Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Tor's fatal flaw (Score 1) 28

Recall the origins and past funding of Onion routing https://en.wikipedia.org/wiki/... i.e. US needed a system that would allow US backed and funded dissidents globally to network for color revolutions https://en.wikipedia.org/wiki/... and other long term political NGO work.
5 eye nations did not seem to be very upset with its spread and use with systems like Tempora https://en.wikipedia.org/wiki/.... Federal funding at a police level in the US to track users goes from success to success even on low budgets per case.
For Onion routing to work well a lot of consumers need to be using the networks to hide the few "dissidents" globally.
Given all the low cost police work that makes it to court, tracking users is now less hard work. Collect it all is now in the hands of anyone or nation or cult or faith or brand with a limited federal police budget.

Comment Re:So is the bottom line... (Score 1) 28

AC "The program marks and tracks the IP addresses of those who search for 'tails' or 'Amnesiac Incognito Live System' along with 'linux', ' USB ',' CD ', 'secure desktop', ' IRC ', 'truecrypt' or ' tor '." as in collects details on all who look for such tools.
More at "NSA targets the privacy-conscious" (03.07.14) https://daserste.ndr.de/panora...
with "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search."

Comment Re:So, why? (Score 1) 170

Re " They are circumventing Constitutional rights with this type of behaviour"
Different groups have tried. http://arstechnica.com/tech-po...
Vast domestic spying by the NSA, CIA and other 5 eye nations as helpers should have all been fixed with the https://en.wikipedia.org/wiki/... back in the 1970's.

Color of law, rubber stamp courts for international collection are now been presented as useful for domestic spying.
Also remember that vast amounts of US private sector staff looking over their own hardware and software do not seem to even know what the US gov is installing.
Or generations are happy to help the US gov. Or mass collection is presented as a sub set of hardware via other domestic agencies with limited court paper work.
Data has to be decrypted for the "ads" and other sorting, backups and at that point the US gov collects all or demands access. Companies help or do not have the networking skills to understand the gov collect it all access to their own networks.
Long term different US state and federal officials want their own domestic and international version of XKeyscore https://en.wikipedia.org/wiki/....
Tracking the origin and destination of any internet usage without any court order to build on domestic parallel construction. Less need to request the NSA via a Fusion centre https://en.wikipedia.org/wiki/..., just go direct to all real time and short term US domestic networking logs.
For that different levels of the US gov need the same plain text access as the NSA to big US brands over decades with no domestic legal limits or any oversight.
Big brands have to consider the PR of been seen to be protecting their consumers rights or help design ever more US gov bandwidth deeper into their own networks.

Comment Re:Don't travel to US. (Score 1) 309

+1 for "So now I travel with a burner phone and an old netbook. No big loss if they are confiscated."
In different nations passwords will be "requested", email, web 2.0 accounts can be requested to be looked at, searched.
Make sure any device is new with only work related software, work contacts, apps, docs or have new hardware just for been looked at.
In the many hours waiting for an interview expect a duplicator to be used and deep search of the hardware:
All contacts will be kept, facial recognition on any images, any gps data extracted, comparison of all files found to domestic and international databases, the drive will be scanned for accounts and contacts, passwords, any OS kept web use, quality data recovery software will look for any removed data, detection of any hidden encrypted volumes.

Submission + - How Some ISPs Could Subvert Your Local Network Security (vortex.com)

Lauren Weinstein writes: You can see the problem. If your local net has typically lax security, and you don’t have your own firewall downstream of that ISP modem, the modem Wi-Fi security could be disabled remotely, your local network sucked dry late one night, and security restored by the morning. You might not even have a clue that any of this occurred.

Comment Re:Sandboxing? (Score 1) 23

It would be interesting thought for DRM and an OS. Remove the DRM and the quality "image" with code is used in the unprotected copy as its part of the new free file. The free copy is then opened and OS and code access to the wider OS is granted to phone home.

As for why, maybe the OS likes a format thats well understood to ensure a set look and feel over desktop, apps, phones.
A more lossy format might change over different hardware and software. With a push for publish once from any device, some image files might have layout options that are more useful and have been created from a TIFF.
Photography support for an image as captured. Applications might like to edit a full color image, not just a created jpeg or other format. i.e. a RAW format export to full size, color "unprocessed" TIFF that can then be worked on with hardware, software and full OS support.

Comment Re:So even without the conductive layer . . . (Score 1) 97

AC given how hair, cloth, clothing, chemical testing and other emerging evidence has been rushed to produce a positive or matching result by expert "crime" labs over the decades in many nations, don't expect too much from a fancy city or state or federal "DNA" report or expert reading a report back under oath..
Who will be the only DNA "expert" in that city, state or nation? How well are their gov labs run? Who inspects their methods? A trusted gov worker with a huge case load just counter signs their own "matched" results to save time or for some other reason?
Outside labs with real experts that a legal team can trust are expensive. Remove all funding during a trail to ensure no further or outside tests can be done and only the prosecutor can present their experts.
The result that legal teams now need to be aware of is a greater range of phones can be accessed, updated, logs and dates corrected and "found" files presented in court.
Just as in the past with testing, matching or lab results a secure phone could exit the chain of evidience for a few hours and return altered thanks to easy access to ensure conviction or cover for parallel construction.

