Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re: They already do. (Score 1) 266

What is really scary is that with this database, TPTB have the ability to find dirt on anyone. Criticize the NSA director? Don't be surprised if embarrassing information is leaked to the press, or if you end up getting investigated for a minor crime inadvertently committed some time ago.

Comment Re:Flying experience (Score 2) 239

What I get out of this story is that, if you're lucky enough to survive the trip in the wheel well, it's much more convenient to travel this way than doing it the regular way: no queuing, no overcharging from the airlines, no restrictions on the amounts of liquids you can carry, no getting your gonads showered with x-rays, no groping from TSA perverts... and of course, no arbitrary, secret no-fly list that prevents you from boarding the plane in the first place.

The airport security theater almost makes me want to risk my life as a stowaway.

I'm not sure about that. For the (surviving) wheel-well travelers, all of that unpleasantness simply comes after the flight. They may not use the backscatter X-ray machine, but I'm sure there will be a far more thorough examination than the TSA would give you, which you will receive on a regular basis. There are also far more limits on what items you can bring with you, not just liquids.

...and after all that, you will likely have a good idea if you are on the no-fly list. (The answer will be yes)

Comment Re:solution (Score 1) 303

Of course, the reaction to this will be that advertisers demand their clients (websites) to show the ads in an "inline" fashion, one which the ad-blocker cannot block.

Inline ads cannot be tracked across sites. This would be a win for the consumer, and a loss for the trackers.

Comment Custody of the Data (Score 4, Insightful) 28

If the data is needed as evidence in the case, then the court should take custody of it and require all other copies to be destroyed. That way the information is available for the trial, but cannot be (ab)used for any other purpose by the NSA.

Another option would be for the parties to stipulate on what data has been stored, and then proceed in the trial on that assumption.

Comment Re:They're already paying (Score 1) 365

In a free market they would be allowed to discriminate traffic. Just like you'd be able to vote with your wallet and choose between the two providers available, who happen to have the exact same discrimination list.

That sounds like a fair trade. Once there is a free competitive market of at least 5 independent ISPs in a market, then we can talk about eliminating new neutrality.

Comment Re:LOL wut? (Score 1) 188

Why is not like going to the shop and paying with cash?

So instead of blocking TOR they should offer things like Bitcoin?

Exactly, the problem (from the seller's POW) with credit cards is that the transaction can be reversed if the buyer complains. If you have a physical delivery address, and you send the cops there to investigate. If your goods are delivered electronically, then there is no recourse. A scammer could give the billing/shipping address associated with the card, receive the stolen goods, and everything would look kosher until the card owner receives their monthly bill and complains. At this point, the store would get a chargeback, and be screwed over.

With Bitcoin (or other cash-like on-line services) there is no possibility to reverse the transaction, no fraud protection, so once the store completes the transation, they have their money, and it cannot be taken away.

Comment Re:Can you trust the compiler? (Score 4, Interesting) 250

The compiler (and support stack) is a MS compiler, and MS is already owned by "the man", so as Kernighan demonstrated you still can't trust it.

The disassembler he used is not. So it is (at least theoretically) possible to see if there is a back door. The compiler has a very low-level view of what it is doing. In order to add a back door, it would need to recognize when it is compiling TC. This could be a much more difficult technical problem than what Kernighan did to login, and, if discovered, would be devastating to MS from a PR standpoint.

Slashdot Top Deals

Any program which runs right is obsolete.