Microsoft Exploit Predictions Right 40% of Time 182
CWmike writes "Microsoft today called its first month of predicting whether hackers will create exploit code for its bugs a success — even though the company got its forecast right just 40% of the time for October. 'I think we did really well,' said Mike Reavey, group manager at the Microsoft Security Research Center (MSRC), when asked for a postmortem evaluation of the first cycle of the team's Exploitability Index. 'Four of the [nine] issues that we said where consistent exploit code was likely did have exploit code appear over the first two weeks. And another key was that in no case did we rate something too low.' Microsoft's Exploitability Index was introduced last month."
Congratulations? (Score:3, Insightful)
That's great, guys, but don't you think being proud that you were right about your code being exploited is... backwards? That's like being proud you correctly predicted you would get stabbed while walking through a ghetto wearing gang colors.
Then again, this is Microsoft. They probably throw an office party every time something compiles without errors.
=Smidge=
Re: (Score:3, Interesting)
Indeed. I swear, I called it: it's easier to predict the holes when you release them yourself [today.com].
After what was expected to be an unusually quiet Patch Tuesday, Microsoft has released eight patches for applications with an insufficient number of security holes. "Our market is the enterprise," said Microsoft security marketer Jonathan Ness. "Information technology professionals know that Windows is the greatest IT job creation scheme in history. Without Patch Tuesday, there's no reason for the experienced IT
Re: (Score:2, Interesting)
That's great, guys, but don't you think being proud that you were right about your code being exploited is... backwards?
Well, they're not proud of making exploitable code (if they were, there would have been a giant endless party at Microsoft for the last 20 years), they're proud of predicting when/how fast their code will be exploited.
That's like being proud you correctly predicted you would get stabbed while walking through a ghetto wearing gang colors.
No, it's like correctly predicting that you'll get st
Re: (Score:2, Insightful)
No, it's like correctly predicting that you'll get stabbed 17 minutes after entering the ghetto, by 6 gang members dressed in red.
Not at all. It's much more like guessing that you will be stabbed 6.8 minutes after entering a ghetto by 8-9 gang members dressed in red, then actually being stabbed after 17 minutes by 6 gang members wearing pink.
Re:Congratulations? (Score:5, Funny)
It's like running your own car into a pole, providing the mechanic with your estimate of the damages and claiming you were right when he only overcharges you by 60%.
Re: (Score:3, Insightful)
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Congratulations? (Score:5, Insightful)
Slashdot crowd *loves* MSFT bashing doesnt it.
Ok lets see... Some company (say Canonical or MSFT) builds a huge software and releases it. And a third party finds a bug and reports it to them. Now would be good to predict the severity of the bug, so that the more exploitable ones can be fixed first? Thats exactly what they are doing, and they are able to get the severity 40% of the time right, with no false negatives (that not a single severe one has been classified as a low priority one).
So, now, do you think this is bad or wrong or something?
Re:Congratulations? (Score:5, Insightful)
So, now, do you think that that is not a reason for criticism on their internal software testing?
Re: (Score:3, Insightful)
No, the criticism of either their coding practices or QA has nothing to do with a new and fairly efficient way to prioritize bug fixes. They already have the software with all the holes built in. Now they should deal with what they have in the best way possible, don't you agree?
Re: (Score:2)
Who cares about prioritization? If they have a monthly batch of fresh flaws and their don't fix at least as many within a month they are fighting a lost battle anyway.
Re: (Score:2)
Except for the 5 completely unpatched exploits for a month.
Of course if the 15 they fix are very severe, and the 5 left unfixed are only locally exploitable or affect and/or only a small amount of machines then it's only slightly humiliating, which I guess is what they're trying to do now.
It's not the best solution, and clearly it's only 40% effective but it IS an improvement.
Re: (Score:2)
Re: (Score:2)
How about the requisite Slashdot car analogy instead?
A car manufacturer states that they predict some quantity of their cars will be stolen due to design flaws (locks and latches, windows, security systems etc).
Then they proudly announce that their theft predictions are right a little less than half of the time. "Hey everyone! Not as many of our cars were stolen as we thought would be! Isn't that great news?"
Does this really inspire confidence in the manufacturer for you?
=Smidge=
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Insightful)
Um, no, I know we're all desperate for this to be some terrible mistake on MSFT's part, it just isn't.
This is more like the car company saying: We have found 10 ways that we think our cars can be sabotaged, and we have released free snap-on repair kits that are intended to counter those possibilities, and will distribute them to all customers who request them. As it turns out, only 4 of them have actually been used by saboteurs, but we nonetheless recommend installing all 10 kits just to be safe.
Yes, how ir
Re: (Score:2)
Yes, this IS bad or wrong or something.
Wouldn't it make MORE sense to perhaps spend the human/technical resources FIXING the most exploitable bugs rather than standing around with a beer in hand saying 'yep, that's going to explode for sure'.
*BOOM*
'See? I told you so.'
