Become a fan of Slashdot on Facebook


Forgot your password?

Comment Those employees' careers are burned (Score 1) 122 122

If security trumped everything, those employees would all be retrained and reassigned to completely unrelated tasks and their previous access yanked as soon as their replacements could be trained.

Now, that's not going going to happen except in a relatively small percentage of individuals.

Instead, our country is probably going to take the risk that this info will be used to hurt us rather than pay the cost of losing a valuable employee 21 million times over.

Comment "I/O gapped" is the new "Air gapped" (Score 1) 80 80

If it's not "I/O gapped" - that is, if state changes aren't completely undetectable outside of the "secure environment" - then for all practical purposes it's not what we used to mean when we said something was "air-gapped."

In today's standards, it needs to be in an EMF-shielded room with an independent power supply (probably batteries), and it needs to be powered down completely when the shielded room's doors are open.

Comment Two words: analog hole (Score 1) 199 199

Many corporate, "non-Internet" email systems have had "message recall" and "do not forward" features, but these are there just to "keep honest people honest" - they are trivial to defeat.

Even the most sophisticated systems can't easily defeat the "analog hole" of photographing the screen with a film camera (yes, that can be done - movie theaters do it - but it's not really practical in a non-controlled environment).

Comment Your use case is likely unique (Score 1) 217 217

Given how few use cases there are like the one you describe, there are probably a lot of important considerations that didn't make it into your question that make your use case unique.

This is one of those cases where you really need to sit down and decide what works best for your situation, NOT what works best for other situations that require this amount of data storage.

Comment Buying big guns (Score 1) 169 169

If I was a narcissist and had money to burn - which I don't - I might make a hobby of buying lots-of-paperwork-required guns just because I would be the only one on my block with such a collection.

For safety's sake - and to calm down the local police - I would put a gun-lock or some equivalent on them and I would take further steps so it would take hours rather than minutes to make the gun fire-able. I wouldn't keep more than a token amount of ammo on-site either.

Comment Uglier corners (Score 2) 169 169

To the extent that people make torture, snuff (murder), and animal- and child- or other-abuse movies for entertainment or financial (vs. war/propaganda) purposes and distribute those on the Internet, then the topic of this article is far, far from the "ugliest corner of the Internet."

People who enjoy others' pain and can't or won't follow the laws regarding torture and abuse need serious mental and/or spiritual help. Those who go out of their way to profit from this kind of thing likely need spiritual help as well, independent of any criminal penalties.

Comment Social engineering or a direct takeover? (Score 1) 158 158

If this is a true direct takeover where no driver interaction is required, then it should be an "OH SH*T" moment for car-makers and will likely result in an "urgent/car is unsafe to drive" recall.

If it's a "social engineering" feat AND the car can be driven without the user touch-screen, then it will still result in a recall but customers will be warned to not use the touch-screen while driving (sorry customer, no radio for you until you come in for the repair).

Personally, I think it's great that this is being researched and publicized. Customers will start to demand that it be "impossible - enforced in hardware" for a car to be taken over in this manner.

Comment And this is why I have email "push" turned off (Score 1) 60 60

I don't get enough phone calls or texts for this to be an issue, but I get a ton of email.

When I'm at my PC, I have "alert me" turned on, because it's usually worth the bother.

But on my phone, I have everything on "manual." If someone emails me after business hours and I'm not expecting an email, I won't see it until the next day. If I am expecting it, I will either manually check it a few times that evening or I'll temporarily turn on "push."

By the way, I do know how to put my phone on "silent" and on the rare cases when I absolutely need to be free of interruption, I use that feature.

When I don't want to be tracked, there is "airplane mode/wifi off/bluetooth off", the "power off" feature, and, for some phones at least, battery removal. And if Donald Trump releases my phone number, there's always the industrial shredding machine/crusher.

