Forgot your password?
typodupeerror

Comment "Overcapacity" (Score 1) 207

Overcapacity: China exports a much smaller percentage of cars they produce than Japan, South Korea and Germany do. If China had a car overcapacity, then those countries have had much more severe ones for several decades now.
From Western AI:
Japan: 49%
"Japan's automotive industry shows a high reliance on exports, with about 49% of the passenger cars produced in Japan between April 2023 and March 2024 being exported (4.05 million exported out of 7.55 million produced)."
Germany: 70%
"Germany exports the vast majority of its cars, with many major brands exporting over 70% of their German production, though the exact percentage varies by brand."
South Korea: 65%
"Approximately 65% of cars produced annually in South Korea are exported, with a total of 2.77 million units exported in a recent period. This figure can fluctuate, but exports consistently represent a large majority of the country's car manufacturing output."
China: 23%
"In 2024, China exported about 7 million vehicles, which represented a small fraction of its total production of approximately 30 million vehicles. This means that roughly 23% of the cars produced in China were exported in 2024."

Comment Re:Afraid of bugged hardware? (Score 1) 397

"As long as Americans continue to elect politicians that worship companies and the "free market" over their own countries interests [...]"

This is capitalism. Big corporations control politics. It doesn't matter who the American vote for. Capitalism is eating away democracy. In a culture that seeks infinite growth and ever growing profits, eventually more and more people will end up picking up the tab.

Comment Re:The death-knell of US cloud providers... (Score 3, Insightful) 771

Lavabit is supposed to be a zero knowledge mail provider.

If you believe that, I have a bridge I'd like to sell you. It is perfectly possible to make a email system where the provider knows very little, but you need to change the basic email protocols to do that. Even PGP isn't sufficient, since it doesn't protect key portions of the mail (To:, From:, Subject:, message length, etc) from observation.

If you receive normal email through SMTP, the provider must be able to read the email as it arrives. Similarly, if you offer a web interface to access, the provider must be able to read your email when you access it through the web interface, because the provider can always provide JavaScript that leaks any keys involved back to the server.

Comment The death-knell of US cloud providers... (Score 5, Insightful) 771

Clearly the operator of Lavabit received a national security letter or warrant which he objected to.

Now since Lavabit is based on normal mail protocols, the operator has the ability to see all the data when it comes in, and obviously with a warrant or NSL, the provider can be compelled to provide the information to the feds. But I suspect that the request was not just something mild ("This sleazebag's mail account") but something broader, given the reaction was to close down the service completely.

In any case, this is also a great reminder of why the cloud, especially US cloud providers, can't be trusted. Companies who care about security are going to have to abandon the cloud and go back to insourcing their infrastructure.

Comment BAD article, better source, and other notes... (Score 5, Informative) 923

The Atlantic article is BAD. Not only is it a summary with no additional information (and information removed), but uses a bad and unrelated photograph!

Read the original article on Medium, and I strongly suggest that a Slashdot editor change the article link.

Although circumstantial, this implies one of two possibilities. Either Google is voluntarily looking for "suspicious" searches and reporting them to law enforcement, or law enforcement (using a warrant, a wiretap, a NSL, or similar) is either forcing Google to look for such suspicious searches or simply wiretapping Google.

Comment Welcome to Cisco and MS's future... (Score 5, Interesting) 410

The problem is the credible fear of a lifecycle attack is sufficient to require that such hardware be avoided. There is a reasonable fear that the chinese might try something using Lenovo kit, therefore the classified networks need to avoid it. Its the same reason why Huawei networking hardware is avoided in some circles.

Of course, with the NSA now clearly off the leash, US IT equipment is now in the same position. Microsoft clearly backdoored Skype to enable easy wiretapping, the NSA is reportedly hacking foreign networks to introduce monitoring (who knows, perhaps it was the NSA responsible for the Athens Affair?), and with any US Cloud service provider subject to PRISM-style requirements, US IT infrastructure is now in the same boat that the Chinese have been struggling with for years now.

Comment But does it work well in practice? (Score 5, Interesting) 94

Strongbox technically is very strong, without a doubt. But, being TOR based, it will be hard to use. Worse, a potential leaker not only must use their own computer (ideally a throwaway computer), but they can never have VISITED the Strongbox information page from work, because otherwise any leak to the New Yorker will be suspicious.

And Strongbox's information page drives Ghostery crazy! Not a good sign for a privacy tool.

Probably more important is general Operational Security, including burner phones and/or burner computers.

Julia Angwin has an excellent additional point: Physical mail (dropped in a random post-box with a bogus return address) is perhaps the best way for anonymous one-way communication. The USPS will record address information when asked by law enforcement, but (currently) doesn't record this on all mail. Thus there is no history and, even if there was, this can only be traced to the processing post office. Perhaps the best use of the mail is simply to send the reporter a burner phone preprogrammed so that the reporter can call your burner.

Comment Period of Relevance (Score 1) 564

Why is it so hard to imagine a technology that "only" stays relevant for 8 years or so? The iPod became relevant in 2004 and stopped being so shortly after the iPhone's introduction. That's less than 8 years of relevance. The iPad is in its Year 3. By the way, there are so much dissing around here that it seems Slashdot has become just another site where haters and fanboys gather.

Comment 1FuckBTCqwBQexxs9jiuWTiZeoKfSo9Vyi (Score 2) 239

Yes, send your unwanted bitcoins here: 1FuckBTCqwBQexxs9jiuWTiZeoKfSo9Vyi

Overall, a general problem with BitCoin mining is that it is a classic "Red Queen's Race". The fixed rate of bitcoin addition means you can only get ahead at the cost of someone else. Which means, IF bitcoin succeeded, mining is effectively non-profit as the rather low barrier to entry (even ASIC rigs are only $2K) and no monopoly power means that the profit from mining gets, well, stripped out.

Slashdot Top Deals

The world will end in 5 minutes. Please log out.

Working...