Beta

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Anonymous Claims To Have Defaced Hundreds of Chinese Government Sites

aschoeff Re:Anonymous way off the mark on this one (72 comments)

When you think you're doing something for somebody's own good without consulting them, you can essentially be seen as doing it in their name and/or infantilizing them. Not only did this potentially cause danger to many of China's citizens, as your motto says, but they likely didn't appreciate it in form at all. You don't see reports of similar incidents on the mainland done by nationals. Just totally counterproductive and it embarrassed me.

more than 2 years ago
top

Anonymous Claims To Have Defaced Hundreds of Chinese Government Sites

aschoeff Anonymous way off the mark on this one (72 comments)

Anonymous look the imperialist assholes with this totally counterproductive stunt. They need to see how offensive they have been in their misguided "quest." to "free" the Chinese people. I'm so embarrassed this has been done.

more than 2 years ago
top

Valve's Newell Thinks PS3 Needs To Be "Open Like a Mac"

aschoeff I read that as... (348 comments)

...Valve's Newell Thinks PS3 Needs To Be "Open Like a Man"

more than 4 years ago
top

It's Time To Split Up NSA Between Spooks and Geeks

aschoeff Split and In Opposition is the only way to oversee (122 comments)

Observing this interplay between the two separate groups is the only way to reliably oversee and glean reliable data that either or both are not compromised, or "rooted." It's a brilliant solution. Be glad they implemented it. The next obvious question is, how do they have the oversight mechanisms kept secret and in redundancy? They'd have to be pretty much 100% passive.

more than 4 years ago
top

Third Undersea Cable Cut

aschoeff Re:Putting the puzzle pieces together (655 comments)

A Subtle Knife, for a subtle move?

Say it isn't so! All we need now is the NSA being responsible for draining the Dust out of the world.

more than 5 years ago

Submissions

top

aschoeff aschoeff writes  |  more than 6 years ago

aschoeff writes "Hi, could I have just a little feedback on why my article was rejected? I'm not mad or anything at all, I sincerely want to know what the reason was, so that if it is something more general I won't make the same mistake in the future...

Just email me a few words, please!"
top

aschoeff aschoeff writes  |  more than 6 years ago

aschoeff (864154) writes "Apple just released a new version of iTunes recently, so I finally got around to letting OSX do the update. Normally I neglect to read the click-throughs, but I was curious and decided to give it a once-over.

Section 4 bothers me. My interpretation is that iTunes users agree to allow Apple and its subsidiaries to collect any and all information they choose from your computer via any mechanism they wish. The last sentence of the section specifies that "Apple may use this information, as long as it is in a form that does not personally identify you," but all the preceding text doesn't read in such a way as to be explicitly limited by this statement.

If indeed the passage is cleverly worded to make it seem innocuous, but in reality enables such expansive and breathtaking surrender of privacy, Apple shows clear knowledge of and intent to mislead and manipulate. As we all know, that's exactly the tactic that known spyware takes. Therefore, is iTunes spyware?

Section 4 is reproduced in its entirety below. Take a look at it.

4. Consent to Use of Data. You agree that Apple and its subsidiaries may collect and use technical and related information, including but not limited to technical information about your computer, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services to you (if any) related to the Apple Software and to verify compliance with the terms of this License. Apple may use this information, as long as it is in a form that does not personally identify you, to improve our products or to provide services or technologies to you."

Journals

aschoeff has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?
or Connect with...

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>