Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Ask Slashdot: Hosting Services That Don't Overreact To DMCA Requests?

Advocatus Diaboli Have you tried Dreamhost? (148 comments)

I have found dreamhost.com to be particularly level-headed when dealing with DMCA-based bullshit. And yes, my opinion is based on a series of experiences with DMCA-trolls.

about three weeks ago
top

Report: Apple To Unveil "Smart Home" System

Advocatus Diaboli What could go wrong? (174 comments)

The road to hell is paved with good intentions and dreams of financial gains. Aren't they betting that such a system (or its components) cannot be hacked?

about 2 months ago
top

Russian GLONASS Down For 12 Hours

Advocatus Diaboli Re:Warning Shot (148 comments)

Actually, most of their high value missiles use inertial navigation- just like those of every other country. Nobody trusts navigation satellites for anything more important than short and medium range cruise missiles.

about 4 months ago
top

Russian GLONASS Down For 12 Hours

Advocatus Diaboli Re:Warning Shot (148 comments)

Wishful thinking. Playing around with Russia in 2014 is very different from doing so with Iraq in 1991. You would have to be insane to do that and believe that they would not respond in kind or worse. More likely to the result of an internal update.

about 4 months ago
top

Engine Data Reveals That Flight 370 Flew On For Hours After It "Disappeared"

Advocatus Diaboli The real puzzle (382 comments)

Evidently the aircraft had enough power to run the pinging transmitter for over 4 hours after the transponder went dead (or was turned off). This implies that the aircraft also had enough power and structural integrity for at least some of its communication systems to work. But the experienced pilots did not make even one distress call or issue a single distress code. Why not? What prevented them from doing it?

about 4 months ago
top

Engine Data Reveals That Flight 370 Flew On For Hours After It "Disappeared"

Advocatus Diaboli The plane was pinging hours after it disappeared (382 comments)

A satellite transmitter on the plane was active for about five hours, indicating the plane was operational after its transponder shut down less than an hour after takeoff, said three U.S. government officials. The 777 can cruise at 500 miles (805 kilometers) an hour or more, meaning it may have flown for as far as 2,500 miles beyond its last point of contact if it was intact and had enough fuel. Link (http://www.bloomberg.com/news/2014-03-13/missing-malaysian-jet-said-to-have-flown-with-beacon-off.html)

about 4 months ago
top

Free (Gratis) Version of Windows Could Be a Reality Soon

Advocatus Diaboli Is Win 8.1 that bad? (392 comments)

Given the history of MS trying to squeeze every last cent out of their captive audience, a free version of Win 8.1 (even one bundled with bing') sounds like desperation.

about 5 months ago
top

Wikileaks Aiding Snowden - Chinese Social Media Divided - Relations Strained

Advocatus Diaboli Re:hope it was worth it (629 comments)

Women prefer dangerous guys over milquetoast ones.

1 year,28 days
top

Wikileaks Aiding Snowden - Chinese Social Media Divided - Relations Strained

Advocatus Diaboli Anti-Citizen One (629 comments)

I would like to point out that Edward Snowden not only has a physical resemblance to the' Gordon Freeman' character in the Half-Life Game Series, but has effectively become 'Anti-Citizen One'- in real life.

1 year,28 days
top

Scientists Themselves Play Large Role In Bad Reporting

Advocatus Diaboli The system selects for CONmen and Shysters (114 comments)

I remember writing a post about this phenomena about a year ago. The short version of the story is that over the last 30-40 years, universities and research institutes have increasingly recruited "scientist" with strong tendencies towards showmanship, fraud, lying and bullshitting. This change is largely due to changing nature of incentives as well as methods of evaluation and promotion in these institutions. Peer reviewed research and grants are probably the biggest culprit. Here is the link: http://dissention.wordpress.com/2011/02/06/why-all-publicised-breakthroughs-are-lies/

about 2 years ago
top

Microsoft's Lost Decade

Advocatus Diaboli Corporations ARE the Modern Version of Fiefdoms (407 comments)

That is because Corporations are the Modern Version of Fiefdoms (http://bit.ly/MSfvml) with a fatal obsession for "Metrics and Productivity" (http://bit.ly/tB6o8I) both which can be easily gamed. Furthermore their supposed focus on shareholder value makes them susceptible to short-termism (http://bit.ly/McEkgs) as the reward system is rather dystopic (http://bit.ly/LYEke4).

