Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:War of government against people? (Score 1) 875

Don't forget the problem of keeping guns from getting back into the population at any given time. This goes back to the same issue you first spoke to: criminals will still obtain guns, and those who respect the law of the land won't. Essentially, I put this whole discussion into much the same frame as the "war on drugs," meaning things can't be uninvented and attempts to overly regulate many of them may result in more net harm than good.

Comment Re:War of government against people? (Score 1) 875

There are many variables you haven't accounted for. Quoting from Crime in the United States:

In 2011, the state with the lowest violent crime rate was Maine, with a rate of 123.2 per 100,000 residents, while the state with the highest violent crime rate was Tennessee, with a rate of 608.2 per 100,000. However, the District of Columbia, the U.S. capital district, had a violent crime rate of 1,202.1 per 100,000 in 2011.

D.C. has a long history of highly restrictive gun laws. Why then does D.C. have double the violent crime rate of Tennessee, and one hundred times that of Maine? It's also worth noting that Maine has very few restrictions on gun ownership. See how this works?

Comment Re:The "lettuce bot" is mostly a vision system (Score 1) 36

[sideband attempt 1 at obtaining a reply] I'm perfectly willing to burn the karma expended from potential "off topic" moderation of this comment to ask you the following question, which is likely to be considered highly "interesting" by anyone interesting in safeguarding privacy: Why haven't you replied to my last question [regarding TrueCrypt and the value of signing keys]?

Comment Re:Nonsence (Score 1) 475

The concern isn't compromise of TC by an insider. The concern is forced conveyance of signing keys to an intelligence agency. Are you aware of the consequences of such a scenario? I suspect you're feigning ignorance at this point in an attempt to minimize perceived risk. Why would you do that?

Comment Re:That's not proof! (Score 1) 475

Please accept my apologies for the delayed reply. You appear to be lacking firsthand experience with interactions involving certain law enforcement agencies and persons who are subject to device examination. The first step will be production of a bit for bit copy of the digital media in question, followed by a quick analysis of the disk image. In many cases, said analysis will rapidly identify media regions which are likely to represent "hidden containers", and interesting interactions between the owner of the device and law enforcement personnel will commence shortly thereafter.

This may disappoint you, but it speaks directly to my original statement regarding the utility of hidden containers. The link included in my prior post was mostly intended to spur further thought, in the hopes that you would consider (at a minimum) the scenario I've just described. Given my apparent failure to spark that trail of reasoning, I elected to provide a more direct example in this post. Cheers.

Comment Re:That's not proof! (Score 3, Informative) 475

LUKS is very good, but until someone works out a way to do hidden containers, it's not even close to a replacement for the most critical feature of TrueCrypt.

Hidden containers are less useful than you might imagine in practice for a variety of reasons. Some of these points are relevant. I don't have any use for hidden containers, although I do use LUKS on a large number of systems.

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...