Forgot your password?
typodupeerror

Comment Re:Having to jail break your own freaking phone (Score 0) 184

HTC are actually going to continue to ship phones with locked bootloaders, and release an unlocking tool on the support website for them: presumably it's a warranty and support thing, and possibly a security one as well: it sounds pretty convoluted, but then, so is the current root exploit - su binary - engineering bootloader - S-OFF process to get custom firmware on there anyway. I'd prefer them to just have a button in the settings menu (like the Nexus One had for root), but the extra layers of "here be dragons" will probably stop people from doing it without realising the implications of trusting a firmware dev - if you could reflash phones straight-up, I suspect we'd see a bunch of custom Kesha ROMs loaded with trojans.

Comment Re:Sarcastic or not? (Score 0) 353

Consider the professionals. What do you think all those stage technicians, sound engineers, etc. etc. use when dealing with audio? That's right, headphones.

Actually, stage techs and live engineers use headphones for isolation, so they can hear what they're doing. They'll pull them off for listening to what the overall mix sounds like, and in a studio, where you can get reasonable quiet on demand, they'll listen on a set of frighteningly expensive ultra-flat powered monitors, since (you guessed it) in a well designed listening room, with good speakers and decent isolation, headphones don't even come close.

Comment Re:Is Hanlon's Razor sharp enough to cut this? (Score 1, Insightful) 175

In this case, though, privacy of ballots is essential to an honest election, to prevent more traditional electoral fraud like vote-buying. Votes have to be entirely anonymous once you leave the booth so that your employer/union leader/other Big Bad of the month can't pressurise you into voting one way or another. The right to an honest election hinges on a vote being one individual's opinion, not that of someone else with an angle to work. All you do by making votes voter-verifiable is move the point of fraud from the system to the individual, which is probably easier to execute.
Privacy

Human Rights Court Calls UK DNA Database a 'Breach of Rights' 206

psmears writes "Describing a judgment that is likely to rein in the scope of the UK DNA database, where at present the DNA of those arrested by the police is kept permanently (even if the people concerned are never convicted, or even charged), the BBC reports that the European Court of Human Rights has ruled that keeping such people's DNA in the database 'could not be regarded as necessary in a democratic society.'" Reader megla adds a link to the full text of the judgement.
The Internet

Who Protects the Internet? 177

strikeleader writes "TechCrunch has an article from an interview with General Kevin Chilton, US STRATCOM commander and the head of all military cyber warfare. Who protects us? 'Basically no one. At most, a number of loose confederations of computer scientists and engineers who seek to devise better protocols and practices — unincorporated groups like the Internet Engineering Task Force and the North American Network Operators Group. But the fact remains that no one really owns security online, which leads to gated communities with firewalls — a highly unreliable and wasteful way to try to assure security.'"

Slashdot Top Deals

If you can't learn to do it well, learn to enjoy doing it badly.

Working...