Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

New Information May Narrow Down Malaysian Jet's Path

EnergyScholar Re:This is the 'Distracting Story of the Week' (227 comments)

Wow, has IQ dropped sharply since I last posted to Slashdot? I didn't claim that the plane didn't disappear. Planes crash all the time. I claimed that this story getting constant 'pay attention to me' billing causes people to ignore more substantive stories. 'Manufactured news' isn't a fake story, it's a 'human interest' story that has been deliberately hyped.

about 5 months ago
top

New Information May Narrow Down Malaysian Jet's Path

EnergyScholar This is the 'Distracting Story of the Week' (227 comments)

This entire story is manufactured news. "Look over here! This is shiny and exciting! Pay no attention to ongoing, substantive stories."

about 5 months ago
top

Inside NSA's Efforts To Hunt Sysadmins

EnergyScholar Re:The apologists will darken the skies (147 comments)

While some of the apologists you decry are probably real, it's a safe bet that most of them are sock puppets. There is a thriving market for 'media consulting firms' who take money to provide sock puppet services. I've personally identified quite a few working Slashdot. They already have 'full capture' of this service, and of most online social networks. They are most apt to turn up when someone posts a 'controversial' story, and otherwise try to keep a low profile.

about 5 months ago
top

Toronto Family Bans All Technology In Their Home Made After 1986

EnergyScholar Lots of tech addicts posted (534 comments)

I find the responses from the slashdot crowd telling. While a few people expressed some support, most seemed horrified. That's quite comical, and more than a bit disturbing. It tells me that many slashdot readers have a problem with too much technology, in the same sense as some people have a problem with too much alcohol. Those people would be wise to spend more time outdoors surrounded by greenery, read more books, and turn off their phones for a few weeks every now and then. If the prospect of turning off your phone for a week disturbs you that's a great indicator that you have a problem.

about a year ago
top

John Gilmore Analyzes NSA Obstruction of Crypto In IPSEC

EnergyScholar Re:Sounds like John Gilmore has called it accurate (362 comments)

Parent post was also modded down [by NSA sockpuppets]. It went up to a 5, then down, then up again. Then it was stable at a 5 for while. Just now, about an hour after the story was first posted (when traffic to this thread is dropping, and a forum slide has been initiated on the front page) it was quietly modded back down. Who besides NSA sockpuppets would do that? Here's an exercise: how much would it cost to station paid sockpuppet moderators at every popular online watering hole? Is this number more or less than the available budget?

about a year ago
top

John Gilmore Analyzes NSA Obstruction of Crypto In IPSEC

EnergyScholar Re:Sounds like John Gilmore has called it accurate (362 comments)

NSA sockpuppets just modded this comment chain DOWN. I watched it go up, then back down. Actually, I'm only guessing the down-modders were NSA sockpuppets, but can you think of anyone else who would do so?

about a year ago
top

John Gilmore Analyzes NSA Obstruction of Crypto In IPSEC

EnergyScholar Sounds like John Gilmore has called it accurately (362 comments)

It seems pretty clear that John Gilmore has clearly identified what's going on. He spotted many instances of NSA-directed sabotage,and has called it out.

Of the multiple examples John calls out, the most poignant is probably the needlessly complicated IPSEC standards. Overly complicated standards lead to bugs and flaws. He and Bruce Schneier describe a process that certainly sounds like NSA sabotage of security standards.

What should be the upshot of this? Perhaps people involved in security research should recognize that [b]anyone affiliated with NSA is a likely saboteur[/b]? Is such sabotage, which deliberately cripples the security of USA electronic infrastructure, a form of treason? Since this sort of deliberate sabotage of technology is the sort of thing terrorists might do, perhaps the NSA, and every person associated with that organization, should be placed on a Terrorist Watch List?

In all seriousness, how should the technical and geek community deal with this sort of sabotage? Is it sufficient to respond,or is proactive behavior called for? What would Sun Tzu have to say about this situation?

about a year ago
top

A Currency linked to Energy

EnergyScholar Great topic to raise (2 comments)

I'd love to see this become a front page story. Thanks!

about 2 years ago
top

California Legalizes Self Driving Cars

EnergyScholar Do we have real AI? (508 comments)

But since we have not mastered true AI yet

Are you sure about that? Your understanding of the AI basis for self driving cars may be flawed. Google's AI (not exclusive to Google) is based on 'artificial life' that was 'encouraged' to evolve intelligence more than 20 years ago. It probably qualifies as both 'strong AI' and 'friendly AI'. Computers are the just medium it uses to communicate with us and are not its basis technology. It's called Quantum Neural Network technology (no useful wikipedia entry yet exists), and its basis is non-abelian anyons interacting in a 2DEG. See the complete scientific works of Stuart Kauffman, Steven Wolfram, Robert Laughlin, and David Deutsch for details.The reason you can't read about this new technology is because the original project that developed it was classified, so all derivative technologies (such as Google's self driving cars) are also classified, and all people who work on this technology must sign ironclad NDAs.

about 2 years ago
top

Has Plant Life Reached Its Limits?

