Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment We are probably talking about different things (Score 3, Insightful) 272

My worry is that the NSA is likely penetrated by moles or it was successfully penetrated by foreign hackers. Regardless of the actual way those files were exfiltrated, this public stunt is nothing less than a public attack on one of your main intelligence services, by a foreign adversary, a brutal undemocratic and illiberal regime.

The fact that the NSA is under attack (and a public one) is what worries me, not that a bunch of 0-days is made public (and some of them are already fixed).

Comment Your security services are under attack (Score 4, Insightful) 272

I don't really see anything funny or positive in the fact that one of your main intelligence services is under attack by a hostile power. And this attack is not clandestine, hidden from unwanted eyes, but it is made in public, so as to call NSA bluff and expose your country as a paper tiger.

And this all is compounded by a poorly hidden active measures campaign to benefit one candidate and to destroy another.

I believe that neither Schadenfreude nor sarcastic gleeing over a major f@ck up at the NSA are appropriate in this case, because want it or not, admit it or not, but your country is under attack by a powerful, sophisticated adversary. And it aint good. at all.

Submission + - Cracking the Code on Trump Tweets (

jIyajbe writes: From

"A theory has been circulating that the Donald Trump tweets that come from an Android device are from the candidate himself, while the ones that come from an iPhone are the work of his staff. David Robinson, a data scientist who works for Stack Overflow, decided to test the theory. His conclusion: It's absolutely correct (

Robinson did some text-mining (using R) to analyze roughly 1,400 tweets from Trump's timeline, and demonstrated conclusively that the iPhone tweets are substantively different than the Android tweets. The former tend to come later at night, and are vastly more likely to incorporate hashtags, images, and links. The latter tend to come in the morning, and are much more likely to be copied and pasted from other people's tweets. In terms of word choice, the iPhone tweets tend to be more neutral, with their three most-used phrases being "join," "#trump2016," and "#makeamericagreatagain." The Android tweets tend to be more emotionally charged, with their three most-used phrases being "badly," "crazy," and "weak.""

Comment The first reasonable comment and it is so down (Score 1) 706

Someone had to say this, and thank you very much for making the first reasonable comment under this article.

Assange was exposed as a tool of Russian intelligence services pretty much long ago, not to mention his work for the Russian propaganda network RT (and one can assume he worked there not for free).

So far, what we know about the leaks is that the latest timestamp in the leaked e-mails more or less corresponds to the moment when CrowdStrike purged Russian APTs from the DNC network (May 25 and May 29 corresp). Wikileaks published the dump on June 22, this poor guy was murdered on July 10.

Now we have to suppress our critical thinking and just take a Russian tool who has worked on Russian propaganda network for his word?

Where is your proof Mr. Assange? Please give us any evidence that Seth Rich was your source.


Comment Guess what? Electric grids were already hacked! (Score 1) 35

Guess what? Electric grids were already hacked in what appears to be one of the first more or less real cyber-wars (previous - Estonia 2007, Georgia 2008 - were primarily powerful DDoS attacks to either disrupt services or cut off the country from the rest of the world).

The hacking happened in December 2015, in Ukraine. The attack was a sophisticated APT attack from Russia.

You can find more by following description in IR-ALERT-H-16-056-01 or reading the Wired article by Kim Zetter.

And, by the way, malware did find its way into nuclear power plants (though not control systems).

Comment What evidence is there to support your suggestion? (Score 1) 114

Besides, while focusing on this front, let's not forget that the SecureWorks, the DNC staff, and some other companies did detect penetration of the DNC networks by two russian advanced persistent threat groups known as APT29 and APT28.

Should we dismiss it now?

Or, more specifically, how should americans perceive foreign governments running intelligence operations to influence the outcome of the elections and therefore determine who will become the next POTUS?

Comment Do you really believe the ends justify the means? (Score 2) 114

For example, if the Russian government finds Trump far more preferable, and runs a campaign to discredit his only competitor to get him elected.

But really, did anybody expect that sockpuppet to come out and admit that he is the front for the Russian intelligence services? Like, really?

Comment There are much more discrepancies in his legend (Score 2, Interesting) 114

But first of all, did anyone really expect "him" to come out and admit that this is merely a front for the Russian intelligence services running an active measures operation against a presidential candidate they don't like to aid the one they do? That's like expecting from Snowden come out and explain his relations to the FSB prior to boarding a plane to Moscow and especially afterwards.

The man claimed to have easily discovered a 0-day in a proprietary and not public piece of software very likely written in C# and JavaScript using IDA and WinDbg.

In addition, the Vice has found out his romanian is far from being good enough for a native speaker. And this prepared FAQ has a much better English than his prior conversations.

More information on this affair:

Comment Re:Trust me, they will deliver... (Score 1) 83

The biggest flying aircraft was developed, tested, and manufactured in Soviet Ukraine, which became an independent state after the union went kaput. And, you should know that Ukraine is not Russia at all. Moreover I would not dare to draw conclusions similar to that you have made taking into account surface area only. First computers were developed in Ukraine, rockets (carriers) were developed in Ukraine and so on. Then, It should be also taken into account that in the nearest future there will be parliamentary elections in Russia, and a little bit later, the presidential elections (approx in 100 days from today). These great plans can be just a part of the PR. These things are used to show the Russians how mighty and powerful became Russia lead by President Putin, and how even more powerful and developed it can become with Tsar Putin the great. In any case, time will show, how honest were these plans.

Slashdot Top Deals

The superior man understands what is right; the inferior man understands what will sell. -- Confucius