Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment **AA should be concerned (Score 4, Interesting) 91

If retrieving a copy of an email while leaving the original intact creates "no meaningful interference" with the account holder's "possessory interest" of that email, how long before this ruling is used as a defence against the RIAA and MPAA's copyright infringement efforts?

Since making a copy of a movie does not create a meaningful interference with the account holder's possessory interest of the movie, surely it can't be worth all those lawsuits?

Comment Re:What about electrical, plumbing etc? (Score 2) 315

Here in South Africa, part of the documentation required when effecting a property transfer is an Electrical Compliance Certificate, and not every electrician is licensed to issue them. The purpose is to cover this exact situation, where the homeowner installed their own connections which may not be up to code. If the property has an electric fence, that requires a separate certificate as well. And an etymological certificate is required to ensure that the purchaser isn't receiving a home filled with wood borers or termites.
There may be other compliance certificates required, these are the 3 I've encountered personally.

Comment Re:Which version? (Score 1) 105

Interestingly, Microsoft also collects telemetry related to Windows usage, but then it's labelled spyware.
When Google uses telemetry and correlation to identify that the people viewing cert details also typically make use of developer tools, it's called cleaning up 'yet another option [that] just adds to the confusion for end users'.
When Microsoft uses telemetry and correlation to reposition OS features, it's called spyware that sends all your documents to the NSA.

Comment Re:Next up dead (Score 1) 399

Star Wars Rogue One was also the movie which made me realise how much the 3D glasses affect the colour of the picture. There were lots of scenes that looked very dull and dark - taking the glasses off for a moment, the colours were much brighter and "normal". I've now started noticing that in other 3D movies as well... surely the studios should master the 3D videos with brighter/lighter colours to compensate for the darkening of the glasses?

I wouldn't call for 3D cinema to go though, I enjoy watching movies in 3D at the cinema... but as the summary/article states, despite having a 3D capable TV at home for 2.5 years, I think we've watched a total of 4 movies in 3D on it, despite havingÂthe option to watch many more in 3D.

Comment Re:I guess... (Score 1) 145

We watched it with our 7yo daughter, who has played the game once or twice when I showed it to her, but is nowhere near an addict. She's been waiting for this moving for months, purely based on the trailers and implied entertainment value, and not at all because of the game itself.

I suspect the 9 month marketing onslaught was to ensure that the movie would be watched by people who haven't played the game, and it clearly worked, having opened at #1. While Angry Birds has been a very popular game across all mobile platforms for a few years now, there's no way they could rely purely on their gamers to support the movie and allow it to be a huge success.

In fact, after watching the movie, I introduced the game to my daughter again, and she still hasn't really taken to it. While I'm sure they got a huge number of new installs after people watched the movie, I'd be surprised if their long-term player base increases in line with the movies success. Just because the movie is based on a game doesn't mean it's aimed only at the gamers.

Comment Re:Useless (Score 1) 166

It adds nothing of value over the browser based solution because that's exactly what it is. This "desktop client" is a wrapper around an embedded browser that launches WhatsApp Web by default. From the looks of it, it's Chrome Embedded Framework that's been used. I'm guessing they chose that route to make it easier to support both Windows and OSX without much difficulty, but it does raise the question of how they plan to handle updates and patches to the Chrome core... while they might not need any new features that get added, they would definitely need to keep up to date with security patches, even if it's a single-purpose browser.

Comment Re:Does the User Control the Keys? (Score 1) 76

It should be trivially easy to do the key exchange without WhatsApp being able to intercept the keys, even though they are relaying them between the two parties.*

Assume Alice and Bob both use WhatsApp. Each generates a certificate with a private and public key. They publish their public keys via some directory service. Alice wants to chat to Bob securely. They currently don't have a relationship set up between them. So Alice looks up Bob's public key, and generates a random encryption key to be used for chatting with Bob. She encrypts this key with Bob's public key and sends this encrypted key to Bob over WhatsApp. Only Bob can decrypt this because only Bob has the private key - WhatsApp doesn't. Bob can either then use the same key to send messages to Alice, or he can repeat the process, so that even if one key is exposed somehow, only one half of the conversation can be decrypted.

Yes, WhatsApp's app must ultimately be trusted to be storing the private keys securely and not leaking them back to WhatsApp somehow, but if they're going to the trouble of implementing end-to-end encryption, then entire point is that they want to be able to simply auto-respond to any law enforcement requests with 'We simply cannot decrypt the messages even if we want to." Given that WhatsApp already has been encrypting messages between client and server for some time now before this, it doesn't make sense for them to implement such an elaborate encryption scheme and then leave a backdoor in it, which will inevitably be discovered, either by a security researcher or when they give in to a law enforcement request.

