Please create an account to participate in the Slashdot moderation system


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Innocent until blogged about (Score 4, Informative) 666

by thequux (#44082623) Attached to: Security Researcher Attacked While At Conference

A friend of Georgia's connected her to the US embassy; she ended up using my girlfriend's cell phone to call the police by dialling 112. (random question: how many Americans know that that's the international GSM emergency number? My guess, not many.) Still, there was a whole bunch of "not my problem" going on on the part of the hotel staff; they spoke English just fine until we asked for them to call the police; after that, the only words they said were "No speak English".

Comment: Re:Innocent until blogged about (Score 1) 666

by thequux (#44082607) Attached to: Security Researcher Attacked While At Conference

The fundamental problem was only partially getting the police to file the police report. The main problem was that after the report was filed, she would have had to come back to Poland at an unpredictable time for the trial, entirely on her own dime, which is not really an option for a freelancer in the States.

Comment: Re:P2P is not inherently illegal (Score 1) 288

by thequux (#19420823) Attached to: Safemedia's CEO Tells Congress He Can Stop P2P
Uhhh.. I would find this very hard to believe, as:
A) Encryption is very difficult to detect. Suppose that I were to chose 256 words in some language, and encode each byte as one of those ("zero", "one", ..., would do). If ISPs were to block that, then they'd be likely to block massive amounts of legitimate moterial as well. Further, this would catch other forms of binaries, such as zip files being downloaded.

B) As detecting encryption is difficult, they might detect protocols, which would catch most P2P. However, if SSH is included, it means that they've added a special filter

"Mach was the greatest intellectual fraud in the last ten years." "What about X?" "I said `intellectual'." ;login, 9/1990