about 2 years ago
top

World's Most Powerful x86 Supercomputer Boots Up in Germany

Advocatus Diaboli The Super Computer Race is a Sad Scam (151 comments)

What are these machines being used for anyway? What have we achieved so far? How far has simulation of complex natural systems been helpful in understanding them? Can we make better predictions using faster computers or more refined algorithms? So far, computer simulations have not helped us understand or find dark matter- if something like that even exists. Our ability to predict the weather is still shit, and our climate models require “correction” factors to even approach observed values. Our ability to model protein folding and bio-molecular interactions is still pretty pathetic. This state of affairs has persisted in the face of colossal increases in available computational power. So what is going on? Why haven’t the computer gods delivered? Why would throwing more computational power at a problem solve it if previous attempts to do so have proved futile? http://dissention.wordpress.com/2012/06/20/the-super-computer-race-is-a-sad-scam/

about 2 years ago
top

Spooky: How NSA's Surveillance Algorithms See Into Your Life

Advocatus Diaboli Delusions of capability (211 comments)

Their biggest problem is not fixable and is linked to what type of communication ultimately destroys a fraudulent society. Hint: It is the mundane stuff. http://dissention.wordpress.com/2012/02/19/spying-and-surveillance-is-rapidly-becoming-worthless/ and it also does not help that intelligence agencies are run by status hungry human beings. http://dissention.wordpress.com/2010/12/05/universal-organizational-flaws-in-intelligence-agencies-1/

about 2 years ago
top

Have We Reached Maximum Sustainable Population Size?

Advocatus Diaboli How does he know that? (1070 comments)

This scumbags is only one of the many who routinely put out such predictions based on "models". Ask yourself- When have people like him been right? If not why not? and why do they continue to make these predictions?

more than 3 years ago
top

Tolkien Estate Censors the Word "Tolkien"

Advocatus Diaboli Tolkien = Sauron (433 comments)

Whose name won't be uttered.

more than 3 years ago

Submissions

top

Photoshopping of adult porn nets man 10-year child-porn conviction

Advocatus Diaboli Advocatus Diaboli writes  |  3 days ago

Advocatus Diaboli (1627651) writes "A federal appeals court upheld Thursday the child pornography conviction and accompanying 10-year prison term handed to a Nebraska man who superimposed the image of an underaged girl's face onto a picture of two adults having sex. The 8th US Circuit Court of Appeals rejected (PDF) claims from 28-year-old Jeffrey Anderson that his actions were protected by the First Amendment. Anderson sent the doctored image to his 11-year-old half-sister via Facebook, resulting in the charge of distributing child pornography. Anderson had superimposed the half sister's face onto the photo, the court said."
Link to Original Source
top

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet

Advocatus Diaboli Advocatus Diaboli writes  |  about a week ago

Advocatus Diaboli (1627651) writes "The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users."
Link to Original Source
top

Obama administration says the world's servers are ours

Advocatus Diaboli Advocatus Diaboli writes  |  about a week ago

Advocatus Diaboli (1627651) writes ""Global governments, the tech sector, and scholars are closely following a legal flap in which the US Justice Department claims that Microsoft must hand over e-mail stored in Dublin, Ireland. In essence, President Barack Obama's administration claims that any company with operations in the United States must comply with valid warrants for data, even if the content is stored overseas. It's a position Microsoft and companies like Apple say is wrong, arguing that the enforcement of US law stops at the border. A magistrate judge has already sided with the government's position, ruling in April that "the basic principle that an entity lawfully obligated to produce information must do so regardless of the location of that information." Microsoft appealed to a federal judge, and the case is set to be heard on July 31.""
Link to Original Source
top

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On

Advocatus Diaboli Advocatus Diaboli writes  |  about two weeks ago

Advocatus Diaboli (1627651) writes "The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies."
Link to Original Source
top

Facebook Experiments Had Few Limits

Advocatus Diaboli Advocatus Diaboli writes  |  about three weeks ago

Advocatus Diaboli (1627651) writes ""Thousands of Facebook Inc. users received an unsettling message two years ago: They were being locked out of the social network because Facebook believed they were robots or using fake names. To get back in, the users had to prove they were real. In fact, Facebook knew most of the users were legitimate. The message was a test designed to help improve Facebook's antifraud measures. In the end, no users lost access permanently. The experiment was the work of Facebook's Data Science team, a group of about three dozen researchers with unique access to one of the world's richest data troves: the movements, musings and emotions of Facebook's 1.3 billion users"

and there is more..

