Forgot your password?
typodupeerror

Comment: except that it didnt. (Score 3, Insightful) 302

by nimbius (#47417589) Attached to: Tor Project Sued Over a Revenge Porn Business That Used Its Service
Tor isnt a service, its a technology and accompanying data protocol. There is no corporate entity or backer that "crontrols" the network or if there were, the federal government would have beaten this attorney to the punch long ago. Its like trying to sue LUKS deveopers for a hard drive that cant be read by the NSA.

Comment: apply this technology where it counts. (Score 4, Funny) 83

by nimbius (#47416911) Attached to: A Brain Implant For Synthetic Memory
If this truly life enriching technology comes to fruition I expect America to do that which is most needful and apply it to politicians first. Imagine having an elected represenative with the cognitive ability to make ethical decisions and prudent judgement during legislative sessions that may involve a declaration of war in which american soldiers will often likely return from battle with signifigant brain trauma. This next-generation of politician could one day come to understand the moral and sociopolitical repercussions of things like intentionally shutting down the government. With this helpful medical implant, one could marvel at a world in which the average congressman understands and acknowledges once baron concepts such as the impact of climate change, or even homosexual marriage.

Comment: translating for the athiests. (Score 5, Informative) 138

by nimbius (#47415035) Attached to: Physicists Spot Potential Source of 'Oh-My-God' Particles
For those of us scientists who hold Christ-gods and sky friends as important in our lives as an empty roll of shit-tickets or takeaway flyers:

God Particle: the Higgs Boson.
Oh-My-God Particle: ultra-high-energy cosmic ray (most likely a proton) detected on the evening of 15 October 1991 over Dugway Proving Ground, Utah.

other particles we find similar to it could be given normal names like UHE particles, or super high energy rays but that doesnt secure grant funding in the theocratic Mormon state of Utah.

Comment: this is not for your benefit. (Score 4, Interesting) 343

by nimbius (#47408937) Attached to: Here Comes the Panopticon: Insurance Companies
insurance companies are taking a page from social media and hedging their bets that you will concede to them monitoring your every waking movement. In most cases you arent told what exact amount you stand to save on insurance until after the metric is collected, and its usually very little (between 5-15%) You arent even told what metrics that little box is collecting or how theyre used, or how long theyre maintained. Most of the information they keep with these snooping devices becomes proprietary once you sign up. So why are you so ill informed about this?
its largely because insurance companies are using the metrics to forecast profit and loss to their board and shareholders, not because they actually care about saving you money. In some cases signing up for a biometric program might quietly absolve the insurance company from having to treat you for a whole range of different ailments they attribute to a sedentary lifestyle, thus saving them in quarterly losses. The worst part is nobody is asking questions like 'does this fitbit factor into my HIPAA protection?' or 'can this vehicle data be used against me in a court of law?'

full disclosure: im signing up for a workplace fitbit program subsidized by my employer. The data, presumably, is going to be aggregated from the devices and submitted to the health insurance company as "harmless biometrics" but as I cant sign up for my employers healthcare for another 7 months, I have no intention of using the device outside of the data i scrape from it in linux using fitbitd.

Comment: as its been said, hackers unite. (Score 1) 149

by nimbius (#47407571) Attached to: Coddled, Surveilled, and Monetized: How Modern Houses Can Watch You
In the words of stallman and an innumerable mass of others, hackers must unite to make these new tools truly subservient to their owners. FitBit manufactures a vital signs system that has a GIT project designed to make the data yours, not the clouds. WiThings by default wishes to beam your data to a shared hosting server somewhere in europe, but dedicated hackers have worked to show users how that data can be intercepted and secured within the confines of the users home, for the users benefit, and no one elses. Virtually every other application, from home automation to thermal monitoring and control has a hackerspace alternative to the glitzy and well-marketed mainstream platform, especially DVR and home surveillance systems.
its incumbent for us as well as others to realize however that privacy and security from these devices is our soverign responsibility. If you choose home automation then ensure the applications and technologies you see fit to expose yourself and family to are held to an ethical standard of operation and always subservient to you, the user. here are a few options:

Instead of smartthings consider leviton home automation systems and invest a bit of time to learn how to install them. nothing has impressed my guests more than a room with futuristic proximity-based lighting controls.

be vocal about your electrical metering equipment. in my case I wrote a formal complaint to my power company about the digital meter that had been quietly installed at my home. The meter was removed and the old one returned to service.

instead of nest consider thermal controllers similar to johnson and honeywell but at a fraction of the cost on amazon. 1wire sensors, a raspberry pie and a relay board maintain the temperature in my home and garage

I have a camera system for the back yard and garage, but they relay to a PCI board and are stored, encrypted, in 30 day rotations. I transcode 10fps weekly's for occasional review over SSL into webm files.

