Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:Ask your friend (Score 1) 191

There is a difference between "noticed" and "went looking for", my assumption is that the friend actually went looking for it, knows which sites are "sketchy" etc. My point merely was that if you trust the friend enough to know how to do this, know what they are looking for etc. then they also would be the ones to give you further advice. This person has far more information than everyone guessing here.

Comment Ask your friend (Score 2) 191

"That, and a friend who noticed a lot of strange activity coming from my phone's IP"

Sound's like your friend is a load more steps ahead than the rest of us, who have none of the information he was working to. He noticed somehow (no detail here), and he know which sites and which he believes are sketchy. Sounds like the best source of help is this friend.

Comment Re:Web sites (Score 1) 277

I have no problem understanding that the idea something is "encrypted" without further definition doesn't amount to much, though I'd argue that even with weak encryption it's still not being applied, since it's only actually encrypting a header not the file, so at best that's "partially encrypted"

What's more important though is what would a reasonable man understand the product to be - it's calling itself a vault and it's claiming to encrypt stuff, I don't think it's an unreasonable conclusion that means something more than the trivial scheme apparently employed.

Comment The problem is... (Score 1) 144

The normal problem is that the majority working with spreadsheets as the summary suggests never do enough of it to get good or understand what's bad.

I remember Y2K and being handed a ruck load of foxbase code a team had written to make work for Y2K, since it was now ITs problem to sort it all out. The easiest thing to do with much of it was scrap it and rewrite it to do what they actually thought it did rather than what was coded.

Comment Re:Stupidity at it's finest... (Score 1) 188

Wasn't one of the complaints that when it came to removing things like child porn, they removed it entirely, whereas for copyright infringement they just removed the specific link and left other links to the same content in place.

By doing the two differently, they certainly left themselves open to the charge that in fact there "relatively good job" was in fact knowingly superficial.

Comment Re:Shouldn't this be a civil case? (Score 1) 86

Many DDOS rely on using "infected" computers of the masses, it appears to me that the targets as big corporates are only one aspect of this case. Misuse of many individuals equipment (and who knows what else these infections do), use of excessive bandwidth which could be costing someone somewhere (for the potential zombies being used , individuals on non-unlimited plans could be paying for excess bandwidth personally).

So to paint this as helping Sony/MS rather than the general social ill it is, is disingenuous.

Not to mention, computer misuse laws have existed for years, and the government haven't made any sort of spectacle of this, I don't believe they've commented on this in any significant way.

Comment Re:Simpler Solution (Score 1) 326

And I'd think most of those ideas suffer various problems too. Most ideas trying to solve social problems end up over-engineered and even more so when trying to iron out the problems.

There are plenty of people with mobile handsets which number other than 1.

Those with 0 for example, either through battery being dead, stolen, lost, quick run to the shops without picking up a phone or simply choose not to have a phone. We seem to now be blocking them from using the car. Well I guess we'll need to engineer some sort of override to allow for that? Now the system without the override is a worse experience for most people, but being the same law abiding, socially caring people who wouldn't text whist driving anyway, they won't use the override except in a genuine situation right?

More than 1, well I guess that only one is blocked so no problem texting etc. as we go. I guess we could implement the cell site thing to ensure all the phones in the car connect to that right? Well what about passengers in the car etc. Guess we need some vision systems so the car can also see who is operating the car and the phones?

And whatever you do you can bet those who are willing to break the law still will, they'll find a way of getting around it. So you still need to find ways of actually enforcing the law anyway...

Comment Re:Broadcom don't deal with little guys (Score 1) 165

That still seems to support the basic underlying proposition though. Something which had appeal to the little guy ended up leading to use of that which ultimately led onto a a successful business initially at least based around that product. If MOS has kept it's key staff involved and developed the line further who knows where that could had led.

Comment Re:Hardkernel wasn't using Broadcom SoC anyway? (Score 3, Informative) 165

No, the linked article says they are better known for their Exynos based products, this board was supposed to have the broadcom chip.

"none of them have made use of the same Broadcom BCM2835 SoC as the Pi, so none of them (until now) have been software compatible."

And the labeling on the picture shows the chip to be used.

Can anything be sadder than work left unfinished? Yes, work never begun.