Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Intuit Beats SSL Patent Troll That Defeated Newegg

SJ2000 Re:WAT (59 comments)

My point is, it's not black and white like you were saying.

about 3 months ago
top

Intuit Beats SSL Patent Troll That Defeated Newegg

SJ2000 Re:WAT (59 comments)

Yes you can. There are many types of cryptographic weakness (Eg: an attack that reduces the effective key space) but specifically regarding RC4, there are weaknesses which make it difficult to use properly in common scenarios.

about 3 months ago
top

Intuit Beats SSL Patent Troll That Defeated Newegg

SJ2000 Re:WAT (59 comments)

Just like the Leaning Tower of Pisa has never fallen down!

about 3 months ago
top

Google: Indie Musicians Must Join Streaming Service Or Be Removed

SJ2000 Summary is Awful (364 comments)

This summary is complete misrepresentation, from the very start of the article.

YouTube will remove music videos by artists such as Adele, Arctic Monkeys and Radiohead, because the independent labels to which they belong have refused to agree terms with the site.

Whoever wrote that summary clearly has an agenda.

about 3 months ago
top

Aussie Attorney General's War On Encrypted Web Services

SJ2000 Re:The Meat of It (151 comments)

With the rise of deniability features in data-at-rest encryption products, I'm not sure how this is going to work in the real world. Wouldn't be hard to use these technologies for communications too.

about 6 months ago
top

Aussie Attorney General's War On Encrypted Web Services

SJ2000 The Meat of It (151 comments)

The article is rubbish so, with that in mind, here are some excerpts:

The Department is also advised that sophisticated criminals and terrorists are exploiting encryption and related counter-interception techniques to frustrate law enforcement and security investigations, either by taking advantage of default-encrypted communications services or by adopting advanced encryption solutions. The Department’s current view is that law enforcement, anti-corruption and national security agencies should be permitted to apply to an independent issuing authority for a warrant authorising the agency to issue ‘intelligibility assistance notices’ to service providers or other persons. The issuing authority should be permitted to impose conditions or restrictions on the scope of this authority.

Where issued to a service provider, such notices would formalise existing arrangements....

When issued to a person other than a service provider, such as the subject of a warrant, the Department’s preliminary view is that a notice would operate in a similar fashion to orders made under section 3LA of the Crimes Act 1914. Section 3LA permits agencies that have seized physical hardware, such as a computer or an external hard drive, under a search warrant to apply for a further warrant requiring a person to ‘provide any information or assistance that is reasonable and necessary’ to allow information held on the device to be converted into an intelligible form.

...issuing authorities should be able to authorise an agency to issue ‘intelligibility assistance notices’, requiring a person to provide information or assistance to place previously lawfully accessed communications into an intelligible form, as discussed by the PJCIS at Recommendation 16...

Recommendation 16
The Committee recommends that, should the Government decide to develop an offence for failure to assist in decrypting communications, the offence be developed in consultation with the telecommunications industry, the Department of Broadband Communications and the Digital Economy, and the Australian Communications and Media Authority. It is important that any such offence be expressed with sufficient specificity so that telecommunications providers are left with a clear understanding of their obligations. ...
The Department’s preliminary view is to support recommendation 16 in principle.

- Comprehensive revision of the Telecommunications (Interception and Access) Act 1979, Submission 26

about 6 months ago
top

Malaysian Flight Disappearance 'Deliberate'

SJ2000 Re:Tracking (436 comments)

Only if it's turned on.

about 6 months ago
top

University of Cambridge Develops Potentially More Secure Password Storage System

SJ2000 Re: Ridiculous (70 comments)

Why not follow the same interface standard instead of defining your own?

about 6 months ago
top

University of Cambridge Develops Potentially More Secure Password Storage System

SJ2000 Ridiculous (70 comments)

Have they never seen a PKCS#11 device?

about 6 months ago
top

Update on the March of Progress: How Slashdot's New Look Is Shaping Up

SJ2000 Re:cleaner doesn't always mean better (237 comments)

I agree, they need to visually break up the comments better.

about 7 months ago
top

Australian Teen Reports SQL Injection Vulnerability, Company Calls Police

SJ2000 Re:Metlink IRP (287 comments)

No. This is simply wrong. If "Metlink were simply following their IRP" then they would have started investigating and taking action last month when their gaping security violation was first reported. Instead they did nothing until exposure of their incompetence was threatened by mainstream media.

It all depends on the IRP, most Australian transport organisations do not have a incident response plan for this report from a member of the public (I.T. or otherwise), but they do have them for various PR issues such as public disclosure of security issue (I.T. or otherwise). I'm not saying it's right I'm just explaining how it occurs, and given the public profile of the incident, I'm not sure I'd want to be the one deviating from the established IRP even if it wasn't written with this in mind.

about 8 months ago
top

Australian Teen Reports SQL Injection Vulnerability, Company Calls Police

SJ2000 Metlink IRP (287 comments)

He has not yet been arrested and Metlink were simply following their IRP for a security breach which doesn't discriminate based on intent.

about 8 months ago
top

Come Try Out Slashdot's New Design (In Beta)

SJ2000 Focus (1191 comments)

Too much focus on the articles, who on earth comes to Slashdot for the articles these days with the awful editing?

about a year ago
top

Ask Slashdot: How Best To Disconnect Remote Network Access?

