Re:Missing the point (Score 1) 538

Im sorry ... "*If* this site is staffed ..." Can we put some breaks on here, before we go speculating

Is there even more then one former staffer?

Can we get some names here please? - AFAIK wikileaks is a really small team, with only 1 former member, Daniel Domscheit-Berg.

This smells like a non-story to me.

Comment Re:Assange gets arrested - Who Is Behind this? (Score 1) 538

Who is behind this 'breakaway, - "[S]everal key figures"?

Let's have some names please.

To my knowledge Wikileaks is a very small team, and there is only ONE former member (Daniel Domscheit-Berg)
DB seems to have a personal bone to pick with wikileaks,

The fine article reads like a hyped up smear piece trying to puff up the creation of OpenLeaks. Now I only skimmed it, - but Is there any demonstrable evidence out there that openleaks is something more then a non-starter/one-man show born out of a single bad attitude, or unwillingness to commit to the ball that is already rolling quite well?

Comment But what is hardware/software will display it (Score 1) 19

Immediately i wondered if the videos will be hosted locally, or if they'll just slap a PC into a slot in the wall & stream it in a browser.

"presented ... and hosted on the YouTube Website by Google, Inc (“Google”)"
from event details, (linked to from url in article)

maybe the physical display set up will be neat. Looks like they are jumping full in on the "gee there is content" angle

Comment Wait, but Access other people's Voicemail? (Score 1) 139

The exploit they mention uses two rapid calls, the first one hanging up, to provide the second one access to voicemail without causing the handset to ring.

is it just me or does that not explain how they are able to gain access to the messages?

are they relying on the fact the phone does not ring to quickly brute-force the PIN undetected?
Because that would be illegal in most states, ("Unauthorized use of a computing resource, etc.")

Comment This is not self-monitoring. (Score 4, Interesting) 51

On the face of it proposal #3 seems perfectly fine.

The desire for government agencies to have "situational awareness" in the form of deep-packet inspection of every transaction coming in or out of their network is nothing more then a proactive capability that any responsible Admin might want for their network. (assuming they disclose this capability and have policy dictating its use)

What does worry me are the washington posts comments about Telcom involvement.
This other article make it very clear EINSTEIN 3 is truly NSA equipment installed on the commercial telcom network where the potential exists for it to easily be repurposed to monitor _OTHER_ traffic streams.

this is a whole different animal from's portrayal of responsible network admin.

Slashdot Top Deals

I THINK THEY SHOULD CONTINUE the policy of not giving a Nobel Prize for paneling. -- Jack Handley, The New Mexican, 1988.