"Until recently, the Data Science group operated with few boundaries, according to a former member of the team and outside researchers. At a university, researchers likely would have been required to obtain consent from participants in such a study. But Facebook relied on users' agreement to its Terms of Service, which at the time said data could be used to improve Facebook's products. Those terms now say that user data may be used for research. "There's no review process, per se," said Andrew Ledvina, a Facebook data scientist from February 2012 to July 2013. "Anyone on that team could run a test," Mr. Ledvina said. "They're always trying to alter peoples' behavior." He recalled a minor experiment in which he and a product manager ran a test without telling anyone else at the company. Tests were run so often, he said, that some data scientists worried that the same users, who were anonymous, might be used in more than one experiment, tainting the results.""

Link to Original Source
top

Core gamers uncomfortable with change, says Peter Moore

Advocatus Diaboli Advocatus Diaboli writes  |  about three weeks ago

Advocatus Diaboli (1627651) writes ""Core" gamers are uncomfortable with change and don't like embracing new business models, according to EA's Peter Moore. The publisher's COO told GamesIndustry that EA is excited about the future health of the industry, but conceded that some traditional gamers will take longer to convince that new innovations will be beneficial."
Link to Original Source
top

U.S. justices limit police right to search cell phones

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "The court said on a 9-0 vote that the right of police to search an arrested suspect at the scene without a warrant does not extend in most circumstances to data held on a cell phone.

Here is a link to the actual judgement. (http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf)"

Link to Original Source
top

NSA Spook-Turned-Twitter-Pundit Goes Dark After Dick Pic Surfaces

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "A well-known conservative pundit and secrecy expert who once worked as an NSA officer has deleted all of his social media accounts after screenshots leaked this weekend that appeared to show him sending sexy messages and a shot of his soft penis to a Twitter follower who was not his wife. John Schindler is a professor at the Naval War College who has written conservative analyses on global security for Politico and Foreign Policy while scrapping with leftists and libertarians online. A former naval officer who worked as a counterterrorism operative at the NSA for more than a decade, Schindler has long defended that agency's secret surveillance efforts while attacking information activists like Chelsea Manning, Edward Snowden, and Glenn Greenwald."
Link to Original Source
top

Emails Show Feds Asking Florida Cops to Deceive Judges

Advocatus Diaboli Advocatus Diaboli writes  |  about 1 month ago

Advocatus Diaboli (1627651) writes "Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails. At the request of the Marshals Service, the officers using so-called stingrays have been routinely telling judges, in applications for warrants, that they obtained knowledge of a suspect’s location from a “confidential source” rather than disclosing that the information was gleaned using a stingray."
Link to Original Source
top

How Secret Partners Expand NSA's Surveillance Dragnet

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype."
Link to Original Source
top

Was 'Watch Dogs' for PC Handicapped on Purpose?

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "Many PC gamers were disappointed that Ubisoft's latest AAA game Watch_Dogs did not look as nice as when displayed at E3 in 2012. But this week a modder discovered that code to improve the game on PC is still buried within the released game, and can be turned back on without difficulty or performance hits. Ubisoft has yet to answer whether (or why) their PC release was deliberately handicapped."
Link to Original Source
top

How Nest Is Using Data From Its Army of 'Smart' Smoke Alarms

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "Consider that each Protect is packed full of sensors, some of which are capable of much more than they're doing right now: What could go wrong?

"From heat and light sensors to motion sensors and ultrasonic wave sensors.This simple little device could scrape an incredible amount of data about your life if Nest asked it to: From when you get home, to when you go to bed, to your daily routine, to when you cook dinner. Now imagine how a device like that would interlock with another that you keep on your wrist, like the forthcoming Android Wear. Together, they would create a seamless mesh of connectivity where every detail of what you do and where you go is recorded into a living, breathing algorithm based on your life.""

