Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Full pardon, and here is why. (Score 1) 822

I think you are misunderstanding the "fruit of the poison tree". Any evidence gained from an unconstitutional search is inadmissible. That doesn't however, prevent the authorities from trying to gain that information through an alternate path, thus parallel construction. Intelligence can't be used to get a warrant or used in court without allowing the defense to challenge it.

However it can be treated like any other tip, and as long as the authorities use legal and constitutional means to investigate that tip and to gain any evidence they use to get a warrant, they use evidence the gain as a result of following up on that tip.

Furthermore, evidence is only excluded if constitutional rights were violated, or the legislation that makes gathering it illegal includes an exclusionary rule.

For example the Pen Register Act doen't include an exclusionary rule. Police can use an illegal pen register to gather metadata about a phone call and it is still admissible. The police could be prosecuted for doing so, but the evidence is still admissible. It's the result of the Supreme Court ruling Smith v Maryland which is at the root of much of the recent controversy lately.

Comment Re:It might be an unpopular opinion... (Score 1) 822

He deserves a pardon for all the data he released that could reasonably be determined to detail illegal or unconstitutional government programs or actions.

But he leaked a massive amount of documents, and most of them don't show illegal or unconstitutional activity. They do compromise legitimate intelligence operations.

Snowden had a legal obligation to make a reasonable effort to filter out things that didn't show the government breaking the law or the constitution. He also had a moral obligation to do so since he swore an oath the keep classified data secret when he was granted his security clearance.

This is something that should have been very clear to him after Manning's leak and prosecution. Public and legal pressure may cause the government to pardon or refuse to prosecute cases where the leaked information is overwhelmingly in the public interest, and in both cases it can be argued that some of the leaked information was the valid act of a whistle-blower, but that only justifies the leaking of that particular data.

Snowden tried to make it sound like he couldn't be protected by whistle-blower legislation because he was a contractor. That's misdirection at best. No whistle-blower legislation is going to excuse the breadth of his leaks.

Comment Re:Fruit of the poison tree (Score 1) 266

Evidence that results from a constitutional violation can't be used in court. Evidence obtained in a manner that breaks legal but not constitutional protections in many cases can be used in court.

For example, the Supreme Court ruled that you don't have a reasonable expectation of privacy regarding pen register data such as what phone numbers you call and how long you spoke (Smith v Maryland), and the Pen Register Act does not contain an exclusionary rule. So even if the officers gained a pen register for a phone under false pretenses and violate the law in the process, the information is still admissible. The officers could be prosecuted for breaking the law, but the evidence isn't excluded.

I also believe that the fruit of the poisoned tree is regarding search warrants. It the evidence submitted to the court in order to acquire a search warrant is obtained improperly, then any evidence gathered through that search warrant is excluded. However, I don't believe that the defendant is allowed to challenge every aspect of the investigation regardless of if the information was used in court.

As for parallel construction, the stated reason for using it is to protect sources where the source might be compromised if the data is used. That doesn't mean the source is illegal, just that the source could be put in danger or is in danger of not being useful in the future if exposed.

So the source is treated like a tip rather than evidence itself. The authorities use that tip to seek our solid evidence that can be used in court. Authorities get lots of tips that aren't enough to get a warrant by themselves but tell them where to look to gain evidence. As long as the evidence isn't used to get a warrant or used in court, I don't believe the defendant has a right to challenge that data.

Comment Re:Where? (Score 2) 177

It is highly unlikely that the EU will kick out the US military. Having the US military there strengthens their own defenses, but that's not the main reason. The main reason is economic. Having a US base there dumps a huge amount of money into the local economy. Kicking out the US military would be economically devastating the the areas surrounding the bases.

The EU and US are allies and competitors at the same time. EU government agencies rarely pass up a chance to tweak the US government. People on both sides talk about removing the bases from time to time, but it never happens because having those bases there benefits both the US and EU.

People from Germany, France, and other talk about how they would never put up with their governments spying. They don't trust their own governments, yet they expect the US government to trust their government? Blind trust of governments, your own or a foreign one is extremely foolish. People know that but they don't think through what that means.