Comment: just the usual shenannigans,. (Score 0) 175

by nimbius (#47406961) Attached to: US Arrests Son of Russian MP In Maldives For Hacking

The Justice Department declined to say where Seleznev was arrested.

So, just randomly stuffed into a van by the secret service or what? for those not in the united states, the Secret Service is our government law enforcement division that handles major financial crimes. Guam is a US Territory. it cant vote in congress or senate but its residents are considered US Citizens.

The indictment, which was unsealed today

so this guy was indicted but never knew about it? or we filed an indictment and just didnt tell anyone at all? Sometimes we do this because the statute of limitations is about to run out, but when is it appropriate should we decide to indict a foreign politicans son? how would diplomatic immunity work? had russia waived he right to it? its just another example of how american law is enforced at discretion and arbitrarily.

the guy allegedly only profited 1.2 million dollars for his scam and for regular stiffs thats quite a bit. However, what the hell do we hope to accomplish arresting him? the financial collapse of 2008 surely claimed more than a trillion dollars in fraud as well, but we never once considered arresting a banker. Leveraging this as part of our commitment to sticking our dick in Ukrane is absurd as well, but probably something we'll shoot for anyhow considering our policymakers never got the memo about the end of the cold war, the dismal failure in iraq and afghanistan, and the decline of the United States as a global superpower in general.

Comment: Time Warner cable is actually better? (Score 2) 110

by nimbius (#47404081) Attached to: YouTube Issuing "Report Cards" On Carriers' Streaming Speeds

of the two major providers in my area, Time Warner is actually better (for youtube video quality) which i found rather shocking. That having been said, they do suck on a number of other levels.

1. things like recursing your own DNS with unbound or other software will get you added to their redirector for "unwanted/malicious traffic." basically, you're robbing them of SRVFAIL ad revenue and they dont like it. Encrypting lots of traffic or using encrypted IRC also seems to trigger this shit, which is easily circumvented by not using their DNS.
2. signup isn't mandatory if you handle your own DNS, but again if you dont then expect to never get to the internet. Signing up means downloading their software, creating an email address, agreeing (again) to the ToS despite signing it on installation. you also get to opt into their advertising.
3. two words: bulk mail. You'll get at least 3 or 4 letters a month reminding you to upgrade to the bundle or a higher data rate. higher data rates arent required when you null-route advertising servers and use noscript/adblock.

Comment: i dont know how much more i can take. (Score 4, Interesting) 359

First i was an extremist because I visited, and posted, to slashdot. then i was an extremist because I used tor, then again because I used crypto on my laptop, and again for reading wikipedia...and once more im an extremist for reading the linux journal?

At what point in my extremety should I start endorsing things like sports drinks and shoes? Am i still allowed to drink tea in the morning or does this mean i need to switch to energy drinks and techno music. Does this work like GTA? can i take up knitting and become less extreme instead? Do the kids know im extreme? I mean the only un-extreme thing i seem to have been able to do last year was buy this Model M keybo0@0#69t@[NO CARRIER]

Comment: more last-mile hillarity. (Score 2) 112

by nimbius (#47378635) Attached to: FCC Proposal To Limit Access To 5725-5850 MHz Band
This spectrum was introduced in 1997 to augment the "last mile" cost for rural subscribers, particularly schools and libraries. It doesnt come with license fees and as such is widely used by private industry to provide internet access to paying customers who live in the middle of nowhere (many of whom dont even have cellular service.) the existing bandwidth peaks at a blistering 25mbit.

as an amateur radio enthusiast, U-NII band reform is a long time coming and private companies have a huge incentive to get you to oppose it. thittesd0375 doesnt say it, but these arent petitions you're filing either, they are official FCC proceedings and considered a complaint, which is very different than the change.org crap that shows up on slashdot one a month. holding on to this band plan and its users is an easy way for telecom companies to quietly interfere with projects that would actually help citizens like wimax and municipal gigabit/wireless. If you have any respect or concern for the people being screwed over for 25 megabit service initially intended for public education around the same time AOL was all the rage, you should probably avoid this slashdot article entirely.