Comment Re:High-volume requesters should do "due diligence (Score 1) 188 188

You forget, it's not just the little guys being hurt by this. It's also Google, etc. It takes them time to go through these and they take the hit to their reputation if they always blindly process obviously-bogus requests without so much as looking at it.

Google has the money, the clout, and the legal talent to fight back even if the law seems to favor those making the bogus complaints. As Tepples said below, there is precedent.

Comment High-volume requesters should do "due diligence" (Score 2) 188 188

Out of every million requests you are going to have some obvious mistakes. That's human nature. But it's a huge problem when companies just "throw a bunch of requests at the wall and see what sticks" without much cost to them for invalid requests.

Google and others who receive large volumes of requests should have some procedure to weed out those who send too many requests where the sender obviously didn't do his "due diligence" or worse, is trying to game the system.

Hopefully they can work out a voluntary system with the high-volume DMCA-takedown-notice requesters where the requester agrees in advance to pay "liquidated damages" (aka a "Google fine") for every rejected request and where they accept that they will be put into a "slow processing lane" if their rate of such requests gets too high.

If Google etc. can't come to a voluntary agreement with a particular high-volume sender and that sender's rate of invalid requests gets too high, Google, etc. should take the requester to court to get an order prohibiting the requester from sending any future request without an affidavit declaring that they have done "due diligence." If they don't sign the oath, it won't be a valid request. If they do sign it and didn't do the due diligence, they will be found in contempt of court and face criminal perjury charges.

Submission + - Since Receiving Satellite Tags, Some Sharks Have Become Stars of Social Media->

Lucas123 writes: A research project that tags the world's most dangerous sharks with four different tracking devices and then offers all the data to the public through a online and mobile apps has taken off, garnering hundreds of thousands of users; one shark even has more then 80,000 followers on Twitter. OCEARCH, a non-profit shark tracking project, has tagged about 130 sharks, from great whites and tigers to hammerheads and makos, and open sourced the data in the hope that it will create citizen scientists who will follow the animals and care about what happens to them. To further personify the apex predators, the researchers at OCEARCH have also given the sharks names such as Katharine and Mary Lee, two sharks that are more than 14 feet long and weight more than a ton. OCEARCH's shark tracker has garnered 10 times the traffic it had last year, and it's expected to grow 20 times more by the end of this year. Along with data from satellite, acoustic and accelerometer tags, the project expects to begin using big data analytics to offer more granular data about the animals and their lives to scientists and the public at large.
Link to Original Source

Submission + - The sad state of open IPCameras -> 2 2

criticalmess writes: I'm about to give up on any decent hardware to be found to roll my own web-based camera setup around the house and office — and thought that the nerds and experts at /. would be my last resource I could pull out.
Having bought multiple IPCamera (DLink, Abus, Axis, Foscam, TP-Link, ...) and always getting the "requires DirectX" treatment, I'm wondering if there are any open and affordable IPCams out there? I've been lookint at BlueCherry and their kickstarter campaign to create a complete opensource hardware solution (, I've been looking at Zavio ( as they seem to offer the streams in an open enough format while not breaking the bank on the hardware. Anything else I should be looking at?

I can't for the love of it understand why most of these hardware companies require you to run DirectX — anybody care to enlighten the crowd?

Should be simple enough really: hardware captures images, a small embedded webserver transforms this into an RTSP stream or HTTP stream, maybe on h264 or similar — done.

Link to Original Source

Submission + - Studies find genetic signature of native Australians in the Americas->

Applehu Akbar writes: Two new research papers claim to have found an Australo-Melanesian DNA signal in the genetic makeup of Native Americans, dating to about the time of the last glacial maximum. How might they possibly have gotten here?

This may move the speculation around the Clovis people and Kennewick man to an entirely new level. Let's hope that it at least shakes loose some more funding for North American archaeology.

Link to Original Source

Steve Jobs said two years ago that X is brain-damaged and it will be gone in two years. He was half right. -- Dennis Ritchie