Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Reverse the role (Score 1) 565

The M-03-22 indeed defines Privacy Impact Assessments (PIA) whereby it is possible to analyze how email works. However, that page does not contain the term "domain", so it does not address the point directly. It merely establishes a general principle.

From a web subscriber POV, it may sound like being accused of killing an ant. Yes, she might reply, I know cruelty is unlawful and life is sacred, but I was not aware, I was just walking on the footpath, you know, I never meant to kill anything... The law doesn't forbid to walk the footpaths.

Comment Re:Reverse the role (Score 1) 565

I would argue that an email address is an identity, and that using one which does not belong to you to create an account on a public system is identity theft.

No, it might be an identifier theft, but that issue would only arise if the legitimate address holder will in turn open an account at the same web site. The first user noticed that the identifier was accepted, and considers such acceptance a probative evidence of his right to use the identifier, on a first come first served principle. She or he doesn't have to know whether that identifier was supposed to be globally unique. The SMTP standard is not law. Actually, it is not even an Internet standard, it is merely a draft. Why should people not interested in email take care of it?

I know identity theft is a crime, but the unintended collider didn't actually steal anything, so I don't think she or he can be prosecuted. As for taking the law into one's own hands, it is certainly not allowed.

Personally, I would blame the websites, which should not use address-like identifiers if they are not going to verify they're valid. However, now that you said it, I recall my brother managed to unintentionally steal my Blockbuster account —which wasn't associated with any email address— just because he has the same surname as I. Perhaps DNA sequences...?

Comment Re:Reverse the role (Score 1) 565

This does not go to court.

Why not? Don't conflate the ability to capture email messages just because you happen to own a domain name with reading communication which was not destined to you. If I were a lawyer I would hold that opening someone else email without their permission is a felony that can jail the offender for up to 5 years.

As far as clicking "forgot password" is concerned, be prepared to answer questions about your mother's maid name or your birthday.

Those stupid people are not interested in email, they just want an identifier they can use for their account. They care so little about email that don't even take the burden to create a free email account somewhere. Why should they?

Comment Re:As an ant, try outsmarting a human (Score 1) 170

Now, talking of something we never saw, general AI, how can we be so antly dumb as to identify that 1000x smarter thing with its off-the-cuff creator? How can we assume that a 1000x smarter thing will obey slavishly to whoever "owns" it?

By comparison, consider a dog with its 0.7x smartness w.r.t. its master. It already distinguishes its own will, and in many cases refuses to obey plainly wrong commands.

So you say a 1000x smarter general AI will want to allow a country to take unfair advantages? Hmm...

Comment Re: Idiots everywhere... (Score 1) 330

Luckily, I doubt there's much chance of getting folks to carry such a device around with them at all times....

such-a-device = smartphone, everyone carries one already.

I don't think it's beyond feasibility to get 90% coverage. It will be enough to place G-men in other key places, e.g. hamam, to reach almost 100% coverage.

Difficulties, if any, are going to arise with analysis and transcription of all that footage. Even with the aid of AI, the number of operators is going to be so huge that governments will need means to surveil them in turn.

Comment Re: Evergreen State (Score 1) 996

The liberals were the fascists in the Nazi party (Nazi meaning new socialist)

Where the heck does this come from?? Every single iota of non-biased information I've ever seen points to the opposite. Eg Wikipedia:

the Nazi Party was a far-right political party in Germany

Hmm... the original post is not there any more. It probably was a good example of "self-righteousness".

However, it is true that the Nazi Party was named Nationalsozialistische Deutsche Arbeiterpartei (NSDAP, literally "National Socialist German Workers' Party").

Likewise, the term liberal can be used to mean the rightish economic thinking associated with laissez-faire economic liberalism, which is considered opposed to socialism.

It would be interesting to know if that kind of political-terminology kidnapping always goes left to right (as in the previous two examples) or there are also right-to-left cases. Let me add that the expulsion of the professors from the universities in nazi Germany certifies that they too didn't think universities had a positive impact on the way things were going in their country. I suspect that the resulting ignorance favors such kind of linguistic overturns...

Comment Re:Please Read The Entire Statement (Score 1) 474

GPLv2 sec. 4 states:

4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

That section says that the customer has a licence for that copy of the Linux kernel, not any other. Section 4 does not apply only to users who received copies from distributors who were completely in compliance with the GPL, because sec. 6 would make the emphasized language entirely superfluous under that interpretation:

That would seem to imply that a patch can be considered not to be derivative work. Is it so?

Some versions of the Grsecurity article seem to imply that Bruce is the only one who argues that's a violation. IANAL, and I think if that's not a violation then the GPL is badly written (perhaps thet's why there is v3.) RMS's statement is unusually laconic.

Comment Re: Hackers in Russian media (Score 1) 263

Phew, a decent comment, at last. Not decent enough to mod it up, so I reply instead.

"We" don't use IT, so we don't mind about cybersecurity. Thanks to shaitand's explanation, now we know that's the reason why students —as well as other people— are not interested in learning how to hack. How come?

One example that comes to mind, recalling a three-year old talk, is the mindset by which you can't expect users to be the primary security managers of their own accounts. If we wanted e-commerce customers to be drawn from IT security experts only, we would still be going to shop by car (yeah, I know we still do... Cars dominate this discussion.)

Let me repeat myself, I'm at about one third through the comments, and the parent poster is about the first one on subject. Computers, algorithms, cybernetics, and that kind of stuff are all too important to be left in the incompetent hands of the populace. Let's discuss something else, please.

Comment Re:Their system protects member accounts (Score 1) 44

Hm... sooner or later someone will learn how to hack their way into intranet servers anyway, for example by emulating that device VPN. Intrusions are normal. The point is that if you allow diversity, it becomes unlikely that all servers are attacked simultaneously.

In addition, smaller data centers can afford smaller security teams, which implies better trust.

Slashdot Top Deals

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...