Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:What a shithole country! (Score 1) 654

USA is no better than any other country when it comes to people that care about not littering their own land! Sad!!!

Garbage full, just throw the trash on the ground, eh? So pathetic everyone blames problems on another person rather than themselves. We are not babies who are incapable of changing a dirty diaper, we are grown adults who are all capable of cleaning up after ourselves! If the garbage is full, be super kind and change the entire garbage out, or at the least, don't throw trash on the ground and litter mother nature!!!!!

Sounds to me like people littering are those angry with Trump and decide they need to take out their anger with polluting the wilderness. If that's not the case, then clearly first-world citizens are nothing more than babies who are lucky to have someone clean up their shit messes!

Comment Re:What rhymes with "douchebag"? (Score 1) 308

It really makes me wonder why Google Fibre isn't much more aggressive at getting into the marketplace?? If I was Google, I would come out with an announcement of an additional few cities they plan to immediately get to hooking up for fibre internet. They could even use ATT's press release to take a big stab at them, plus it would give investors more confidence with the lack of competition from ATT!

Comment Great American firewall for China?? (Score 2) 76

Maybe the USA needs to build a firewall that blocks all of China.... What I don't get, is how do we always know it is China, when all they need to do is use some VPN's and proxies to hide their location? They can break into satellites and every damn other thing, yet they don't take 2 seconds to hide their trail. Makes me think China is an easy scape-goat, otherwise China is giving a big middle finger to the US... Or maybe another country wants the USA to get pissed at China, by making the attacks all look like they are coming from China.

Comment Be considerate for TOR use please. (Score 1) 68

"A promotional video suggests several uses for the device, including using it to securely share Internet access with family and friends, or to stream live audio from sports games that are blocked in a specific region. "

First off, this is great project, but their promotional video makes me a bit upset with this company... Encouraging people to use this to get around blocks to allow streaming of their favorite sports game is just wrong, the service does not currently have bandwidth to even realistically do that, especially not for a massive amount of people to go out purchasing this device for that reason!

They are basically saying we are going to sell our devices by abusing a free network so we can make profits while carelessly screwing over the reporters that need their anonymity, people who's governments put such tight restrictions on their internet use, allowing the NSA to continue on their rapid spying technologies, and on and on!!!

Now if they sold these devices and claimed they were going to donate a sizable amount of bandwidth based on sales, or better yet make an easy to integrate feature that allows users to share their own bandwidth with the TOR network, then I would not feel so negative towards their promotional video's advertising high-bandwidth consumption such as a sports game!

Comment RF killer (Score 1) 158

Anyone consider what this will do to a neighborhood with multiple neighbors who decide to stream over WiFi at 4k? Or worse, an apartment building. There goes your smartphones wifi competing for RF spectrum, or if anything it will try to compete by increasing the transmit to get it's signal heard killing your battery that much faster.

The need for more WiFi spectrum may be rapidly approaching. They need to make a specification that doesn't allow channel bonding, something that is optimized for multiple connected devices that all can get a respectable speed and doesn't allow a small few to consume it all.

Comment Re:Wow, that's a lot of iterations (Score 1) 220

If there is some way to dramatically speed up the decryption that is discovered later on(or discovered and not publicly known), the increase of iterations could be next to meaningless. It is best to use 2 or more forms of encryption than a single form and adding multiple times more iterations to. I am not familiar with the PBKDF2-RIPEMD160 that is used in VeraCrypt, it could already be using multiple forms of proven-strong encryption standards... I do believe TrueCrypt allowed you to select from multiple different forms of encryption as well as using more than one, I would imagine and hope the same with VeraCrypt.

Comment Re: Oblig xkcd (Score 1) 220

It could become automated after simply entering the numbers into a password list to then create a combo list from... It would be interesting to calculate this out to see the strength if they can still torture your pw's system out of you. Maybe first bill first digit, second bill is second digit, and so on, maybe last 3 bills you do some math formula, etc.

