Forgot your password?
typodupeerror

Comment Re:Good! (Score 1) 45

Mostly just in the bulk, low barriers to entry, and pervasiveness(like a lot of things social media). The case of actors actually goes back a long way; state laws regarding compensation of child actors were spurred by the case of one who was popular in the 1920s and litigated with his parents over where the money wasn't in 1939. That case doesn't provide for takedowns; but it's also the case that filmmakers are normally looking for children to play characters; rather than to do 'candid' intense documentaries of them at home; so the degree of public exposure of private life is presumably deemed to be less; with the main issue being children who were...definitely...getting a solid education while on stage finding that all the money was gone when it became their problem.

Child-blogging, by contrast, seems to reward verisimilitude (if not necessarily truth) and invasiveness, relatively pervasive in-home mining for 'content', so presumably seems better served by removal-focused options; though there has definitely been talk about covering the economic angle in line with child actors.

I don't even know what the deal is with child beauty pageants, or how something you'd assume is a salacious bit of slander about what pedophile cabals are totally doing, somewhere, is actually a thing a slice of parents are into, way, way, into. Apparently that's a third rail to someone, though, as the only jurisdiction I'm aware of with significant restrictions on them is France.

Comment Re:The Horse is Already Gone (Score 1) 32

Unless quantum computing becomes cheap and comparatively widely available quite quickly after becoming viable passwords seem like they'll be a manageable problem. Nobody likes rotating them; but it's merely tedious to do and the passwords themselves are of zero interest unless they are still being accepted. If it does go from 'not possible' to 'so cheap we can just go through through in bulk' overnight that could ruin some people's days; but if there's any interval of 'nope, the fancy physics machine in the dilution refrigerator is currently booked by someone with a nation state intelligence budget' you can just rotate older credentials.

Now, if you were hoping that encryption was going to save any secrets that are interesting in and of themselves that got out in encrypted form; then you have a problem. Those can't be readily changed and will just be waiting.

Comment Re:This is the right decision (Score 1) 91

You don't get to pick and choose what people post (with some obvious exceptions like fraud or csam), while also claiming immunity for the stuff you couldn't or wouldn't.

Exactly, thanks for the excellent example. That's the kind of statement that nobody ever explains, but always presents as pure axiomatic dogma.

I do think that you might have revealed a clue in your unusual phrasing, though. You said "claiming immunity for the stuff you couldn't or wouldn't" but how can there ever be any possibility of liability there? If your computer denies someone else's request to publish something, what liability is there to be immune from?

Comment Re:ed-tech (Score 1) 88

Plus the whole 'fucking dystopian' angle. On the one hand we've got people bitching about 'civilizational decline'; but we want 'robot philosophers' teaching children? I'm not against the occasional scantronned multiple choice test; but outsourcing philosophy to save on those oh-so-expensive adjuncts seems like the sort of thing you only do to children being groomed for mindless servitude or because you've entirely given up on humanity as anything but an ingredient in pump and dump schemes.

Comment Re:I think SCOTUS were concerned about a trap (Score 1) 91

are automakers responsible when someone breaks the speed limit and kills someone?

What's funny is that there's no such thing as "vicarious speeding" or "contributory reckless driving," but with copyright, there is. Analogously, sometimes the automaker is liable for drivers speeding!

But even so, Cox's behavior didn't fit contributory infringement.

The court just said T17 S501 is an ok law that they're not striking it down or anything like that, but it doesn't apply to this case!

A very good thing has happened.

Comment Re:Illegal (Score 0) 73

It's illegal but laws aren't currently enforced, so I don't know why you're bringing the law up.

Let's perform a natural experiment: keep saying reappropriation is illegal, and then wait for the executive to do it anyway. Then watch to see if Congress gives a fuck, by impeaching the executive (or credibly threatening to impeach if the embezzled funds aren't returned in n hours).

My hypothesis is that Congress won't do anything about it, and is fine with whatever new powers that the president decides he wants.

What's your hypothesis?

Surprise: we're actually going to do that experiment. In fact, we started it last year.

Comment Re:I give this 3 days (Score 1) 77

It's not in society's interests, but it is in government's interests. Society and government are orthogonal teams who often conflict with each other. In the US, we spelled that out explicitly in the late 1700s, but docs go back at least as far as the Magna Carta.

Alas, "spelling out" government limitations isn't the same thing as believing limits are a good idea and enforcing them, as we're occasionally reminded. The Constitution is just ink on a page, until people give a fuck about it. And in America, the constitution is currently very unpopular. Society wants to surrender to government, or if it doesn't want that, it's sure acting like it wants that.

Comment Re:That's Fine (Score 1) 77

That's pretty neat!

The danger with using unallocated space, is that sometimes you might accidentally overwrite it. But if that happens, I guess it just means you need to figure out what your new size needs to be, make a new hidden volume, and then restore from backup. It's that last step that I never remember as a possibility, probably due to my horrible backup habits. ;-)

Comment Re:Touch ID (Score 1) 77

I think that might be a bad idea, because when thugs say "hand over your phone" and you hand them a brand new phone that you have apparently never used, you're going to get wrench-based cryptanalysis. You need to be able to hand them the keys to a realistic environment that looks like it's being used. Thugs wanna see recent timestamps.

Ideally, we need to have some casual, boring (but constantly-touched!) environment that can launch encrypted environments, but somehow not have anything that references those environments.

The biggest problem I see is storage allocation. We need to be able to plausibly deny the existence of something, but also keep it from being overwritten by not-denied environments. How do you hide "don't write to these blocks, because something else uses them"?

Some might suggest hiding in plain sight with steganography, but at some point thugs will notice that everyone they suspect, just happens to have an unnecessarily-large gigaphoto. ;-)

Having alt environments that are detectable, but can be quickly destroyed the way you suggest, might be a decent compromise as long as it keeps an innocent and recently-used one around as cover. You enter the oh-fuck PIN, and it logs you into the innocent host environment but then it immediately deletes its encrypted guests, leaving you with a truly innocent machine as far as anyone can tell. And then you just really hope you can enter that duress code (or you can trick thugs into entering it) before they image your storage.

Comment Re:Cisco vs. TP-Link (Score 1) 180

One of the lessons we've had as the Federal, multi-branch nature of the US governmennt has frustrated Trump is that the government may be fucking us over, but it's not doing it in *unison*. It's doing it piecemiel, on the initiative of many interests working against each other, just as the framers intended. The motto on the Great Seal notwithstanding, there are myriad roadblocks to consolidating power in the hands of a single individual. It takes time and repeated failures. This is why the second Trump Adminsitration is worse than the first; they've figured out ways around things like Congressional power of the purse, put more of their henchmen in the judiciary, and normalized Congress lying down and letting the president walk all over them. It's a serious situation, although fortunately Trump isn't long for this world.

Slashdot Top Deals

Nothing happens.

Working...