Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Re:Please wait until after you're screwed. (Score 1) 69

Read the attached settlement from the Illinois lawsuit before speaking. It doesn't require "actual damages."

Seriously read the settlement. Since you won't I'll paste part of the summary here:

The plaintiffs in the L.A. Tan case alleged that the company, which used customers’ fingerprint scans in lieu of key fobs for tanning membership ID purposes, violated the BIPA by failing to obtain the customers’ written consent to use the fingerprint data and by not disclosing to customers the company’s plans for storing the data or destroying it in the event a tanning customer terminated her salon membership or a franchise closed. The plaintiffs did not claim L.A. Tan illegally sold or lost customers’ fingerprint data, just that it did not handle the data as carefully as the BIPA requires.

HUH NO ACTUAL DAMAGES. Just that they were an aggrieved party whose information wasn't being stored according to the statutory requirements. Mind blowing

Comment Re:Please wait until after you're screwed. (Score 1) 69

Their biometric data was incorrectly stored. It was completely unencrypted. That particular law is equating, really elevatingto a higher level, biometrics to PII. Read the intent of the law. It's clearly meant to prevent companies from unsafely storing the data and punishing them if any number of things happen. Storing a face/avatar unencrypted easily falls afoul of the intent of the law. Abridged intent of law: (c) Biometrics are unlike other unique identifiers that are used to access finances or other sensitive information. For example, social security numbers, when compromised, can be changed. Biometrics, however, are biologically unique to the individual; therefore, once compromised, the individual has no recourse, is at heightened risk for identity theft, and is likely to withdraw from biometric-facilitated transactions.

(g) The public welfare, security, and safety will be served by regulating the collection, use, safeguarding, handling, storage, retention, and destruction of biometric identifiers and information.

IL courts have already ruled, quite correctly, in similar cases in the plaintiffs defense. Unencrypted biometric is inherently unsafe and against commercial practices. PII like SSNs, card numbers, and passwords are kept encrypted. The statute puts the level of care required at least as high as PII.

Comment Re:How large?!? (Score 1) 308

Because fucking with a moon that orbits your planet and is partially responsible for water levels, tides, et al is beyond retarded. Then it's not really exposed Then you also have the decades of treaties governing the ban of commercial exploitation of the moon. We also know exactly how exposed these resources are (eg directly on the surface of the asteroid).

So why would anyone? Because they've thought about it for more than 2 seconds and seem to actually have studied the issue. And the Space Act's legality is tenuous at best, probably closer to outright illegal.

Comment Are you familiar with CR? (Score 1) 246

Apparently not


... our battery tests are not designed to be a direct simulation of a consumer's experience. Rather, we look to control as many variables as possible, then perform a test that gives potential users a reasonable expectation of battery life when a computer's processors, screen, memory, and antennas are under a light to moderate workload. This test has served as a good proxy for battery life on the hundreds of laptops in our ratings.

Comment God are you people serious? (Score 1) 433

If it's that fucking bad, just leave. Don't threaten to leave. Get a new job. It's not worth the time or effort to fix. Gaslighters are never going to get better and if this situation exists (for whatever reason), it's being tacitly allowed by those upstairs.

There's really no other option. I don't relish confrontation but don't shy away from it. However this is not a fight you can win and you look like a moron for trying. Being a passive bitch about it with all the CYA emails and documentation isn't going to help either. It's a huge time sucker and management almost certainly won't care. Grab whatever of your confidence is left, get your resume polished and be prepared to just walk out after giving two weeks notice.

Comment Your friends suck (Score 1) 449

And bothering to post this question is almost as bad.

Is computing as cool? No of course not to the self-described nerds who helped build it to where it is now. It's a lot more accessible and exponentially more powerful.

So instead of lamenting the past, appreciate what's been built and work to making the experience as pleasant as you found it back when you were younger.

Comment Why the fuck would Symantec analyze non-threats? (Score 1) 129

FFS who writes this? Of course an anti-virus company is looking for malicious scripts and most of those are going to *wait for it* be malicious. The 5% who aren't are likely abject failures. Symantec isn't knocking on Initech's door asking Jim from the Windows team for his powershell solution to deploy licensed software packages

Comment If your career hinges on social media (Score 4, Interesting) 186

I highly highly doubt it's a career. Or you could just be really, really shitty at your job. I made it about 2 paragraphs but had to stop when he was talking about some guy who felt the need to update his blog every 30 minutes. That's just an abnormal amount of anxiety and narcissism, not to mention an insane outlook on social media and modern life.

Slashdot Top Deals

Life is cheap, but the accessories can kill you.