Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Submission + - NSA's use of 'traffic shaping' allows unrestrained spying on Americans (zdnet.com)

schwit1 writes: A new analysis of documents leaked by whistleblower Edward Snowden details a highly classified technique that allows the National Security Agency to "deliberately divert" US internet traffic, normally safeguarded by constitutional protections, overseas in order to conduct unrestrained data collection on Americans.

The new findings, published Thursday, follows a 2014 paper by researchers Axel Arnbak and Sharon Goldberg, published on sister-site CBS News, which theorized that the NSA, whose job it is to produce intelligence from overseas targets, was using a "traffic shaping" technique to route US internet data overseas so that it could be incidentally collected under the authority of a largely unknown executive order.

Comment This story has really saddened and angered me (Score 2) 956

That was me in 1975 onward through high school. I used to cut or etch my own circuit boards, and made everything from (yes) digital clocks to power supplies to radio receivers. The fact that 95 IQ cops and brain dead school administrators can ruin a bright child's life just infuriates me. Stick a fork in it, 'Murica, you're dead.

Comment Re:Why? (Score 1) 403

I give it ten years max before the whole thing collapses. I luckily found a job two years ago outside the US, and should be a permanent resident of my adopted country soon, and a citizen shortly afterward.

The stubbornness of the US is like the old "keep doing what we're doing, just do more of it".

Comment Couldn't it be said . . . (Score 2) 887

Strictly speaking, couldn't it be said that the data in an encrypted volume technically exists only in your mind?

I possess a hard drive full of meaningless bits, that reasonably can never be brute forced. There are no documents there, no .jpg files, no audio, no video.

The 30+ character key to reconstitute those bits into something readable resides only in my mind.

Therefore the act of decrypting the volume technically involves the creation of those files anew.

Blackberry

Submission + - Developers Defecting From BlackBerry (itworld.com)

jfruhlinger writes: "Mobile app developers with multiple platforms to build for need to figure out how to conserve their resources somehow, and many are choosing to do so by not bothering to build apps for BlackBerry phones. It's a combination of declining market share and the general difficulty of building apps for the BlackBerry platform, one developer told Bloomberg: "RIM brought in a touchscreen and mixed it with a thumbwheel, a keyboard and shortcut keys, it made it really difficult and expensive to develop across devices.""

Slashdot Top Deals

You're already carrying the sphere!

Working...