Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Civil disobedience is the only option (Score 1) 380

BitTorrent exists to transmit large volumes of data between individuals without cost. This is an act which is often precisely counter to the intent of copyright, which intends to restrict the transfer of data to only the parties the creator intends. BitTorent may not exist to protest Copyright law, but its continued existence is very much a protest of copyright law.

Comment Re:Sadly its real (Score 1) 828

It makes little difference whether or not Rossi destroys this planet. Earth is a classic type 13 which typically destroys itself at about this stage in it's development. Sometimes through war, often through environmental catastrophe, but more commonly a type 13 planet is unintentionally collapsed into a pea sized object through scientists trying to determine the mass of the Higgs Boson Particle.

Submission + - US Wiretap report: 34% increase (networkworld.com)

sTeF writes: According to the 2010 Wiretap Report, released today by the Administrative Office of the United States Courts (AOUSC) federal and state requests for court permission to intercept or wiretap electronic communications increased 34% in 2010 over 2009 with California, New York, and New Jersey accounting for 68% of all wire taps approved by state judges.
The Courts

Submission + - Samsung withdraws counter-suit against Apple (tekgoblin.com)

tekgoblin writes: "Samsung had filed a counter-suit against Apple in their ongoing legal battle which concerns similarities in the iOS device lineup against the Galaxy S lineup from Samsung. The counter-suit concerned the design of the user interface being very similar to that of Samsung’s: “related to fundamental innovations that increase mobile device reliability,efficiency, and quality, and improve user interface in mobile handsets and other products.”"

Comment Re:that would be a poll tax (Score 1) 218

This is basically equivalent to requiring everyone to have a public and a private key, then signing the key of whichever candidate they want to vote for.

It would be a secure and verifiable system. However it would never work because it's not something that a normal voter would understand.

The only problem would be making it anonymous. If you required each person to have a new key for each election and had all keys signed by a central authority (recording only that a person already had a key signed, but not actually recording which key it was), I think it might be theoretically possible.

Also, since only the central authority can know which keys are properly signed, someone could always make a fake signed key, if someone were to try and bribe them into casting a specific vote. That way, even if the vote buyer required the person to cast their vote right in front of them, they'd have no actual way of knowing whether or not it was valid.

Alas, if only everyone was a cryptonerd.

Comment Some Actual Text From The Announcement (Score 3, Interesting) 391

1. We don't fully understand the complex legal issues involved with creating a new currency system.

2.We don't want to mislead our donors. When people make a donation to a nonprofit like EFF, they expect us to use their donation to support our work. Because the legal territory around exchanging Bitcoins into cash is still uncertain, we are not comfortable spending the many Bitcoins we have accumulated.

3. People were misconstruing our acceptance of Bitcoins as an endorsement of Bitcoin. We were concerned that some people may have participated in the Bitcoin project specifically because EFF accepted Bitcoins, and perhaps they therefore believed the investment in Bitcoins was secure and risk-free. While we’ve been following the Bitcoin movement with a great degree of interest, EFF has never endorsed Bitcoin. In fact, we generally don’t endorse any type of product or service – and Bitcoin is no exception.

Comment Re:Shut up with the bitcoin stories (Score 1) 411

Although right now, 'mining' bitcoin is a fool's errand; it would be cheaper to just buy them than to spend the power mining them.

Actually, that's not true, at least not in every case.

Currently I'm mining on my gaming rig for about .5 bitcoins a day using about 8 kWh a day. Electricity hear is about 14 cents/kWh. The current bitcoin exchange rate is about 7 USD to 1 Bitcoin. Thus I recieve 3.5 USD worth of bitcoin for electricity costs of 1.15 USD. A three-fold increase over what I would get if I just purchased bitcoins outright.

However, I'm running on a gaming rig with decent graphics cards I already had. If I had to first purchase the items for the sole sake of mining, There'd be no gaurantee of ever being able to make back that investment.

Ubuntu

Submission + - Nine features we may see in Ubuntu 11.10 'Oneiric (arnnet.com.au) 1

splitenz writes: Canonical's Ubuntu 11.04 "Natty Narwhal" may still be occupying much of the Linux world's attention, but at last week's Ubuntu Developer Summit in Budapest, the next version of the free and open source Linux distribution began to take form.

A number of decisions were reportedly made about Ubuntu 11.10, or "Oneiric Ocelot," at the conference, while numerous other questions are still being debated.

Ready for a very early look at Oneiric Ocelot? Here's a roundup of what's been reported so far.

Security

Submission + - Your Nintendo 3DS pwns you (defectivebydesign.org)

Max Hyre writes: "The Nintendo 3DS's terms of so-called service, and the even more grotesquely misnamed privacy policy, make it clear that you are in the service of Nintendo. Specifically, anything you do, write, photograph, or otherwise generate with the 3DS is Nintendo's possession, for them to do whatever, however, whenever, and for as long as they want. On the other hand, if you do something they don't like, they're prepared to turn your device into a doorstop—and you gave them permission when you started using it.

And if you have a child's best interests at heart, don't give it to anyone too young to know to never use her real name, type in an address or phone number, or take any personally-identifiable photos. They might, at best, end up in a Nintendo ad. At worst, who knows?

Some of the details are on Defective by Design's website. I haven't found the full text online yet. If you do, please post it in a comment."

Education

Submission + - University Copyright Case About To Go To Trial (duke.edu)

Nidi62 writes: A Duke University blog covers the possible ramifications of the latest motion in the copyright case against Georgia State University. Cambrigde, Oxford, and Sage have proposed an injunction that would first enjoin GSU to include all faculty, employees, students. All copying would have to be monitored and limited to 10% of a work or 1000 words, whichever is less. No two classes would be allowed to use the same copied work unless they paid for it, essentially taking fair use out of the classroom. Along with this, courses would be allowed to be made up of only 10% copied material, the other 90% must be either purchased works or copies that have been paid for by permission fees. And, if this isn't enough, the publishers also want access to all computer systems on the campus network, to monitor compliance and copying.

This proposed order, in short, represents a nightmare, a true dystopia, for higher education....Yet you can be sure that if [these] things happen, all of our campuses would be pressured to adopt the “Georgia State model” in order to avoid litigation.

Disclosure: I am currently a graduate student at Georgia State University.

Security

Submission + - US Congress Tries to Cut Body Scanner Funding (epic.org) 1

OverTheGeicoE writes: The Electronic Privacy Information Center reports that the US House of Representatives is trying to cut funding for new airport body scanners from next year's budget. This would prevent TSA from installing 275 new scanners in airports in FY 2012, at a cost of $76 million.
Networking

Submission + - How Windows 7 knows about your internet connection (superuser.com) 1

An anonymous reader writes: In Windows 7, any time you connect to a network, Windows tells you if you have full internet access or just a local network connection. It also knows if a WiFi access point requires in-browser authentication. How? It turns out, a service automatically requests a file from a Microsoft website every time you connect to any network, and the result of this attempt tells it whether the connection is successful. This feature is useful, but some may have privacy concerns with sending their IP address to Microsoft (which the site logs, according to documentation) every single time they connect to the internet. As it turns out, not only can you disable the service, you can even tell it to check your own server instead.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (9) Dammit, little-endian systems *are* more consistent!

Working...