Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Tin foil hat wearer - now with edits! (Score 1) 50

I guess I'm the only one who uses two fingers or hands to enter 4 digit PIN?

I have a credit union, so for me easy access to ATMs means going to the nearest 7eleven.

You may understand the unease I had at first, but really when compared to a Chase ATM, it was about the same.

So for my personal security, I always check for card skimmers by gripping and shaking the scanner. Then, I use one hand with two fingers, or two hands to enter the PIN for one of two reasons: speed; reducing the amount of time at an ATM, or for blocking visual access to the keys I press. I always look around for any "security cameras" around the ATM.

I try to only visit the same ATM, so I can see what changes in the hardware.

Then when I'm done, I randomly press keys to protect myself against heat signature attacks.

Finally, I wait until the terminal is ready to accept a new transaction. #1 I always ask for no receipt. And because of the inconsistent manner ATMs function, I can't trust that nothing will come out, so I wait.

#2 some ATMs actually wait for input to close out a session "Would you like to perform another transaction?"

So I don't trust ATMs very much, except that they'll give you the correct amount of money.

On an aside, I'm using firefox on android, and it seems to lag terribly. And when I swipe the top stories, the entire page swipes to nothing. smh

Comment Check out this Book About Time Travelers (Score 3, Informative) 465

What a coincidence or premonition of my buddy, McGrew, who wrote a book about this exact subject! He says it was inspired by Slashdot itself so what perfect timing. I'm hooked on reading it and recommend* it... Check out here to purchase or read online as he is releasing a chapter a week on-line for free.

On Sale Now
Hardcover $24.95
6x9 168 pages
ISBN 978-0-9910531-0-0

*I am not being paid or compensated in any way to promote his book and have no direct ties to it other than having "friended" McGrew on /.

Comment Re:Surveillance Camera Man (Score 1) 292

So what is the "normal" way "one should act" if someone shows up close to you and just starts recording? While I find it funny on this side of the screen, obviously some don't appreciate it while in front of the lens.

I get his argument that we're recorded everywhere, but it occurred to me, do the public recordings have audio that goes along with it.

I work in Downtown Los Angeles. So on one occasion I noticed something mounted to a short tripod. After walking up to it and visually examining the device, I could tell it was an array of microphones - I couldn't see anything that was recording video to my knowledge. But the question I had, is our right to speak in public protected from being recorded? I *think* this guys arguments that he is in public are valid, thus he is able to take pictures or moving video of them, but what about sound? Sure, one would think if you're in a public place, but does that violate any laws?

The one guy at the Starbucks who was on a cellphone - he was in a public place, outside even! Yet he demanded privacy for a conversation on a cellphone. Are we all just that confused in assuming that we have any privacy at all?

Submission + - I fought my ISP's bad behavior and won (

An anonymous reader writes: Eric Helgeson documents his experience with an unscrupulous ISP that was injecting affiliate IDs into the URLs for online retailers. 'It appears that the method they were using was to poison the A record of retailers and do a 301 redirect back to the www cname. This is due to the way apex, or ‘naked’ domain names work.' Upon contacting the ISP, they offered him access to two DNS servers that don't perform the injection, but they showed no indication that they would stop, or opt-out any other subscribers. (It was also the only wireless provider in his area, so he couldn't just switch to a competitor.) Helgeson then sent the data he gathered to the affiliate programs of major retailers on the assumption that they'd be upset by this as well. He was right, and they put a stop to it. He says, 'ISP’s ask you to not do crummy things on their networks, so how about they don’t do the same to their customers?'

Submission + - New York Investigators Obtain Fraudulent Ballots 97 Percent of Time ( 8

cold fjord writes: National Review reports, "New York City’s Department of Investigation (DOI) has just shown how easy it is to commit voter fraud that is almost undetectable. Its undercover agents were able to obtain ballots for city elections a total of 61 times — 39 times using the names of dead people, 14 times using the names of incarcerated felons, and eight times using the names of non-residents. On only two occasions, or about 3 percent of the time, were the agents stopped by polling-place officials. In one of the two cases, an investigator was stopped only because the felon he was trying to vote in the name of was the son of the election official he was dealing with. Ballot security in checking birth dates or signatures was so sloppy that young undercover agents were able to vote using the name of someone three times their age who had died. As the New York Post reports: “A 24-year female was able to access the ballot at a Manhattan poll site in November under the name of a deceased female who was born in 1923 and died in April 25, 2012 — and would have been 89 on Election Day.” All of the agents who got ballots wrote in the names of fictitious candidates so as not to actually influence election outcomes."

