Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - London cops waste £2.1m on thought crime unit and they want volunteer info (theregister.co.uk)

An anonymous reader writes: The Metropolitan Police is to spend £2.1m of public money funding a unit that will actively investigate “offensive” comments on Twitter and Facebook, according to reports.

Backed by a team of “volunteers”, the Met's new unit will actively seek out anything “deemed inappropriate” on social media services, according to the Sunday papers.

Scotland Yard is splurging £1.7m of its own budget on the headline-grabbing stunt, which will have five full-time detectives on its staff.

The Home Office is contributing a further £452,756 to the Online Hate Crime Hub, as reported by the Sunday Telegraph.

The five-strong hub will consist of a detective inspector, a detective sergeant and three detective constables.

Submission + - Bad Programming Ideas That Work

snydeq writes: Cheaper, faster, better side effects — sometimes a bad idea in programming is better than just good enough, writes InfoWorld's Peter Wayner. 'Some ideas, schemes, or architectures may truly stink, but they may also be the best choice for your project. They may be cheaper or faster, or maybe it’s too hard to do things the right way. In other words, sometimes bad is simply good enough. There are also occasions when a bad idea comes with a silver lining. It may not be the best approach, but it has such good side-effects that it’s the way to go. If we’re stuck going down a suboptimal path to programming hell, we might as well make the most of whatever gems may be buried there.' What bad programming ideas have you found useful enough to make work in your projects?

Submission + - South China Sea conflict could be IT's Black Swan (computerworld.com) 1

dcblogs writes: The vast majority of the world’s electronics — its servers, PCs, mobile phones — are now manufactured in China. This means any inadvertent escalation over the on-going South China Sea territorial dispute could do more than raise geopolitical tensions. About 84% of the world’s electronics are made in Asia, and about 85% of those goods are made in China, said Michael Palma, an analyst at IDC. “All that product flows through the South China Sea,” said Palma. Headlines about military activities in the region appear frequently. Just this month, Vietnam moved rocket launchers within striking distance of China’s military positions. Recent photographs show new aircraft hangerson China’s islands that are believed to be for fighter aircraft. “The South China Sea dispute is indeed a serious security issue of global significance because it has the potential to lead the world into war,” said Linda Lim, a professor of strategy at the Stephen M. Ross School of Business at the University of Michigan and a China and Southeast Asia expert.

Comment Re:Network Effect (Score 2) 237

Maybe using an application (like Jitsi, as other posters already suggested) can interoperate with other messengers. You can register a SIP address and then chat with any other user that has a SIP address, no matter what their comm client is. At least in this manner you won't have to convince all your friends to switch to just that one client that works best on your platform (but you would still need to convince them to move from Skype, securely configure some new software client that works on their device, have them register a SIP address... so still far from doable).

While on this subject, I'm not aware of how good SIP security is. Also not sure which SIP providers are considered secure and honest to respect their terms of service and privacy policies. I guess it also depends on how competent where the client developers in implementing the security features.

Comment Re:Inherently Insecure (Score 1) 237

You're absolutely right: "how much security" is a fundamental question before considering solutions. My "secure enough" phone could be decryptable by 3-letter governement agencies, but not from a random criminal without state-sponsored resources.

Concerning privacy, conversations and contacts should be invisible to mass marketing siphons and their partners. Again, I don't expect that a state-sponsored organization won't be able to eavesdrop if they decide to, and it doesn't really matter.

Submission + - How do you prepare for and deal with a lost/stolen/destroyed Smartphone? 3

Qbertino writes: A lot of our everyday lives today hinges on having our smartphone and our apps/services/data that are on it working and available.

What are you tactics/standard procedures/techniques/best pratices for preparing for a lost/stolen/destroyed Android Phone and/or iPhone? And have you needed to actually use them?

I'm talking concrete solutions for the worst case scenario: Apps, backup routines (like automating Google Takeaway downloads or something) tracking and disabling routines and methods and perhaps services. If you're using some vendor specific solution that came with your phone and have had positive experience with it, feel free to advocate.

Please include the obvious with some description that you use such as perhaps a solution already build into Android/iOS and also describe any experience you had with these solutions in some unpleasant scenario you might have had yourself. Also perhaps the procedures and pitfalls for recovering previous state to a replacement device.

Please note: I'm talking both Android and iOS.
And thanks for your input — I can imagine that I'm not the only one interested in this.

Comment Re:Check the EFF Secure Messaging Scorecard (Score 3, Informative) 237

Unfortunately that version of the scoreboard is outdated and new one is underway but there is not even a draft published. Nevertheless, I had a look at several of the most promising looking software listed there and trying to figure out if there is even one that is currently secure enough.

Slashdot Top Deals

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...