Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - AT&T Is Spying on Americans for Profit, New Documents Reveal (

schwit1 writes: The telecom giant is doing NSA-style work for law enforcement—without a warrant—and earning millions of dollars a year from taxpayers.

Hemisphere isn’t a “partnership” but rather a product AT&T developed, marketed, and sold at a cost of millions of dollars per year to taxpayers. No warrant is required to make use of the company’s massive trove of data, according to AT&T documents, only a promise from law enforcement to not disclose Hemisphere if an investigation using it becomes public.

Hemisphere is used far beyond the war on drugs to include everything from investigations of homicide to Medicaid fraud.

Submission + - Rowhammer Attack Can Now Root Android Devices (

An anonymous reader writes: Researchers have discovered a method to use the Rowhammer RAM attack for rooting Android devices. For their research paper, called Drammer: Deterministic Rowhammer Attacks on Mobile Platforms, researchers tested and found multiple smartphone models to be vulnerable to their attack.

The list includes LG Nexus (4, 5, 5X), LG G4, Motorola Moto G (2013 and 2014), One Plus One, HTC Desire 510, Lenovo K3 Note, Xiaomi Mi 4i, and Samsung Galaxy (S4, S5, and S6) devices. Researchers estimate that millions of Android users might be vulnerable. The research team says the Drammer attack has far more wide-reaching implications than just Android, being able to exploit any device running on ARM chips.

In the past, researchers have tested the Rowhammer attack against DDR3 and DDR4 memory cards, weaponized it via JavaScript, took over PCs via Microsoft Edge, and hijacked Linux virtual machines. There's an app to test if your phone is vulnerable to this attack.

Submission + - Clinton Foundation works with Big Pharma to keep the price of US AIDS drugs high (

Okian Warrior writes: A newly released Podesta E-mail explains how the Clinton Health Access Initiative (CHAI) works to keep the price of AIDS medicines high in the US.

CHAI contracted with Big Pharma companies for AIDS drugs to be distributed in developing countries. In return, the group agreed to resist efforts to bring similarly lower cost and generic drugs to the US.

The email is a reaction to "comments President Clinton made on lowering domestic AIDS drugs prices at the World AIDS day event":

We have always told the drug companies that we would not pressure them and create a slippery slope where prices they negotiate with us for poor countries would inevitably lead to similar prices in rich countries.

[...] If we do try to do something in this area, we suggest that we approach the innovator companies that can currently sell products in the US with the idea of making donations to help clear the ADAP lists. For a variety of reasons, the companies will likely favor a donation approach rather than one that erodes prices across the board.

[...] I would guess that they would also likely favor a solution that involved their drugs rather than an approach that allowed generic drugs from India to flood the US market at low prices or one that set a precedent of waiving patent laws on drugs. ... We can go to war with the US drug companies if President Clinton would like to do so, but we would not suggest it.

Submission + - 'Calibration error' changes GOP votes to Dem in Illinois (

Okian Warrior writes: Early voting in Illinois got off to a rocky start Monday, as votes being cast for Republican candidates were transformed into votes for Democrats.

Republican state representative candidate Jim Moynihan: “I tried to cast a vote for myself and instead it cast the vote for my opponent,” Moynihan said. “You could imagine my surprise as the same thing happened with a number of races when I tried to vote for a Republican and the machine registered a vote for a Democrat.”

The conservative website Illinois Review reported that “While using a touch screen voting machine in Schaumburg, Moynihan voted for several races on the ballot, only to find that whenever he voted for a Republican candidate, the machine registered the vote for a Democrat in the same race. He notified the election judge at his polling place and demonstrated that it continued to cast a vote for the opposing candidate’s party. Moynihan was eventually allowed to vote for Republican candidates, including his own race.

Submission + - "Most serious" Linux privilege-escalation bug ever is under active exploit (

operator_error writes: Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.

By Dan Goodin — 10/20/2016

A serious vulnerability that has been present for nine years in virtually all versions of the Linux operating system is under active exploit, according to researchers who are advising users to install a patch as soon as possible.

While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it's not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that's a part of virtually every distribution of the open-source OS released for almost a decade. What's more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild.

"It's probably the most serious Linux local privilege escalation ever," Dan Rosenberg, a senior researcher at Azimuth Security, told Ars. "The nature of the vulnerability lends itself to extremely reliable exploitation. This vulnerability has been present for nine years, which is an extremely long period of time."

The underlying bug was patched this week by the maintainers of the official Linux kernel. Downstream distributors are in the process of releasing updates that incorporate the fix. Red Hat has classified the vulnerability as "important."