Link to Original Source
top

Local cops in 15 US states confirmed to use cell tracking devices

Advocatus Diaboli Advocatus Diaboli writes  |  about a month ago

Advocatus Diaboli (1627651) writes "A new map released Thursday by the American Civil Liberties Union shows that fake cell towers, also known as stingrays, are used by state and local law enforcement in 15 states. Police departments in Baltimore, Chicago, Houston, Tucson, Los Angeles, and even Anchorage, among others, have been confirmed to use the devices. Beyond those states, 12 federal law enforcement agencies, ranging from the FBI to the National Security Agency, also employ them. Relatively little is known about precisely how police decide when and where to deploy them, but stingrays are used to track targeted phones and can also be used to intercept calls and text messages. However, privacy advocates worry that while the devices go after specific targets, they also often capture data of nearby unrelated people."
Link to Original Source
top

N.S.A. Collecting Millions of Faces From Web Images

Advocatus Diaboli Advocatus Diaboli writes  |  about 2 months ago

Advocatus Diaboli (1627651) writes "The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed."
Link to Original Source
top

WikiLeaks statement on the mass recording of Afghan telephone calls by the NSA

Advocatus Diaboli Advocatus Diaboli writes  |  about 2 months ago

Advocatus Diaboli (1627651) writes ""The National Security Agency has been recording and storing nearly all the domestic (and international) phone calls from two or more target countries as of 2013. Both the Washington Post and The Intercept (based in the US and published by eBay chairman Pierre Omidyar) have censored the name of one of the victim states, which the latter publication refers to as country "X". "

" We do not believe it is the place of media to "aid and abet" a state in escaping detection and prosecution for a serious crime against a population. Consequently WikiLeaks cannot be complicit in the censorship of victim state X. The country in question is Afghanistan. The Intercept stated that the US government asserted that the publication of this name might lead to a ’rise in violence’. Such claims were also used by the administration of Barack Obama to refuse to release further photos of torture at Abu Ghraib in Iraq.""

Link to Original Source
top

The NSA Is Recording Every Cell Phone Call in the Bahamas

Advocatus Diaboli Advocatus Diaboli writes  |  about 2 months ago

Advocatus Diaboli (1627651) writes "The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month."
Link to Original Source
top

Australia asked Americans for more help to spy on Australian citizens

Advocatus Diaboli Advocatus Diaboli writes  |  about 2 months ago

Advocatus Diaboli (1627651) writes "Documents from the US National Security Agency, published by Glenn Greenwald on Tuesday in his book No Place to Hide: Edward Snowden, the NSA and the Surveillance State, reveal new details of Australia’s close relationship with the US spy agency. In an extract on 21 February 2011 from the acting deputy director of Australia's Defence Signals Directorate, which has since been re-named the Australian Signals Directorate, the director pleads for additional surveillance on Australians. “We would very much welcome the opportunity to extend that partnership with NSA to cover the increasing number of Australians involved in international extremist activities – in particular Australians involved with AQAP,” the extract said."
Link to Original Source
top

British Spy Chiefs Secretly Begged to Play in NSA's Data Pools

Advocatus Diaboli Advocatus Diaboli writes  |  about 3 months ago

Advocatus Diaboli (1627651) writes "Britain’s electronic surveillance agency, Government Communications Headquarters, has long presented its collaboration with the National Security Agency’s massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSA’s vast troves of private communications and sought “unsupervised access” to its data as recently as last year – essentially begging to feast at the NSA’s table while insisting that it only nibbles on the occasional crumb."
Link to Original Source
top

Google+ Is Walking Dead

Advocatus Diaboli Advocatus Diaboli writes  |  about 3 months ago

Advocatus Diaboli (1627651) writes ""According to two sources, Google has apparently been reshuffling the teams that used to form the core of Google+, a group numbering between 1,000 and 1,200 employees. We hear that there’s a new building on campus, so many of those people are getting moved physically, as well — not necessarily due to Gundotra’s departure. As part of these staff changes, the Google Hangouts team will be moving to the Android team, and it’s likely that the photos team will follow, these people said. Basically, talent will be shifting away from the Google+ kingdom and towards Android as a platform, we’re hearing. We’ve heard Google has not yet decided what to do with the teams not going to Android, and that Google+ is not “officially” dead, more like walking dead: “When you fire the top dog and take away all resources it is what it is.” It will take copious amounts of work for it to un-zombie, if that’s even a possibility.""
Link to Original Source
top

Identity Dominance: The U.S. Military's Biometric War in Afghanistan

Advocatus Diaboli Advocatus Diaboli writes  |  about 3 months ago

Advocatus Diaboli (1627651) writes ""For years the U.S. military has been waging a biometric war in Afghanistan, working to unravel the insurgent networks operating throughout the country by collecting the personal identifiers of large portions of the population. A restricted U.S. Army guide on the use of biometrics in Afghanistan obtained by Public Intelligence provides an inside look at this ongoing battle to identify the Afghan people.""
Link to Original Source

Journals

Advocatus Diaboli has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...