Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: Re:What rhymes with "douchebag"? (Score 1) 308

by kualla (#48374453) Attached to: AT&T To "Pause" Gigabit Internet Rollout Until Net Neutrality Is Settled

It really makes me wonder why Google Fibre isn't much more aggressive at getting into the marketplace?? If I was Google, I would come out with an announcement of an additional few cities they plan to immediately get to hooking up for fibre internet. They could even use ATT's press release to take a big stab at them, plus it would give investors more confidence with the lack of competition from ATT!

Comment: Great American firewall for China?? (Score 2) 76

by kualla (#48374203) Attached to: US Weather System and Satellite Network Hacked

Maybe the USA needs to build a firewall that blocks all of China.... What I don't get, is how do we always know it is China, when all they need to do is use some VPN's and proxies to hide their location? They can break into satellites and every damn other thing, yet they don't take 2 seconds to hide their trail. Makes me think China is an easy scape-goat, otherwise China is giving a big middle finger to the US... Or maybe another country wants the USA to get pissed at China, by making the attacks all look like they are coming from China.

Comment: Be considerate for TOR use please. (Score 1) 68

by kualla (#48147317) Attached to: Tiny Wireless Device Offers Tor Anonymity

"A promotional video suggests several uses for the device, including using it to securely share Internet access with family and friends, or to stream live audio from sports games that are blocked in a specific region. "

First off, this is great project, but their promotional video makes me a bit upset with this company... Encouraging people to use this to get around blocks to allow streaming of their favorite sports game is just wrong, the service does not currently have bandwidth to even realistically do that, especially not for a massive amount of people to go out purchasing this device for that reason!

They are basically saying we are going to sell our devices by abusing a free network so we can make profits while carelessly screwing over the reporters that need their anonymity, people who's governments put such tight restrictions on their internet use, allowing the NSA to continue on their rapid spying technologies, and on and on!!!

Now if they sold these devices and claimed they were going to donate a sizable amount of bandwidth based on sales, or better yet make an easy to integrate feature that allows users to share their own bandwidth with the TOR network, then I would not feel so negative towards their promotional video's advertising high-bandwidth consumption such as a sports game!

Comment: RF killer (Score 1) 158

by kualla (#48147229) Attached to: Netflix To Charge More For 4K Video

Anyone consider what this will do to a neighborhood with multiple neighbors who decide to stream over WiFi at 4k? Or worse, an apartment building. There goes your smartphones wifi competing for RF spectrum, or if anything it will try to compete by increasing the transmit to get it's signal heard killing your battery that much faster.

The need for more WiFi spectrum may be rapidly approaching. They need to make a specification that doesn't allow channel bonding, something that is optimized for multiple connected devices that all can get a respectable speed and doesn't allow a small few to consume it all.

Comment: Re:Wow, that's a lot of iterations (Score 1) 220

by kualla (#48147065) Attached to: VeraCrypt Is the New TrueCrypt -- and It's Better

If there is some way to dramatically speed up the decryption that is discovered later on(or discovered and not publicly known), the increase of iterations could be next to meaningless. It is best to use 2 or more forms of encryption than a single form and adding multiple times more iterations to. I am not familiar with the PBKDF2-RIPEMD160 that is used in VeraCrypt, it could already be using multiple forms of proven-strong encryption standards... I do believe TrueCrypt allowed you to select from multiple different forms of encryption as well as using more than one, I would imagine and hope the same with VeraCrypt.

Comment: Re: Oblig xkcd (Score 1) 220

by kualla (#48146993) Attached to: VeraCrypt Is the New TrueCrypt -- and It's Better

It could become automated after simply entering the numbers into a password list to then create a combo list from... It would be interesting to calculate this out to see the strength if they can still torture your pw's system out of you. Maybe first bill first digit, second bill is second digit, and so on, maybe last 3 bills you do some math formula, etc.

Comment: Re:Oblig xkcd (Score 1) 220

by kualla (#48146931) Attached to: VeraCrypt Is the New TrueCrypt -- and It's Better

That is what you would call Plausible Deny-ability I do belive :) Just like what truecrypt has, but this is the non-tech version. Knowing police today, you would get charged with something that amounts to nearly the same crime, like an obstruction of justice along with destruction of evidence, and what not else they have for their plan B when they want to screw someone over.

