Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Only Nougat? (Score 1) 1

Some things need patching in historic Android releases.
One of the Dumb things about Smart phones is the lack of software
support and maintenance. The hardware cycle is vastly quicker
than the software support. Sam has stung me by failing to update
the software on otherwise marvelous hardware. I have motored
on to other venders and providers.

Comment Please define assault. (Score 1) 1

Failure to comply
      -- results in immediate corporal punishment no judge no jury.

To my knowledge, we do not allow or prescribe corporal punishment (with the exception of executions)
for any crime.

Should we bring back 20 lashes? We have banned the switch from schools.

In a number of failure to comply videos I see an officer body slamming the suspect in
a way that guarantees the suspect's head will hit the pavement or sidewalk. Citizen
to citizen such an assault would be an assault with a deadly weapon.

If such action is proscribed in departmental policy but not supported in the
law the author of that policy needs to have a taste of it. Not just written
policy but second order natural consequences and result of proscribed training.

Comment Re:Good solution (Score 1) 983

"If a shooter is holed up and alone, can they be qualified as an imminent threat to life?"

In this case, definitely yes. Obviously a blanket judgement cannot be made for all cases. Each situation is entirely different.

We need to more clear about why "definitely" yes applies.
One report was that he had hidden IEDs in public and near public places
that he could control via cell phone or otherwise remotely. That assertion
seems to have no truth behind it and waiting and watching for days if need be
might have been possible.

RF jammers and cell phone jammers are easy to build.

A drone with a bomb is an escalation. I do not want to see this
type of judge, jury, executioner type of murder repeated.

I fear we have imported training, tactics and weapons from foreign
war zones and are deploying them via policy that is external to
and absent in the law. Extralegal vengeance is an evil we do not
want to allow.

Comment Re:"Oh look, a puppy!" (Score 1) 99

I fail to see how any 'ecryption' matters when Facebook is spying on everything you do, both on an off Facebook.

If it is Facebook (singular) you are in a better perhaps more secure space.
Unencrypted anyone near or far that can tap into the stream could read it.

Even if FB archived messages and kept them behind a "legal" wall there
should be an audit trail to show abuse when abuse happened.

I fear the naive structures put in place today by honest well intentioned
individuals. Should that individual retire, change companies or be promoted
there is no mechanism to guarantee another honest replacement.

To pick on one chain of authority.
Google reminded me and would let you find my source:
"While it's true that no one is perfect, the seven corrupt popes below were exceptionally unholy:
"Pope Clement VII (Pope from 1523 to 1534) ...
"Pope Leo X (1513 to 1521) ...
"Pope Julius II (1503 to 1513) ...
"Pope Alexander VI (1492 to 1503)
"Pope Benedict IX (1032 and 1048) ...
"Pope John XII (955 to 964) ...
"Pope Stephen VI (896 to 897)"

Submission + - Mesa 12.0 Brings Open-Source OpenGL 4.3 To Intel/AMD/NVIDIA, Open-Source Vulkan (phoronix.com)

An anonymous reader writes: Mesa3D developers have announced the release of Mesa 12.0. Mesa 12 notably adds open-source OpenGL 4.3 drivers for Intel / Radeon / NVIDIA on Linux and it also integrates the previously open-sourced Intel Vulkan graphics API driver. From the Phoronix analysis, "Mesa 12.0 is easily one of the biggest updates to this important open-source user-space OpenGL driver stack in quite some time and will offer much better support and features especially for Intel, Radeon, and NVIDIA open-source Linux desktop users/gamers."

Comment Re:Might as well order them to produce cold fusion (Score 1) 296

There is no such thing as keys that would decrypt "all data on the internet", which hopefully everyone here already knows. Empty, dead, pointless parody of law. The war on encryption is doomed to fail

Are you sure?:

0000000 90e4 781a 3c0a f245 1c28 4910 6394 1c84
0000020 8ce8 da59 fffe 5993 4499 19c6 5e3e 405f
0000040 c2d8 83bf f249 e9be 3b4a 68d3 2355 b2ce
0000060 4a6e 17a4 b1d7 92a7 0503 0e1e 1c22 6215
0000100 7709 e0ea 5b76 382a e59f 4a00 d9fd 0e85
0000120 41e1 9080 7f36 01c4 449f b7c4 b31e 2f38
0000140 953a a04f f4df 3f7b b47f 4097 5a88 7339
0000160 d83a a41f 9d5b 9007 01f4 bff0 a1ed 22e6
0000200 85a3 d75f 35a5 cfdb 37ed 9c51 1d48 b6d7
0000220 bfd5 f9e4 b931 d71f 728c 0b9f b71c 84d9
0000240 d798 0397 3793 4faf b727 b0a7 3b2d e9d3
0000260 ff88 21ec ba57 072d 3e10 37f1 fbc2 43d4
0000300 6c31 122e b22f 403c 247e eb7f 9a4e 1c2b
0000320 0b77 1b31 dcb4 354d f363 d573 205a 2d1f
0000340 e09c 0977 4578 0037 79ee ead1 9ec6 65ef
0000360 4912 8127 fff8 2cf7 6d96 76db 5c7c e582
0000400 4ee4 7be0 521f e9a4 d6de d146 7440 7c2f
0000420 1466 d267 658e a8d0 d1c0 d5dd 34ec 56b7
0000440 3039 8d5a e1f1 9f0e a456 6e32 ef2c 043e
0000460 4bde 36f5 b78c fbc8 e42d e4e1 2bda 5a1d
0000500 751c e017 2573 7371 b2c3 4d5a d724 7254
0000520 e4c7 e22b 21ce 071f efe5 d644 cab0 4a5f
0000540 8e3f 150a 54e0 fa6c d7ce f430 a733 9390
0000560 a999 4e80 aabd 746c ad75 1e4c 76c0 05cf
0000600 6559 9dcb 233c b5a7 9e8e 1e43 8dbf 818f
0000620 bf97 934d 097e 2942 261f 4440 41ee 0057
0000640 018d c2bc f50a 8b7a 5575 7e8a ff6b 9bec
0000660 a23d e045 a3c5 0606 80d3 e93c 8046 554c
0000700 5c5d d729 1245 4a3e 8dda e8b6 422b a5cf
0000720 4b05 31b0 63aa ff3c 54f9 2025 b1e7 d05a
0000740 0f8b 913f 7d7a f9a1 0f2a 1ff1 466b ce0f
0000760 9b8f b86c bd15 3157 a406 e096 72ff 157c

