Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Legal implications (Score 2) 221

What no one seems to have thought about is some of the legal implications. I haven't seen this happen with games but I did see it happen with a well known author. He used to participate regularly in a forum about his works until some fan accused him of stealing his ideas and demanding payment. The fan had no legal leg to stand on aparently but the thing did go to court. Sowered the author on forum participation.

Comment It doesn't work the way most people think it does (Score 1) 1

One of the methods suggested to get around this service was using a calling card.
To my surprise I was informed by a coworker that sometimes calling card services also forward the ID.

Bottom line is that caller ID & caller ID blocking have been with us long enough for people to take them for granted.
I for one had no idea that the block worked on the receiving end and not the sender.
I also did not know that 800 numbers could view the data.


Submission + - TrapCall service to bypass caller ID blocking. 1

cemaco writes: TelTech systems of New Yersey, is taking advantage of a loophole in the way caller ID blocking works.
Since ID's cannot be blocked when the recipient is an 800 number, they allow their clients to forward incoming calls to their service. The caller ID info is then collected and forwarded along with the call, back to their clients.

Advocacy groups for victims of domestic violence are concerned.
Victims of annoying calls hiding behind caller ID blocking rejoice.

Article can be found here Discuss among yourselves.

Comment Devils advocate. (Score 2, Insightful) 257

Any time you provide a tool like this, it has the potentiall to be used against the owner as well, especially if someone else with access to the equipment understands the tool better than the owner does.

I can see several scenarios, some more plausible than others where another party might be inclined to use it to lock the owner out of access to his own data.

Yes if the other party has access to the machine, they can always cripple it by other means but the beauty of this is that it can be used even after that party apparently no longer has access.

Slashdot Top Deals

"They that can give up essential liberty to obtain a little temporary saftey deserve neither liberty not saftey." -- Benjamin Franklin, 1759