Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Incapacitating Chemical Agents: Coming Soon To Local Law Enforcement?

DarkOx Re:I guess you missed Kent State? (137 comments)

The counter argument though is the non-lethal weapons lower the hurdle for use of weapons at all. Any cop knows the outcome of using his service pistol against someone is likely that someones death. Most cops being decent people don't WANT to kill people.

Most cops however like all people value their own safety if you give them a tool like a taser and tell them it won't likely cause serious injury they become very likely to use it anytime the situation gets "tense" its the safe way out for them. They won't consider the corner case outcomes where the person has a heart condition or something and it could kill, humans don't think way.

Should someone who is shouting during a political event but otherwise not doing anything violent or injurious to others be subject to taser and pepper spray, those microwave pain ray things etc? I don't think that is the right thing for our society.

8 hours ago

FTDI Removes Driver From Windows Update That Bricked Cloned Chips

DarkOx Re:Sorry They're Changing (462 comments)

I think a great deal of this comes from two sources:

Company A creates a design, builds proto types etc. Hires Compnay B ( like a Foxcon to manufacture ) lets company be mange all the parts inventory etc. Essentially they just send orders.

Company B makes the product with genuine parts as speced for some period of time. Company A feels good stuff is being made correctly etc. Gradually company B starts to do more and more runs with the knock off parts growing their margin because they continue to charge A the same for completed units.

Maybe Company B runs likes to A's spec during the day, delivers all of A's orders to spec. At night the knock off the whole damn finished product using fake parts and other cuts and push complete counterfeits out to other channels, knowing A won't get to inspect them for quality.

8 hours ago

Sale of IBM's Chip-Making Business To GlobalFoundries To Get US Security Review

DarkOx Re:Wake up America ... (94 comments)

There is was an old joke about digging a canal in South America.

The local Dictator brimming with pride shows a visiting group of foreign dignitaries a gang of workers digging the new canal using pick axe and shovel.

The American industrialist says: why are they using shovels surely you could get a loan against the future revenues to purchase heavy equipment get the project done sooner start collecting tolls right way.

The Dictator replies: Ah but this employees more people.

The visiting economist asks: Would it not be better to have them use spoons.


Ask Slashdot: Smarter Disk Space Monitoring In the Age of Cheap Storage?

DarkOx Re:Bigger question (168 comments)

I don't know; the default 5% might be excessive for really big volumes but keeping at least %1 free seems 'smart' pretty much no matter how many orders of magnitude the typical volume grows to be. The typical file size has grown with volume size. We now have all kinds of large media files we keep on online storage now that previously would have run off to some other sort of media in short order.

The entire port of the reservation is so in the event of calamity the super user retains a little free space to work in; if (s)he is going to be able to be able to shuffle things about they might well need what we nominally think of as quite a bit of space. Those things today might be a 100GB VM image or something on 20TB SAN volume for example.


Proposed Penalty For UK Hackers Who "Damage National Security": Life

DarkOx Re:Not inherently unreasonable (164 comments)

Most crimes have a "Mens rea"

Yes that is why I asked if the requirement was more than negligent. Negligent basically means you formed no intent; specifically you did not for see the particular consequences of your actions or possibly inaction.

Consider this, suppose I buy some candy out of the back of some guys white van in parking lot. I bring it into the kids preschool for snack. All the kids die. I would totally be up for manslaughter. The mens rea would be negligent. I was just being a cheap bastard, did not mean anyone any harm but should have known better.

We might argue similarly about Tilly or Bobby. They should have known better than to be pasting crap from some untrusted website, but... the kitten looked like it had a smile.. yea well.


Cisco Fixes Three-Year-Old Telnet Flaw In Security Appliances

DarkOx Re:Telnet has its place (60 comments)

Because its not what your customers are really going to use! Better to exercise a real world configuration in the lab. Add 'null' cipher to ssh if you need this and make the command to enable it something obviously out of place for normal operations like:



Cisco Fixes Three-Year-Old Telnet Flaw In Security Appliances

DarkOx Re:The funny about Cisco... (60 comments)

here is nothing wrong with using TELNET on a private network but today we understand that security is better served using SSH for this functionality. However, in some environments, legacy dies hard because TELNET is not really that much of a security risk if you have good control over who accesses your network.