Submission + - We need a better Private Browsing Mode (networkworld.com)

Miche67 writes: Many browsers have some type of 'private' browsing. The settings aren't enough, though, to offer real protection.

As this writer says, Chrome's Incognito Mode "doesn't offer strong protection at all," and Firefox's Private Browsing with Tracking Protection — while stronger than Chrome — is an all-or-nothing option. "You can’t turn it off for sites you trust, but have it otherwise enabled by default."

Every single link to non-trusted websites should open, by default, in a Private/Incognito window. C'mon, browser makers, get this done.


Comment Re: fp (Score 1) 165

You know, a major property of the security of a password is the fact that it's something you know. If you write it down, it's something you have.

Except for the fact that with the various rules for passwords that differ from site to site, I have over 100 passwords that often need to be changed every quarter. Am I supposed to memorize all of those? This is a key failure of the current paradigm.

Why yes.. you are supposed to recall them all.
Any individual with over 100 passwords is in an interesting position.
The 100 passwords are likely enabling access to a long list of data and your employers need to have
a policy to sustain this data. One policy is "keys" need to be shared with management. But if sharing
is tacitly illegal management has a problem. N.B. Rightly so there are managers with no permission to access
data that their employees have access to. So these managers need to manage differently. They also need
to verify that the alternate access works.

Like backup procedures. Failure to test (backup procedures) is folly.

There are some solutions that when expressed as policy might work but the law and technology can
entangle things in ways that F. Kafka and Joseph Heller could not have imagined.

If you have 100 customers it gets interesting.

Comment Re:US Customs and Border Protection (Score 1) 397

Modern Day Shakedown.

Even as a US Citizen it is fucking absurd. I had one flight into Boston that took longer to get through immigration that flight itself - AS A US CITIZEN!

My wife never wants to come back. I don't blame her. It's a straight up humiliating process.

I think I have dozens of active online accounts.
Some are vendor product forums.
Some like /. are whimsy.
Some are to read the news.
Some for music.
Some are.......

The wrinkle in all of this is that an on-line ID takes 30 seconds to generate
and no connection to a new connection would be used by a serious criminal,
murderer or activist.

Given the power of metadata this seems silly, foolish and ill conceived as presented.
A contact ID sure but online presence is a blind and foolish reach and electronic
contacts are the norm for interacting with airlines, hotels and more.

I smell layers of beureaucracy hunting for more data for bigger and larger data farms.
i.e. project and department feather bedding.

Comment Re:Not Totally New (Score 1) 60

I have seen such cameras (hair thin fibre optic connected) before; in use by security services of various nations.

What is most interesting is the construction via 3D printing, making it available to anyone.

Me, I want to see some images.

It is also true that a collection of terrible images of the same scene can be assembled into
improved images.

The optical fiber can allow data to flow through faraday cages at high rates.

Comment case closed (Score 1) 268

The officials made a policy decision.
Case and investigation seems closed if this is true.
  "State Department officials by e-mail because spam filters were blocking their messages. To fix the problem, State Department IT turned the filters off "

We can quibble about document classification but classification is a result of policy
and the use or non use of a department mail server is also policy.

If those that make policy change it one way or another one place or another and even if that
policy was modified by HC herself the investigation is going to find a dead end at Kafka's
tombstone.

Submission + - Drop the Supersonic Aircraft Ban, Watch Business Boom (wsj.com)

SonicSpike writes: In an Op-Ed from the WSJ:

Today’s aircraft designers are able to run hundreds of computer simulations to discover “quiet supersonic” designs that substantially curtail perceived noise. NASA has been investing in noise-abatement research like this since the mid-1980s, and now private startups are also getting into the game, with at least two U.S. companies, Boom and Aerion, in preproduction of affordable supersonic passenger jets.

So long as the FAA maintains the supersonic ban, these companies have a reduced incentive to implement noise-abatement technologies and gain access to the lucrative coast-to-coast market. But the agency’s official position—offered in a 2008 public statement—is that it will forgo issuing a noise standard for supersonic travel until the “designs become known and the noise impacts of supersonic flight are shown to be acceptable.”

And that’s the catch: Without an official noise standard, how are America’s aviation companies to know what counts as acceptable? No company is going to spend millions of dollars producing a quiet supersonic aircraft behind a veil of ignorance, only to discover later that the FAA does not find it to be quiet enough.

Slashdot Top Deals

IOT trap -- core dumped

Working...