Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 7 declined, 14 accepted (21 total, 66.67% accepted)

Submission + - How the Next Keurig Will Make Your Coffee: with a Dash of DRM (techdirt.com)

FuzzNugget writes: Apparently seeking to lock competitors out of the burgeoning single-serve coffee market, Green Mountain Coffee Roasters, maker of the popular Keurig coffee machines, is jumping on the DRM bandwagon. GMCR's CEO confirmed this in a statement, heaping piles of marketing doublespeak about providing "game-changing functionality and performance" by using "interactive technology" to "ensure quality". The obvious goal, of course, is to prevent "unlicensed" third parties from selling compatible refills and reusable pods. Want to bet on quickly the DRM will be subverted? Loser buys coffee.

Submission + - Stop Trying To "Innovate" Keyboards, You're Just Making Them Worse (arstechnica.com)

FuzzNugget writes: Ars Technica brings the hammer down on the increasing absurdities plaguing laptop keyboards, from the frustrating to the downright asinine "adaptive keyboard" of the new Lenovo X1 Carbon. When will laptop manufacturers finally perform a much needed cranialrectalectomy instead of needlessly reinventing the wheel with every new generation?

Submission + - Australian Teen Reports SQL Injection Vulnerability, Gets Arrested (wired.com)

FuzzNugget writes: Wired brings us the latest in security researcher witch hunts: "Joshua Rogers, a 16-year-old in the state of Victoria, found a basic security hole that allowed him to access a database containing sensitive information for about 600,000 public transport users who made purchases through the Metlink web site run by the Transport Department. It was the primary site for information about train, tram and bus timetables. The database contained the full names, addresses, home and mobile phone numbers, email addresses, dates of birth, and a nine-digit extract of credit card numbers used at the site, according to The Age newspaper in Melbourne. Rogers says he contacted the site after Christmas to report the vulnerability but never got a response. After waiting two weeks, he contacted the newspaper to report the problem. When The Age called the Transportation Department for comment, it reported Rogers to the police."

Submission + - Memo to Parents and Society: Teen Social Media "Addiction" is Your Fault (wired.com)

FuzzNugget writes: Wired presents a this damning perspective on so-called social media addiction...

If kids can’t socialize, who should parents blame? Simple: They should blame themselves. This is the argument advanced in It’s Complicated: The Social Lives of Networked Teens, by Microsoft researcher Danah Boyd. Boyd ... has spent a decade interviewing hundreds of teens about their online lives. What she has found, over and over, is that teenagers would love to socialize face-to-face with their friends. But adult society won’t let them. “Teens aren’t addicted to social media. They’re addicted to each other,” Boyd says. “They’re not allowed to hang out the way you and I did, so they’ve moved it online.

It’s true. As a teenager in the early ’80s I could roam pretty widely with my friends, as long as we were back by dark. Over the next three decades, the media began delivering a metronomic diet of horrifying but rare child-abduction stories, and parents shortened the leash on their kids. Politicians warned of incipient waves of youth wilding and superpredators (neither of which emerged). Municipalities crafted anti-loitering laws and curfews to keep young people from congregating alone. New neighborhoods had fewer public spaces. Crime rates plummeted, but moral panic soared. Meanwhile, increased competition to get into college meant well-off parents began heavily scheduling their kids’ after-school lives.


Submission + - Obama's Privacy Reform Panel Will Report to... the NSA (arstechnica.com)

FuzzNugget writes: No, you didn't just stumble upon The Onion by mistake. Ars Technica reports that Obama's "reform" panel will report directly to James Clapper, the Director of National Intelligence who arguably lied to congress about whether the NSA conducted dragnet surveillance of Americans' communications. But is anyone really surprised?

Submission + - Rise of the Warrior Cop: How America's Police Forces Became Militarized

FuzzNugget writes: An awakening piece in the Wall Street Journal paints a grim picture of how America's police departments went from community officers walking the beat to full-on, militarized SWAT opterations breaking down the doors of non-violent offenders.

From the article: "In the 1970s, there were just a few hundred [raids] a year; by the early 1980s, there were some 3,000 a year. In 2005, there were approximately 50,000 raids." It goes on to detail examples of agressive, SWAT-style raids on non-violent offenders and how many have ended in unecessary deaths.

Last year, after a Utah man's home was raided for having 16 small mairijuana plants, nearly 300 bullets in total were fired (most of them by the police) in the ensuing gunfight, the homeowner believing he was a victim of a home invasion by criminals. The US miltary veteran later hanged himself in his jail cell while the prosecution sought the death sentence for the murder of one officer he believed to be an criminal assailant. In 2006, a man in Virgina was shot and killed after an undercover detective overheard the man discussing bets on college football games with buddies in a bar. The 38-year-old optomitrist had no criminal record and no history of violence.

The reports range from incredulous to outrageous; from the raid on the Gibson guitar factory for violation of conservational law, to the infiltration of a bar where underage youth were believed to be drinking, to the Tibeten monks were apprehended by police in full SWAT gear for overstaying their visas on a peace mission. Then there's the one about the woman who was subject to a raid for failing to pay her student loan bills.

It's a small wonder why few respect police anymore. SWAT-style raids aren't just for defense against similarly-armed criminals anymore, it's now a standard ops intimidation tactic. How much bloodshed will it take for America to realize such a disproportionate response is unwarranted and disasterous?

Submission + - Got Malware? Get a Hammer! (arstechnica.com)

FuzzNugget writes: After the Economic Development Administration (EDA) was alerted by the DHS to a possible malware infection, they took extraordinary measures. Fearing a targeted attack by a nation-state, they shut down their entire IT operations, isolating their network from the outside world, disabling their email services and leaving their regional offices high and dry, unable to access the centrally-stored databases.