* I haven't actually read up on how WhatsApp is doing their key exchange, so they may be doing exactly this.


European Telecoms May Block Mobile Ads, Spelling Trouble For Google 198

Mark Wilson has news that may have a big impact on both advertisers and end-users who use their phones as portals to ad-supported websites. Several European telecom providers are apparently planning to use ad-blocking software at the data-center level, which would mean benefit for users (in the form of less obnoxious advertising, and less data being eaten by it) but quite a pickle for online advertisers, and sites that rely on advertising revenue. From BetaNews's article (based on this Financial Times article, paywalled): Talking to the Financial Times, one wireless carrier said that the software had been installed at its data centers and could be enabled by the end of the year. With the potential to automatically block most ads on web pages and within apps, the repercussion of the ad boycott could be huge as mobile providers try to wrestle control from the likes of Google. I just wish my mobile provider would start testing this out, too.

Single Verizon IP Address Used For Hundreds of Windows 7 Activations 323

An anonymous reader writes with this story from TorrentFreak: A presumed pirate with an unusually large appetite for activating Windows 7 has incurred the wrath of Microsoft. In a lawsuit filed [in] a Washington court, Microsoft said that it logged hundreds of suspicious product activations from a single Verizon IP address and is now seeking damages. ... Who he, she or they are behind address is unknown at this point, but according to Microsoft they're responsible for some serious Windows pirating. "As part of its cyberforensic methods, Microsoft analyzes product key activation data voluntarily provided by users when they activate Microsoft software, including the IP address from which a given product key is activated," the lawsuit reads. The company says that its forensic tools allow the company to analyze billions of activations of software and identify patterns "that make it more likely than not" that an IP address associated with activations is one through which pirated software is being activated.
The Military

New Compound Quickly Disables Chemical Weapons 52

sciencehabit writes: In 2013, the Syrian military allegedly launched sarin gas rockets into a rebel-held town, killing hundreds. After diplomats brokered a deal to eradicate the weapons, international organizations began the dangerous job of destroying them. One roadblock to chemical weapons disposal is that heat and humidity quickly break down enzymes that can disable the deadly chemicals. Now, researchers have developed a highly stable compound that can inactivate nerve agents like sarin in a matter of minutes.

Comment Re:White balance and contrast in camera. (Score 5, Interesting) 420

This morning, I saw it on my phone in my darkened bedroom, and it was clearly blue and brown. Just now, I opened the Washington Post link on my 24" screen in a sunlit room, and it was clearly white and gold. I then found the link that I had seen on my phone this morning (not Washington Post, so I wanted to confirm that it just wasn't two different pictures that I was looking at), opened it up, and it was white and gold there too. Went back to my bedroom and closed the curtains, and it remained white and gold for a bit, but after I left the room (after my eyes had adjusted a bit to the darkness), it was blue and brown again. The picture on the Washington Post was also now blue and brown. Now that my eyes have adjusted to the sunlit room again (and the white Slashdot background), I switch back to the Washington Post tab, and it's white and gold again. My wife (who's now gotten fed up with following me around to look at this picture under different lighting conditions) has had pretty much the same experience as me.

So it appears to be linked to the lighting conditions that your eyes are adjusted to when seeing the image initially... even after they've adjusted to the ambient light, the brain appears to stick to the image it created initially.


Canadian Supreme Court Rules In Favor of Warrantless Cellphone Searches 105

An anonymous reader writes In a surprising decision, a split Supreme Court of Canada ruled this morning that police can search cellphones without a warrant incident to an arrest. The majority established some conditions, but ultimately ruled that it could navigate the privacy balance by establishing some safeguards with the practice. Michael Geist notes that a strongly worded dissent disagreed, emphasizing the privacy implications of access to cellphones and the need for judicial pre-authorization as the best method of addressing the privacy implications. The U.S. Supreme Court's June 2014 decision in Riley addressed similar issues and ruled that a warrant is needed to search a phone.

Comment Re:Try living in RSA (Score 1) 516

I am closely related to someone who works at Eskom. His "insider's view" is that the power cuts and load shedding are not due to pressure on the supply, but just to create the impression that there is pressure on the supply, to justify their price increases to pay for the new power stations (and of course sponsoring The New Age breakfasts). He had a good laugh at the 'wet coal' excuse for the problems earlier in the year (conveniently around the time that NERSA was reviewing their tariff increase application) because all the coal arriving at the power plants gets sprayed down with water as soon as it arrives anyways, because coal dust is extremely flammable. We have two new power stations under construction, both coal-fired... when South African engineers are designing safe nuclear power stations that are being used by other countries but not our own. (see

Slashdot Top Deals

Real wealth can only increase. -- R. Buckminster Fuller