There is nothing right with it! SSH is not an overhead concern for any contemporary device. Even if the only people with access to the networks the management services accept connections from all have access you still have a problem. If there have been credentials running around in the clear we don't really know / can't prove who has been using them. Also it leaves the door open for MITM possiblities where content is injected. TACS logs show Bob issued the "write erase" but we can't really say it wasn't Jim using Bob's account in one way or another. Lack of attribution is a problem; even in authorization might not be.

Really there is no real world case where cryptography or authentication make sense without there other. Cryptography might not be encryption of the content; it could be something like a digital signature that just provides continuing authenticity and message integrity. Security: Authentication/Authorization/Availability/Integrity (in no particular order).


Proposed Penalty For UK Hackers Who "Damage National Security": Life

DarkOx Re:Seriously (164 comments)

Not really the reporter knows everyone who cares enough to listen to anything holder says already is perfectly aware of the true answer to that question at least in Eric's opinion.

Whistle-blowers are great as long as they are embarrassing my political enemies, in which case I am thrilled to stand up for strong protections and will gladly come up with some elaborate construct to make it morally equivalent something people get whipped up about like civil rights or something. In all other cases I perceive them as threat as a threat to the status quo and my crony buddies; I'am prepared to invent some wild construct to tie it to "national security" because that way everything is "on the table", I don't mind sounding "insane" to anyone actually listening because my buddies will brand anyone listening as "insane".


Proposed Penalty For UK Hackers Who "Damage National Security": Life

DarkOx Re:Not inherently unreasonable (164 comments)

So hypothetically lets say aunt Tilly uses decides to use their online form to post a question to customer service. She is feeling cute and copy pastes an emoticon which her browser software decides to accomplish by inserting an img tag.

The free emoticon side Tilly users happens to be some other attacker's plot to get people to send his Cross site request forgery links for him. Tilly has idea some nasty java script is about turn her cute little links to some smily.gif into the password requests for 50 popular sites.

Under this law, who are the victims, who are the attackers. Is Tilly attacker? victim? both? negligent and does that matter?

Who is the victim {legal entity power co}? the customer service rep? both?

Is national security "threatened" just because a utility was evolved, even though if we even consider the utility itself a victim only a billing / customer interaction system was ever involved in the attack?

This law addresses exactly non of those questions. Now we all know dear sweet aunt Tilly will not be prosecuted. On the other hand the book would be thrown at Biker Tattoo Bobby with all those crazy opinions of his for doing exactly the same thing.


Proposed Penalty For UK Hackers Who "Damage National Security": Life

DarkOx Re:Don't do the crime (164 comments)

The problems are its not always getting a shell. What if you violate a websites TOS, is that an unauthorized act?

What does damage national security mean, If I post about how Minister X lied about Y 10 years ago does that erode society's faith in its officials and by extension "threaten national security"?

There are bright lines such as bypassing an authentication mechanism; deliberate insertion of abnormally structured data designed to alter application behavior (injection attacks); that could be defined in laws like this. Its very possible to write laws governing computer access that are both inclusive to allow interpretations to cover changing and new technology and still be specific enough a reasonable people can agree on if a specific act meets the criteria.

Groups like OWASP have done the work; we now have good working definitions and generic criteria for describing attacks and abuse. Its not '92 anymore where public network access was a new thing.

There are two reasons overly broad laws like this are being written both equally scary. 1) The people writing and enacting them remain profoundly ignorant of topics that pretty much effect every aspect of the economy today. 2) They want them overly broad because it makes for a nice blunt instrument to shutdown anything that threatens the status quo.


The Inevitable Death of the Internet Troll

DarkOx Re:Not just women (531 comments)

Women generally are the ones who get offended and emotional about this stuff,

Nice troll.


Hungary To Tax Internet Traffic

DarkOx Re: Nah, this is just stage 1 (324 comments)

The real conceptual problem with it comes down to SS was designed before we had a fiat currency.

When we were on the gold standard government "savings" took real money out of the economy. Because the taxes are levied and the government does not put it back into "nice things" subsidies for education, roads, other services. People must continue to pay for these on their own so they have to stay in the work force, the dollars pulled out make the dollar slightly stronger.

The smaller generation following a boom would usually create deflation, few workers => lower productivity less money moving. Having retirees drawing down the SSTF would have smoothed that money would flow back in and they would have spent it.

Instead we went fiat. So rather than SSTF contributions being that deflationary drag, the government just borrowed creating new inflation. Now that money as its disbursed is just more fuel on the inflationary fires. So it does not go as far, we have to make COLA adjustments and pay it out faster creating a ever widening disconnect between what people pay in and what they typically get out (assuming they live their projected life spans).

