Forgot your password?
typodupeerror

Comment Re:I think SCOTUS were concerned about a trap (Score 1) 89

are automakers responsible when someone breaks the speed limit and kills someone?

What's funny is that there's no such thing as "vicarious speeding" or "contributory reckless driving," but with copyright, there is. Analogously, sometimes the automaker is liable for drivers speeding!

But even so, Cox's behavior didn't fit contributory infringement.

The court just said T17 S501 is an ok law that they're not striking it down or anything like that, but it doesn't apply to this case!

A very good thing has happened.

Comment Re:Illegal (Score 0) 73

It's illegal but laws aren't currently enforced, so I don't know why you're bringing the law up.

Let's perform a natural experiment: keep saying reappropriation is illegal, and then wait for the executive to do it anyway. Then watch to see if Congress gives a fuck, by impeaching the executive (or credibly threatening to impeach if the embezzled funds aren't returned in n hours).

My hypothesis is that Congress won't do anything about it, and is fine with whatever new powers that the president decides he wants.

What's your hypothesis?

Surprise: we're actually going to do that experiment. In fact, we started it last year.

Comment Re:I give this 3 days (Score 1) 77

It's not in society's interests, but it is in government's interests. Society and government are orthogonal teams who often conflict with each other. In the US, we spelled that out explicitly in the late 1700s, but docs go back at least as far as the Magna Carta.

Alas, "spelling out" government limitations isn't the same thing as believing limits are a good idea and enforcing them, as we're occasionally reminded. The Constitution is just ink on a page, until people give a fuck about it. And in America, the constitution is currently very unpopular. Society wants to surrender to government, or if it doesn't want that, it's sure acting like it wants that.

Comment Re:That's Fine (Score 1) 77

That's pretty neat!

The danger with using unallocated space, is that sometimes you might accidentally overwrite it. But if that happens, I guess it just means you need to figure out what your new size needs to be, make a new hidden volume, and then restore from backup. It's that last step that I never remember as a possibility, probably due to my horrible backup habits. ;-)

Comment Re:Touch ID (Score 1) 77

I think that might be a bad idea, because when thugs say "hand over your phone" and you hand them a brand new phone that you have apparently never used, you're going to get wrench-based cryptanalysis. You need to be able to hand them the keys to a realistic environment that looks like it's being used. Thugs wanna see recent timestamps.

Ideally, we need to have some casual, boring (but constantly-touched!) environment that can launch encrypted environments, but somehow not have anything that references those environments.

The biggest problem I see is storage allocation. We need to be able to plausibly deny the existence of something, but also keep it from being overwritten by not-denied environments. How do you hide "don't write to these blocks, because something else uses them"?

Some might suggest hiding in plain sight with steganography, but at some point thugs will notice that everyone they suspect, just happens to have an unnecessarily-large gigaphoto. ;-)

Having alt environments that are detectable, but can be quickly destroyed the way you suggest, might be a decent compromise as long as it keeps an innocent and recently-used one around as cover. You enter the oh-fuck PIN, and it logs you into the innocent host environment but then it immediately deletes its encrypted guests, leaving you with a truly innocent machine as far as anyone can tell. And then you just really hope you can enter that duress code (or you can trick thugs into entering it) before they image your storage.

Comment Re:Next time... (Score 2) 117

The story here has nothing to do with sympathy; it's about incompetence.

"You used a n^2 query on a billions-of-records database?!"

"Well, yeah, but it's ok because the only people who use it are assholes."

That the victims of the breathalyzer's incompetent implementation happen to be people I mistrust, doesn't make the breathalyzer's makers look any less incompetent. They had one job, and they failed.

Comment Like 16th Century Americas (Score 1) 116

Just a bit more than five hundred years ago Cortes & Co. arrived in the Americas. They were riding horses, wearing steel armor, wielding firearms, and spreading diseases for which the natives of the western hemisphere had no defenses. When two previously unconnected networks of similar entities encounter each other, there is conflict, and one "giant component" emerges. The natives that are left are perhaps 1% of their former number and in general they subsist at the edges of a transplanted European society.

AI has reached the point where it's hard to tell meat from machine and the internet is now having that same experience. These attempts to create human only networking are going to crush the life out of existing social media KPIs, and I think it'll be good for the Fediverse. Bot operators don't want to manually work their way through archipelagos of tiny spaces that do NOT want them. There's a political repression angle to the identity verification as well - if you want to manipulate the masses, gotta herd 'em into a space where you can DO that. Ten thousand digital islands are frightful when you have clear memories of being able to operate in a few globally flat spaces like Facebook and Twitter.

I've done computational social sciences stuff with a heavy conflict component. The day Musk took over Twitter was the equivalent of the Titanic bumping that iceberg. The sinking took about six months and I'm glad I made it to a life boat. But the really frightful thing here?

The same dynamics that apply to these social sites today are coming for white collar jobs and this isn't going to be measured in decades, it's going to happen in at most a few quarters. I hope my health care startup is about to get funded, because the alternatives for me are pretty grim. As for the vast majority of people who don't have a computer science background and the autistic focus superpower? I imagine what they feel is akin to the mood in Tenochtitlan in the early 1520s.

Slashdot Top Deals

Usage: fortune -P [] -a [xsz] [Q: [file]] [rKe9] -v6[+] dataspec ... inputdir

Working...