Comment: Re:Oblig xkcd (Score 1) 220

by kualla (#48146905) Attached to: VeraCrypt Is the New TrueCrypt -- and It's Better

Ya you missed the point...

"Here, the law says they can't compel you to produce an encryption key, except under very particular, special circumstances."

SPECIAL CIRCUMSTANCES is a value of degree that is sadly becoming more and more vague to cover a large amount of people and I wouldn't be surprised if not now, eventually law enforcement will have enough ways to make that include every single person on this planet with their abusive framing tactics.

Imagine if your in China or South Korea, that method could be very useful or even corrupt cops or non-law-enforcement could still use torture on you. You could decide to take that wad and toss it up in the air or not. But at the same time, you could easily loose all your data if anything happened to that stack of bills, making that secret information gone at the cost of having such security system.

I wonder tho, if they beat the method out of you even with the stack of bills all out of order, could they do a combo brute force attack to crack the password??

Comment: TOR's purpose abused. (Score 1) 68

by kualla (#48146605) Attached to: Tiny Wireless Device Offers Tor Anonymity

"A promotional video suggests several uses for the device, including using it to securely share Internet access with family and friends, or to stream live audio from sports games that are blocked in a specific region. "

First off, this is great project, but their promotional video makes me a bit upset with this company... Encouraging people to use this to get around blocks to allow streaming of their favorite sports game is just wrong, the service does not currently have bandwidth to realistically do that, especially not for a massive amount of people to go out purchasing this device for that reason!

They are basically saying we are going to sell our devices by abusing a free network so we can make profits while carelessly screwing over the reporters that need their anonymity, people who's governments put such tight restrictions on their internet use, allowing the NSA to continue on abusing their spying technologies, and on and on!!!

Now if they sold these devices and claimed they were going to donate a sizable amount of bandwidth based on sales, or better yet make an easy to integrate feature that allows users to share their own bandwidth with the TOR network, then I would not feel so negative towards their promotional video's advertising high-bandwidth consumption such as a sports game!

Comment: Re:can be subpoenaed for their data (Score 2) 210

by kualla (#48123067) Attached to: Snowden's Tough Advice For Guarding Privacy

Too bad any long-distance wireless frequencies are regulated and would result in breaking the law with very stiff fines and possible jail sentences. Plus you could be sued from the big telcos for interfering with their paid-for air-waves. Even HAM radio does not allow noise or encryption to be transmitted over the radio waves.

You can always use an encrypted VOIP service I suppose, but technically that is controlled as well, not to mention that the NSA is also developing/buying 0-day exploits so they can break into your computer/router/modem/etc and spy on you that way so even the encryption will not be secure... A bit tin-foil paranoia on that level, but not impossible as it is already being done here in the USA, and who knows how many other things that they are doing that the public is unaware of or how bad it will get into the future.

Comment: Re:How does one determine the difference... (Score 1) 389

Sadly, the prosecution can frame evidence to make you appear guilty by a legal definition, which in reality does not prove guilt.

The so-called burden of proof bar has been lowered to an seemingly vague level of crap! Even technicalities can be found as guilt, resulting in a severe sentence that any moral and intelligent person would think is ridiculous. But because it was a law and it is technically considered to be breaking the law, the judge still comes down with his hammer following his orders like a slave following their master to obey.

Comment: VERY NICE! (Score 1) 66

by kualla (#47126141) Attached to: YouTube Releases the Google Video Quality Report

This is a really great tool!!!

You can look at your ISP and determine by using this tool which hours your ISP's network is running into a bottleneck(peak hours), and as well look at other ISP's to determine bandwidth/bottlenecks. Also, see if other ISP's may offer better deals if you like to have a good connection at peak hours. You can actually see how the ISP's are performing throughout the day, rather than being advertised as X-Mbit connection, only to find out those speeds are only reachable at 3A.M.

This tool is very damn cool, great for competition and could even be used to help determine if throttling is occurring.

Real Programmers think better when playing Adventure or Rogue.

Working...