Forgot your password?
typodupeerror

Comment Re:This is the right decision (Score 2) 81

The analogy doesn't really work for two reasons. Firstly copyright infringement is a civil matter, not criminal. Secondly they were informed about the copyright infringement, but declined to cut off the customer. It was a request to stop providing service that was allegedly being abused, going against their own Terms of Service.

This is still the right decision. Aside from it being bad if companies can be forced to enforce their own ToS, there has never been a trial to determine if the copyright infringement actually took place, and if the right person was identified. These claims are notoriously unreliable.

Comment Re:Temu missiles (Score 1) 272

Lockheed focuses on reliability of weapons, rather than quantity. As we have seen in Ukraine and now in Iran, quantity is often more important. Ukraine uses a lot of civilian grade material in drones, for example, as does Russia. Shear numbers and low cost are more important than military grade component reliability.

Comment Re:That's Fine (Score 1) 69

So for example, say you use the hidden partition feature. You have two encrypted partitions, one with your really secret data, and one other with some other data that you don't mind if your adversary gets hold of. Under duress you give your adversary the password to the latter.

In the UK, the prosecution can argue that the data you gave up is not all there is, and you are holding some back. As evidence, they can point to things like lists of recently accessed files that seem to point to data on that hidden partition, or the fact that the data you did give up has not been touched in a very long time and there is evidence that you were using the computer recently.

It's not a given that they can prove there is more data beyond a reasonable doubt, but you do have to be careful to avoid mistakes that can give them what they need.

Comment Re:That's Fine (Score 1) 69

Hidden data is an interesting idea, but you need it to be plausible. The fake data has to have signs of regular, recent use, for example, or they can argue that you haven't given them the real key. The same issue with claiming to have forgotten the password, when there is evidence that you used it recently.

Comment Re:Everything bad about MS Copilot... (Score 1) 42

I've done this with Google Gemini and it isn't nearly as bad as you imagine.

For a start it has to get permission for everything it wants to do, at a pretty granular level, and it asks every time. I ran it in a VM anyway, with just the data files I needed processing.

It was a difficult task and so far it's been the best of the bench. AI stuff happens in the cloud, the file processing happens locally, and it eventually came to a solution that worked about 70% of the time. Sounds bad, but that's a 70% reduction in manual work for me.

Comment Re:The reason I like CarPlay & Android Auto. (Score 1) 117

Android Automotive is separate to those two though. It runs on the car's computer system. Vehicles with it are actually quite good by the standards of in-car systems. You get Google Maps for navigation, and a reasonably good UI that tends to be updated regularly.

It's not a great choice - Android Automotive or the manufacturer's own thing which is probably based on Android anyway - but if forced to make it I'd take the former.

Comment Re:That's Fine (Score 1) 69

The UK has had a similar law for a long time now, and this has been considered. It won't work. Veracrypt rejected the idea.

In the case of computers, they will clone the drive before entering the password, so wiping won't help. Some SSDs are better, in that they won't even allow the data to be read without the password first, but they don't support the duress password feature.

In the case of things like phones, you can set up a duress password that wipes the device, but using it will get you into more trouble. You might decide that trouble is worth it - there have been cases here where people have refused to give up passwords and taken the two years in jail, rather than whatever they would have got had the content of the device been seen by police.

In that case it might actually be worth having a duress password, as the risk is that even if the device is secure today, it might not be in 10 years time.

Typically the solution most people in the UK have opted for is to "lose" the phone, by say dropping it overboard in the ocean. Some of the people close to Epstein and former prince Andrew had those kinds of accidents. IIRC our former Prime Minister forgot his password. Oh yes, you can forget your password, but it needs to be credible. If you unlocked the device the day before and have been unlocking it for years... Well, maybe you could argue you changed the password yesterday and now can't remember it. I used to do that a lot when work mandated monthly password changes.

Comment Re:Which ones aren't made in China? (Score 2) 175

They all use Chinese parts. Worse than that, they all use Chinese developed algorithms too. Key parts of the WiFi and 5G specs are Chinese. If you are really paranoid, you might suspect that they did something like the NSA did back in the day, by deliberately introducing weaknesses into those standards so that they can be hacked by people who know the secret.

Or just be sensible, use defence in depth, as much open source software as you can, and look longingly at the lower prices Europeans pay for hardware.

Comment Re:Cisco vs. TP-Link (Score 4, Informative) 175

Cisco gear. Chinese backdoors installed at the factory, NSA backdoors installed when they ship it to you.

I'll take my chances with TP-Link. Actually, I really like GL.iNet hardware at the moment. Very solid, and runs a version of OpenWRT. You can flash standard OpenWRT onto most of it too.

Slashdot Top Deals

EARTH smog | bricks AIR -- mud -- FIRE soda water | tequila WATER

Working...