Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:oh look (Score 1) 91

What about Betamax, Minidisc, and MemoryStick? Sony has been trying to force everyone onto a Sony-controlled format for many years, Bluray was merely their first success.

Let's not forget ATRAC3.
Anyone else have the pleasure of buying a CD player marketed as MP3 compatible, only to find out that you had to transcode to ATRAC3 first?

Comment Re:Use end to end encryption? (Score 1) 234

If the spies are actively targeting someone, yes. But they can't hack *everyone* - not only would it be expensive, but they'd be detected in no time at all. So if your objective is to avoid the dragnet, it works.

Reminds me of when people said that they couldn't listen in on everyone, which was true right up until they figured out a way to do it.

Comment Re:Seized? (Score 3, Interesting) 162

The coins aren't in the wallet - they're in a completely transparent, publicly viewable account in the bitcoin block chain. Every transaction is visible to everyone. The wallet only contains the credentials that allow you to transfer the coins to another account. If the wallet was encrypted, and they were unable to access the credentials, then they cannot meaningfully seize the account since another copy of the credentials could (and should) exist elsewhere allowing someone else to spend the coins.

Given that according to TFA, the Feds have already transferred the coins to another account that they hold and that the transfers are a part of the current accepted blockchain, I would say that they have seized them. A side effect is that by revealing the blockchain entry for the transfers, they have marked these coins as government owned and traceable for the rest of their existence.

I wonder if it would be possible to also transfer the coins using a blockchain prior to the Fed transfer, then somehow replace the Fed transfer in the current blockchain and get the majority to accept the substitution, effectively denying the Feds their seizure? I realize that the majority design of Bitcoin is meant to prevent this sort of thing in reality, but it should be theoretically possible, right?

Comment Re: The wrong signal? (Score 1) 214

That is one thing that really gets under my skin -- when I am visiting with someone (i.e., I took the effort to go over to their space, whether it is a co-worker's office, or visiting with family), and their phone rings. No matter what we're in the middle of talking about, that phone call always gets priority.

I had this sort of issue with one particular boss. He would constantly place our conversations "on hold" so that he could take a phone call. He got the point though when I left his office during one such interruption and called him on the phone so that we could continue the conversation.

Comment Re:"what is necessary to be done" (Score 1) 461

Second, I checked the references to the times involved, and unless somebody really screwed up in a major way, then there is a genuine time discrepancy. In the government's own records, not just according to some bozo reporter out to make a name for herself.

But what does the time of death of two seal team members have to do with the time of death of a state department official?
Here are the facts. The assault in Benghazi began at 9:40pm local time on 9/11. Smith was known to have been dead by 11:40pm local time. From that we can assume he is likely the state department official mentioned by Ms. Clinton. An AP report quoting Ms. Clinton at 4:58am on 9/12 noting the death and discussing the attack would be perfectly normal as far as a timeline goes. The Seals were killed at about 5:15am on 9/12 during a second attack, not the first and it is unrelated to the AP story or Ms. Clinton's statements.

Comment Re:Hi (Score 3, Informative) 82

Where shall we send your NAL?

From the FAQ:
How do you suggest we ID? US regulations (CFR Sec 97.119) require amateur radio stations to identify themselves at the beginning and end of a transmission and at least once every 10 minutes. If you ID at the beginning of the first "dit" of the HI and at the end of the final one before you go QRT, you will meet the US requirements. Others should verify that this will meet your national requirements.

Comment Re:Needs to be an appliance.. (Score 1) 55

Monitoring is not the same thing as analyzing.. but I am quite certain I know where my packets are headed - at least when they're sent from my gateway. That's how the internet works.

But are you sure you know everything that is in those packets? Nothing extra in those DNS requests leaving your network?

Comment Re:Why? (Score 2) 527

from TFA: ....But Lavabit offered paying customers a secure email service that stores incoming messages encrypted to a key known only to that user. Lavabit itself did not have access.

If this is true, then how could Lavabit also have done the following?

Lavabit offered an alternative method to tap into the single user in question but ...

Either they could access the data or they couldn't.

Comment Some Issues (Score 4, Informative) 53

Before committing to anything you might want to read this follow up post.Apparently there are titles shown in the library that may not actually be available in your geolocation. In addition, you won't find out about that until you actually try to open the book. It's really quite disingenuous of them to show you books and let you add them to your library, when they clearly later know that those titles are not available to you for actual reading.

Slashdot Top Deals

"It takes all sorts of in & out-door schooling to get adapted to my kind of fooling" - R. Frost