Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:The mindset is worse than money (Score 1) 372

Agreed. What I find worrisome about this is not the money. It's more about the tone and implications of basing the design on Star Trek.

It's disturbing enough to learn that the NSA is spying on US citizens, pulling private emails and phone logs from anyone and everything with minimal oversight, but if they're going to do that, you kind of hope that they're taking the whole thing seriously. You'd like to imagine that it's a bunch of very serious people who view the whole project as a solemn duty, a necessary evil, to be carried out under the most rigorous discipline and restraint.

If there's some reason why all this must happen, if we must have a domestic spy program potentially collecting and reading all of my emails, then it makes it that much worse to imagine that it's run by a bunch of weirdo nerdy frat-boys working from a high-tech version of a blanket fort. You don't want them treating this whole thing like a game of Cowboys and Indians. This is the sort of thing that you expect from a crazy dictator like Kim Jong-il.

Comment Re:That's awesome (Score 1) 372

I'm sure that's where Roddenberry got the idea of colored uniforms to designate branch (ops blue and engineering red).

Not to be pedantic, but I believe ops was gold, science/medical were blue, engineering and security were red. That's why red shirts kept getting killed-- it was the color worn by the security personnel who were assigned to protect the rest of the crew.

Comment Re:Trending political procedures... (Score 0) 314

And it's not exactly unique. Caltrans uses the sensors for the FastTrak toll devices to monitor the flows of traffic and respond to accidents faster. It makes a lot of sense and you can opt out by putting the transponder in your glove compartment. You can test that this works (I've done it) by forgetting to remove it from your glove compartment when you drive through the toll collection area. The sign won't signal that you've paid, but the license plate recognition will resolve the fare properly.

Yes, there's a potential for abuse in stuff like this, but the benefit to everyone is undeniable. Faster response from officials to traffic conditions will help alleviate them sooner and may result in emergency personnel arriving on scene sooner and saving more lives. And I'd rather they use a technology that's both cheaper and easy to opt out of than to install expensive camera systems that track license plate numbers and give drivers no way of avoiding being tracked.

GNOME

Intel, Red Hat Working On Enabling Wayland Support In GNOME 168

sfcrazy writes "After shooting down Canonical's Mir, Intel and Red Hat teams have increased collaboration on the development of Wayland. Developers at Intel and Red Hat are working together to 'merge and stabilize the patches to enable Wayland support in GNOME,' as Christian Schaller writes on his blog. The teams are also looking into improving the stack further. Weston won't be used anymore, so GNOME Shell will become the Wayland compositor. It must be noted that Canonical earlier committed to supporting and embracing Wayland. Despite that promise, the company silently stopped contribution, and it was later learned that they were secretly working on their own display server, Mir. Intel's management recently rejected patches for Mir, leaving its maintainance to Canonical. Before Intel's rejection, GNOME and KDE also refused to adopt Mir. Intel's message is clear to Canonical: if you promise to contribute, then do so."

Comment Re:Not exactly a right to remain silent... (Score 2) 452

The fifth amendment doesn't even apply here. It's a first amendment issue. As a member of the press, his right to report on anything, including secret classified documents, cannot be curtailed. Forcing him to reveal his source falls under that protection because it limits his ability and the ability of other reporters going forward to receive similar offers of assistance from sources. It would be murkier if he had signed any sort of agreement to gain clearance to the documents, but he didn't.

If the situation were different and Risen had been found to have classified documents during a legal search, then he could be compelled to reveal where he got those documents so long as he wasn't incriminating himself. But it's not, he's an member of the press and the first amendment protects the press's right to keep their sources secret.

Comment Re:Of course not. (Score 1) 227

the next step is to go to the person responsible for that part of the business.

And what if the offender is the CEO? Ah, see, there's the big problem you're failing to account for. Sometimes it's the big muckety muck head-hancho who just doesn't seem to care, and you have no one to appeal to. Or even if it's not the CEO, do you really want to try going over the head of some executive to a higher-level executive?

The thing is, I think your example shows that *you* don't understand business. Lots of this stuff is about politics more than it is about technology or security. If you want to succeed (or at least avoid getting fired), you'd better learn to pick your battles.

Government

NSA Can Spy On Data From Smart Phones, Including Blackberry 298

An anonymous reader writes with a report from Spiegel Online that the U.S. government "has the capability of tapping user data from the iPhone, [and] devices using Android as well as BlackBerry, a system previously believed to be highly secure. The United States' National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. ... The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been." As a bonus, the same reader points out a Washington Post report according to which "The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency's use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans' communications in its massive databases ... In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court."
Democrats

New Jersey Congressman Seeks To Bar NSA Backdoors In Encryption 200

Frosty P writes "Congressman Rush D. Holt, a New Jersey Democrat, has proposed legislation (summary, full text) that would prohibit the agency from installing 'back doors' into encryption, the electronic scrambling that protects e-mail, online transactions and other communications. Representative Holt, a physicist, said Friday that he believed the NSA was overreaching and could hurt American interests, including the reputations of American companies whose products the agency may have altered or influenced. 'We pay them to spy,' Mr. Holt said. 'But if in the process they degrade the security of the encryption we all use, it's a net national disservice.'"

Comment Of course not. (Score 5, Insightful) 227

As someone who has been working in IT for almost two decades, I'm not the least bit surprised. There are all kinds of things that we've given up on trying to communicate. People don't want to hear it. They don't understand what you're saying, they don't want to figure it out, and if you can get them to understand, they still don't care.

In the case of security, it falls into this classification of 'technical things nobody even wants to understand' and also into the classification of 'preventative measures that people will not recognize the importance of, until after it bites them in the ass.' You tell people that it's a bad idea to use "password" as your password, and they'll blow you off. The more you stress the point, the more annoyed the'll become-- all the way up until someone malicious gains access to their accounts. Once they've been hacked, they'll come back angry, demanding, "Why didn't anyone tell me it was a bad idea."

Until there's an actual security breach, people think you're chicken little. They'll tell you, "I've been using 'password' for my password for 10 years and I've never had a problem."

Face that kind of attitude for a several years, and you get awfully tired of warning people.

Slashdot Top Deals

egrep -n '^[a-z].*\(' $ | sort -t':' +2.0

Working...