So the entire thing is completely unhinged; it would be even worse but for the fact the rest of the economy also plays by one rule now; "the influential make it up as they go along"

2 days ago

Windows 0-Day Exploited In Ongoing Attacks

DarkOx Re:Only for root users (114 comments)

Have not looked at the vuln yet but does it necessarily pop a UAC given its OLE, i assume this is some kind of memory overwrite. So might be possible to step all over the users data without calling any privileged operations.

2 days ago

'Microsoft Lumia' Will Replace the Nokia Brand

DarkOx Re:Recognition (150 comments)

Yea but the hatred of Microsoft is more resentment and jealousy than anything else. Sure geeks hate them but nobody else really does. Microsoft like IBM before it represents safety in a confusing market place. Nobody every got fired for buying Microsoft, just like nobody ever got fired for buying IBM before that.

Microsoft has lost the consumer phone space, they have not yet decided they won't try but they know trying to get Teens and college kids to think their phones are 'cool' and or convince homemakers they are easy and safe would mean dislodging incumbents who have invested lots in that messaging already and have largely succeeded and are now seeing those ideas intrenched. Nokia still has come cache there; if they were going down that road they'd pick Nokia.

Microsoft is instead going with their old top down we're gonna force it on you strategy. The business mobile space has tons of companies that still don't have device deployment beyond the sales force, they have large orgs that are fleeing the Blackberry sinking ship. They can land those deals, right now all the policy management and such absolutely sucks for IOS and android; its all half backed and has more holes in it than a Swiss cheese. Microsoft is a brand you sell IT managers on. Its familiar and rule 0 of marketing is familiarity is more important than likability. People will knowingly select a brand they have had negative past experience with over the unknown.

IT manager thinking works like this: durr herp derp Samsung they make TVs; now Microsoft they make IT solutions! derp.

The truth is Windows phone probably can/will score better on their myopic score card spreadsheet too, Microsoft knows how to win the weighted decision matrix game. Which we all should know is a tool managers everywhere use to give a veneer of objectivity to their most subjective a prejudiced decisions. I look forward to the TCO whitepapers streaming from servers in 5 . 4 . 3 . 2 . 1 what relevance do the categories and metrics chosen have to do with anything; well the will have been 'scientifically' chose to make Microsoft look good.

3 days ago

Facebook To DEA: Stop Using Phony Profiles To Nab Criminals

DarkOx Re:Government Dictionary (239 comments)

The trouble is the law isn't the law. Law enforcement is not supposed to break the law. Facebook has a terms of use agreement, your right to access their systems and post anything there exists entirely from your agreement to abide by the terms there. Facebook does not allow pseudonyms and other characterizations of ones identity.

Doing so constitutes violation of the CFAA, the court even held that in US v Drew ( a case about pseudonyms on myspace), although the verdict was vacated because the District court judge believed that while violating the terms of service on a web site could constitute unauthorized access, placing site operators in control of criminality would likely result in the law being over turned for being vague ( does not define the act, other than to say violation of a certain type of contract is a criminal offense ) rather than letting that be tested the government chose not appeal so they could keep their law on the books. Presumably so they can continue to threaten and harass anyone who does anything on line they don't like with it ( remember is really vague ).

Facebook does not belong to them, but they use it anyway in violation of the terms and their own law. If you or I setup dozens of fake Facebook acounts and use it to harass someone you can bet at the very least they would waive the CFAA in our faces to try and get us to plea to something else. Rules don't apply to them though!

If they set up their own site they would be perfectly within their rights to do this kind of pretexting; but then who is going to sign up and start posting on NARKBook?

3 days ago

Who's In Charge During the Ebola Crisis?

DarkOx Re:No the constitution is fine.. (279 comments)

That clause is in the preamble. It and everything else in the preamble should not be read as operative, it merely provides context in which to read the rest of the document. In that sense the idea it functions as a restrictive clause is more reasonable it limits possible interpretations of the other powers.

Its like the description before the ingredients list on a recipe. If you just had the title and then it launched strait into the contents and cooking instructions you'd have no idea what to do when you encounter something vague like bake 10-14min @ 350.

Should it be 10 or 14 how do I know? Well it helps to know the objective was: A delicious light by dry cake to be served with coffee.