Comment Re:Oblig xkcd (Score 1) 220

That is what you would call Plausible Deny-ability I do belive :) Just like what truecrypt has, but this is the non-tech version. Knowing police today, you would get charged with something that amounts to nearly the same crime, like an obstruction of justice along with destruction of evidence, and what not else they have for their plan B when they want to screw someone over.

Comment Re:Oblig xkcd (Score 1) 220

Ya you missed the point...

"Here, the law says they can't compel you to produce an encryption key, except under very particular, special circumstances."

SPECIAL CIRCUMSTANCES is a value of degree that is sadly becoming more and more vague to cover a large amount of people and I wouldn't be surprised if not now, eventually law enforcement will have enough ways to make that include every single person on this planet with their abusive framing tactics.

Imagine if your in China or South Korea, that method could be very useful or even corrupt cops or non-law-enforcement could still use torture on you. You could decide to take that wad and toss it up in the air or not. But at the same time, you could easily loose all your data if anything happened to that stack of bills, making that secret information gone at the cost of having such security system.

I wonder tho, if they beat the method out of you even with the stack of bills all out of order, could they do a combo brute force attack to crack the password??

Comment TOR's purpose abused. (Score 1) 68

"A promotional video suggests several uses for the device, including using it to securely share Internet access with family and friends, or to stream live audio from sports games that are blocked in a specific region. "

First off, this is great project, but their promotional video makes me a bit upset with this company... Encouraging people to use this to get around blocks to allow streaming of their favorite sports game is just wrong, the service does not currently have bandwidth to realistically do that, especially not for a massive amount of people to go out purchasing this device for that reason!

They are basically saying we are going to sell our devices by abusing a free network so we can make profits while carelessly screwing over the reporters that need their anonymity, people who's governments put such tight restrictions on their internet use, allowing the NSA to continue on abusing their spying technologies, and on and on!!!

Now if they sold these devices and claimed they were going to donate a sizable amount of bandwidth based on sales, or better yet make an easy to integrate feature that allows users to share their own bandwidth with the TOR network, then I would not feel so negative towards their promotional video's advertising high-bandwidth consumption such as a sports game!

Comment Re:can be subpoenaed for their data (Score 2) 210

Too bad any long-distance wireless frequencies are regulated and would result in breaking the law with very stiff fines and possible jail sentences. Plus you could be sued from the big telcos for interfering with their paid-for air-waves. Even HAM radio does not allow noise or encryption to be transmitted over the radio waves.

You can always use an encrypted VOIP service I suppose, but technically that is controlled as well, not to mention that the NSA is also developing/buying 0-day exploits so they can break into your computer/router/modem/etc and spy on you that way so even the encryption will not be secure... A bit tin-foil paranoia on that level, but not impossible as it is already being done here in the USA, and who knows how many other things that they are doing that the public is unaware of or how bad it will get into the future.

Comment Re:How does one determine the difference... (Score 1) 389

Sadly, the prosecution can frame evidence to make you appear guilty by a legal definition, which in reality does not prove guilt.

The so-called burden of proof bar has been lowered to an seemingly vague level of crap! Even technicalities can be found as guilt, resulting in a severe sentence that any moral and intelligent person would think is ridiculous. But because it was a law and it is technically considered to be breaking the law, the judge still comes down with his hammer following his orders like a slave following their master to obey.

Comment VERY NICE! (Score 1) 66

This is a really great tool!!!

You can look at your ISP and determine by using this tool which hours your ISP's network is running into a bottleneck(peak hours), and as well look at other ISP's to determine bandwidth/bottlenecks. Also, see if other ISP's may offer better deals if you like to have a good connection at peak hours. You can actually see how the ISP's are performing throughout the day, rather than being advertised as X-Mbit connection, only to find out those speeds are only reachable at 3A.M.

This tool is very damn cool, great for competition and could even be used to help determine if throttling is occurring.

Slashdot Top Deals

All life evolves by the differential survival of replicating entities. -- Dawkins

Working...