Submission + - ICANN recommends TLDs like .txt -- and .exe ( 1

fyngyrz writes: ICANN says, in part:

Given preliminary feedback that there is not a technical need to prevent file extensions as TLDs, as well as the lack of an authoritative source of common file extensions to draw from, staff determined that it is not workable to prevent common file extensions from being used as TLDs.

To summarize, it is the recommendation of the ICANN technical staff to allow applications for TLD strings that may also be commonly used for file extensions.

But will ICANN approve such applications? If so, we can all look forward to opportunities to click on...


Submission + - Filmmaker Arrested At Pipeline Protest Facing 45 Years In Felony Charges (

walterbyrd writes: The lengths that the oil industry, and their puppet politicians, will go to suppress information is amazing. 45 years is way more than most people get for murder.

Deia Schlosberg, the producer of the upcoming documentary “How to Let Go of the World and Love All Things Climate Can’t Change,” was detained while filming a protest against TransCanada’s Keystone Pipeline in Walhalla, North Dakota. Activists at the event, associated with the group Climate Direct Action, shut down the pipeline, which carries oil from Canadian tar sands to the U.S, for about seven hours.

Submission + - Strange New World: Samba Server running on Windows ! ( 1

Jeremy Allison - Sam writes: "Do you know what this is? This is a non-Windows SMB file server running natively on Windows."

"To be more specific, this is a Virtualbox Ubuntu virtual machine running on Windows 10, grabbing a file across SMB from a Samba file server running inside the Windows Subsystem for Linux through Bash."

Submission + - SPAM: John Podesta's Password Found in WikiLeaks Dump

Okian Warrior writes: Unauthorized users appear to have accessed Hillary Clinton Campaign Chairman John Podesta’s various accounts after an email containing his Apple ID and password was found within the recent WikiLeaks email release.

One user is alleged to have remotely erased Podesta’s iPhone . Another user tagged WikiLeaks editor Julian Assange in a Twitter post along with various screenshots of Podesta’s Apple account and the comment: “You are going to be getting some interesting information shortly.”

Link to Original Source

Comment Re:Why Retire the ISS? (Score 1) 64

As time goes on it becomes harder to keep the inside infection free. The ISS has no immune system, let alone an adaptable one. Mir was filled with lots of nasty bacteria and fungi after a short lifetime, which showed us that we need to build spacecraft with super cleanliness in mind, but we still can't get it right over the long term. Now and then it will be prudent to just build a new one and try not to cross-infect it with equipment and people exchanges before we burn it with reentry.

Submission + - Argumentative Twitter bot can go for hours before people realize it's not human

AmiMoJo writes: Like something out of a Monty Python sketch, the a Twitter bot called "Liz" with the handle @arguetron has been engaging in long running debates using simple AI. Its author points out that "So many arguments, especially on a place like Twitter, are almost content-neutral. You can swap one argument out for another and the context is almost irrelevant." That’s why @arguetron’s conversations look so much like arguments a real person might have with a persistent troll.

Submission + - Why science fiction authors can't win

bowman9991 writes: Science fiction authors have long been outcasts from the literary world, critics using the worst examples of the genre as ammunition against it. Unfortunately though, at times even science fiction authors themselves can turn on their own kind: “Science fiction is rockets, chemicals and talking squids in outer space,” mocked Margaret Atwood, one of her many attempts to convince people that she is not a science fiction author, even though one of her most famous novels, A Handmaid’s Tale, is exactly that. Considered by the literary establishment, and frequently by non-SF award-giving institutions, to be trashy, pulpish, commercially driven lightweight gutter fiction, it’s no surprise that very few works of science fiction have won major literary awards. Kim Stanley Robinson, author of the award-winning (not “literary” awards obviously) Mars novels recently hit out at the literary establishment, accusing the Man Booker judges of “ignorance” in neglecting science fiction, which he declared was “the best British literature of our time”.

Submission + - A U.S. election-system vendor who uses developers in Serbia (

dcblogs writes: Voting machines are privately manufactured and developed and, as with other many other IT systems, the code is typically proprietary. The use of proprietary systems in elections has its critics. One Silicon Valley group, the Open Source Election Technology Foundation, is pushing for an election system that shifts from proprietary, vendor-owned systems to one that that is owned "by the people of the United States." One major election technology company, Dominion Voting Systems (DVS), develops its systems in the U.S. and Canada but also has an office in Belgrade, Serbia. It was recently advertising openings for four senior software developers in Belgrade. "Like many of America's largest technology companies — which develop some of the software for their products in places like Asia, India, Ireland and the Mideast — some of our software development is undertaken outside the U.S. and Canada, specifically, in Serbia, where we have conducted operations for 10 years," said firm spokesman Chris Riggall.

Slashdot Top Deals

Dead? No excuse for laying off work.