Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Better Cannon meet improved Wall (Score 2) 105

I believe this whole outcry is quite stupid. It has quite a "simple" technical solution.
1. Crowdsource the position and coordinates of "legal" cell tower antennas. It's not hard, they are visible . If it is possible to have "OpenStreetMap" I do not see why it cannot have a layer called "OpenCellSites". Just like Waze
2. Write an App, or include it in the firmware that keeps the cellphone from answering siren calls from any antenna not in the list.
Stingray is not a problem if you simply do not answer its call.

I know #2 maybe difficult if it is in the firmware inside radio module. If that is the case then I foresee an industry of open source radio modules with a "veto" signal that tells the cellphone when it is hearing a "better" antenna and asks for permission to change. It it does not receive permission, it is forbidden to switch.

Just My Idea.

Submission + - TP-Link confirms Wifi freedom is dead- All routers to be locked down (

An anonymous reader writes: We got confirmation today from one of the largest router manufacturer that they have begun locking router firmware down due to recent FCC rule changes. This is exactly what the Save Wifi campaign participants had been arguing would happen for the past several months. Despite the FCC unequivocally denying that this was there intention it was irrelevant to the outcome, and the expected response of manufacturers to the new rules. The competitiveness of the market and costs of compliance means the only real solution for manufactures to comply is the lock down of there router's firmware. The TP-Link rep went on to say that all future routers would be locked down as a direct result of the rule changes.

These rules are bad and already hindering user freedom. The FCC has pulled a fast one and we need to fight back. This is a major security and privacy threat which will lead to even buggier and more insecure wireless hardware. A legal campaign to end this nonsense will require significantly more funding and criticism. Unfortunately the major players on fighting this are burning out. Christopher Waid, of ThinkPenguin, Dave Taht, of BufferBloat, Eric Schultz, Josh Gay of the FSF, and others just don't have the time or resources to keep fighting this. Don't let this be the end.

The Save Wifi campaign needs major financial help if we're going to put an end to this. Please donate to the effort at: . Please see for updates.

Read more about what TP-Link had to say here:

Comment Not Needed anymore (Score 2) 172

It means that they no longer need to index and associate your use across platforms because they have already developed the capability to link you personally across all their different platforms through Super Cookies, Data Mining, etc. Google+ is now irrelevant and a good bone to throw to the privacy minding minions who will celebrate it as if it accomplished anything.


Comment Re:No, these companies need to follow the law (Score 1) 273

The employees like it, the customers like it, and nobody who didn't voluntarily put themselves in this situation is affected by it

Let me laugh at this assertion. The employees will continue to like it until it bites them in the ass. There is a reason why the whole employee rights framework was created, and that is to protect employees from predator companies. Those companies are Privatizing profits, but Socializing their expenses. If an Uber driver, for example, gets in a crash, it is the driver's own insurance that has to bail it out, or the Public Health services. Uber is let go scot free even though the driver lost his health while performing Uber's business. Uber and similar companies just see you like a toy, now they need you, now the don't and f*ck you.It is raw predatory capitalism at its worse.

Comment Re:I can't quite decide (Score 1) 83

The NSA should be split in three, similar to what they did to MaBell.
One part would be pure R&D
The Second part should be Apps to help their spying and data collection for foreign purposes (What they usually do today)
The Third part should be Apps to defend the country from someone else using apps similar to those used by the Second Part against USA.

The Second and Third part should have a real Chinesse wall, never talking, never knowing what each one is doing.
It is the only way we could trust again whatever help the Third Part provides to cryptographic standards and stuff like SELINUX. Likewise, the Third Part should work in the open in a as transparent way as possible.


Slashdot Top Deals

If you can't learn to do it well, learn to enjoy doing it badly.