Forgot your password?

Comment: Re:How many engineers does it take to screw netfli (Score 1) 233

by fibonacci8 (#48274369) Attached to: First Detailed Data Analysis Shows Exactly How Comcast Jammed Netflix
There's too much revisionist history in the Boss's statement for my tolerance. Boss- "First they take our subscribers now they're forcing to upgrade our equipment... well fuck em!" First they had subscribers, then Netflix introduced the online version of their service (circa 2008) bringing in more subscribers, then Xfinity got added (circa 2010) offering the speeds demonstrated by Netflix carried by Comcast but with a selection of Comcast's cable offerings. fast forward a few years and Netflix is still the better offering so Comcast strategically decides to upgrade in ways that improve Xfinity on-demand services without accepting offers from Netflix to likewise maintain the quality of service Netflix customers experienced in the past and presumably would still get to experience if the dollars spent on monthly connection fees to Comcast actually went into improving total network quality instead of just promoting Xfinity services. It would be nice if it were just friendly competition going on, but it's Comcast trying to cut in on the streaming market after Netflix showed it was profitable.

Comment: Re:Their answer to oversubscription as well (Score 2) 233

by fibonacci8 (#48274221) Attached to: First Detailed Data Analysis Shows Exactly How Comcast Jammed Netflix
When a toll road sells 10.000 people a monthly pass for a lane each, and then offers up to 5 lanes at a time during peak hours due to "maintenance", and yet has another 9,995 lanes constructed, uncluttered, and for sale in advertisements to other bidders I would certainly complain.

Facebook To DEA: Stop Using Phony Profiles To Nab Criminals 239

Posted by Soulskill
from the do-that-with-linkedin-like-everyone-else dept. writes: CNNMoney reports that Facebook has sent a letter to the U.S. Drug Enforcement Administration demanding that agents stop impersonating users on the social network. "The DEA's deceptive actions... threaten the integrity of our community," Facebook chief security officer Joe Sullivan wrote to DEA head Michele Leonhart. "Using Facebook to impersonate others abuses that trust and makes people feel less safe and secure when using our service." Facebook's letter comes on the heels of reports that the DEA impersonated a young woman on Facebook to communicate with suspected criminals, and the Department of Justice argued that they had the right to do so. Facebook contends that their terms and Community Standards — which the DEA agent had to acknowledge and agree to when registering for a Facebook account — expressly prohibit the creation and use of fake accounts. "Isn't this the definition of identity theft?" says privacy researcher Runa Sandvik. The DEA has declined to comment and referred all questions to the Justice Department, which has not returned CNNMoney's calls.
The Internet

Why the Trolls Will Always Win 728

Posted by Soulskill
from the emboldened-and-protected-by-anonymity dept.
maynard writes: Kathy Sierra spent a tech career developing videogames and teaching Java programming in Sun Microsystems masterclasses. Up until 2007, she'd been a well regarded tech specialist who happened to be female. Until the day she opined on her private blog that given the crap-flood of bad comments, maybe forum moderation wasn't a bad idea. This opinion made her a target. A sustained trolling and harassment campaign followed, comprised of death and rape threats, threats against her family, fabricated claims of prostitution, and a false claim that she had issued a DMCA takedown to stifle criticism. All of this culminated in the public release of her private address and Social Security Number, a technique known as Doxxing. And so she fled from the public, her career, and even her home.

It turned out that a man named Andrew Auernheimer was responsible for having harassed Sierra. Known as 'Weev', he admitted it in a 2008 New York Times story on Internet Trolls. There, he spoke to the lengths which he and his cohorts went to discredit and destroy the woman. "Over a candlelit dinner of tuna sashimi, Weev asked if I would attribute his comments to Memphis Two, the handle he used to troll Kathy Sierra, a blogger. Inspired by her touchy response to online commenters, Weev said he "dropped docs" on Sierra, posting a fabricated narrative of her career alongside her real Social Security number and address. This was part of a larger trolling campaign against Sierra, one that culminated in death threats."

Now, seven years later, Kathy Sierra has returned to explain why she left and what recent spates of online harassment against women portend for the future if decent people don't organize. The situation has grown much more serious since she went into hiding all those years ago. It's more than just the threat of Doxxing to incite physical violence by random crazies with a screw loose.
Read on for the rest of maynard's thoughts.
United States

US Says It Can Hack Foreign Servers Without Warrants 335

Posted by Soulskill
from the how-to-win-friends dept.
Advocatus Diaboli tips news that the U.S. government is now arguing it doesn't need warrants to hack servers hosted on foreign soil. At issue is the current court case against Silk Road operator Ross Ulbricht. We recently discussed how the FBI's account of how they obtained evidence from Silk Road servers didn't seem to mesh with reality. Now, government lawyers have responded in a new court filing (PDF). They say that even if the FBI had to hack those servers without a warrant, it doesn't matter, because the Fourth Amendment does not confer protection to servers hosted outside the U.S. They said, "Given that the SR Server was hosting a blatantly criminal website, it would have been reasonable for the FBI to 'hack' into it in order to search it, as any such 'hack' would simply have constituted a search of foreign property known to contain criminal evidence, for which a warrant was not necessary."

Comment: Re:waiving my consultancy fee today (Score 1) 124

First translate the algorithm into Perl, and then run it on a Perl interpreter written in BrainFuck, of which the BrainFuck interpreter is written in APL, which runs on a machine language written for a drum-based OS from the early 1960's.

You shouldn't knock Visual BASIC like that...

He who is content with his lot probably has a lot.