SJ2000 Top 10 (284 comments)

This Ask Slashdot has to be in the top 10 worst Ask Slashdots...

about a year ago
top

With Sales Down, Whale Meat Flogged As Source of Strength

SJ2000 Re:Hold on a moment... (311 comments)

The area where is happened was north of the 60th parallel south, which is outside the jurisdiction of the ATS.

about a year ago
top

Australian Tax Office Stores Passwords In Clear Text

SJ2000 Re:It's a third party not the ATO (84 comments)

That's right, summary is completely false.

The system is run externally by the warehouse and separately to the ATO," a spokesperson told SC....It is unable to access taxpayer information or their details. There are no financial or bank account details stored on POS.

A case of not reading the article, it's blatant FUD.

about a year and a half ago
top

Adobe Bows To Pressure and Cuts Australian Prices

SJ2000 Re:I'm Surprised (159 comments)

A committee like this is usually asking the question "What's so different about Australia that prices are so much higher than else where in the world? What is causing it?". It's to determine what the cause is so the government can implement measures into the marketplace to make it more attractive for suppliers to reduce their prices.

about a year and a half ago
top

Real-Time Fact Checking With "Truth Teller"

SJ2000 Watson (149 comments)

I think I'd rather IBM's Watson, I think it's shown a lot of promise in natural language parsing and I think it would do a better job than anything The Washington Post can come up with.

about a year and a half ago

Submissions

top

Julian Assange arrested in England

SJ2000 SJ2000 writes  |  more than 3 years ago

SJ2000 (1128057) writes ""Scotland Yard has confirmed that Julian Assange has been arrested by police in England... It is expected he will appear before an extradition hearing at Westminster Magistrates' Court today for a ruling to be made on whether or not he should be sent to Sweden.""
Link to Original Source
top

Rockstar involved in 'Cash for Comment'?

SJ2000 SJ2000 writes  |  more than 4 years ago

SJ2000 (1128057) writes ""Australian games journalist Toby McCasker claims he was recently fired from his role as Deputy Entertainment Editor of Zoo Weekly for blowing the whistle on a policy of trading good reviews for advertising.
Specifically, McCasker told News.com says that developers like Rockstar will often demand positive reviews from staff and that he was fired after posting on Facebook excerpts from Rockstar PR emails.""

Link to Original Source
top

CSIRO wins Wireless Patent case

SJ2000 SJ2000 writes  |  more than 5 years ago

SJ2000 (1128057) writes ""The CSIRO's case dates back to 2005 when it sued wireless component provider Buffalo for intellectual property breaches. A further 12 companies including Dell, Intel, Microsoft, Nintendo, Fujitsu, Toshiba, Netgear, Buffalo, D-Link, Belkin, SMC, Accton, and 3Com joined the case after CSIRO lawyers won an injunction preventing it from selling its products. However, this week all 13 companies settled the case. The details of the settlement are confidential but it's understood that each firm has settled their matters separately.""
Link to Original Source
top

Snakes on a Plane... A Qantas Plane

SJ2000 SJ2000 writes  |  more than 5 years ago

SJ2000 (1128057) writes ""FOUR escaped pythons have caused a Qantas plane to be grounded in Melbourne after airline staff failed to find them. The young Stimson's pythons, four of 12 in a container in the Boeing 737-800's cargo hold, apparently escaped on Tuesday during a 2½-hour flight from Alice Springs to Melbourne.""
Link to Original Source
top

Australia Pushes to Ban Card Skimming Devices

SJ2000 SJ2000 writes  |  more than 5 years ago

SJ2000 (1128057) writes ""The State opposition has called for new laws to ban the possession and manufacture of ATM and identity skimming devices. He said the State and Commonwealth attorney generals had already agreed on and recommended amending the legislation to include offence such as: *The possession of equipment capable of being used to make identification information with the intention of using, or allowing another person to use, that equipment for the purpose of committing an identity crime offence, punishable by up to 3 years imprisonment." That's very generic, technically anyone who owns (or sells) any Magnetic Stripe Card reading devices can be punished under this if they are able to establish some form of "intention" especially for sellers."
Link to Original Source
top

Crocodile devours shark

SJ2000 SJ2000 writes  |  more than 5 years ago

Sharks to Arms (1128057) writes "The 15ft saltwater crocodile began to eat the shark only metres from a boat of fisherman. Craig Van Lawick was aboard the commercial barramundi boat on the Wildman River, east of Darwin, in the Northern Territory when the crocodile started eating the shark."
Link to Original Source
top

Windows Explorer identified as Malware

SJ2000 SJ2000 writes  |  more than 6 years ago

SJ2000 (1128057) writes "Windows Explorer was quarantined last week by Kaspersky Lab's antivirus software after being falsely identified as malicious code.

The security company's systems had decided that a virus called Huhk-C was present in the explorer.exe file, leading to its confinement or, in some cases, deletion

"We proactively went out to our enterprise customers to make them aware there was this potential issue," David Emm, a senior technology consultant at Kaspersky Lab, said. "Only one corporate customer [in the UK] encountered this problem, as well as a handful of home users.""

Link to Original Source

Journals

SJ2000 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>