Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Not just entering US, but also leaving (Score 1) 505

The US entrance controls are obvious -- immigration and customs officers you must satisfy. Unlike some countries (AU), there are no obvious exit controls. But the US has always exerted jurisdiction over _exports_ so CBP officers can and do stop people leaving the US to inspect for prohibited exports. Just about any comp/phone might be seized because it contains crypto (5A002, 5A992 unless you have the resources to press the Mass Market exemption).

Even if CBP are being less @$$hole-ish (seriously, a job requirement), they can certainly claim electronics could be carrying data (mostly instructions) that are prohibited export.

Comment Training for the more experienced (Score 1) 197

In any technical field, conferences are the "Training" component for the more experienced, just as classes/CBT are for the less experienced. "When you stop learning, you start dying".

A bigger problem is "bean-counteritis", an endemic loss of vision and courage in management position-holders. Entrepreneurialism and indeed all capitalism is based on taking selected risks. If you only bet on documented sure things, poor returns are guaranteed.

Comment Re:Exactly (Score 1) 163

Yep. Do you have any idea how big a 100+A relay is? (~1 cm contacts) The cooling? And you'd need a duplex for std N.American service (230V hot-hotinv). Look at a 50A AC relay. Smaller & fewer for UK/EU. But meters are buss-bar straddle devices. You have to physically pull the meter out of it's socket to cut power.

Now a malefactor certainly could interfere with the power usage signals, and potentially confuse higher (optimizing) layers of the grid load-balancing system. Even that should not result in a brownout, let alone a blackout.

Comment KNOW YOUR RIGHTS ! (Score 1) 313

This story is prehistoric, overbooking has been an algorithmically optimised practice by the airlines for at least 40 years. No recent news, but in 2011 the US increased the legally-mandated compensation for "involuntary denied boarding compensation" in 14 CFR 250.5 .

The loophole is the airlines try to get their victims to agree to substantially less, mostly by never giving the written notice they're required to, or by obfuscating it. Go google/duckduckgo it.

Comment Stingray = US felony (Score 2) 25

This device is the very essence of cracking, unauthorized access to a computer system, namely the targetted cellphone and others in the vacinity. A violation of 13 USC 1030. It is testimony to the corruption of our legal system that the perpetrators, so-called Law Enforcement Officers, are so brazen as to use these devices openly without fear of prosecution.

Comment Unauthorised Access is already a US felony (Score 1) 212

Doh! Accessing a computer without the owners permission is a felony under 18 USC 1030 . Even if the vendors did not access/test their botnet, they are accessories-before-the-fact. DDoS on open, public ports may or may not be covered as contrary to 18 USC 1030 , however accessing all the little 'bots most certainly is.

Comment C O P Y R I G H T ??? (Score 1) 157

What if it were legislated/court ruled that an individual has a copyright interest in any and all data that is personally identifiable? Certainly a company recorded it, but _MY_ click created it. They of course can use it as necessarily intended (implied consent), but cannot copy and send it anywhere else without explicit (annual?) consent. Database holders might have the right to strip personal identifiers and average data from users (min 12?) then use the aggregates as they wish.

Comment No downside for false/careless complaints (Score 4, Insightful) 88

There are many problems with copyright enforcement, two of which is the disproportionate size of litigants and low cost of making a false complaint. There ought to be some liquidated damages like US$1000/day-blocked per 3Mbps in the event of an unsupported/unproven finding. Modest for the complainer, but sufficient to encourage vigorous defense and hence very careful prosecution.

Comment Re:What danger ? HAMMERTIME (Score 2) 368

Yes, hammers look like stupid overkill. But people die in flash floods, often of underpasses. How? If the car stalls out because the water is deeper than expected, you or weaker family members will not be able to open the doors due to water pressure. If you don't get the windows open (due to hard rain?) before the power to them dies, you will have to break windows or drown. Nasty progressive trap.

Comment Undetectable = does nothing (Score 1) 59

At some point, anyone bent on malicious programming _wants_ to be detected -- when the payload does whatever malice intended. Before then, it wants to hide. Loadable kernel modules are a good way to hide, but not perfect. It might be detected by network activity (gotta love those lights) or power consumption (machine not sleeping). Both AFAIK still major detection mechanisms for all intrustions.

But LKM are a known security risk, and can be turned off in Linux. Easy with known hardware. At one time OpenBSD did not allow LKM.

Comment Details, always details (Score 0) 609

Well, this should depend on whether Parlement authorised the Brexit referendum. If they did, then they ought to abide by the result. That is the implication of making such a choice public.

If the Parlement at Westminster did not pass a bill for Brexit and HM govt held Brexit on its' own, then Parlement _has_ been bypassed, and has a legitimate concern.

Comment Trial Balloon (Score 2) 406

Can you not recognize a trial balloon? More common in the UK, where someone less senior (_NOT_ the big cheese) throws out details for an established theme to see reaction. Easily deniable if excessively opposed, easily co-opted if insufficiently opposed. Look for a payoff as an Ambassadorship or Cabinet post.

As for legality, please show me the Feds care. They certainly did not when Senator Joe McCarthy abused subpoena power. Both before and since, the Feds have lawyers who will argue that zero is one.

Comment "Sovereign Immunity" unamerican (Score 2) 188

While entrenched in British Common Law, the very notion of "soverreign immunity" is completely contradictory with the founding principles of the United States. The idea was whatever powers (sovereigns) were subject to limitations.

To now claim "sovereign immunity" is merely a complete about-face, and very likely corrupt.

Slashdot Top Deals

We are not a loved organization, but we are a respected one. -- John Fisher