Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Submission + - Cyanogen Mod forces tracking of user devices (cyanogenmod.org)

CRC'99 writes: In what was hoped to be an April Fools Day prank, Cyanogenmod just committed a change to the 10.1 git that removes the option of counting all devices installed with Cyanogen mod. Details reported by the stats service include the devices unique ID, the device name, the active carrier, and the country the device is located. While this is being touted as "anonymised data" by Steve Kondik, it is common knowledge that the unique device ID is unique for a reason. What effects does this have on privacy for CM users?

Comment Re:Where's the USDS/W? (Score 1) 236

They will be a source of knowledge, studies, research and tools in how to keep itself alive rather than be at the forefront of the technology. I don't understand why you would want more red tape and not less? I think this is a ludicrous idea, especially coming from a supposedly intellectual on the net. Progress has been made admittedly both by commercial, entrepreneurial efforts as well as cooperative efforts of people who are genuinely passionate about this stuff. You throw a government in there, and the hearts of all this highly idealized and motivated individuals will freeze over unless we have a reformed perception of the role of the government in this type of thing. Don't you remember the recent public reaction to gov't agencies having mere "access," albeit hidden, to our private information? And they (such as CIA/FBI) aren't even in the business of sharing information with others or selling our private information like Facebook is.

Comment Re:Why was this "difficult"? (Score 1) 982

The law that he broke was a section CA Penal Code 502, specifically that he disrupted or denied computer service to an authorized user and he did so without permission.

Refusing to provide a password is absolutely not a denial of service. That's like claiming losing keys to a rack in a data center is a denial of service.

However, he made one of the biggest mistakes then that he could have. While under police surveillance, he decided then to leave the state and make cash withdrawals of over $10,000. He was arrested, and that's where it became a criminal matter instead of simply an employment matter.

How this is a criminal act? Was he under court order to stay within the state of California and not touch his money?

This whole case was never a criminal matter.

Please re-read all the replies before that post. The problem wasn't the refusal of providing a password, but the refusal of providing ANY access at all. Combine that with the attempt to leave the state and it looks likely that he was going for a Denial Of Service in the most literal sense of the word. That's what got him convicted, not a refusal to hand over a password.

To rephase the issue, the city accused him of Denial of Service. His actions support that accusation. There are penalties for DOS-attacks and he got hit with 'em. Now, the DOS-attack would never have taken place if the city management had not been completely incompetent - that is very clear. But if I had been a juror on this, and with the explanations given above, I would have considered him guilty too.

That said, I might still have hesitated to actually vote that way, given the circumstances. But it looks like he did a Denial of Service on the city and yes, that carries a stiff penalty.

Comment I have the answer! (Score 1) 414

It's called CSM and it's amazing! It does everything for you and never fucks up!!! :D

Seriously though, we're so far from this I couldn't even begin to tell you. Half the time the application vendor can't even tell you what ports are required and they wrote the software that's making the connections. It's pathetic. I get requests from clueless lusers who obviously don't even know what they're requesting, then the question ("No you can't have an IP any. No, ugh, never mind what that means...just ask the vendor what you need.") goes to the vendor and half the time they can't answer it.

Truthfully there is really no great way of doing this. Even if you can profile the software running on the machine, you're not going to know if it's making all the connections it needs to make during the time you profile it. You also need to have some kind of idea what you're doing so you don't wind up exposing 139/445 to the internet or something dumb like that. They pay us infosec people a salary to do this stuff for a reason: we can't always tell you what you want, but we can usually tell you what you don't want. Making these kinds of changes requires thought, risk analysis, and planning. It's not something that should be a drag and drop routine that any user can do...at least not at this point in history.

Maybe at smaller companies sys admins have the knowledge necessary to make these sort of decisions responsibly but I can tell you from experience that being a sys admin does not automatically confer on you the ability to make smart decisions about what firewall exceptions to request. We've had users escalate requests WAY up the chain after being denied by us, only to have them sending 911 pages to us literally 20 minutes after it's implemented to have it shut off. Just because your sshd is up to date and you use strong passwords doesn't mean you want the entire internet beating down your door 24/7/365...sometimes it really is better for you to have your users connect to the VPN first. That's the knowledge that infosec brings to the table, and that's why we don't want you making your own exceptions.

Comment Remote wipe was in fact demanded ... (Score 1) 492

The remote wipe is a required feature for many enterprise users. The original iPhone OS caused grief when execs bought iPhones and they could not be wedged into the enterprise management in place already.

As to being required to return it to Apple, well, it is not an acknowledged product. Apple will likely be quiet until the real product is released. At least on the legal front. No messy need to enter the device into evidence and produce proof they actually own it.

Comment Re:Kilo? (Score 1) 496

It's quite surprising that calorie is used in non-SI countries, as it's defined in terms of two SI units. It's the amount of energy needed to heat one gram[1] of water by one degree centigrade.

If you're doing any calculations involving heating water then it's often easier to work in calories and then convert into Joules at the final step (multiply by 4.2).

[1] Or kilogram for a kilogram calorie, which is what this poll appears to be using.

Comment Re:Give that man a new job (Score 2, Interesting) 266

Gates is well known for stuff like that. He is (or was, since he's semi retired now) passionate about a good product. He is driven in almost the same way as Steve Jobs - they just went about it in different ways. The fact that so many people had just cause to call Windows "annoying and convoluted" would have been very troubling to him - especially since he faced the same issues when using it himself.

Comment Re:No problems here (Score 1) 266

Not to mention the added value to GNP by having us all purchase a console or two for gaming and a PC for work (not to mention a few televisions) instead of just one PC.

Just one PC? Ordinarily, if you want more than one player, you have to buy a separate PC and a separate copy of each game for each person in the house.

Comment Re:Not want to be bitching... (Score 1) 208

> A solution then, as I mentioned above, is not to push for a global consensus on copyrights as the U.S. is doing, but to recognize the copyright claims of every world nation. This preserves the native laws of a country, while still pushing for protection of IP.

What you are suggesting is ridiculous and contradictory.

Contradictory because to do what you suggest would also require a global consensus.

> And if you value the laws of your own country, then to maintain them you must respect the laws of other nations, despite personal objections.

Why should I be required to respect the laws of some other country that I'm not staying in, nor have any voice in?

> What gives you the right to steal what is made and issued under the protection of a differing set of laws?

Copying is NOT stealing. Even the lawyers and Courts know the difference - that's why there are copyright laws in the first place.

And this is how ridiculous your ideas are:

Assuming copying is stealing, and the punishment for repeated theft in Saudi Arabia is having your hand chopped off, then I'm sure you should have no objections if in the future citizens in your country would have to have their hands chopped off if they are ever guilty of illegally copying stuff from Saudi Arabia (by Saudi laws).

Slashdot Top Deals

The computing field is always in need of new cliches. -- Alan Perlis

Working...