Forgot your password?
typodupeerror

+ - AT&T, Verizon, and Comcast are working together to screw you.->

Submitted by jon787
jon787 (512497) writes "In Michigan, AT&T is trying to screw over customers by getting the state to deregulate the bulk of the telephone business. In particular they want the right to drop landline service completely. Verizon and Comcast are playing along because they want a piece of the pie as customers find new services."
Link to Original Source

+ - AT&T, Verizon Attempting to Get Government Approval to Cut Off Competitors.->

Submitted by Anonymous Coward
An anonymous reader writes "In Michigan, Senate Bill 636 will remove any remaining requirements of AT&T and Verizon to lease lines to other providers, effectively killing all competing phone and internet providers, including wireless providers, which rely on leasing any connectivity from AT&T or Verizon. Readers should not be fooled by the title of the bill into thinking it only applies to a hard-wired phone line coming into their home or office. What the consumer calls a landline differs greatly from what the law calls a landline."
Link to Original Source

Comment: Re:The battle now begins. (Score 4, Informative) 407

by jon787 (#39543241) Attached to: Teacher's Aide Fired For Refusing To Hand Over Facebook Password

I believe the legal term is tortious interference and Facebook could pursue civil action for it. Possibly even pursue criminal action under the CFAA by arguing it is still unauthorized access despite the fact that the password was disclosed.

"Tortious interference with contract rights can occur where the tortfeasor convinces a party to breach the contract against the plaintiff, or where the tortfeasor disrupts the ability of one party to perform his obligations under the contract, thereby preventing the plaintiff from receiving the performance promised."

Comment: Re:But but but (Score 5, Interesting) 536

by jon787 (#34556576) Attached to: FBI Alleged To Have Backdoored OpenBSD's IPSEC Stack

Ah the old NSA DES conspiracy theory. The NSA suggested two changes to DES: 1) shorten the key 2) changed the S-boxes. They gave no public explanation for the latter and for years the story was that this somehow introduced a backdoor into the algorithm. The truth came out over a decade later:

"Some of the suspicions about hidden weaknesses in the S-boxes were allayed in 1990, with the independent discovery and open publication by Eli Biham and Adi Shamir of differential cryptanalysis, a general method for breaking block ciphers. The S-boxes of DES were much more resistant to the attack than if they had been chosen at random, strongly suggesting that IBM knew about the technique in the 1970s. This was indeed the case; in 1994, Don Coppersmith published some of the original design criteria for the S-boxes. According to Steven Levy, IBM Watson researchers discovered differential cryptanalytic attacks in 1974 and were asked by the NSA to keep the technique secret."

Of course, they could still be lying, better keep the tinfoil hat on.

Comment: Re:TFA is useless; here's the actual order (Score 1) 439

by jon787 (#33909988) Attached to: FCC Approves Changes To Cable Box Rules

From the TFO (the fraking order):

In this Third Report and Order ("Order"), we remedy shortcomings in our CableCARD rules in order to improve consumers' experience with retail navigation devices (such as set-top boxes and digital cable-ready television sets) and CableCARDs, the security devices used in conjunction with navigation devices to perform the conditional access functions necessary to access cable services.

Maybe they should get around to actually implementing the provisions of the Telecommunications Act that requires the cable system to be open to innovation!

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (4) How many times do we have to tell you, "No prior art!"

Working...