Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Don't fall for Chinese propaganda (Score 1) 576

And I think we're there.

You think we're there? What cringeworthy, random, flailing act on the part of this administration can you possibly point to to make that claim? Contact tracing depends upon one very important datum - knowing exactly where the disease is and is not at any given point in time. Given that the goal thus far has been to block access to testing in order to keep the confirmed case count down, how could you possibly assert that it's even possible to know this?

And even if you managed to get that far, all you'd do is meaningfully establish where the starting blocks are. To characterize anything Trump has done as an effort comparable to the Apollo or Mahatten(sic) projects is an exaggeration on par with Caligula claiming to have conquered England after some legionaries whacked some reeds with their swords.

Comment I switched from Android to iOS (Score 1) 122

... after having been an Android user for 10+ years, specifically for this kind of thing. Apple is far from perfect, but they're the only big player pretending to give a shit about user privacy. With an Android phone, by the time you get done with the preinstalled crapware from the phone manufacturer, network provider, and Google, your entire damn life is an open book to gods know who.

Submission + - NextCry Ransomware Targets NextCloud Linux Servers and Remains Undetected (linuxsecurity.com)

b-dayyy writes: A new and particularly troublesome ransomware variant has been identified in the wild. Dubbed NextCry, this nasty strain of ransomware encrypts data on NextCloud Linux servers and has managed to evade the detection of public scanning platforms and antivirus engines. To make matters worse, there is currently no free decryption tool available for victims.

Comment Security theater (Score 2) 35

I'd say about 70% of security measures associated with *any* security policy, whether there has been a breach or not, are busywork at best and/or harmful at worst.

Consider, for example, password rotation. We now know frequent enforced password changes are a bad idea. Yet almost every security policy I've seen still imposes them. Why? Because IT security is still an emotional exercise, not an empirical one.

Slashdot Top Deals

We must believe that it is the darkest before the dawn of a beautiful new world. We will see it when we believe it. -- Saul Alinsky

Working...