Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Johnson and anti-incumbent (Score 1) 381

A minor point, but the Veto power exists specifically to allow refusal to sign legislation that the President doesn't like.

This is also why the Congress has the ability to override the veto, in case the representatives of the People in large numbers decide the President is wrong.

I agree that blocking legislative items specifically because of 'us versus them' is ridiculously stupid. Legislation should be passed on the merits of what the legislation does.

Comment Re:Johnson and anti-incumbent (Score 2) 381

They are making a choice. They choose not to endorse either one of the major parties' nominees. Stop acting like the only choice is to vote for someone you find slightly less abhorrent than someone else you find to be completely abhorrent. That only continues the problem.

Comment Re:maaaan (Score 5, Informative) 381

From the group of 30,000 e-mails returned to the State Department, 110 e-mails in 52 e-mail chains have been determined by the owning agency to contain classified information at the time they were sent or received. Eight of those chains contained information that was Top Secret at the time they were sent; 36 chains contained Secret information at the time; and eight contained Confidential information, which is the lowest level of classification. Separate from those, about 2,000 additional e-mails were “up-classified” to make them Confidential; the information in those had not been classified at the time the e-mails were sent.

There were still 110 emails in 52 separate conversations that had classified information at the time sent or received, according to the director of the FBI during a televised statement, quoted above. Source, quoted paragraph 12.

Top Secret, Secret, and Confidential. At the time of sending or receipt. Stop being an apologist.

Comment Re:maaaan (Score 1) 381

No, but you can combine it with other data in order to get a better picture. Like source IP address and geolocation of that IP.

Sure, there's proxy hosts and VPNs and such, but if this guy is always using a particular subnet or two to access things that are known to be him, and those same subnets are used to access these posts on Reddit, the likelihood of impersonation gets rather small, especially considering the time factors.

Slashdot Top Deals

"I think trash is the most important manifestation of culture we have in my lifetime." - Johnny Legend