As for the bulk data collection. I suspect that the administration will scrap the program and go back to requesting the data on individual cell phone numbers from the cell companies. However since our Supreme Court ruled decades ago that we don't have a reasonable expectation to privacy regarding such metadata held by third parties, it will have very little real effect. A warrant will still not be required to get the data from the cell companies. The pen register act requires a court order, but the standards for getting such an order are so low that the court is basically required to rubber stamp any request. It will take them more time to gather metadata and the process will be less efficient, but there will be no real increase in our privacy protections.

Comment Re:Somewhere, Google is Smiling (Score 1) 451

I understand dumping Google maps. However, Google is hardly the only company out there that Apple could partner with to provide a mapping solution for iOS. An in house solution would have been great if it were ready, but it wasn't. You can't tell me that there weren't other mapping companies with quality products that would have offered Apple reasonable term to replace Google maps in iOS.

Dumping Google maps may have been the right decision. Replacing it with their own solution that wasn't ready was an awful solution.

Comment Re:Bye Apple (Score 2) 451

They didn't start from scratch, but their replacement simply isn't of the kind of quality Apple customers have come to expect. Apple has always demanded a bit of a premium price for a premium product. Maps are a critical app on a smartphone. I can understand that continuing to lack turn by turn navigation wasn't a viable choice for Apple. It's something they really should have had before now. However substituting their own solution that simply wasn't ready yet was a foolish choice. They should have either been investing more on a better solution of their own, or provided an alternative from another company until theirs was ready.

Comment Re:Thunderbolt not at all useless (Score 1) 540

You can get a USB 3.0 dock or eSATA cable that will give you the same access speeds for about 15% of the cost unless you are connecting a lot of disks in a RAID. Thunderbolt isn't useless, but since there are very few devices that rally utilize it, and those that do are needed by few people, I'd say that "currently fairly useless" describes it pretty well for the vast majority of users.


New Speed Cameras Catch You From Space 351

A new kind of speed camera that uses satellites to measure average speed over long distances is being tested in Britain. The "Speedspike" system combines plate reading technology with a global positioning satellite receiver to calculate average speed between any two points in the area being monitored. From the article: "Details of the trials are contained in a House of Commons report. The company said in its evidence that the cameras enabled 'number plate capture in all weather conditions, 24 hours a day.' It also referred to the system's 'low cost' and ease of installation." I can't wait to see the episode of MythBusters where they try to avoid getting a speeding ticket from a satellite.

Comment Re:So why not change it? (Score 1) 305

Operating systems already do try to block access to OS files. However, administrators still have to be able to modify such files, and some services have to be able to modify such files.

So hackers find bugs in software that allow them to run code with administrator privlidges.

Once they find one, their actions appear ligitimate because the process has the appropriate privledges.

The kind of testing you have to do to write software that is nearly bug free, such as how control software for airplanes is developed is incredibly time and cost prohibitive. You end up spending on the order of $1000 per line of code by the time you are done with the entire development and testing process in such systems. Obviously that isn't practical for consumer operating systems and applications, and even then you only have such security and stability by stripping out any non-essential functionality.

If you want flexibility, extensibility, and variety, you are going to have to accept that you are going to have bugs and vulnerabilities. Good design and development practices can help a lot, but the tradeoff still has to be made.

Comment Re:I'll give you a clue... (Score 1) 305

There are lots of examples of Linux servers getting hacked, but for the purpose of a botnet they want to infect massive numbers of systems. In reality, that means Windows. Mac OS X isn't particularly secure, there's just no good reason to aim at a niche market instead of the market leader.

Linux is more secure, but being relatively more secure is far different from being unexploitable.

Of course since there are so many distributions, with so many different configurations, the number of systems exploitable with a particular flaw are even more limited.

Don't delude yourself to think that because you are running Linux you are safe. You might be more safe, but the biggest factor is you are simply a less likely target.