Comment Re:-1 disagree (Score 1) 8

I've been telling people about the Anime "Ghost in the Shell" for years, because I think this is more likely to happen first: Augmented Humans.

We'll have feet and hands, followed by arms and legs, leading up to organs and eventually e-brains (network connectivity, SSD, etc), eye inserts (optical zoom and macro abilities), and who knows what else? But the series has a catch, no more than 2 people in the entire world have full cyborg bodies because you can't just drop anyone in a full cyborg machine.

The Japanese provide the high quality augmentations, while the Chinese have the low quality parts that don't work very well, last long, and are prone to be hacked.

Now with that being said, I would find it hard to imagine "that a person can be preserved." Think of explaining what a person is to a computer - you may never finish the task, such as explaining what color is to a person who's been blind since birth. Because we're not just constructs of memory that recall to produce a real time interface, but rather a complex array of sensors and output that interacts in an environment that is difficult to describe - just to name a few things. You can do a lot of things, and maybe one day create a real life simulacrum but will it be able to perceive that you are sad or happy? Will it understand what your emotions mean as it interacts with you?

I kinda think of it like the writers from the Robocop series did, not everyone is cut out to be a brain in a robotic suit with weapons, you might just spaz out and shoot others or yourself to end the misery.

Submission + - How Iron Maiden found its worst music pirates -- then went and played for them (

mattydread23 writes: Iron Maiden, the heavy metal band, was suffering the same kinds of losses to piracy as other classic acts. So the band used data from Musicmetric to see where its biggest fans were — including the biggest pirates of its music. Turns out, some of the biggest fans live in South America, so Maiden booked a bunch of tours there, and made millions. The results helped Iron Maiden LLC become one of six music firms in the UK to outperform the music sector as a whole. Plus, made a lot of heshers happy.

Comment Good Read (Score 1) 1

The steps Mexico took are ideal and should be part of normal operating procedure around the world. Unfortunately, I am not sure how many countries would be agreeable with taking those actions. The fact that about 30 incidents of theft of class 1 - 5 materials occur each year is, well, frighting. Maybe this will be the starting point for such global agreements to be drafted.

Submission + - Cobalt-60, and Lessons From a Mexican Theft ( 1

Lasrick writes: George Moore and Miles Pomper examine the theft of a truck containing Cobalt-60 and find that, while Mexico did the right thing and reported the theft promptly, they were under no obligation to do so according to international rules and the IAEA. This was true even though the stolen material was 3,000 curies, making it a Category 1 source (the most dangerous). Great discussion.

Submission + - Soviet Union Spent $1 billion on 'Psychotronic' Arms Race with the US (

KentuckyFC writes: During the Cold War, the US and the Soviet Union battled on many fronts to demonstrate their superior technical and scientific achievements. While the race to put a human in space and then on the Moon is famous, a much less well-known battlefront was the unconventional science of parapsychology, or psychotronics as the Soviets called it. Now a new review of unconventional research in the Soviet Union reveals the scale of this work for the first time and the cost: as much as $1 billion. The Soviets had programs studying how "human energy" could influence other objects and how this energy could be generated independently of humans using a device called 'cerpan'. The Soviets also had a mind control program similar to the CIA's infamous MKULTRA project. Interestingly, the Soviets included non-local physics in this work, such as the Aharonov-Bohm effect in which an electromagnetic field can influence a particle confined to region where the field strength is zero. And they built a number of devices that exploited the effect, although research in this area appears to have ended in 2003.

Comment Re: apples and oranges (Score 1) 5

Unfortunately I lack knowledge in who these guys are in taking up the cache. My question is thus: what risks does Greenwald and cohort run of getting assassinated to keep this under wraps (and to send a message to anyone who would want to continue the work)? Snowden is hiding out in Russia for a reason. Where are these guys going to be located that they think they're safe from getting picked up Osama style while flouting around that they have ALL of the data AND they plan to release it all?

Comment I might be as excited about all this as you! (Score 1) 8

Having started and gotten a lot of work done on a book, I know it can be difficult. Its been years and I have not been able to finish it time, research and other hurdles. But it is so exciting to see that you have a copy of your book in your hands - how awesome does that feel? Maybe you can email us before you post it on /. so we can make sure to login and upvote your submission.

Slashdot Top Deals

I haven't lost my mind -- it's backed up on tape somewhere.