Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Proprietary software is unsafe building material (Score 1) 227

As well you should have, and so should have every car owner have the means to get complete corresponding source code with build instructions. Software freedom gives car owners the means to help themselves and prevent more outbreaks of this ridiculousness as Eben Moglen pointed out when we saw the first round of this.

Comment Trump asks for what US has long done (Score 1) 1017

As Glenn Greenwald of The Intercept reminds us, "Governments do spy on each other and do try to influence events in other countries, certainly the U.S. government has a very long and successful history of doing exactly that.". So hearing Americans, particularly Democrats, complain about Trump's request here reminds us the US has unclean hands and about far more important things than distracting us away from the ugliness the Democrats apparently sic on each other to win political races. Some of that increased ugliness includes voter shenanigans (possibly voter suppression) to make it harder for would-be Bernie Sanders voters to vote in the Democratic primary, collusion with news outlets to suppress unfavorable stories, and possible illegality from the DLC. These strike me as far more interesting considering the veracity of the DLC emails remains unchallenged.

The last thing the Democrats really want is people thinking about Hillary Clinton's voting record, or campaign funding sources. That analysis won't go down well with anti-war, pro-universal health care, pro-organized labor, anti-fracking, anti-TPP voters the Democrats seem to be losing. Such discussion might lead these voters to notice that the Democrats are apparently as interested as the Republicans in using a distractionary fear-based campaign against the only competition they're willing to admit to (no talk of Greens or Libertarians, for instance, people might defect or demand inclusive debates).

Comment It looks like the best system for my needs... (Score 1) 134 a notebook with usernames and passwords written down in it. Primarily because any system I use has to work on Linux, Mac, Windows, iOS, and Android.

I don't actually write down the password, but a description of it. "Usual, first letter cap, +9*3, without old First Sergeant's name" type of thing.

Comment Democratic Party lying? (Score 1) 704

A video edit comparing what Hillary Clinton claimed to what James Comey claimed after the FBI investigation highlights the distance between the two quite well and puts a fine point on the part where Comey says that if this had been anyone else who did what she did they might not get the same cushy response from the FBI she got.

And keep in mind that the US has very unclean hands here, according to Edward Snowden, former NSA contractor who would know what tools the NSA has available to look into this.

But of course the veracity of the documents leads us to the real story. Nobody claims the DNC emails were faked, just like nobody said the Snowden revelations were untrue. This helps us focus on what those documents show: Bernie Sanders was not lying to us when he said, "I told you a long time ago that theâ"that the DNC was not running a fair operation, that they were supporting Secretary Clinton.", and that he requests far too weak of a solution to remedy the problem (getting rid of Debbie Wasserman Schultz as chair of the DNC). And the emails show us that the DNC were telling amenable media outlets (such as NBC, if I recall correctly) which stories to not publish because they made someone they cared about look bad. Julian Assange's interview on Democracy Now is worth reading, it's quite revealing about how nasty the Clinton campaign is, sourcing the unnamed "experts" who told Robby Mook, Clinton campaign manager, that "Russian state actors broke into the DNC, stole these emails" and "are releasing these emails for the purpose of actually helping Donald Trump".

Comment /. should encourage sharing (Score 4, Insightful) 66

So why not encourage GPL violators ("pirates" too)? Instead we seem to cheer whenever we find a GPL violator.

First, we should understand what the propagandistic term "piracy" really means and understand that meaning as separate from sharing—a friendly, neighborly thing to do. As the GNU Project points out in it's list of terms to avoid on "theft": "In general, laws don't define right and wrong. Laws, at their best, attempt to implement justice. If the laws (the implementation) don't fit our ideas of right and wrong (the spec), the laws are what should change. A US judge, presiding over a trial for copyright infringement, recognized that "piracy" and "theft" are smear-words.". This difference gets to the heart of the problem in your point—you're conflating the legal with the ethical and then trying to get others to view all sharing as copyright infringement and all copyright infringement as equivalent because the law frames things in that way.