EnergyScholar Re:HEMP!!!!! (209 comments)

Interesting that that comment was modded down. It related directly to the conversation and the article. The hemp advocates might be annoying and sometimes incoherent, but what they say is also, in general, entirely true and correct.

about 2 years ago
top

Has Plant Life Reached Its Limits?

EnergyScholar Learn about Carrying Capacity (209 comments)

... no matter how much plant matter humans harvest for various reasons, the Earth is able to replenish it to its maximum level.

Nope, the universe does not work that way, no matter how much we would like it to be so. You seem lack a basic understanding of ecological carrying capacity. When any species transgresses the carrying capacity of an ecosystem, it permanently reduces the carrying capacity of that ecosystem. This is basic Biology. The Reindeer of St. Matthew Island illustrate this point very well. In the future, please learn the basics of the topic before spouting off your (un) scientific opinion.

about 2 years ago
top

Has Plant Life Reached Its Limits?

EnergyScholar You repeat the same lies! LTG is NOT wrong! (209 comments)

Limits To Growth has never been proven wrong. This lie, originally created by Economists, has been told, and retold, and retold again, and I see it again in that Reason article, which I just read. Same lies! Try this: Go out and buy the original 1973 Limits to Growth book. Read it and look at the numbers. Now get CURRENT data on the same items. Compare. You will find that they match strikingly well.

The anti-Limits to Growth hatchet jobs tend to use the same lies. The standard approach, which is REPEATED in that lame Reason article, is to deliberately misinterpret LTG as predicting stuff it never said, then 'proving' that misinterpretation wrong. It's the standard 'Straw Man' argument, and that wretched Reason article does it AGAIN.

To repeat myself: go out and buy the original 1973 Limits to Growth book, or any of the more recent ones. Read it and look at the numbers. Now get HISTORICAL data on the same items. Compare. You will find that they match strikingly well. Nothing in Limits to Growth has been proven wrong, that is a FALSE MEME that represents a triumph of Disinformation.

about 2 years ago
top

Rapid Arctic Melt Called 'Planetary Emergency'

EnergyScholar Fact Checking! (757 comments)

The other big trend is the availability of cheap natural gas from fracking, which is driving the construction of new gas electric plants and gas-heating in homes. Fuel oil is expensive; gas is dirt cheap. The simple economics will force a mass conversion to this relatively clean and cheap power source.

You have some factual errors regarding hydraulic fracturing. You have accepted known-false statements as true, due to hearing them repeated many times by a very well funded public relations campaign. Please allow me to correct your (understandable) misconceptions.

1. The availability of cheap gas from fracking is very temporary. We currently have a glut, but don't expect it to last more than a couple years. These reservoirs have a very high decline rate. It is unlikely that we'll see the unusual confluence of circumstances that caused this resource to be overproduced this past few years. By 2017 or so North American natural gas won't be cheap anymore.

2. Natural gas derived from hydraulic fracturing is NOT 'relatively clean'. The actual gas is the same as 'normal' natural gas, but the fracturing process is quite dirty. This (false) claim that fracked gas is 'clean' has been an important aspect of the paid marketing campaign.

3. While I am dispelling marketing-campaign-induced mythology, readers should also be aware that the 'USA will become energy independant' myth is just that, a myth. The numbers don't even come close to adding up. When you hear that myth repeated, you are hearing propaganda.

Rather than link to a whole host of scholarly articles highlighting my myth busting, I'll point to this well-researched story which nicely explains the reasons for the deception.

about a year ago
top

TSA Spending $245 Million On "Second Generation" Body Scanners

EnergyScholar Re:Post Removed (335 comments)

"This post was removed due to Dice content standards violations." - and note we had already classified it as 'funny'.

Looks like it's time to leave Slashdot. It's been a fine 15 years. So, where's is a comparable, not-controlled-by-our-corporate-overlords place where we geeks can speak freely?