Comment: in short, there arent. (Score 5, Informative) 146

by nimbius (#47377595) Attached to: Ask Slashdot: Hosting Services That Don't Overreact To DMCA Requests?
The letter of the DMCA law works hard to make sure people who do not react properly to the issuance of a DMCA face rather brutal punishment. This is partly because of the history of infringement on the internet, that major companies like godaddy simply couldnt be reached while other emerging companies barely had offices and just ran local mom-and-pop shops. record labels crafted the DMCA, the incisors of their efforts based on the industries lack of a standard to handle legitimate problems in a timely manner.
the other reason the punishment is pretty brutal, is because record label recording industry protection rackets and even record labels themselves had been brutalized for almost a decade by declining sales in favour of a far more reasonable distribution method: the internet. Locking down everything from unsigned independent artists with DMCA takedowns as well as fair-use snippets meant the industry could keep its fat foot wedged in the door music and talent with relatively little blowback (its their law after all..) the DMCA, one could argue, is also part of the reason the Youtube music awards were basically an advertisement campaign on behalf of the largest record labels in hollywood as it can be used by, and only by, the industry to take out mafia style hits on published independent content through the much maligned 'frivolous DMCA takedown.' Sure, other groups like the church of scientology have tried this in the past, but only the record industry has emerged without punitive retalliation from online services.

What I think i can do is offer a hosting solution that has decent tech support for when these takedowns happen. Try Dreamhost.com, who actively oppose most draconian legislation against the internet like SOPA and PIPA. Vote with your dollars.
full disclosure: i used to work for Dreamhost.

Comment: for christ sake stop comparing things to NASA (Score 5, Informative) 225

by nimbius (#47375325) Attached to: Senate Budgetmakers Move To End US Participation In ITER
The numbers get rather large here, but that shouldnt matter. if NASA is our shining example of the commitment to scientific progress, then its so low on our list of priorities as to be a pointless comparison.

the DoD has an annual budget of over 500 billion dollars.
the USDA has a budget of 109 billion dollars.
the department of homeland security has a 60 billion dollar budget.
the department of justice has a 26 billion dollar budget
NASA has a budget of 18 billion dollars

So if one were to read these budgets as an expression of the will of a nation elected by and for its people (i know its a laughable presumption but stick with me here) then our priorities are
shitty food thats killing us
the neverending war against everything
Airport anal probefest 2015
mass incarceration
NASA, the agency thats congressionally barred from collaborating with china or russia, and is expected by every reigning politician to turn a quarterly profit or die in a gutter.

At this point the fact that we gifted europe 75 million dollars for a project to assess the fundamental tenability of fusion should be considered a treasonously accidental oversight. thats a whopping six whole percent of the NASA budget that we wrecklessly applied to the concept of an energy source that would user in apocalyptic levels of productivity and peace.

Comment: America has a rich tradition of this (Score 4, Interesting) 271

by nimbius (#47369877) Attached to: Amazon Sues After Ex-Worker Takes Google Job
Robert Parker and Anthony Johnson in 1654 was possibly one of the first documented cases of this. One of Johnsons servants, John Casor who was brought over from Africa, claimed he was under a 'seaven or eight yeares' contract and that hedd completed it. Thus, he asked Johnson for his freedom. Johnson didnt see things this way, and denied the request. Despite this, according to Casor, Johnson eventually agreed to allow him to leave, with pressure supposedly coming from Johnsons family who felt that Casor should be free. Thus, Casor went to work for a man by the name of Robert Parker. Either Johnson changed his mind or he never said Casor could go, because he soon filed a lawsuit against Parker claiming that Parker stole his servant, and that Casor was Johnsons for life and was not an indentured servant.

Comment: perhaps a slice of crow for the US? (Score 2) 86

by nimbius (#47360341) Attached to: Western Energy Companies Under Sabotage Threat
America patented this handy attack vector during the cold war. the CIA once destroyed a gas pipeline in 1982 by hacking malicious controls software into a system purchased by them from canada.The pipeline software that was to run the pumps, turbines and valves was programmed to go haywire, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to the pipeline joints and welds.
Again, the US did this in 2010 in collusion with Israeli Mossad, who were at the time busy with bomb attacks against key nuclear scientists in Iran. Stuxnet was meant to sabotage the uranium enrichment facility at Natanz. The worm worked by first causing an infected Iranian IR-1 centrifuge to increase from its normal operating speed of 1,064 hertz to 1,410 hertz, causing repeated stress and ultimately failure.

now the cows have come home. America is finding itself on the receiving end of increasingly sophisticated attacks against its 60 year old reactors and control systems by proxy. smaller western nations use the same GE technology and concepts while arguably being 'under the radar' enough to avoid major investigation into penetrations that would result in increased security of these systems by the US, or so i suspect the prevailing theory would be. It is no longer a matter of if, but when we as a country will take a seat for one of our famous 'teachable moments'

Never underestimate the bandwidth of a station wagon full of tapes. -- Dr. Warren Jackson, Director, UTCS

Working...