That helps now you know to err on the side of more done, but not burred, as opposed to worrying the cake is loosing to much moisture.

about two weeks ago

Password Security: Why the Horse Battery Staple Is Not Correct

DarkOx Re: symbols, caps, numbers (549 comments)

Okay so there should be some limit. Buffers need to be allocated etc. There is not good reason that limit needs to be so small it impacts humans. 10KB would be a preposterously long password but would no more expose a webserver and or database engine to a DOS than all of the other operations they necessarily allow already do.

about two weeks ago

Password Security: Why the Horse Battery Staple Is Not Correct

DarkOx I'll Bite (549 comments)

1) Choosing a password should be something you do very infrequently.

No. Passwords need to be rotated for all kinds of reasons. It results in the account being effectively disabled when account policies fail (forgotten service accounts etc). It ensures that if the password store has leaked and its not discovered strong passwords remain safe (can't be cracked in the rotation time) and that access to accounts with weak passwords is at least detected at some point. Passwords should be used uniquely person/organization for the most part, finer grains in some cases; most people form relationships with organizations frequently. So password selection actually occurs very often and should.

2) Our focus should be on protecting passwords against informed statistical attacks and not brute-force attacks.

Most "brute force" attacks are informed and statistical the offline ones anyway; you try to get the low hanging fruit first (birthdays, names, dictionary words and usual substitutions) before you do the exhaustive search of the key space. In online attacks where the attacker is throttled this has greater impact but a password that is strong against offline attack is also strong against online attack so I don't see any reason to place emphasis here, other than to simple say the best passwords have the most entropy.

3) When you do have to choose a password, one of the most important selection criteria should be how many other people have also chosen that same password.

Ok I can agree with this one, but really implementation is hard, beyond the usual is it in a dictionary of common passwords (good systems already implement this), you should not be able to know if lots of other people are using that password because you are only storing salted hashes right and everyone gets their own salt right?

4) One of the most impactful things that we can do as a security community is to change password strength meters and disallow the use of common passwords."

No the most important thing we can do is try to move away from password only security and move toward two factor, which is more and feasible now that most people are carrying a cell phone that can at least get SMS messages.

about two weeks ago

The Correct Response To Photo Hack Victim-Blamers

DarkOx Its not all victim blaming (622 comments)

There is a difference between blaming victims and admitting they did not take a reasonable person could have take to prevent themselves from becoming a victim. A little discussion of the choices a victim made leading up to the crime is not victim blaming. I am do tired of this PC BS. Do we want to be politically correct or do we want to actually empower people to protect themselves.

No matter how you slice it the people who obtained those photos without permission are the criminals. The probably by brute forcing weak passwords or using malware to log password fraudulently represented themselves to a service provider 'Apple' using stolen credentials, and they almost certainly violated the photographer's copyrights, and various other crimes. No matter what else we say that remains true, they not the victim did something wrong, but that does not mean victims could not have done more right. Yet as soon as you add that last clause 1000's of PC morons will pile one. I see the same mentality being applied to the 'campus sexual conduct' debate and it makes me sad because it means there will be more victims.

We live in a free society. We can't round up bad actors until they do something, criminal. How much effort put into finding them, and obtaining justice is another discussion, but they are out there and always will be so long as society is open. So if you want to actually protect people from being victims we really ought to look at J-Law and ask what else might she have done.

Now, there are limits obviously everyone has RIGHT and reasonable NEED to walk down the street in broad daylight and expect to do so and be reasonably assured they can without being harassed etc. There is no analogue there though to sending a private document over a network you know nothing about to a third party for storage and distribution who you know little about that will replicate it to a bunch of other devices some encrypted some likely not and just assuming everything will be all cool.

It would be better for people with a little knowledge to be able to use this as a teachable moment for others. The phyiscal world analog for what these nude-selfie takers are doing is essentially: Taking a nude Polaroid of yourself; and storing it the sheet metal desk draw at the office, with the cheapo four tumbler lock, high probability the maintenance guy has another key, and leaving it there why you go on month long holiday. -- Now if that seems reasonable to you than you are good to put your nudes on iCloud and similar services. If not well you should not do it.

No its not right for someone to break into your account and copy your stuff, but being aware will let others at the very least make a go / no go choice, maybe you can start to find better options or improve your situation like replacing the cheap lock in my analogy with good quality padlock via using a STRONG password. Advising prudence and offering education ISNT "victim blaming." Its how you avoid having a nation of victims.

