Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: "People need to know — the public needs to k (Score 2) 241

by mitcheli (#49111279) Attached to: In Florida, Secrecy Around Stingray Leads To Plea Bargain For a Robber
Whether or not the use of this technology is a violation of Constitutional Rights is really up to a Judge to determine. And as for "the people need to know", that's really pointless. The people are powerless to prevent the use of such technologies if their elected officials aren't doing anything to prevent the use of such technologies. The nature of globally connected communications in this era leaves open the avenue for exploitation of technology across vast distances. Cell phone intercepts, such as the ones in the article, firmware exploits such as the ones published last week, and any other manner of exploits are going to define the new normal. Unless laws are passed (and with the Patriot Act, I have sever doubts) that prohibit not only average citizens from engaging in these activities, but law enforcement as well, then we just need to suck it up and deal with it. For professionals in our field though, this does present us an opportunity to review our standards and identify logical risks associated with them and then to redefine them to take privacy and security in mind. Encryption designers need to up the bar and create stronger and more secure algorithms. Right now, there are only a small handful of manufacturers looking at this level (black phone?) but even they aren't digging deep enough.

Comment: Non-repudiation (Score 4, Insightful) 129

by mitcheli (#49021591) Attached to: The Technologies That Betrayed Silk Road's Anonymity
The advantages to Encryption and defense-in-depth strategies is they are based on the triad of information assurance, one key of that is "non-repudiation". The "downside" to non-repudiation is the ability to connect the dots come litigation time. Interesting that they mention that the SSH sessions used key based authentication when the opposing attorneys claimed that anyone can name their systems "frosty" and use the login name "frosty". My question is, did the key on the laptop that was supposedly logged in as "frosty" also correlate to the key on the server? If so, the "anyone" list just got a lot smaller.

Comment: Second amendment zone of lawlessness (Score 5, Interesting) 431

by mitcheli (#48925291) Attached to: Justice Department: Default Encryption Has Created a 'Zone of Lawlessness'
Has anyone considered looking at this from a Second amendment perspective? If we are not to pass laws prohibiting the right to bear arms in order to establish a proper militia, has it not been considered that the command and control of said militia would also be as equally important? If so, then would it not be fair to assume that military grade encryption standards (read: non-exportable encryption) would by nature also be protected weapons systems? Granted, I know that arms exports has a litany of laws and the average Joe American can't just walk down the street buy an over the shoulder rocket launcher, but one would think that the ability to communicate securely for defensive purposes would in and of itself constitute protection under the Second Amendment? Or am I just reaching here?

Comment: Nothing good can come of this. (Score 1) 114

by mitcheli (#48884457) Attached to: Apple Agrees To Chinese Security Audits of Its Products
So, what do we think? Will the Chinese Government use this opportunity to provide valuable input to Apple on security vulnerabilities that they discover to help better secure Apple products? Or will they squirrel away the things they discover to their Intel agencies? My bet's on the latter.

Comment: Re:How depressing... (Score 1) 81

by mitcheli (#48829945) Attached to: Washington DC's Public Library Will Teach People How To Avoid the NSA

So, fight or don't fight your your rights, I don't care. But keep your fucking hands off mine. The rest of us haven't consented to this horseshit by the NSA.

But that's the NSA's job. It's posted in their mission statement on their public website. And news flash. If you think that whatever country you're in isn't doing the same damn thing... Then you're delusional.

+ - Amazing reduction in privacy->

Submitted by AtWorkInChicago
AtWorkInChicago (3985011) writes "An Atlanta-based company, AirSage, collects real-time data (15 billion data points every day) from cell phone tower interactions — whenever a person sends a text, makes a phone call or when a phone is searching for the next cell phone tower.... ...Because AirSage knows the home (or where the device seems to call home and sleeps on a daily basis) and its Census Block Group, it can infer demographic information (such as average household income) about the devices’ owners.
I'm surprised carriers are allowed to send this data to a commercial aggregator and more surprised that the company is allowed to sell details of my daily activity to any who will pay — am I being naive?"

Link to Original Source

Comment: Re:How depressing... (Score 1) 81

by mitcheli (#48820345) Attached to: Washington DC's Public Library Will Teach People How To Avoid the NSA

Getting around a surveillance state which has declared itself to be legal and legitimate ... well, guess what, demanding your rights now is subversive.

... declared itself to be legal ...

I love how we use this phrase as if to imply that the government has somehow changed the rules on it's own without the consent or will of the people. All of these changes stem from the Patriot Act that followed September 11th. Which was voted into law by the Representatives that we elected. How many people actually read the Patriot Act? How many people chose to attend the House and Senate sessions where the nuances of the act were debated? How many people actually wrote to their legislators in opposition of the act? How many people actually chose to vote against the law makers that made this legal? The US is not a surveillance state that declared itself legal. The US is a Republic that grants the authority to pass laws into the legislators that we elect. Those law makers represent us. If we're not happy with the work they're doing we can do a number of things, first and foremost we can kick them out of office, next, we can choose to run ourselves and work to change the system, and third, we can actively protest our grievances. If people don't like the way it works, then it's incumbent on them to work to change that system.

Comment: Re:FBI also does counter intelligence (Score 1) 52

by mitcheli (#48796797) Attached to: FBI Access To NSA Surveillance Data Expands In Recent Years
The problem is when someone like Senator McCarthy comes along and decides that some group of people (Communists) are a threat to our society and need to be systematically monitored, imprisoned, etc... Question is, how will the protections by the Church commission come into play in this broadened surveillance scheme?

With the increasingly violent actions of some of the radical offshoots of Islam like ISIS and BOKO HARAM, how long do you think it will be before we have Senators asking for ISIS to be kept in check? And what if that look for ISIS extends to inside the US? Then what?

What the world *really* needs is a good Automatic Bicycle Sharpener.