Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Seems pretty obvious (Score 3, Insightful) 63

A strong argument against our government agencies actively backdooring stuff (cisco hardware, AES, key escrow, etc) and passively maintaining an arsenal of zero day exploits is that these things will be leaked or discovered independently and used by adversarial states against our companies and citizens.

It's happened a bunch.

Now some companies catch China doing it. They protect themselves, turn over the details to three-letter-agencies, and deny it ever happened so that the exploit can be added to the national arsenal of weaponized vulnerabilities.

Good times.

Comment Re:Eminent Domain for Private Businesses (Score 1) 196

Wait, what?

Help me understand this.

So if I want a domain name for a business (I do) and that domain is currently owned by a squatter (it is) and that squatter wants $2k for it (he does)...

I can just register trademark the name and force it to be transferred to me without compensating the troll?

Comment Re:Security implications? (Score 1) 101

While walking along in desert sand, you suddenly look down and see a tortoise crawling toward you. You reach down and flip it over onto its back. The tortoise lies there, its belly baking in the hot sun, beating its legs, trying to turn itself over, but it cannot do so without your help.

You are not helping.

Why?

Comment Re:Security implications? (Score 1) 101

You're driving a car down the road.

Do you make decisions solely based on what's directly in front of your bumper?

Or do you make decisions drawing from years of experience driving cars and what you see to either side and in the rearview mirror and your side mirrors and what you see further down the road and, dare I say it, common sense?

Comment Lol (Score 1) 31

So they're targeting the non-SSL versions of services.

And SNMP being included is somehow a mystery? If you were the sort who wanted illicit access to people's systems, networks, and communications why wouldn't you want to also catch their SNMP strings? It's notoriously insecure yet shockingly common; a great way to dig deeper into a compromised site.

Comment Who would've thought? (Score 1) 282

From "do no evil" to adopting MicroSoft's Embrace, Extend, Extinguish strategy.

They proved it works with their handling of RSS and now they're moving on to "extending" the web where people can either comply with Google insinuating itself as the main (or sole) arbiter of identity or else get de-ranked in search results.

It's the end of the web as we know it.

Slashdot Top Deals

Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin

Working...