Same thing with "campus sex crisis". Telling young people its not smart get near blackout drunk around lots people you don't know; especially in what may be a new and unfamiliar location to you; isn't victim blaming. Its COMMON FREAKING SENSE, for men and women alike. If I were a pick pocket you bet I'd go after the drunk stumbling down the street before the together looking other guy. Women might be more at risk for a certain class of crime than other groups. Recognizing that fact and communicating it isnt victim blaming. Its empowering members of the group to make choices, about the risks they take. That is better than ignoring reality because it violates or sense of fairness.

I am not blaming the victim when I say if you are target and you know you are a target well its dumb to put nudes of your self in the cloud! Dumb you hear the the rest of your celebs? Delete them now, no I won't blame you when yours leak but you should understand it was preventable. You could have stopped it; that does not make it right but remains true.

about two weeks ago

How Spurious Wikipedia Edits Can Attach a Name To a Scandal, 35 Years On

DarkOx Re:Research (165 comments)

I am having difficulty understanding how giving opposing views on an issue or news item in any way hinders free speech.

Expressing even the idea that alternatives are possible fundamentally spreads those ideas and may even legitimize them in the minds of some. This is my issue with most of our civil rights laws as well, they should be unconstitutional. In order for Freedom of Speech or Freedom of Association to have any real meaning you also need Freedom from Speech and Freedom from association.

Liberals agree with this principle when its something they support like anti-nationalism, lefties will be happy to show up and defend your right NOT to say the "Pledge of Allegiance", or to stand up for atheistic principles like your right not have to swear on the Bible lest you be associated with some faith. These same people will turn on folks in the blink of eye if they don't want to say be associated with a minority of some kind, and not hire them or whatever.

Same principle here, nobody anywhere for any reason ought to be forced by government to state an opinion they think is wrong. The right NOT to speak something should be taken every bit as seriously as the right to speak. The other thing about the fairness doctrine was there was always an underlying assumption that some options were so radical and out of norm they did not have to be given air time. Who got to decide that though? The news agencies firstly and second the FCC which thought not very transparent processes did or did not take action.

So the fairness doctrine was in fact only really fair to people who had views that represented at least a large minority. Fringe ideas could still easily be hidden away. Which is probably a good thing, otherwise anytime someone bring up WW2 we'd have to endure listing to "Of course Adolf may have been right about Semitic peoples, and the final solution may have substantively improved western society" You don't want to require news to report mindless disgusting ideas like that.

No I think in the end the only really workable plan is let people/institutions report what they thing, let individuals decide if they have been presented with facts that support those ideas or not.

about two weeks ago



NSA not Assad brought down Internet in Syria

DarkOx DarkOx writes  |  about 2 months ago

DarkOx (621550) writes "In his most recent interview with Wired Edward Snowden makes the claim that in 2012, the NSAâ(TM)s TAO hacking group was attempting to install surveillance malware when it accidentally brought down a crucial router at a Syrian Internet service provider, and the nation's Internet connectivity with it.

The NSA allowd the public to blame the Assad regime, while others within the NSA apparently considered pointing the finger at Israel for the botched intrusion. This revelation raises even more questions about the legality of the NSA actions, as they would seem to be very similar to electronic atacks other officials have suggested the USA would consider acts of war if used against infrastructure based in the USA.

Could the reckless behavior by the NSA cause our nation to be drawn into war?"

Link to Original Source

Anonymous Vows to Destroy Facebook

DarkOx DarkOx writes  |  more than 3 years ago

DarkOx (621550) writes "Anonymous has vowed to destroy Facebook on November 5th (which should ring a bell).

Citing privacy concerns and the difficulty involved in deleting a Facebook account.

From: Anonymous posting:
Attention citizens of the world,
We wish to get your attention, hoping you heed the warnings as follows:
Your medium of communication you all so dearly adore will be destroyed. If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill facebook for the sake of your own privacy."

Link to Original Source
top is gone

DarkOx DarkOx writes  |  more than 3 years ago

DarkOx (621550) writes "It appears the domain registration of the oldest commerical GNU/Linux distributions has expired. Is this a simple oversite on the part of Slackware's maintainer Patrick Volkerdi or is this a diliberate retirement of many peoples favorite distribution?"
Link to Original Source

Jessica Watson sets sail

DarkOx DarkOx writes  |  about 5 years ago

DarkOx (621550) writes "Jessica Watson has begun her round the world voyage, if successful she will be the youngest person, age 16, to circumnavigate the globe by sail unassisted and non-stop.

She will 23,000 nautical miles (about 38,000 kilometres), departing and returning to Sydney as required to set the record. This will be a journey lasting around 240 days, during which she may not acquire any outside supplies or receive any assistance with repairs.

