Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment The state could require breeders to be insured (Score 1) 132

True, you'd have to be in VHEMT to say breeders ought not to exist. But in the same way that many U.S. states require drivers of motor vehicles to carry liability insurance, generally privately underwritten, the state could require breeders to carry unemployment insurance that covers the full cost of the child's upbringing, also probably privately underwritten.

Comment Trump doesn't plan to pursue Rx pot (Score 1) 132

From a story in The Morning Call :

White House Press Secretary Sean Spicer [...] may have actually done Pennsylvania's effort a small favor by simultaneously voicing the administration's intention not to interfere with medical marijuana programs.

"There are two distinct issues here, medical marijuana and recreational marijuana," Spicer said. "Medical marijuana, I've said before, the president understands the pain and suffering many people go through who are facing especially terminal diseases and the comfort that some of these drugs, including medical marijuana can bring to them."

Comment this applies to all EU and Canadian citizens too (Score 1) 112

Under the treaties that the US signed with the EU and with Canada, this applies to all such recordings - even in the US or stored in the US - of any conversations of citizens of the EU and of Canada.

Next time, don't sign treaties which overrule laws passed by Congress.

Comment Re:Part of a botnet != ultimate attack target (Score 1) 161

Against a bandwidth consumption attack, patches to the machine that is the ultimate target of the attack are ineffective, but patches to the machine that would form part of the botnet are effective.

A firewall would take care of that.

Such a firewall would have to be installed at the ISP. Otherwise, the attack traffic sent by your unpatched, Internet-connected Windows PC would congest a subscriber's link, keeping legitimate traffic from getting even as far as the firewall. In addition, if the firewall is vulnerable to other attacks, your unpatched, Internet-connected Windows PC could be used as an amplifier to attack it.

I know of no IoT devices or any significant number of non-PCs that run Windows.

That's not the point. Your unpatched, Internet-connected Windows PC could be used as an amplifier to attack unpatched non-Windows non-PC devices that cannot be patched for some reason.

That is called "blaming the victim".

The existence of secondary liability and recklessness as a mens rea shows that at least some measure of victim blaming is the law of the land.

Comment Proprietary software makes anonymity unverifiable (Score 2) 43

Data is gathered and sent encrypted and in a completely anonymous fashion

Unless an application is downloaded from a repository that builds from public source, such as F-Droid, the end user has no way to verify this.

at no time is personally identifiable data shared with marketing companies or sold.

The end user has no way to verify this.

There will always be the tin-foil hat crowd that attaches some type of nefarious motive to such product improvement efforts

I think the fear is that a hostile government could subpoena private information in crash dumps and the like for a fishing expedition.

Slashdot Top Deals

God doesn't play dice. -- Albert Einstein

Working...