Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:"did not obtain legal advice when it set up" (Score 2) 160

If you believe it's sensible to have to obtain legal counsel to set up voluntary trade of digital goods—where nobody is forced to participate.

The thing is if you were trading in them like ordinary physical goods then that would be fine, but if you're selling out "licenses" which is essentially a rather complex contract, then yes getting a lawyer for different jurisdictions might be advisable. Dealing in international IP law is always going to be a mess because you're not selling something tangible and different countries have different rules and accepted customs. There have been attempts to harmonise law on this in the shape of TPP, Berne, etc but you're always going to anger someone because someone's law has to change.

Comment Re:Pointless hype (Score 1) 343

The problem is that if the enemy has some kind of new radar or algorithm that can undermine your stealth capability, they are going to do their best to keep this from you. Pilots then trained with absolute impunity in an aircraft may not then have practiced the skills necessary to deal with that radar. Also an unluckily even slightly damaged aircraft may lose stealth capability, something you also want to train for.

Comment Re: Self-driving will not "destroy" auto insuranc (Score 1) 299

Blu-ray AACS was hacked years ago, mainly because the player keys kept leaking. However the truth is it doesn't really matter because streaming services made non-commercial piracy pretty much irrelevant economically (at least in the markets they care about). It's easier to pay Netflix or Amazon a lil fee and watch it straight on your TV than to pirate.

Comment Wrong people to strip (Score 5, Informative) 576

They still would come because they have nothing to lose, most of them have net assets of close to zero. The first generation tends to live hand to mouth. The people who make the money are the American factory owners and farmers who employ them. These are the people you would need to asset strip to stop employment of immigrants but if we think politicians are going to go after these people (their biggest donors) we are naive. Incidentally if the U.S. did manage to deport all 11 million of them it would cause a massive economic implosion due to a drop in demand for basic goods. It would likely also cause a closure of US factories and increase the offshoring of US industry.

Comment Re: Delete stuff. (Score 1) 279

Bad advice if you're in the UK. The lawful business regulations secondary legislation for the regulation of investigatory powers act make it clear that if you have reason to believe an email is personal rather than business or discover in the course of looking at it then it is protected by the act. Being criminal law this isn't something you can waive away by contract. The flip side being that a surprising number of uk agencies can demand access to anyone's emails in performance of an investigation.

Comment You're a director? Take the accountants route (Score 1) 185

Given that your job is to protect the company from making loss as much as help it make profit, you can quite safely say no. For starters it's a legal quagmire because it's tied into rent, this gets a multiplier if you are a multi state operation, I imagine getting a legal opinion in every state you operate is going to cost you. Plus the time to maintain it, and that added service desk calls. Add to that how much it would cost to successfully defend at least one class action lawsuit by an ambitious college legal clinic and subtract the profit from the (small scale) contracts. You will most likely get a negative number. There's also likely to be a hit to your tenants goodwill, that's hard to put a price on but also financially important, unhappy tenants leave apartments in worse states when they leave.

Comment Eh? Stem cells do make Telomerase (Score 0) 178

We do all make Telomerase in some of our stem cells, just not in somatic cells and certain semi-differentiated stem cells. In fact someone knocked out Telomerase in mice and showed they hyperaged and lived only 6 months (rather than 3 years) without it (interestingly they also found you could rescue them by reintroducing telomarase). In short Telomarase seems to be part of the cellular ageing mechanism, rather than the organism level one. Whatever is causing organism level ageing relates to more than just telomeres.

Comment Re:Good, I guess (Score 1) 148

Depends what kind of monopoly you mean, because of regulation, maybe not in a Network Neutrality kind of way but it's still a monopoly. All but one of those options above are going over BT's local loop and a lot of the smaller operators also buy their exchange hub backhaul from BT (Also Plusnet is BT). BT Openreach (the bare wires bit) is pretty much a local monopoly in most of the country and thus why they're so heavily regulated. It's pretty hard to say how they'd behave if they weren't, but you can bet if they had a choice they'd not be sharing that loop. Outside of the cities it is BT Wholesale that is most definitely a monopoly, the rural broadband project was pretty much a flop and all of the contracts went to BT. This means that the way BT Wholesale's price list is set up in turn sets the business model for anyone who buys bandwidth and lines from them.

Submission + - Weev Is in Jail Because the Government Doesn't Know What Hacking Is (vice.com)

Daniel_Stuckey writes: Last March, weev, the notorious internet troll who seems to be equally celebrated and reviled, was convicted of accessing a computer without authorization and identity fraud, and sentenced to serve 41 months in prison.