Re: (Score:2, Informative)
Wouldn't it make MORE sense to perhaps spend the human/technical resources FIXING the most exploitable bugs rather than standing around with a beer in hand saying 'yep, that's going to explode for sure'.
Yes it indeed would, and thats exactly what they have done and the story is about the review of the practice that happened at the end of the month (read during a review of what became an exploit and what got fixed at the right time)
Re:Congratulations? (Score:4, Insightful)
Sure, if you have unlimited resources and can devote an infinite number of people to fixing everything, that would be great. However, if you have finite resources available and have to devote them to fixing up certain areas, how do you know where to devote your attention? If you can come up with a methodology for predicting such a thing, put it to the test, and get decent accuracy in your predictions, then wouldn't that be useful for confirming for you how you should devote your limited resources?
There is nothing unique in what they are doing. I mean, look at the auto industry, for example. They don't just randomly assign engineers to try and make random things safer. They do studies, try to figure out what are the most dangerous aspects of a vehicle, and then assign engineers to work on those specific things.
Fortunately for the auto industry, it's a little easier to do your predictions pre-release, since the "attack vectors" are more limited and well known (there are typically only so many ways you can get into an accident, so it's easier to model a majority of those cases). This allows them to be proactive in fixing flaws. Unfortunately, the attacks vectors in software are a bit more numerous, and you often have to take a more reactive approach. What Microsoft is doing here is trying to model things to see how reasonable it would be to devote resources in certain ways to be proactive.
So again, in what way is this bad?
Re: (Score:2)
Re:Congratulations? (Score:4, Funny)
Based on their success rate, they should flip a coin instead, then they'll be at 50%. That's what everyone's laughing at.
Re: (Score:2, Informative)
Re:Congratulations? (Score:4, Informative)
I don't understand how the article got the math completely wrong or how people aren't seeing the extremely obvious flaw in the math.
Re: (Score:2)
Re: (Score:3, Informative)
Actually, they'd have to flip a coin for every bug – and their current statistic, "40% of the bugs we identified as exploitable were exploited", would probably look great compared to the percentage they'd get by flipping a coin.
Basically, you're looking at this wrong. Microsoft correctly predicted 40% of the exploitable bugs, but they also correctly predicted the non-exploitable ones which wouldn't be exploited.
Suppose (and I don't have actual numbers, so I'll make up hypothetical ones) Microsoft find
Re: (Score:2)
Those laughing (including me) just find it funny to put that much effort into figuring out which bugs can be ignored rather than just fixing the bugs.
Re: (Score:2)
I find those funny as well given the sample population and number of trials is too small to draw any real conclusions yet. My 'deep analysis' was just as high in quality as any other for now.
It's amazing really. I make more or less a throw away comment and it gets treated like it was meant to be a doctoral thesis.
You mean unlike ... (Score:2)
And a third party finds a bug and reports it to them. Now would be good to predict the severity of the bug, so that the more exploitable ones can be fixed first?
You mean, unlike the press which tends to overblow every report of a vulnerability on Linux and/or FireFox, although in reality the "vulnerability" only work in a few very rare cases where a complex mix of condition. Plus a very gullible and cooperative user who will go through a long process in order to reach the point ...
Thats exactly what they are doing, and they are able to get the severity 40% of the time right, with no false negatives (that not a single severe one has been classified as a low priority one).
So, now, do you think this is bad or wrong or something?
It wouldn't be bad, if it weren't for microsoft's software quality being so bad, that simply calling every bug as critical would be a 100% sensitive 99% specific test.
Today's news almost
Re: (Score:2)
Re: (Score:2)
So, now, do you think this is bad?
I think it's pretty bad that without thinking, just by flipping coins, you can do better than them: http://tech.slashdot.org/comments.pl?sid=1029297&cid=25763435 [slashdot.org]
Re: (Score:2)
Obviously you cannot separate your passionate love for Steve Ballmers trouser snake from the need for good engineering. Should 40% be acceptable for detecting parachute defects? How about life raft defects? Is this a severe comparison? Well when healthcare systems and life support systems and financial systems and even a INTERNATIONAL SPACE STATION run on their software, you'd think 99.9% would be the only goal they would be happy with and anything short of that wou
Re: (Score:2)
As far as I know they tried to figure out how long it would be until an exploit was released for it and/or it was reported on a security site, then they could check those results by searching on exploit/security sites.
Of course if theres a group of 5 or 6 people who made an exploit for that bug and DIDN'T publish it, they couldn't tell and therefore their numbers would be slightly off, but if it was exploited on a large scale it would have been discovered anyway.
Re: (Score:2)
In fairness to MSFT, it could have some useful applications in prioritizing. History has shown us that a software company obviously can't fix every bug, so, a more efficient way of knowing in how many person hours to sling in which direction may prove useful.
Re: (Score:2)
That's great, guys, but don't you think being proud that you were right about your code being exploited is... backwards?