Comment Re:D&H Distributing (Score 1) 314

I'm still waiting for their appology to Newegg. They insisted that the original statement about demo processors was some kind of coverup. Apparently HardOCP shouldn't be held accountable for passing on incorrect information from their sources, but it's just fine for HardOCP to bash the hell out of Newegg for doing the same, and to not even appologize to them for it.
The way things stand now, Kyle deserves to get sued for libel. Either he needs to admit he accused Newegg without good cause, or he needs to accept fault for not doing a better job of verifying that D&H was at fault. He can't have it both ways.

I was unreasonably harsh in my previous post. Kyle doesn't deserve to get sued. He's been around a long time and has built up a lot of well deserved credibility over they years. It's a shame to see that credibility tarnished by him not holding himself to the same standard he held Newegg. He owes them an appology.

Comment Re:D&H Distributing (Score 1) 314

I'm still waiting for their appology to Newegg. They insisted that the original statement about demo processors was some kind of coverup. Apparently HardOCP shouldn't be held accountable for passing on incorrect information from their sources, but it's just fine for HardOCP to bash the hell out of Newegg for doing the same, and to not even appologize to them for it.
The way things stand now, Kyle deserves to get sued for libel. Either he needs to admit he accused Newegg without good cause, or he needs to accept fault for not doing a better job of verifying that D&H was at fault. He can't have it both ways.

Comment Re:Glad (Score 1) 314

Yes they vetted the suplier, and from everything I know they haven't had significant problems with them in the many years they have been doing business with them.

However, sometimes good suppliers go bad.

It is their responsibility to make good on what they promised to sell customers, and from all indications they are doing so. They should then go after the supplier to recoup their costs in taking care of their customers.

Now if customers expect unreasonable compensation for the inconveience of not getting what they ordered, that's part of the entitlement mindset. Overnight shipping of the replacement and return shipping costs for the fake is reasonable. Expecting a refund and the replacement or something along those lines isn't reasonable.

Good customer service is good business, but mistakes happen, and passing these chips on from their distributor is a mistake. If companies have to bear a high burden for mistakes and problems that aren't really forseeable, it become cumbersome and unreasonably expensive to do business. Newegg has low prices because they have low profit margins. To keep prices low they have to keep costs down.

A well run company has lower costs in general, but if you have unreasonable expectations, you should expect to pay for them. If you want good prices, accept reasonable solutions to mistakes.

Comment Re:New Egg (Score 5, Informative) 314

Actually the cease and desists were sent by a different distributer who was incorrectly named as the culprit and was justifiably upset. The cease and desist letters by D&H were appropriate, and their claims that they were being falsely accused were accurate.

I think Kyle at HardOCP was honestly misinformed, but he didn't exactly handle if well. He accused Newegg of being dishonest and trying to cover things up. He appologizes to D&H but defends himself by saying "We would NEVER "speculate" on something of this nature, as there is NOTHING for us to gain by misinforming our readers." However, he never gave Newegg the same benefit of the doubt he claims he deserves. He adamantly accused Newegg of a cover-up when they originally relayed IPEX's story about demo processors. Newegg had no more to gain by lying than HardOCP did.

Kyle has been around a long time and should know better. He owes Newegg one hell of a public appology, and hopefully after a little more thought he will man up and make that appology.

Comment Re:Down already (Score 2, Informative) 241

I'm not aware of any fair use rulings that have ever allowed for the broad publication of a complete copyrighted work.

His justification appears to be that although Microsoft is required to comply with the law, they should publish exactly how they comply so that people are more capably of avoiding the governmental eavesdropping.

Basically he's arguing that while complying on the surface, Microsoft should be helping subvert the law at the same time, which would likely land Microsoft in some pretty serious legal trouble.

The public has a right to know what the law allows the government to do. It doesn't have a right to know the specific implementation.

Such back doors do often result in some security risks, however, believe it or not you don't have a right to do penetration testing on someone else's system, even if you use that system.

Slashdot Top Deals

"The eleventh commandment was `Thou Shalt Compute' or `Thou Shalt Not Compute' -- I forget which." -- Epigrams in Programming, ACM SIGPLAN Sept. 1982