Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:What happened? No security. (Score 2) 125

Basically Wikileaks has nobody there who is competent enough to actually implement a security framework for the site.

So, as a result, it basically becomes a dumping ground for all this crap.

Thus, when examples are pointed out to them, all they can do is nix the examples.

Wikileaks has withstood countless efforts to get their site offline, sometime by dedicated groups and/or state sponsored actors. You may remember how all hell broke loose with cablegate, including DDOS and Senator Lieberman's call to Amazon. Calling Wikileaks incompetent at security is completely ridiculous.

I bet that the whole thing went down like this: author of this backchannel article wanted to rag on Wikileaks for their dissemination of personal details, and wanted to bring up email #117 as prime example (medical bill!!) and got infected herself for lack of security competence. Author then contacted some security outfit to perform a security evaluation, security outfit performed a simple virus scan. Author then cooked up a click bait article, how Wikileaks is out there to recklessly infect everyone with malware.

Let's face it: Wikileaks is plenty competent securitywise, as evidenced by their very presence for so many years. They expect their readers, especially professional journalists scouring their site to bring at least a moderate skill set to the table, and Mrs. Upson apparently failed miserably.

Comment Re:Maybe... (Score 0, Flamebait) 334

Riyadh al-Adhadh is not some random raghead insurgent whom Laura suddenly decided to fund. He was the primary focus of her film 'My Country, My Country', so little surprise that she was in contact with him and supported him. He was jailed for months on false terrorism charges, and apparently still served as Baghdad Provincial Council Chairman last year.

Evidently she knew him better than the whole bunch of all-seing, all-scanning, all-collecting, "we need to listen to your granny or we can't catch the terrorists" three letter agencies together. We should all sit down and weep in despair, if this wire transfer is still the reason for the ongoing harassment Laura on every single flight.

Comment Why should we trust NIST encryption? (Score 4, Insightful) 64

NIST recklessly broke our trust in them by allowing known to be broken encryption into their standard. Their new document may come with all the best intentions, but it will take years to rebuild that trust. Let's wait for what the crypto community has to say about these documents, before we blindly follow their latest standards.

Comment Re:culture trap (Score 3, Interesting) 169

*** Yes, he did flee. The claim that Assange was "free to go" as promulgated by Björn Hurtig, a former attorney of Assange's. He tried that same line in court and got smacked down by the judge for trying to deceive the court, and then got an official reprimand from the Swedish Bar Association.

I can't confirm or deny your claim here, but the link you provide doesn't confirm it either:

Riddle was referring to testimony in which Hurtig had said he had been unable to contact Assange last year when he was sought by Swedish prosecutors for questioning.

Nothing is said about whether Assange was free to leave Sweden or not, but a court order banning you from leaving the country usually means you hand over your passport. Since the UK is not part of the Schengen Area, he would have needed a passport to enter the UK from Sweden.

Submission + - The FAA Says You Can't Post Drone Videos on YouTube (

schwit1 writes: If you fly a drone and post footage on YouTube, you could end up with a letter from the Federal Aviation Administration.

Earlier this week, the agency sent a legal notice to Jayson Hanes, a Tampa-based drone hobbyist who has been posting drone-shot videos online for roughly the last year.

The FAA said that, because there are ads on YouTube, Hanes's flights constituted a commercial use of the technology subject to stricter regulations and enforcement action from the agency. It said that if he did not stop flying “commercially,” he could be subject to fines or sanctions.

Submission + - Swedish Authorities Offer To Question Assange in London (

An anonymous reader writes: Since 2012, WikiLeaks founder Julian Assange has been holed up inside Ecuador's embassy in London trying to avoid extradition to Sweden, where he faces sexual assault investigation. Now, after the case has been stalled for years, Swedish prosecutors are now arranging to come to London and question Assange within the embassy. According to his lawyer, Assange welcomes this, but Sweden still needs to be granted permission from both the UK and Ecuador. "Assange’s lawyers, who are appealing against his arrest warrant in Sweden’s highest court, have complained bitterly about the prosecutor’s refusal to travel to London to speak to him – an essential step under Swedish jurisprudence to establish whether Assange can be formally charged. [Lead investigator Marianne] Ny’s refusal, they say, has condemned Assange to severe limitations on his freedom that are disproportionate to the accusations against him." Ny has also requested a DNA sample from Assange.

Comment Re:cryptolocker solution (Score 1) 331

There is a solution for this class of malware, but it isn't anti-virus. Since cryptolocker only damages user data, the operating system should provide a secure and automatic backup of the user's data. Any time a user's file is changed, the new version is recorded on the backup, with its date. From the user's point of view, the backups are read-only, so malware can't damage them, and the user can retrieve an old version of a file at any time.

I hope you are aware that this could go wrong in terrible ways: there are some files that you actually want to have only in encrypted state. If your operating system always keeps a backup of their unencrypted versions, you may be secure against certain kinds of ransomwares, but open to all kinds of other data leakage.

Comment Re:This has been done and it failed (Score 1) 104

The video shows a single layer ring welded onto a metal substrate, but nothing of substantional height or volume. Hearing the guy talk in this video tells me he had quite a few software and electronics issues to work out, and he did not show any large parts made my this process. His machine in the present configuration also doesn't provide a method for making overhanging features (a problem already solved by Shape Deposition Manufacturing), so I really wonder when we are going to see the first piece of art coming out of this machine ...

Comment This has been done and it failed (Score 2) 104

There was a project going on, first at Carnegie Mellon University and then at Stanford's Rapid Prototyping Laboratory, where a very similar but more sophisticated process (Shape Deposition Manufacturing) was investigated to make precise metal parts with full strength (unlike the sintering methods mentioned here and elsewhere). A number of methods were used or tried to melt the metal, including TIG welding, laser fusing and induction heating.

The biggest hurdle to success was the huge internal stress that built up in the process. Remember that one puts layer after layer of molten metal on top of the previous one. The new metal layer solidifies and shrinks, creating lots of compressive on the previous layer. Put down enough of these layers and the part will crack.

And no, doing this process with Invar won't help, because Invar doesn't have this beautiful near zero thermal expansion close to its melting point.

Lets hope the blogger reads what has been published about this process before he commits more effort and resources to his project ...

Slashdot Top Deals

Any program which runs right is obsolete.