Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:revolutionary technology (Score 3, Informative) 172

Dunno how things are done in the US, but ballot boxes are sealed here (with actual lead / hard to change seals). The boxes are then couriered (with several different people accompanying the box) to a central location. There are various different registers that show who has attended the vote, what papers have been used. ie. Double Entry. with different people responsible for each register. Usually with a completely separate observer overseeing the ballot box.

At the count all the politicians and representatives can watch the boxes opened and counted. The teams responsible for counting boxes will not know ahead of time which box(es) they are counting. There are careful initial checks to count the papers, to ensure they tally with the registers. There are usually teams of about 8-9 people per box, with an overseer. The room is sealed / guarded. Politicians and representatives can ask for a recount. It is done then and there.

Any deviation from an X in one box on the voting paper, is carefully considered by a team of very senior well trained staff, with a very comprehensive manual to consider all the various ways that a vote can be considered valid or spoiled.

It would take an amazing level of conspiracy and corruption to rig a count in the UK. There are no volunteers, these people are usually paid (and paid well enough) for their role in the ballot and count. Consequences for interfering with the vote in any way are harsh and will include criminal charges as well as most likely loss of employment (staff typically are Local Government staff).

All these protocols would expose fraud or deception quite easily. It'd be simpler to put a gun to people on the way in to the count and tell them who to vote for and check they do this, than to actually create a convincing scenario where the count itself is corrupted.

I know techies often think traditional paper counts are more open to abuse, absolutely no way. If you've ever been at a count or worked with the people at the polling stations you would understand. The only problem is that a vote is expensive with all the oversight and double checking.


Comment Brilliant - This means... (Score 4, Interesting) 115

That the Gov cannot gain access to modern Apple and Microsoft devices. This legislation wouldn't be necessary otherwise. Microsoft and Apple have genuinely closed the encryption / key loopholes that would allow the authorities to force them to unlock these devices.

This is excellent news, now just to get this bill junked.


Comment Re:Can Apple push extra software on the device? (Score 2) 225

Yes sure, you can enroll an iOS device in MDM and then send it an unlock command. The end-user has to agree and approve this first of all of course.

Apple have built the system so that it is immune to a direct unlock. Apple and Microsoft have been giving clear signals that they no longer want to be stuck in the middle of international legal / court disputes requiring them to unlock under court order. So they've re-engineered their encryption and unlock protocols so that they no longer hold any master keys / unlocks etc. This also makes these devices useless when stolen.

The only slightly questionable part is wether they can access any cloud backups. Although that might not be what the court asked.


Comment Re:What's the point of "shaming"? (Score 1) 70

I disagree with your analysis. It's all about knowing the level below which people might pay without involving the authorities. 50 BTC is at the point that pretty much any business might find it in their interests to pay, rather than involving the authorities, expensive IT consultants or down-time. I've been holiday mugged twice - both times the attacker deliberately demanded such an insignificant amount that I never bothered reporting it or fighting it.


Comment Re:Possible! (Score 1) 122

Not intended to mislead, a mistake, a pretty easy one at that. Given it's shown up when you are on the UK page.

Why you think people would use cell phones in embassies for important conversations when you would instead be using a secured or encrypted line?

A stingray outside parliament would get rather overwhelmed with all the tourists.

If the government wanted to spy on itself, there are easier ways than this.


Comment Re:That is cool (Score 1) 12

It's saying that the reason why so few police requests are received is due to the fact that snapchat can only produce information on unopened snaps (or stories). Most police investigations are in response to an event that has happened, rather than something they anticipate happening. The police would have to be exceptionally lucky to time the warrant to hit after the message has been sent, but before it is opened.


Comment Re:This is pretty common. (Score 2) 193

It depends on the copy. Non-OEM licenses are usually transferable to another computer. You can of course sell that digital copy installed on a computer. - assuming it's not an upgrade SA right.

It wouldn't be strictly legal to sell a computer with one of these amnesty copies.

I've never used phone support, but yes they do offer it for Office and Windows, I'm pretty sure it's free, but time / case limited.



I have a theory that it's impossible to prove anything, but I can't prove it.