We should recognize that the terms of the licenses involved between, say, the GNU General Public License (GPL) and a typical Hollywood movie, are radically different when it comes to doing what friends do: share. One can and should share copies of GPL'd programs. It's easy to do, the GPL is easy to comply with simply by also sharing a copy of the complete corresponding source code of the program at the same time as one shares the binary. By contrast, other famously shared copyrighted items (such as most Hollywood movies) aren't legal to share even if done non-commercially and verbatim. So doing the thing that comes naturally with friends, non-commercial and verbatim sharing, is likely not allowed by that movie's license.

Since you mention the GPL, a free software license written by Richard Stallman, this is somewhat akin to what Stallman describes in his talks about the freedoms of free software specifically freedom #2: the freedom to help your neighbour. That's the freedom to make copies and distribute them to others, when you wish. This comes from a 2006-03-09 talk and you can see how the consideration here is akin to the dilemma one faces should a friend ask for a copy of a Hollywood movie:

Freedom two is essential on fundamental ethical grounds, so that you can live an upright, ethical life as a member of your community. If you use a program that does not give you freedom number two, you're in danger of falling at any moment into a moral dilemma. When your friend says "that's a nice program, could I have a copy?" At that moment, you will have to choose between two evils. One evil is: give your friend a copy and violate the licence of the program. The other evil is: deny your friend a copy and comply with the licence of the program.

Once you are in that situation, you should choose the lesser evil. The lesser evil is to give your friend a copy and violate the licence of the program.


Now, why is that the lesser evil? The reason is that we can assume that your friend has treated you well and has been a good person and deserves your cooperation. The reason we can assume this is that in the other case, if a nasty person you don't really like asked you for help, of course you can say "Why should I help you?" So that's an easy case. The hard case is the case where that person has been a good person to you and other people and you would want to help him normally.

Whereas, the developer of the program has deliberately attacked the social solidarity of your community. Deliberately tried to separate you from everyone else in the World. So if you can't help doing wrong in some direction or other, better to aim the wrong at somebody who deserves it, who has done something wrong, rather than at somebody who hasn't done anything wrong.

However, to be the lesser evil does not mean it is good. It's never good - not entirely - to make some kind of agreement and then break it. It may be the right thing to do, but it's not entirely good.

The only thing in the software field that is worse than an unauthorised copy of a proprietary program, is an authorised copy of the proprietary program because this does the same harm to its whole community of users, and in addition, usually the developer, the perpetrator of this evil, profits from it.

Comment High-tech users have a lot to learn here (Score 1) 639

There's a lot programmers, sysadmins, and other high-tech people could learn from those who are used to organizing politically for shared ends. Political advocacy is not one of the poorer high-tech person's strengths. There's a streak of undeserved independence in high-tech that doesn't reflect how much people have to work together explicitly for political ends, not dismissing politics as undesirable, unnecessary, or unimportant as you commonly see the high-tech set train each other to espouse.

Comment Why do you believe people don't care? (Score 4, Informative) 104

What's your backing for that assertion?

I ask this because I notice you've cited nothing backing up your claim, and it's quite a claim. And because people on /. make comparably grand assertions of people not caring about the Snowden revelations despite evidence to the contrary, and it's a good idea to back up one's statements from something substantial.

Glenn Greenwald, Edward Snowden, and Noam Chomsky addressed this at a recent talk on privacy and spent some time debunking the notion that the public doesn't care about privacy or that Snowden's revelations weren't a big deal.

The host says around 32m44s that after Snowden's revelations were published by international news "Pew Internet Life Research shows that people were modifying their behavior -- they were self-censoring, they were curtailing their own speech.". Around 38m the host questions the point directly asking "Do people in general care?" to which we get variations on the theme of "Yes" ranging from Snowden's point that whether people care "isn't really that material even if it is the case [because] rights don't exist for the majority; rights exist to protect the minority against the majority.". He then explains that he thinks increasingly people do care because they only recently learned of the threat to their privacy and then he explains that threat in plain language.