Comment Re:How smart is Snowden, exactly? (Score 1) 106

The past work of any whistleblower can be understood as in who hired (e.g. CIA), who contracted (e.g. NSA), positions offered in what foreign nations, amount of information of interest to the USA in that nation. i.e. more of an outpost nation that could be seen as low level test or needed skills for complex work at a hub of international diplomacy and politics... say a location like Switzerland.
Do average staff members get a placement e.g. a US fly over state site and then get tested/trusted with international work with a more entry level support role in a nation with less of a work flow i.e. diplomatic cover to ensure the software and hardware support needed on site or a job in the US..
It also reflects to what the US gov did or did not seek as a stringent background report for promotion or even the ability to see and submit an application. In depth, in person interviews with everyone up and down the history of an applicant vs a state and federal "digital" search for a newer lesser clearance for some levels of gov work.
Also note that the State dept will allow "other agency" staff posted by the US gov to present very simple cover stories to other nations, the press, their friends as far as any diplomatic role/work goes. The life story will be searchable and have a depth of detail re online images, education, gov work before any posting.
The trust and skill set needed for the workload and the "other agency" that gave the top clearance usually shows the skill levels needed.

Comment Re:Won't do anything (Score 1) 106

It really depends on the world view of the data flow.
The NSA, Australia, Canada, NZ and GCHQ get the origin, destination, number and content of the call via their shared collection sites globally.
The call will get the same amount of interest as any call. If the caller recipient of the call or any of their contacts ( a few hops i.e. friends of friends) are listed as been of interest, even more value will be placed on collecting that communication.
That occurs on the national and international pipes and is not passible to avoid that kind of shared collection globally on any consumer telco account.
The next step down is a city, state, local gov or NGO working "with" a gov or local gov buying contractor software to push down on a phone or run as a trusted installed application to turn on the mic, cam or upload a generated log file.
That access and changes would be more detectable to the user given the need to run as an application layer and interact with the users hardware..
Cant escape the NSA and GCHQ collect it all.
Can find out if a log file is been created, uploaded or the cam, mic is getting turned on by pushed down installed software.

Submission + - 'Ghostbusters' Is A Perfect Example Of How Internet Movie Ratings Are Broken

AmiMoJo writes: “Ghostbusters,” a revival of the 1984 original, hits theaters nationwide on Friday. As a reboot of a beloved, male-led science fiction film from the 1980s with a female-led cast, the reboot has proved somewhat controversial in the circles you would expect. But regardless of the quality of the film, it serves as a perfect demonstration of why internet movie ratings are inherently a problem. Most fundamentally, single-number aggregations — like those used by sites such as Rotten Tomatoes, Metacritic and IMDb — are pitiful way of explaining the diverse views of critics.

Some stats:

- Metacritic score of 61 out of 100, based on 41 critics.
- Of the reviews aggregated by Metacritic, 24 were positive, 16 were mixed, 1 was negative.
- Tomatometer score of 74 percent “fresh” based on 138 reviews.
- Of those reviews, the average rating was 6.5 out of 10.
- Looking only at top critics, it had a Tomatometer score of 54 percent “fresh” based on 35 reviews.
- Of top reviewers, average rating was 6.3 out of 10.

- IMDb average user rating: 4.1 out of 10, of 12,921 reviewers
- IMDb average user rating among men: 3.6 out of 10, of 7,547 reviewers
- IMDb average user rating among women: 7.7 out of 10, of 1,564 reviewers

(keep in mind that at the time these stats were collected the movie wasn't even in theatres yet, so only reviewers and a few test audiences will have actually seen it)

Submission + - SPAM: Dalai Lama : Refugee Should Only Be Allowed "Temporarily" To Europe

whoop99 writes: Dalai Lama :Tibetan Buddhist Spiritual Leader Says refugee Should Only Be Allowed “Temporarily” To Europe.
Dalai Lama Said Europe Has Let in Too Many Refugees The Lama Also Feel Very Unhappy With The Way Each Individual Refugee. Dalai Lama Said That Each individual “Refugee is the Responsibility Of Every People”.
But There Are Too Many Who Accepted In “Europe”.

Link to Original Source

Comment Re:Run your own webserver and use any web-browser (Score 1) 74

Yes that will be the future. People, brands, groups, nations will just use couriers with a jet set network. Takes a few days but its one time pad secure.
Big US brands that help 5 nations mil/govs on all data flowing will be trusted with gamers chat and for making expected free international calls.
If US designed networking products are seen to be trusted in the open, it will be for pushing complex disinformation.
Encryption will be more diverse and creative.

Comment Re:it didnt work for the soviets, it wont work for (Score 1) 40

What a brand can report in public based on its own internal numbers might not be the all that "public".
Other methods, NSL can sway any data reporting. What Country Monitors Communications the Most: U.S., U.K., Canada, or Australia? (July 18 2012)
..."it is being replaced by more covert, unaccounted forms of surveillance. Favored methods may include social media monitoring or, as National Security Agency whistle-blowers in the United States have alleged, dragnet interception systems that function outside the law."
..."as a single interception request may sometimes include dozens of individual targets."
...."with a single communications data order garnering information on hundreds, even thousands, of individuals"

Slashdot Top Deals

The star of riches is shining upon you.