Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:No duh. (Score 1) 11

There's plenty of times where this would be lawful *and* appropriate.
there is reasonable cause to suspect a group is planning a bank robbery.
Turning on the On-Star tracking and mic in their getaway car is both lawful (assuming you get a warrant) and appropriate.

There are also (I suspect) vastly more inappropriate uses in those sealed dockets than there are appropriate ones.

Unsealing these as a mater of course would (IMHO) lower the inappropriate use only if when it's discovered it's followed up on with the individuals seeking and granting such use (fines, warning letters, dismissal).

Comment Re: Makes perfect sense (Score 1) 309

Yes. This. A thousand times this. And when you try to turn it off, half the time, you accidentally press both the power and volume buttons, and the phone ignores it. Apple doesn't design for end users. They actually design for their own designers and engineers.

The last phone that was actually designed for end users was the 3GS. Since then:

  • 4 Series was covered with unnecessary glass whose only purpose was to look pretty and then break.
  • 5 Series moved the headphone jack to the wrong end of the phone, making it essentially impossible to build a holster that allows access to both the headphone jack and the power cord, to save space inside the device.
  • 6 Series had that design flaw *plus* putting the power button in a defective position, presumably for some engineering-centric reason.
  • 7 Series has that design flaw plus the headphone jack nightmare.

What's next? Buttons so perfectly smooth that you can't find them by feel?

Comment Re:Password fatigue (Score 2) 176

going to do a quick count of how many pwds I deal with at work: ...
I have 49 separate pwds I need to know to do my job.
of those *several* are in a one-note file that is on a secure server so others with the same need to know can remain synchronized.
Three or four of these also require a SecurID or similar token.
Only two are committed to memory.


Comment Re:Technically neither can ICANN or a domain provi (Score 1) 135

Copyright law still benefits people.

Overall it does. In some specific situations, it does not. One category of these is a copyright owner deliberately keeping a previously published or publicly exhibited work out of print everywhere or in particular countries. An example of this is Song of the South. Another is uncertainty over whether a song you've written is legally original, as opposed to an accidental infringement of copyright in someone else's song. An example of this is "My Sweet Lord" by George Harrison. Why are those specific cases worth keeping?

Heck, I did something similar with a needle - just pierce a hole at random, then figure out which sectors are unreadable in my original. If you could read them, the floppy was not an original. And since it was at random, no two disks were alike. Writing data to the original wasn't a big deal - once you knew where the bad sectors were, skip over them.

Nintendo GameCube disc authentication works the same way: burn six evenly spaced pinholes in the lead-in at some random theta, and then mark in the Burst Cutting Area which sectors were burned.

Comment Re: sure! (Score 1) 288

some of my friends know me as "the chemist" :)
Those friends have guns (and are good with them).
There is a group of about 20 of us that, while we may not be best mates we recognize each other's value in certain situations. Guns with requisite skill, gardening, wood carving, food preservation, etc. Everyone would have value to the whole.

Comment Re:Reality is... (Score 1) 176

No, My Gentle Fool, there isn't. It is entirely possible that 1-2-3-4-5 could be _Everybody's_ Password.

You've missed my point entirely. "12345" is the fifth numeric password an attacker would try (after "1", "12", "123", and "1234"). It doesn't matter how securely you store it or how long each guess takes, if an attacker has a reasonably high chance of guessing it by a mere educated guess.

Sure, you could lock the account after X guesses - But then you've just given me a trivial way of locking out the legitimate account-holder as well - Arguably, a lot of kids just out to raise some hell rather than seriously wanting to compromise your accounts would prefer that (applied on as large a scale as possible) than actually guessing the right password. "Oh, look, we just locked the entire Microsoft staff out of their own network, ha-ha!"

Any Password, hashed in any number of many ways repeatedly, and yet each one with a unique Time Stamp embedded and invisible, should do the trick.

That accomplishes nothing more than slowing down any brute force attempts. It certainly doesn't somehow magically make one of the top few million passwords more secure. Or, looked at another way, let's say you use such a horrendously complex hash that each guess takes a whole second. You've just handed any potential attackers a trivial on/off switch to DOS'ing (no leading "D" required) your site, as your poor server farm tries to keep up with just a handful of bad login attempts per second.

Time Stamps supposedly assigned to certain Alpha Decay Chains stuck out like three sore thumbs upon later Analysis.

Would you care to provide a link on how timestamped audit trails have anything to do with brute-force password cracking? It sounds like you've mixed up two separate concepts here. Yes, you can make an RTPS virtually tamper-proof; that doesn't have much in common with proving my identity to Facebook from a previously untrusted computer.

Comment Re:Reality is... (Score 4, Interesting) 176

What form of "properly hashed and securely stored" would make a five character numeric-only password even remotely acceptable?

Mind you, I don't disagree with your premise - The problem here has nothing to do with end-users, and everything to do with expecting them to remember over a hundred distinct "secure" passwords. But that glaring flaw aside (which leads people to use the least secure password a site will let them, and reuse it at every site they can), there *is* still such a thing as a pathetically weak password.

We've all seen, and can debate the exact accuracy of the relevant XKCD strip, but the general idea holds true - We'd all do a hell of a lot better to use memorable three to five word phrases, than trying to squeeze something we can almost remember into leetspeak with an extra random character or two tacked on at the end.

Comment Re:What about EU users (Score 1) 76

Is that some sort of misplaced arrogance, or do you really not understand how easy blocking WhatsApp/Facebook would be if the German authorities wanted to do it?

People write as if the Internet is some huge network that everyone has unlimited access to, but guess what? It's not. You have an ISP, and somewhere up the line they are hooked in to a relatively small number of pipes in and out of any given country, and those pipes are controlled by a major infrastructure provider that isn't going to argue with the national government.

The political fall-out could be a different question, but somewhere like Germany the people are very cautious about excessive surveillance and profiling for obvious historical reasons, so I wouldn't bet on WhatsApp/Facebook winning the PR battle either.

Comment LGPL does not "infect" the same way (Score 1) 44

Needs a stable, standard, unencumbered, free GUI -- windows, menus, toolbars, widgets, mouse, touch, etc. It'd be lovely if it was open source and not a barely-masked invitation to buy a new Porsche for some lawyer, too. IOW, no GPL infection.

Assuming that by "infection" you mean "causing [a larger work] to be distributable only under copyleft terms":

Both GTK+ widgets and Qt widgets are under the GNU Lesser General Public License (LGPL). Because LGPL is a weak copyleft, use of an LGPL library in a larger work does not "infect" it. It does, however, require an application's object to be available to a licensed user without digital restrictions management, which rules out a port to iOS or major video game consoles.

Slashdot Top Deals

Just go with the flow control, roll with the crunches, and, when you get a prompt, type like hell.