Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Duh (Score 1) 785

This lets the desktop environments have more advanced features then they would with init systems that don't do this delegation.

First, is it the regular user account or the DE itself which essentially gets its privileges escalated? Either way, that sounds inherently dangerous -- if you want the DE to be all powerfull, just login as root (there are good reasons not to login as root of course, but if systemD is doing it for you anyway, why even bother with the distinction between root and user accounts).

Comment Re:Translation (Score 2) 85

Exactly right.

The incentive for people to contribute to a closed source project isn't all that much. Remember that open source isn't a gift by your company to the public, it is an offer of trade -- you let the public have the source, the public provides you with feedback (bug fixes, enhancements, etc.) and gets its suggestions provided back to it. It's a circle.

What you are suggesting sounds like you want the benefit of that deal, while negating the benefit for those who are doing work for you. Psychologically, it's a hard sell to say to someone -- "mow my lawn for me and I'll sell you a lemonade afterward at full price --- um yeah, I'd also sell you the lemonade at full price if you don't mow my lawn." You aren't going to get many takers for that deal, and the ones who do take it will have questionable motives (scoping out the property) or will just be naive and gullible (not a great foundation to build upon).

Comment Re:Likely misdemeanor mishandling of classified in (Score 1) 434

The statute the sent Oliver North to prison might apply here.

Paragraph b, aside from other punishments, bars a person from holding public office.

The way I see it, the emails were filed with a public officer of the united states as required by par. a (HRC was a public officer so the emails sent/received were filed with her personally) and by deleting the emails, they were certainly "mutilated, obliterated, or destroyed". If deleting emails filed with the SOS is illegal, then that's good for 3 years in the pokey.

Next, under par. b, it is clear that HRC had custody of the records and again, destroyed them. If she is found guilty of par. b, she simply can't be president -- she couldn't be dog catcher. She'd be fully and finally retired.

Comment Re:Likely misdemeanor mishandling of classified in (Score 0) 434

The Rethuglikans are freaking out about Hillary. Absolutely losing their shit in a big way.

Let's be clear hear. HRC is a warmongering neo-con wallstreet cocksucker on the Democrat team. Some warmongering neo-con wallstreet cocksuckers on the Republican team hate her because she is on the other team.

I hate them all because they are war mongering neo-con wallstreet cocksuckers. I don't give a fuck about what team they're on -- I care about what they stand for.

Comment Re:Investigating if laws were broken (Score 1) 312

Ignorance of the law is not and has never been an excuse.

This is a legal principle that literally goes back to Greek antiquity.

How Heller-ishly convenient. There are so many criminal laws on the books, it is impossible to know them all (ask the ABA, they tried to simply count them, which is much less than _knowing_ them, and failed: ). And yet an individual person without ranks of lawyers to do the research, is presumed to know each and every one. This is extremely dangerous because it gives those in power the ability to lock up anyone they don't like, which means that an individual's freedom and liberty -- core American values right? -- are subject to the whim of any dickweed with a little power.

Comment Re:pardon my french, but "duh" (Score 1) 288

For someone using computers a lot, they're probably going to figure it out.
For someone not using computers a lot, and who have managed to do things by remembering exactly what to click - this is enormously fragile.

Even for people who do use computers a lot. I recently got a new macbook pro with Yosemite on it. I've been sticking with Snow Leopard because it seems so much better, but now that isn't an option. Yesterday I touched the touchpad in some way that made the computer go into some sort of mode in which I couldn't interact with any of the windows. I tried escape, random touchpad stuff, some other things. I'm embarrassed to say that I finally just resorted to a hard shutdown and reboot. There is apparently some cryptic touchpad sequence that will put the computer into useless mode, and a cryptic sequence required to get out of useless mode (and for what -- the view was just like normal view except for a darkened 1/4" frame around the whole screen -- it wasn't expose or full desktop -- I have no idea WTF it was for, normal view without the ability to interact with anything at all, not even force quit menu). Yosemite makes me seriously consider just putting Debian on that computer.

Comment Re:Your biggest screw up (Score 1) 452

Reddit may well find its users going elsewhere if someone else manages to build something that they find familiar without all of the current baggage.

I haven't tried it yet, but this looks interesting:

Aether is a free app that you use to read, write in, and create community moderated, distributed, and anonymous forums, an "anonymous reddit without servers."

Comment's the LAW! (Score 1) 423

So we can just add the 1st amendment to the pile, you know, that pile of constitutional directives the government adheres to so much, like the 4th and 5th amendments, congressional responsibility for declaring wars, and likely others things I'm not aware of too. Essentially, anything that stands in the way of ever expanding executive power, corporate welfare, or wall street bailouts is just ignored. Instead, the NSA must monitor us and the police must practice military tactics, not because of terrorism, but because those mega-money interests pulling the puppet strings don't want to face any dangers.

That constitution is so quaint -- it makes a great wall hanging.

Comment Re:maybe robots can fly the drones (Score 0) 298

Perhaps what happens is that people in the Chair Force eventually realize that nobody has any idea if they are killing bad guys.

He was told that they were carrying rifles on their shoulders, but for all he knew, they were shepherd"s staffs. Still, the directive from somewhere above, a mysterious chain of command that led straight to his headset, was clear: confirmed weapons. ... As he watched the men walk, the one who had fallen behind seemed to hear something and broke into a run to catch up with the other two. Then, bright and silent as a camera flash, the screen lit up with white flame.

In one episode that will fuel controversy about allegations of civilian casualties, he described monitoring a drone strike on a mud compound in Afghanistan and seeing the figure of what he was certain was a child just before it was struck by a Hellfire missile.

When he expressed those concerns to an intelligence observer overseeing the operation, the response came back: "Per the review, it's a dog." Bryant replayed the shot repeatedly on tape and said that he was certain it was a child, not a dog.

Note -- it seems PTSD can arise from being a drone pilot, but also note, I have absolutely zero sympathy for the drone pilots. It's an incredibly small bit of karma for the horrific acts they've performed and is the least they deserve, and worse, probably most will never even get that.

Comment Re:Trust (Score 1) 196

The part that concerns me is that it appears for some data Apple does not have the key and has no access even if it has possession of the data. For other data it does have the key and can thus decrypt the data. The first instance is secure and protects user privacy (given a good passphrase), the second is barely secure and subjects user data to the Third Party Doctrine -- this gives the government the ability to grab it whenever it wants to. If this is so, it will confuse unsophisticated users who think encryption _is_ information security, which is true in only certain circumstances, and not true if a third party can decrypt the data.

Comment Re:Trust (Score 1) 196

the juxtaposition of the first and second sentence, the first saying how great the encryption is, the second implying that the backups aren't encrypted by the fact you can disable it if you want to -- it implies a lesser level of security by its silence on whether the data is only available to the user. But more to the point, the iCloud section states pretty clearly that Apple can access the data:

All your iCloud content is encrypted in transit and, in most cases, when stored (see below). If we use third-party vendors to store your data, we encrypt it and never give them the keys. Apple retains the encryption keys in our own data centers, so you can back up, sync, and share your iCloud data.

Slashdot Top Deals

Real wealth can only increase. -- R. Buckminster Fuller