"He had to decrypt and decode, and do all of these things I don't even understand," Assistant US Attorney Glenn Moramarco argued. Here, on a Wednesday morning in Philadelphia, before a packed courtroom, the federal prosecution argued that a hacker should spend three and a half years in prison for committing a crime it couldn't fully comprehend.

Previously, Orin Kerr, a law professor at George Washington University and weev's defense attorney, had argued first and foremost that there was no criminal hacking to speak of. According to Kerr, what weev and Daniel Spitler (who pleaded guilty to avoid jail time) had done while working as an outfit called Goatse Security was entirely legal, even though it embarrassed public officials and some of the country's biggest corporations.

Submission + - Survey Finds Nearly 50% in US Believe in Medical Conspiracy Theories (nydailynews.com) 1

cold fjord writes: NY Daily News reports, "About half of American adults believe in at least one medical conspiracy theory, according to new survey results. (paywalled, first page viewable) Some conspiracy theories have much more traction than others ... three times as many people believe U.S. regulators prevent people from getting natural cures as believe that a U.S. spy agency infected a large number of African Americans with the human immunodeficiency virus (HIV). J. Eric Oliver, the study's lead author from University of Chicago, said people may believe in conspiracy theories because they're easier to understand than complex medical information. ... Some 49 percent of the survey participants agreed with at least one of the conspiracies. In fact, in addition to the 37 percent of respondents who fully agreed that U.S. regulators are suppressing access to natural cures, less than a third were willing to say they actively disagreed with the theory." — One of the conspiracy theories, that the US created the AIDs virus, was created for an active disinformation campaign by the Soviet Union against the US as a form of political warfare during the Cold War, and still gets repeated.

Submission + - Security Industry Incapable of Finding Firmware Attackers (threatpost.com)

BIOS4breakfast writes: Research presented at CanSecWest has shown that despite the fact that we know that firmware attackers, in the form of the NSA, definitely exists, there is still a wide gap between the attackers' ability to infect firmware, and the industry's ability to detect their presence. The researchers from MITRE and Intel showed attacks on UEFI SecureBoot, the BIOS itself, and BIOS forensics software. Although they also released detection systems for supporting more research and for trustworthy BIOS capture, the real question is, when is this going to stop being the domain of research and when are security companies going to get serious about protecting against attacks at this level?

Submission + - First Automatic Identification Of Flying Insects Allows Hi-Tech Bug Zapping

KentuckyFC writes: Entomologists have never been able to identify flying insects automatically. But not through lack of trying. The obvious approach is to listen out for the frequency of the wing beat. But acoustic microphones aren't up to the job because sound intensity drops with the square of the distance, so flying insects quickly drop out of range. Now a group of researchers has solved this problem using a laser beam pointing at a photosensitive array. Any insect flying through the beam, casts a shadow of its beating wings that can easily be recorded at distances of several metres. Using this new device, the team has created a dataset of millions of wing beat recordings, more than all previous recordings put together. And they've used the dataset to train a Bayesian classifier algorithm to identify flying insects automatically for the first time. That opens the prospect of a new generation of bug zappers that kill only certain insects or just females rather than males. That could have a big impact on human health since mosquitoes and other flying insects kill millions of people each year. It could also help in agriculture where insects threaten billions of dollars worth of crops.

Submission + - Full-Disclosure Email List Suspended Indefinitely

An anonymous reader writes: John Cartwright from Full-Disclosure sent out an email this morning. . . Hi When Len and I created the Full-Disclosure list way back in July 2002, we knew that we'd have our fair share of legal troubles along the way. We were right. To date we've had all sorts of requests to delete things, requests not to delete things, and a variety of legal threats both valid or otherwise. However, I always assumed that the turning point would be a sweeping request for large-scale deletion of information that some vendor or other had taken exception to. I never imagined that request might come from a researcher within the 'community' itself (and I use that word loosely in modern times). But today, having spent a fair amount of time dealing with complaints from a particular individual (who shall remain nameless) I realised that I'm done. The list has had its fair share of trolling, flooding, furry porn, fake exploits and DoS attacks over the years, but none of those things really affected the integrity of the list itself. However, taking a virtual hatchet to the list archives on the whim of an individual just doesn't feel right. That 'one of our own' would undermine the efforts of the last 12 years is really the straw that broke the camel's back. I'm not willing to fight this fight any longer. It's getting harder to operate an open forum in today's legal climate, let alone a security-related one. There is no honour amongst hackers any more. There is no real community. There is precious little skill. The entire security game is becoming more and more regulated. This is all a sign of things to come, and a reflection on the sad state of an industry that should never have become an industry. I'm suspending service indefinitely. Thanks for playing. Cheers — John

Slashdot Top Deals

The Macintosh is Xerox technology at its best.