Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Legal implications (Score 2) 221

What no one seems to have thought about is some of the legal implications. I haven't seen this happen with games but I did see it happen with a well known author. He used to participate regularly in a forum about his works until some fan accused him of stealing his ideas and demanding payment. The fan had no legal leg to stand on aparently but the thing did go to court. Sowered the author on forum participation.

Comment It doesn't work the way most people think it does (Score 1) 1

One of the methods suggested to get around this service was using a calling card.
To my surprise I was informed by a coworker that sometimes calling card services also forward the ID.

Bottom line is that caller ID & caller ID blocking have been with us long enough for people to take them for granted.
I for one had no idea that the block worked on the receiving end and not the sender.
I also did not know that 800 numbers could view the data.


Submission + - TrapCall service to bypass caller ID blocking. 1

cemaco writes: TelTech systems of New Yersey, is taking advantage of a loophole in the way caller ID blocking works.
Since ID's cannot be blocked when the recipient is an 800 number, they allow their clients to forward incoming calls to their service. The caller ID info is then collected and forwarded along with the call, back to their clients.

Advocacy groups for victims of domestic violence are concerned.
Victims of annoying calls hiding behind caller ID blocking rejoice.

Article can be found here http://blog.wired.com/27bstroke6/2009/02/trapcall.html. Discuss among yourselves.

Slashdot Top Deals

(1) Never draw what you can copy. (2) Never copy what you can trace. (3) Never trace what you can cut out and paste down.