Forgot your password?
typodupeerror
United States

Trump Will Get Power To Send Unblockable Mass Text Messages To All Americans (nymag.com) 555

President-elect Donald Trump will have access to a system which can send unblockable texts to every phone in the United States once he becomes the president. From a report on NYMag: These 90-character messages, known as Wireless Emergency Alerts (or WEAs), are part of a program put in place after Congress passed the Warning, Alert, and Response Network (WARN) Act, in 2006. WEAs allow for targeted messages to be sent to every cell phone getting a signal from certain geographically relevant cell towers (or, in a national emergency, all of them). While it'd be a true nightmare to get screeching alerts from your phone that "Loser Senate Democrats still won't confirm great man Peter Thiel to Supreme Court. Sad!", there are some checks and balances on this. While President-elect Trump hasn't shown much impulse control when it comes to his favorite mass-messaging service, Twitter, the process for issuing a WEA isn't as simple as typing out a 90-character alert from a presidential smartphone and hitting "Send." All WEAs must be issued through FEMA's Integrated Public Alert Warning System, meaning that an emergency alert from the president still has at least one layer to pass through before being issued. While FEMA is under control of the executive branch (the head of FEMA is selected by the president, and reports to the Department of Homeland Security), the agency would have a vested interest in not seeing their alert system bent toward, uh, non-emergency ends.
Security

Linux Kernel Exploit Busily Rooting 64-Bit Machines 488

An anonymous reader writes "Running 64-bit Linux? Haven't updated yet? You're probably being rooted as I type this. CVE-2010-3081, this week's second high-profile local root exploit in the Linux kernel, is compromising machines left and right. Almost all 64-bit machines are affected, and 'Ac1db1tch3z' (classy) published code to let any local user get a root shell. Ac1db1tch3z's exploit is more malicious than usual because it leaves a backdoor behind for itself to exploit later even if the hole is patched. Luckily, there's a tool you can run to see if you've already been exploited, courtesy of security company Ksplice, which beat most of the Linux vendors with a 'rebootless' version of the patch."

Slashdot Top Deals

We can predict everything, except the future.

Working...