She will have internet access, e-mail, and her position will be continuously tracked and monitored. This is a pretty high tech undertaking both in the electronics sense and as in sailing kit. Her yacht is a S&S (Sparkman and Stephens) 34 a boat that has successfully been used in other solo circumnavigation bids.

Much more information can be found at her website:"

Link to Original Source



Hypocrisy and the Contraception debate

DarkOx DarkOx writes  |  more than 2 years ago

Since apparently we have to decide the future of American politics around this issue of whether insurers should be forced to offer contraceptives and pharmacies be forced to carry them the freedom or religion question again comes to the forefront.

The progressive propaganda machine is out in full force trying to accuse conservatives of forcing their religion on others and or trying to sell us all on the idea that these measures are in some way protecting them from the tyrannical religious views of the minority. The sad part is its working in that public is actually entertaining the idea this has anything to do with religion. It may be to an extent but if is than the conservatives as usual have the more supportable position even if most of those would be ïïSantorum votes and the candidate himself are blind to it.

All of these âoeprogressivesâ who see their boy Obama as a hero pushing common sense over the religious right, are as much the fools they like to make the Santorum supporters out to be or the worst kind of hypocrite. I personally suspect its pretty even mix of both; frequently found in the same individuals. Almost any of them would be willing to argue that âoefreedom of religionâ means freedom from religion and Iâ(TM)d agree. It follows though that âoefreedom of associationâ its in that same amendment, should also mean freedom from association. That means as an individual, or private business, I should have the right to disassociate myself form any person or group of people I chose for any reason, however stupid. This is the view I take as libertarian. Its incumbent upon me to not pick stupid reasons but if I do; well to damn bad right? So if an employer, insurance agency or pharmacy does not want the sort of customer or employee that interested in contraception coverage well that ought to be allowed. So toss out all your civil rights acts, quota laws, and similar non-egalitarian derk.

The Supreme Court of the United States disagrees with me; partially. The have held you can only exclude members from your group if their presence would make it difficult to express you view point. Clearly in the case of Catholic organizations who have the view point that contraception is wrong, would have a problem espousing that viewpoint while having a membership with the expectation they are going to pay for it. So their covered but the pharmacy that does not want to carry Plan B, they are not a religious organization, the are not pushing an agenda other than make buck; so they canâ(TM)t just dissociate themselves from a certain group of customers right? Well I guess you got me there, or do you? I say the the Supreme Court is wrong. I say this because if the the freedom of associate is in fact not freedom from association than its terribly inconsistent to take the view freedom of religion is.

If your not forcing people to violate the tenants of their own faith with say biblical-y inspired laws than those must be okay, as that would be consistent with the Courts rulings on association. Sorry Atheists if the Christians want to hang the Ten Commandments over the door and start the school day with a prayer I guess you must let them. You canâ(TM)t have it both ways, well not and be honest anyway. Lets face it honesty and integrity have never really been part of the progressive agenda though have they?

  hmm some other thoughts on the subject.

What about the basic freedom reserved for the states and the people, you know ALL the ones not enumerated elsewhere in the Constitution. Like say deciding what to stock in your store. If a pharmacy has to carry Plan B, does my auto mechanic have to stock parts for my thirty year old import? Does JC Penny have to have beige pants in a thirty-one inch waste in stock at all times? Where is line? Clearly its totally against the character of this nation for any central governing body to be dictating what a retail operation has on their shelves, at least I hope that is still true!

Finally can we just dispense with the totally ridiculous notion that contraceptive drugs are âoenecessary for womenâ(TM)s health.â Clearly when prescribed for âoecontraceptive useâ they are not. Effective inexpensive contraception for men and women is available at just about every gas station, drug store, and many a public rest room across this country. If you really canâ(TM)t of any of it for whatever reason you could just keep your pants on. Sure it might ruin a Saturday night but it wonâ(TM)t kill you. I would be willing to entertain an argument that these medications might be necessary when prescribed as they frequently are for other health reasons. Doing so than places it on the doctor writing the prescription and their professional integrity when they attest to why they are doing it. Seems like a reasonable compromise. This simply is not an equal protection issue. Its just not.

Lets face it contraception is NOT specifically a womenâ(TM)s issue unless fathers have no obligation or rights to the consequences of not using it. Oh wait nobody is happy with that idea? Thought not.

Slashdot Login

Need an Account?

Forgot your password?