Greenwald, by this time in the discussion, had already debunked the notion that people who say they have no secrets and therefore don't care: He offered them his email address and told them to send him the credentials of every personal (as opposed to work) account they have including the sensitive ones (I interpreted this to mean an account on, say, a cheat-on-one's-spouse site). To date, he said, nobody's taken him up on his offer. Here he points out that contrary to the naysayers who dismissed the Snowden revelations as a flash-in-the-pan that would go away in a few days, these documents have been headline stories "not just in the United States but in dozens of countries in multiple continents around the world precisely because people were so angry and offended at the intrusion into their privacy including people who might have said in the past 'I don't really care'." (43m43s). He cites a "massive increase in the number of people around the world who are now using encryption to protect the privacy of their communications, to the number of people who put pressure on the US Government in both parties to enact legislation limiting these programs [the NSA spying programs] but maybe the best evidence of all of how much people care about privacy is the behavioral change in Silicon Valley companies. The biggest ones -- Yahoo, Facebook, Apple, and Google, and Microsoft -- when I first read the archive that Ed gave me, one of the things that struck me the most is what full-scale collaborators these companies were in the surveillance state that the NSA had created. They were not only complying [and a Snowden leaked document from the NSA showing "Dates When PRISM Collection Began For Each Provider"] [...] to the extent the law required but even went beyond that." including building backdoors into their non-free, user-subjugating, proprietary software. Greenwald concludes, "And the reason they were such full-scale collaborators is because nobody knew they were doing it completely in the dark, nobody knew they were doing it, and there was no cost." (45m18s). Once this became known these companies changed their behavior due to fear of being seen as the collaborators they have been for so long. They know the pressures of their customer base and that they are seen standing up to the FBI, being "seen as aides and abettors of ISIS", etc. People won't use these companies' products and services if they know their privacy won't be upheld.

Noam Chomsky reflected on this from a historical perspective saying that the answer was given centuries ago by Blaise Pascal, "The root of man's misfortunes is the lack of a room in which one can sit quiet and undisturbed." recognizing that this metaphor is substantively correct.

Comment Working with DHS components (Score 2) 198

DHS being the Defense Health Service of the DoD. Someone had the brilliant idea of requiring the use of CACs (ID cards) to log in to terminals used by military medical personnel worldwide. This would satisfy the HIPAA requirements, keep Security happy, make it easy to log who was seeing what, and generally be a Good Thing.

Then it was pointed out that using a CAC for login required a connection to validation servers. And field hospitals in Afghanistan, Iraq, and other places generating lots of patients might not have good connections... Oh, and Navy ships at (and especially under) sea can also lack good connectivity.

Amazingly, the Powers That Be agreed that the Idea, while Good, was not practical, so using the CAC is now recommended rather than required.

Comment I bought a VW TDI because (Score 1) 124

It was, according to independent testing and according to VW's marketing: More powerful than gasoline cars, more fuel efficient, and less polluting. The fix, whatever it is, will probably reduce the power available, or reduce fuel economy, in order to bring it within limits. Probably reducing power. So I bought the based on false pretenses. Oh, and I paid more for it than I would have for a gasoline vehicle.

So, yeah, I was definitely defrauded. Of potentially several thousand dollars.

Comment Don't do business with orgs that treat us badly. (Score 1) 120

Given how unprincipled /. moderators are (see any thread about whether a /. moderator will pay to see the next Star Wars movie and keep in mind Disney's behavior on DRM and copyright term extension, for instance), I'd say you're sadly in the minority. Cases like this are ample reason to refuse to do business with organizations that treat us badly, but /. moderators became far more concerned with convenience at any price.

Slashdot Top Deals

"Truth never comes into the world but like a bastard, to the ignominy of him that brought her birth." -- Milton