Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Yup (Score 1) 235

Yes, because they're meant to kill - of course they're a better deterrent than something not meant to kill...

The numbers you quote, which came from actual studies, are valuable; however, the rather important contrast (you left out for some reason) is that given the average annual defensive firearm incidents reported - the number of violent crimes committed using firearms is astronomically higher (in 1992 for example, 931,000.)

Statistics clearly state that gun ownership is not an effective deterrent to violent crime committed with a gun.

I'm not interested in taking peoples' guns away, but it does get annoying to listen to the bullshit spouted in the name of "guns are good" and "the only cure for a bad guy with a gun is a good guy with a gun" types of stupidity.

BTW, not sure where you got the crazy numbers of 2.5 million and 4.7 million given that in 1992 there were fewer than 4.7 million violent crimes of any time (robbery, murder, manslaughter, rape, aggravated assault, et cetera...)

Comment Re:Who knew? (Score 1) 294

Even the most rudimentary investigation into this story reveals that the hospital didn't decided to take her from her parents, the state child protective services (equivalent) did. There are also some pretty strong correlations between her condition being strongly exacerbated by the presence of her mother (which is the basis by which she has been diagnosed with a psychosomatic disorder.)

I don't doubt that this poor girls is suffering from physical disorder(s), but it's a very complex situation and the hacker seems like an idiot for reacting in this fashion.

Comment Re:Ex post facto (Score 1) 302

It depends (of course, lol.) If they did something explicitly (not implicitly) allowed by law - that would be true. If implicitly allowed (i.e. there's no law that says you cannot do that) then it's certainly arguable.

The EU would likely argue (likely very successfully) that Apple behavior is not explicitly forbidden, but instead implicitly forbidden by other laws (which they will traipse out at that time.)

The whole thing is academic at this point because everyone and their dog knows that this is exactly what Apple was doing, and they were expecting that the EU would just be happy to receive the little taxes they did receive. Solid, but short term, thinking. As soon as the U.S. got pissed about this, the EU knew they had Apple over a barrel.

Comment Not surprising, people who are usually excellent.. (Score 1) 179 reverse engineering and cracking tend to be extremely 'pragmatic' in their approach to creating software.

People are constantly confusing programming with software engineering. Look at Google for example, look at the design decisions behind golang. Google has lots of very smart people no doubt, but golang was designed around their pervasive weakness - they do not tend to be good software engineers (experience will usually lead them there though.)


Should Cloud Vendors Decrypt Data For The Government? ( 136

An anonymous Slashdot reader quotes an article by Help Net Security's editor-in-chief: More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance (CSA). 35 percent believe cloud app vendors should be forced to provide government access to encrypted data while 55 percent are opposed. 64 percent of US-based infosec professionals are opposed to government cooperation, compared to only 42 percent of EMEA respondents.
Raj Samani, CTO EMEA at Intel Security, told Help Net Security the answers ranged from "no way, to help yourself, and even to I don't care..." But since vendors can't satisfy both camps, he believes the situation "demands some form of open debate on the best approach to take..."

Comment Re:Security theater (Score 1) 19

It's not security theater - it's not intended to make things 'more secure' - it's intended to allow enterprises (Fortune 100 types) to integrate their existing centralized key management systems into GCE so that they don't have two sets of keys, two sets of audit data, two sets of key policies, et cetera.

This will make it an easier decision for enterprises to push their key-oriented applications/systems/service-bus' into GCE. Previously this was a pain in the rear.

Comment Re:Not Client Side? (Score 2) 19

This is a move by Google to allow enterprise key management systems employed by big business to operate in the Google Cloud (previously a very hacky arrangement.)

I wouldn't be surprised, given Google's new focus on the Enterprise with GCE (note the leadership changes), to see Google Docs starting to embrace a 'bring your own' encryption feature set to its applications as well.

This would be a differentiator for Google as Microsoft's solution (RMS) really doesn't work well in this scenario and Amazon is starting to embrace enterprise key management (but is just starting.)

Google would be the first with a cloud offering, encryption integration points, and an enterprise encrypted document play that could be federated. The fear is, as some other posters noted, will Google commit to this or just do it for 2 years and then dump the whole thing?


WhatsApp Isn't Fully Deleting Its 'Deleted' Chats ( 60

Facebook-owned messaging app WhatsApp retains and stores chat logs even after those messages have been deleted, according to iOS researcher Jonathan Zdziarski. The Verge reports: Examining disk images taken from the most recent version of the app, Zdziarski found that the software retains and stores a forensic trace of the chat logs even after the chats have been deleted, creating a potential treasure trove of information for anyone with physical access to the device. The same data could also be recoverable through any remote backup systems in place. In most cases, the data is marked as deleted by the app itself -- but because it has not been overwritten, it is still recoverable through forensic tools. Zdziarski attributed the problem to the SQLite library used in coding the app, which does not overwrite by default. WhatsApp was applauded by many privacy advocates for switching to default end-to-end encryption through the Signal protocol, a process that completed this April. But that system only protects data in transit, preventing carriers and other intermediaries from spying on conversations as they travel across the network.

Slashdot Top Deals

Swap read error. You lose your mind.