A security contractor ultimately declared the systems largely clean, finding only six computers infected with untargeted, garden-variety malware and easily repaired by reimaging. But that wasn't enough for the EDA: taking gross incompetence to a whole new level, they proceeded to physically destroy $170,500 worth of equipment, including uninfected systems, printers, cameras, keyboards and mice.

After the destruction was halted — only because they ran out of money to continue smashing up perfectly good hardware — they had racked up a total of $2.3 million in service costs, temporary infrastructure acquisitions and equipment destruction.

Submission + - Big Changes Coming to Canada's Wireless Landscape (www.cbc.ca)

FuzzNugget writes: The CRTC has unveiled a code of conduct that brings many positive changes for Canadian wireless customers, most notably:
  • Carriers must provide the option to unlock a cell phone after 3 months for subsidized phones within the contract period, or immediately if the device was purchased outright.
  • Contracts are now capped at two years, and cancellation fees are limited to the amount of the subsidy.
  • Carriers can no longer charge outrageous data overage and international roaming charges. Without explicit consent from the a customer, such charges are capped at $50 and $100 per month, respectively.

The full text of the Wireless Code is available on the CRTC's website.

Submission + - Canadian Man Pleads Guilty in Celebrity Hacking, Harrassment Case (www.cbc.ca)

FuzzNugget writes: A 25-year-old man from Abbotsford, British Columbia has plead guilty to several charges involving the unauthorized access to a computer and phone belonging to singer Carly Rae Jepsen, who also hails from BC.

It's alleged that after obtaining nude photos from the singer's computer and phone, he attempted to sell them to media outlets. The allegations also include releasing a fake sex tape claming to be of the celebrity. As a result, he was charged with a number of offenses, from unauthorized use of computer to (oddly) fraudulently obtaining telecommunications services, mischief to data, identity fraud and possession of stolen property.

It will be interesting to watch this unfold and see how Canada's laws on computer-based crimes compare to those of the US, particularly the notorious Computer Fraud and Abuse Act.

Submission + - The Canadian Government's War on Science (scienceblogs.com)

FuzzNugget writes: A contributor at ScienceBlogs.com has compiled and published a shockingly long list of systematic attacks on scientific research committed by the Canadian government since the conservatives came to power in 2006.

This antiscientific scourge includes muzzling scientists, shutting down research centres, industry deregulation and repurposing the National Research Council to align with business interests instead of doing real science. It will be another two years before Canadians have the chance to go to the polls, but how much more damage will be done in the mean time?

Submission + - Feds Drop Two of Three Charges Against "Hacker" Gambler (wired.com) 1

FuzzNugget writes: According to Wired, the two CFAA charges that were laid against the man who exploited a software bug on a video poker machine have been officially dismissed.

Says Wired: "[U.S. District Judge Miranda] Du had asked prosecutors to defend their use of the federal anti-hacking law by Wednesday, in light of a recent 9th Circuit ruling that reigned in the scope of the CFAA. The dismissal leaves John Kane, 54, and Andre Nestor, 41, facing a single remaining charge of conspiracy to commit wire fraud"

Kane's lawyer agreed, stating, "The case never should have been filed under the CFAA, it should have been just a straight wire fraud case. And I’m not sure its even a wire fraud. I guess we’ll find out when we go to trial.”

Submission + - Netflix to go HTML5, but not without DRM 1

FuzzNugget writes: In a recent blog post, Netflix details their plans to transition from Silverlight to HTML5, but with one caveat: HTML5 needs to include a built-in DRM scheme. With the W3C's proposed Encrypted Media Extensions, this may come to frition. But what would we sacrificing in openness and the web as we know it? How will developers of open source browsers like Firefox respond to this?

Submission + - How Mobile Devices Kill Your Creativity (readwrite.com)

FuzzNugget writes: ReadWrite has posted a thought-provoking piece on how mobile devices killing our boredom may also be killing our creativity...

"Numerous studies and much accepted wisdom suggest that time spent doing nothing, being bored, is beneficial for sparking and sustaining creativity. With our iPhone in hand — or any smartphone, really — our minds, always engaged, always fixed on that tiny screen, may simply never get bored. And our creativity suffers."

Ironically, you'll probably be reading this on a smartphone.

Encryption

Submission + - Ask Slashdot: Less Volatile Encryption?

FuzzNugget writes: A recent catastrophic hard drive failure has caused me to ponder whether the trade-off between security and convenience with software-based OTFE is worthwhile. My setup involves an encrypted Windows installation with TrueCrypt's pre-boot authentication, in addition to having data stored in a number of TrueCrypt file containers.

While it is nice to have some amount of confidence that my data is safe from prying eyes in the case of loss or theft of my laptop, this setup poses a number of significant inconveniences:

1. Backup images of the encrypted operating system can only be restored to the original hard drive (ie.: the drive that has failed). So, recovery from this failure requires the time-consuming process of re-installing the OS, re-installing my software and re-encrypting it. Upgrading the hard drive where both the old and new drives are still functional is not much better as it requires decryption, copying the partition(s) and re-encryption.

2. With the data being stored in large file containers, each around 100-200GB. It can be come quite burdensome to deal with these huge files all the time. It's also a particularly volatile situation, as the file container is functionally useless if it's not completely intact.

3. As much as I'd like to use this situation as an opportunity to upgrade to an SSD, use with OTFE is said to pose risks of data leaks, cause decreased performance and premature failure due to excessive write operations.

So, with that, I'm open to suggestions for alternatives. Do you use encryption for your hard drive(s)? What's your setup like and how manageable is it?

Slashdot Top Deals

This process can check if this value is zero, and if it is, it does something child-like. -- Forbes Burkowski, CS 454, University of Washington

Working...