Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment You can try, but... (Score 5, Funny) 838

"Beloved science fiction and fantasy writer Terry Pratchett has terminal early-onset Alzheimer's. He's determined to have the option of choosing the time and place of his death, rather than enduring the potentially horrific drawn-out death that Alzheimer's sometimes brings. But Britain bans assisted suicide, and Pratchett is campaigning to have the law changed.

THANK YOU FOR YOUR SUGGESTIONS. PLEASE UNDERSTAND HAVE A VERY BUSY SCHEDULE. I'LL GET BACK TO YOU WHEN I FIND THE TIME. BUT REST ASSURED I _WILL_ GET TO YOU.

Comment Not entirely stupid. (Score 1) 169

Here's the exact quote from TFA: "This unauthorized use of our application for malicious activities like spamming/phishing infringes on Skype's intellectual property. We are taking all necessary steps to prevent/defeat nefarious attempts to subvert Skype's experience. Skype takes its users' safety and security seriously and we work tirelessly to ensure each individual has the best possible experience."

Even the PR drone is saying "unauthorized us for malicious activities"... so reverse engineering the protocol isn't the problem, it's what you do with it. And considering it seems to be a Russian effort, I'd worry too.

Comment Re:Leaked copy of the document (Score 0) 108

Ok, seriously, you can base64 encode an entire document in a URL, that URL shorteners will allow linking to something in no way resembles a valid URL, and web browsers are silly enough to render it? It's even an proposed RFC!

On a page is one thing, neat way to inline small images. But as a redirect URL? What domain is it in? Local?

If you wanted to get even more evil about it, you could have base64 encoded hello.jpg and included it directly as image/jpeg.. assuming you could get it under the 255 character string limit for URIs.

I'm pretty sure I see a huge, gaping hole here.

Comment Re:What could go wrong? (Score 3, Interesting) 189

Stop spreading FUD.

Some anti-theft radios have a code, provided with the owner's manual, that you can enter after the radio has lost standby power. Others know what vehicle they are in.

I'm fairly sure what you were trying to say is that in modern vehicles (As in Fords with the Sync system) the electronics are keyed to the VIN, which is provided by the car's computer. If you remove the radio and put it in another vehicle, it will require rekeying, which can only be performed by authorized service centers.

There are strict laws when it comes to car safety. Car manufacturers can NOT knowingly (intentional or otherwise) make it dangerous to service a car, as doing so may affect emergency personnel or the driver/passengers in breakdown situations.

Comment Re:"pointed out the possible scope of the problem" (Score 2, Informative) 104

Idiot.

First of all, don't you realize every time you make a joke about "anal probes" at the airport, you're being not-so-subtly homophobic? Same thing with prison-rape jokes. I'm about as much a fan of those jokes as I am of the acts.

Didn't you read the part where the DHS CERT (a part of US-CERT, which falls under DHS but has nothing to do with the TSA...) told NSS something like, "Um, guys, the patch Siemens released doesn't work, and there are thousands of these devices deployed all over the place, including the power plants in this here city.."

NSS decided to play it safe, they weren't forced to do anything. It's called responsible disclosure, and when Siemens gets their products fixed, it will be released.

But I know your type. You, my familial-basement-dwelling troll, assume coercion and conspiracy is how everything gets done by three-letter agencies. Ironic, considering you love to rant about how those same agencies assume everyone brown is a terrorist.

Bar none, the libertarian, open-source evangelizing, Apple/Microsoft bashing, EFF supporting types are some of the most bigoted, narrow-minded, reactionary, paranoid individuals I've ever met.

Comment Re:Coulda Saved Him the Trouble (Score 2) 267

More like A Beautiful Mind

You do realize a lot of these cryptographers are borderline psychotic while they are employed by agencies such as the NSA, and eventually progress into genuine mental illness.

From TFA:
"Binney, who is six feet three, is a bespectacled sixty-seven-year-old man with wisps of dark hair; he has the quiet, tense air of a preoccupied intellectual. Now retired and suffering gravely from diabetes, which has already claimed his left leg, he agreed recently to speak publicly for the first time about the Drake case."

At that age, if his diabetes is bad enough to have taken his leg, it has probably also afflicted him with dementia. The fact he is making accusations using such vague terms as "twisted" is another clue there's something not quite right upstairs.

Also TFA, it seems like the issue is that the ThinThread is so good it picks up everything of interest including data about Americans. So the NSA decided not to use it, even with filters and anonymizing controls, because those controls could always be turned off. After 9/11, they realized they desperately needed ThinThread, they started using it without any privacy controls. Computers don't discriminate, if ThinThread sees a patten it records it. That doesn't mean that data it gathers has been abused.

First of all, warrants are not needed for pen-registers and other metadata like IP addresses and email sender/recipient data. Never have been.

Second, even though FISA warrants were not always obtained like they should have been, it has been shown every time an American involved in a NSA wiretap, it was because they were communicating with a non-American person of interest. The wiretap was on the foreign national, not the American.

Comment Here's an idea. (Score 2) 386

BitTorrent should support a "random assist" mode. Clients (even if idle) announce they want to assist. The tracker selects an active torrent randomly or based on need and returns a peer list.

The client doesn't have the .torrent, so it doesn't know what the files or piece hashes are. It simply requests peers give it random pieces, then shares the pieces it receives with anyone that needs them.

After a random amount of time the client leaves the swarm, and securely deletes the torrent and any data from it.

The reasoning behind this is that you cannot determine if anyone on an infringing torrent had any intent to infringe. It could just be their client assisting the swarm. Even if the peer downloaded every piece of the torrent, it could be their client randomly decided to assist for a long time.

A beneficial side effect of this is that all swarms will get more peers.

Comment Re:undivided attention of Anonymous (Score 1) 645

Anonymous might be a bunch of trolls and griefers, and would love to pwn Sony hard, but they've denied responsibility for this and wholesale identity theft just isn't their thing. They typically don't go beyond DDoSing and harassing the people they feel are responsible. They're not carders... but if they did decide to start stealing from millions of people, I hope the FBI/DoJ partyvans all of 'em.

I'm thinking the motivation for this was financial vs. ideological, and organized crime is behind it.

Slashdot Top Deals

"Don't try to outweird me, three-eyes. I get stranger things than you free with my breakfast cereal." - Zaphod Beeblebrox in "Hithiker's Guide to the Galaxy"

Working...