Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Encryption with back doors (Score 1) 393

Two Issues to consider - If an application was built with a backdoor the hackers of the world would invest their considerable talents and efforts into finding that back door and they will find it once found it will be abused. Once the back door has been uncovered the company who built the application would be required to fix it. Now who is going to pay for the fixing? Not the company because they know the same things that one is reading now. YOU will pay for the new application. YOU will pay to inform ALL the people who are using this now worthless application that it is broken and needs to be updated. YOU will pay to download and ensure that the new version is in use. This will happen over and over until YOU give up your foolish mandate. The state of Mississippi once considered mandating PI as 3. Same issue, politics needs to understand mandating foolish ideas makes one look like the fool they are! --- Since the world has MANY countries in it, any mandate for USofA would not apply to the other countries. Any person wanting or needing a non-FU encryption application would find one from some other source and use it. How are YOU going to mandate what application one uses to encrypt? You can't! Poof! There goes universal back door access!

Comment It's not just toner cartridges!!! (Score 1) 227

Any product that has ANY post sale involvement is up for DRM (Digital Rights Management) abuse! Any home appliance the breaks or needs repair! Any vehicle that needs repair! This is a BIG issue! DRM MUST be toned down to protect the original manufacturer or sale, but NOT limit or deny repair for fix by a 3rd party!

Comment Robot Safety (Score 1) 126

I would make it MANDATORY that every robot made have an OFF switch! Governments, clandestine organizations; CIA, FBI, NSA, etc. all make life and death decisions daily. Their mechanical servants MUST have an OFF switch that works from a distance. Otherwise one may get into a situation like SKYNET, COLOSIS, etc.

Comment Mark for upgrade (Score 1) 148

Put a string of password like alphabet soup in a routine. Then when that routine becomes ensconced in some other application it can still be searched for and noted for replacement of removal. It would only take about 128 bytes to clearly note application, programmer, usage, date, time, etc. It used to be a size issue but with todays Gigabyte memory size, that issue has diminished dramatically.

Slashdot Top Deals

Doubt isn't the opposite of faith; it is an element of faith. - Paul Tillich, German theologian and historian

Working...