Forgot your password?
typodupeerror

Comment Re: Trolling for clicks (Score 1) 213

Divisive political content is perfect for getting people riled up and clicking on those links. Many of the stories I have read emphasize that the Trolls don't seem to post content steering readers consistently left or consistently right, it is just controversial stuff designed to get under people's skin. This is not an "attack on our democracy" or "undermining trust in our instititions." It is plain and simple clickbait. I for one will maintain a healthy distrust of our institutions, like the intelligence community, pushing conspiracy theories that only serve to increase their own budgets and control over what we are allowed to read on the Internet.

Comment Trolling for clicks (Score 3, Insightful) 213

I have seen no evidence that these so-called Russian Trolls are doing anything other than posting clickbait and farming for traffic, just like any of a million other SEO "businesses" in today's Internet ecosystem. Seriously, if our democracy is vulnerable to a few dozen people in St. Petersburg shitposting on Facebook, we have a lot more to worry about. I am more fearful of the people pushing these conspiracy theories to further their own agendas of censorship and control over all media. Get a clue, folks.
Censorship

Submission + - Ask Slashdot: Best ccTLD to avoid confiscation?

Pete McCann writes: "Given the recent spate of domain seizures by the USG, it seems that registrations in any US-hosted registry (like the gTLDs .com, .net, and .org) aren't stable places to put content that the USG might find objectionable. I am wondering, are there any ccTLD registries out there that have an open registration policy and are willing to stand up to censorship demands from the USG? There is this list of ccTLDs with open registration policies and the current MAFIAAFIRE redirection list looks very Tuvalu-heavy. Where would you register a site for maximum resistance to confiscation?"

Comment Read my lips: No New Namespaces (Score 1) 276

The way to do this is to start inside the existing namespace: get yourself a short 2nd-level domain and start signing people up underneath it. Decide on your own policies for who gets what sub-domains and delegate them out. I'd suggest making WHOIS privacy the default policy, but be sure to keep a chain of accountability so that you aren't providing a spam haven.

The fun starts when the Man comes to confiscate your 2nd-level domain. At that point, if you're big enough and enough people depend on the services resolvable under your domain, you need to do a PR campaign appealing directly to the resolver community and ask them to configure a special exception for your 2nd-level, pointing directly at your nameservers. Gets even more interesting with DNSSEC as they will need to add a DS record as well. You will need an alternative means to publish your KSK to the world. There are some interesting enhancements being proposed for the RPKI to allow this kind of sub-domain exception policy, but we need a few additions to DNS and DNSSEC to make it work smoothly.

I'm all for a new set of policies, but you've got to give props to the current root.

Slashdot Top Deals

"Let's show this prehistoric bitch how we do things downtown!" -- The Ghostbusters

Working...