Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:if that's true, (Score 1) 131 131

I don't care about whether you can prevent sharing with your friends on FB it whatever, what I care about is me not having to alter my network settings so that if I give you access to my WiFi network, you sharing MY network information with the pwoe you're "friends" with.

Comment: Re:Not Exactly.... (Score 3, Interesting) 131 131

That isn't the issue. The issue is YOU being able to share MY WiFi key because I was dumb enough to let a Windows 10 user on my WiFi network. This is akin to me giving you the keys to my house so you can housesit, and you getting a hundred copies cut and distributing them to a bunch of people you know.

Comment: Re:Every SSD WIFI Password ? (Score 1) 131 131

Thank you for being a friend,
And sharing WiFi passwords there and back again.
You're giving me the WiFi key of your favorite restaurant.

And if they came to your dorm,
Invited everyone you knew,
You would see the ugly guy at the back downloading kiddie porn,
And the FBI would raid you singing "Thank you for filling our jail!"

Comment: Re:No (Score 1) 131 131

Inflammatory Mode On: Why in the fuck would even want to opt-in to such a service? If it's private WiFi, it's likely to be at my home or my workplace, and in either case I absolutely do not ever want to share that over fucking Fuckbook, Twatter or whatever stupid lame-ass soshial neshworking crap site becomes the next biggest and greatest.

Rational Mode On: Now let's imagine that my organization has a private WiFi hotspot available for employees and a few others. I do not ever want to have those keys shared outside that group, nor should I have to change MY network with an "_optout" on the end of an SSID. I would consider that a breach of security. Sure, I'll probably be able to disable Windows devices that are domain members via GPO, but if they're not actually devices belonging to the organization, or "Pro" versions of Windows where it even knows what the hell Active Directory is, then MY network is being compromised by this service.

This is just a plain bad idea, whether you're being reasonable or inflammatory.

Comment: Re:Iran is not trying to save money (Score 1) 267 267

A bit before 1970 many places, even Egypt, South Africa and Indonesia had nuclear weapons programs (which didn't get far) - plus even Turkish and Australian governments were considering starting one. Turkey got as far as trying to get approval for a CANDU reactor to make weapon material (as India successfully did later to make their first bomb) while Australia just talked about it at high levels of government leaving us to read about it in sheer disbelief years later when the papers were released.

Comment: Re:Don't strawman me (Score 1) 113 113

Last decade, when you were doing this shit

Bit longer than that and still doing it. Why bother to quote something if you haven't read and comprehended it?

Twenty-year-old back-ups?

Indeed. Even though that's a bad idea with media life and formats there's a lot of material that fits that description, especially in the geosciences and some other applied sciences. It's something I have to deal with several times a year with some clients even providing tapes from the late 1970s.

Comment: What's with the misrepresentation? (Score 1) 113 113

Losing an encryption key is one of the most minor risks I can imagine

It's both potentially a complete showstopper and totally unnecessary in the first place. I don't really understand why you cannot grasp the concept.
I'll restate something above in another way - if you can't work out how to do a bare metal restore on a single system with all the needed data on media that you can read and the right hardware then somebody has seriously fucked up. That guy that worked there should have put something together in such a way as someone with a moderate skillset can work it out, or someone with detailed instructions can do it with very little in the way of skills. Requiring a key that can be lost is a major fuckup waiting to happen. You suggested you wouldn't be able to work it out in a couple of hours - I think you were selling yourself short to try to make a point just as your ridiculous strawman in my name "with no foreknowledge of their systems" WHEN THE ENTIRE POINT is to PROVIDE FOREKNOWLEDGE OF THEIR SYSTEMS by having disaster recovery documents designed to be read by the least skilled person capable of doing the job.

Real computer scientists don't program in assembler. They don't write in anything less portable than a number two pencil.