In the 90s I used Dice as my primary resume location, with excellent results. Then they got greedy, and made a bunch of changes that made their service less useful to geeks looking for jobs. For example, they made your resume not-visible externally, such that potential employers had to sign up with Dice and pay them to see your resume. Dice is a greedy entity, and I can't imagine any way they could own Slashdot and not kill it.

about 2 years ago
top

Why WikiLeaks' Spinoff OpenLeaks Failed

EnergyScholar Prediction: This Forum will soon be Flushed (79 comments)

This particular forum is filling up with lots of info that spy agencies don't like to see widely distributed. I predict that those (few) Slashdot admins who are forum spies will soon 'Slide' this forum off the front page. I.e. They will implement a Forum Slide to remove the offending discussion from sight. Watch as a bunch of 'junk' articles soon appear, and this thread becomes hidden. Note that I have exposed and correctly anticipated the actions of the Slashdot forum spies previously, and they have aggressively modded me down and/or silenced me for it, so don't be surprised if this comment gets modded 'troll' pretty quickly.

about 2 years ago
top

Why WikiLeaks' Spinoff OpenLeaks Failed

EnergyScholar WRONG!!! 'Journalism' organizations are corrupt! (79 comments)

The REASON Wikileaks was established in the first place was BECAUSE the various 'journalism' organizations have been infiltrated by intelligence agencies. It is IMPOSSIBLE to publish hyper-sensitive stuff! My first-hand exposure to this information began on 27 Nov. 2003, and continued for several years, so I'm not just making this up. See my previous Slashdot posts.

I've told Slashdot about this before: The Plame/Wilson affair, and the unwillingness of ANY journalism organization ANYWHERE to publish their (true!) evidence indicating that G. W. Bush lied to the US public about the reason for going to war in Iraq, sparked Wikileaks. It had been considered before, but that was the impetus to make it happen.

about 2 years ago
top

Why WikiLeaks' Spinoff OpenLeaks Failed

EnergyScholar Anonymity is Dead (79 comments)

I think you greatly underestimate the difficulty of truly anonymous publishing. There are half a dozen advanced hacks capable of determining where the info came from. Especially if you are submitting to a Honeypot, but even if you are not. Yes, I know all about the many methods of anonymity - are you aware of the many methods of defeating them?

Here's what John Young, founder of Cryptome and early Wikileaks Board Member, has to say on this matter: Anonymous Publication is Dead

about 2 years ago
top

Here's how Android fanboys responded to the iPhone 5 announcement

EnergyScholar Stupid time-wasting story (1 comments)

As neither an Apple for Android phanboi, I must say this is a lame and stupid story. This is not 'news for nerds', neither is it 'stuff that matters'. Please don't post this lame-oh crapware story.

about 2 years ago
top

'Warbiking' Shows that 25% of Hotspots Have Poor or No Security

EnergyScholar Poor security, or deliberately open? (1 comments)

Your language is loaded. Your implication is that an unsecured Wireless Access Point is a Bad Thing. This can be true, and it can be false, depending on the situation and intentions of the admin. Personally, I run all my personal stuff encrypted, but also provide an open network for visitors. You should check out what security guru Bruce Schneier has to say about the topic.

about 2 years ago

Submissions

top

The Gentleperson's Guide To Forum Spies

EnergyScholar EnergyScholar writes  |  more than 2 years ago

EnergyScholar writes "This recently leaked document describes modern COINTELPRO techniques for manipulating Internet forums. Observant readers may have noticed these techniques being used in familiar online forums. Part of modern media literacy includes understanding these techniques. This document contains information about:
1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression"

Link to Original Source
top

The Gentleperson's Guide To Forum Spies

EnergyScholar EnergyScholar writes  |  more than 2 years ago

EnergyScholar writes "Modern COINTELPRO is largely about controlling Internet discussions, through fair means or foul. This leaked document describes some of the standard techniques spies use to manipulate Internet discussion groups. Observant readers may have spotted some of these techniques being used to manipulate the Slashdot crowd. This author certainly has. Knowledge is Power! Forewarned is Forearmed! The article discusses these points:

1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression"

Link to Original Source
top

Wikileaks sparked Arab revolution, says MI6

EnergyScholar EnergyScholar writes  |  more than 3 years ago

EnergyScholar writes "Former British intelligence chief Sir Richard Dearlove credits Wikileaks with helping spark revolution in Middle East, in an off the record speech someone serreptitiously videotaped. In previous stories about the Middle East revolution there were several conversation threads in which people asked whether there was evidence that Wikileaks had helped spark the Middle East revolutions. This is my first story posted to Slashdot, but it's safe to say it won't be my last on this topic. Interested readers should follow the phrase "disruptive compliance" for information about the origins of Wikileaks. "What sort of Hacktivist applications shall we write?" Indeed!"
Link to Original Source
top

MI6 credits Wikileaks with helping spark revolutio

EnergyScholar EnergyScholar writes  |  more than 3 years ago

EnergyScholar writes "Former Intelligence Chief of MI6 credits Wikileaks with helping spark revolution in Middle East, in a (supposed to be) off the record speech. In previous stories about the Middle East revolution there were several conversation threads in which people asked for evidence that Wikileaks had helped spark the Middle East revolutions. This is my first story posted to slashdot, although it's safe to say there are more to come on this topic. This author is hoping for a Nobel Peace Prize for Wikileaks, and suggests interested readers check out "disruptive compliance"."
Link to Original Source

Journals

EnergyScholar has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>