Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:The actual abuse exist, but ... (Score 1) 126

I think we can take their resignation at face value. There was serious abuse in their organization by its most public member and they failed to stop it. The people taking over aren't government stooges, they are well respected and highly competent people like Bruce Schneier.

They did the right thing. Fresh start, get some good people in, free up some of the old board members to work on the technical side.

Comment Re:Hatchet jobs aside (Score 2) 126

Tor is backdoored.

No. You don't understand what Tor is or what the vulnerabilities used by attackers are.

Tor is secure. Where people have been located, it was due to bugs on the bundled browser and not following best security practices like disabling Javascript and not using a maximized browser window (to thwart canvas based fingerprinting). But the underlying network itself is secure.

Don't mistake compromised Tor exit notes as flaws in the network. Tor was designed on the assumption that exit nodes would be compromised and are inherently untrustworthy. Even if you use Tor, you still need to encrypt the traffic leaving the exit node because, as the documentation makes extremely clear, the exit node can see everything that passes in and out of it.

Once you understand what Tor is and the limits of what it does, you can see that it is highly effective and has proven secure.

Comment Re:Does MS have any idea what they are doing? (Score 1) 268

Unix managed to evolve beyond this though.

Yes, it evolved to the point where we no longer had to allocate space for our main memory in the paging file. But Unix systems still include paging by default, even though it is stupid when RAM is cheap. It's goddamned pointless because if a process runs away and eats all the RAM I want it killed, not swapping.

I am not using any paging space on Windows or Unix. My Windows 7 system has 16GB and my Ubuntu system has 8GB, and there's no need for paging thankfully. This isn't even a lot of RAM any more, it's a pittance.

Comment Re:This is NOT a matter of trademark violation (Score 2) 211

Not necessarily. Take a look at the relevant portion of the Lantham Act. It would have to fit one of the provisions therein. It might make a false suggestion of affiliation, but it's arguable.

15 U.S.C. 1125 - False designations of origin, false descriptions, and dilution forbidden

(a) Civil action

(1) Any person who, on or in connection with any goods or services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact, which

(A) is likely to cause confusion, or to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by another person, or

(B) in commercial advertising or promotion, misrepresents the nature, characteristics, qualities, or geographic origin of his or her or another person's goods, services, or commercial activities,

shall be liable in a civil action by any person who believes that he or she is or is likely to be damaged by such act.

Comment Re:"no dedicated GPU" (Score 1) 85

I am typing this on an AMD APU system that claims to have an integrated Radeon HD 8400, and I can assure you that it is terrible gutter trash and is barely functional with any significant applications running.

So, just like having a real Radeon then?

I kid, I kid. I'm not going to look that one up, but a lot of these integrated chipsets are nothing like what the model number would imply. I remember nVidia outright changed the name they were reporting for a couple of different integrated video chipsets, without actually doing anything to improve performance. That was worth a snicker, too.

Comment Re:Missing the point (Score 1) 103

I'm less concerned about my exact location being sent in emergencies than by the fact that my phone can now be hacked to provide by exact location AT ALL TIMES.

Nobody has to hack your phone at all to get your location down to a few meters in the best case, using DtoA. You just have to be in sight of two towers. Then they do a little math with your timestamps and they know right where you are. Get over the idea of positional privacy if you have a cellphone turned on.

Comment Re:Define "Emergency" (Score 1) 103

Since it's pretty much ILLEGAL to call 911 when there isn't an emergency, any claims that "THEY" are going to use it to get you are ridiculous.

Last I checked, in a few places you still dialed 9-1-1 to reach the PD whether you had an emergency or not. Other places get quite cross about it, which is why the practice should either be made universal or abolished.

If someone wanted to get you, they'd make your phone dial 9-1-1 and make threats, preferably in your voice. Of course, they have to have owned your phone already, but there's new vulns all the time.

Comment Re:Er (Score 1) 567

Might as well ask if they'd like to lose their pilot's license. They're required by law (and ethics) to always be prepared to take control away from the Autopilot, in a fraction of a second.

So what is the purpose of autopilot then? Specifically, what is the purpose of autopilot when it doesn't prevent you from running broadside into a truck?

Slashdot Top Deals

Real Programmers don't write in FORTRAN. FORTRAN is for pipe stress freaks and crystallography weenies. FORTRAN is for wimp engineers who wear white socks.