I think it's even worse that they're proud that they're right about their code being exploited when they did worse than chance. They were more wrong than right, and they claim they did well.
FTFA (edited but staying true to the point):
Of the nine October vulnerabilities marked "Consistent exploit code likely," four did end up with exploit code available. None of the nine tagged "Inconsistent exploit code likely" had seen actual attack code. Microsoft correctly called the four bugs last month tagged with "Functioning exploit code unlikely."
So they got eight right, out of twenty-two: 8/22. If we give them one third credit for the maybe-exploits not having full-blown exploits, they're still only at 11 out of 22.
Here's my security advice: if you want to know whether a bug will be exploited, flip a coin.
I'm better
That's not too bad (Score:5, Insightful)
Huh? It's completely backwards! (Score:2)
Call us when they rated something TOO HIGH, or OVERESTIMATED the number of exploits, not the other way around.
(boggle)
Re: (Score:3, Informative)
No. What happened was this - MS spotted 18 potential security holes. 9 of them were regarded as more serious. A company that focussed on protecting against those 9 would not have been affected at all and would have had less disruption than a company that protected against all 18.
They are offering
Re:It is TERRIBLE (Score:4, Informative)
What REALLY happened is this: Every security hole that MS discovered on its own, was exploited BUT we are supposed to be happy because in 40% of the cases MS correctly predicted that it would be exploited.
I know we don't RTFA but please at least RTFS.
'Four of the [nine] issues that we said where consistent exploit code was likely did have exploit code appear over the first two weeks. And another key was that in no case did we rate something too low.'
So no, at least according to the summary not every security hole was exploited. If you're going to claim otherwise at least provide some links to an article; hopefully one supporting your claims although that's not always necessary for the +5 informative.
In fact I just actually bothered to RTFA, just to make sure, and it said that no exploit code appeared for the low ranked vulnerabilities.
In other words... (Score:2)
Yup. Trust me, we got it. But given Microsoft's track of security and to get back to the metaphor of grand parent's post :
Yes
Still not getting it. (Score:2)
Well, that's like saying, after you block all your email from getting through, "We rated all the spam accordingly, and let none of them through".
How about, we just guess, a rough fucking guess, that any "remote code execution" or "run with elevated privileges" exploit or hell ANY GOD DAMN FUCKING BUG YOU FIND, needs fixing, right Microsoft?
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
or hell ANY GOD DAMN FUCKING BUG YOU FIND, needs fixing, right Microsoft?
Any goddamn bug doesn't need fixing asap the same way. Software always has bugs, even really good software, so it's a matter of prioritizing which bugs are show-stoppers, which are less problematic and which are minor.
The problem with Microsoft is their habit of releasing bananaware: they ship green software that matures at the customers, at the expense of the customer of course who essentially pays to become a beta-tester for Microsof
Re: (Score:3, Interesting)
You mean, like Apple's Leopard release? Or Apple's iPhone 3G release? Or Apple's mobileme release?
I fail to see how Microsoft has a reputation of releasing 'bananaware' whereas Apple doesn't. I don't recall hearing about major, crippling bugs when Office 2007 came out (one of their biggest apps), and rega
Re: (Score:2)
No, the problem was that MS changed the underlying layers between the betas, RC's and the RTM. Since that was happening, the manufacturers held off until they had a stable platform to shoot at.
Re: (Score:2)
Really? Care to cite proof of them changing the underlying layers between the RC and RTM? Or explain how some manufacturers were able to get drivers working for Vista properly before RTM?
Re: (Score:2)
Forget it, this is one of those Slashdot bullshit claims you see around here all the time which never has any kind of supporting evidence. One of the other ones is how DRM in Vista "slows down your computer."
It's trouble enough to get vendors to support their products *at purchase*, and yet people have problems believing that they don't support products for new OSes that come out after the purchase? I have no idea where people get that idea.
I bought a USB wifi card that didn't support Vista out-of-the-box..
Re: (Score:2)
The problem with Microsoft is their habit of releasing bananaware: they ship green software that matures at the customers, at the expense of the customer of course who essentially pays to become a beta-tester for Microsoft.
I find it funny that that's a "problem" with Microsoft, and a stated goal of open source software. (Release early, release often.) Frankly, I'd be ecstatic if some open source projects followed Microsoft's example and removed the show-stopping bugs before release.
This is why Microsoft software sucks (Score:2, Insightful)
Any engineer who says that "40% is pretty good predicting" is incapable of writing good software, or managing a project, or, even, applying the scientific method.
Hint: 40% is worse than guessing.
Re: (Score:2)
Dear MS. I have a foolproof way of enhancing and improving upon your algorithms to determine the exploitability index.
if it comes up heads, its exploitable. Tails its gonna be ok.
I estimate you will increase your predictive capabilities by a whole 10% using this method.
Re:This is why Microsoft software sucks (Score:5, Insightful)
>if it comes up heads, its exploitable. Tails its gonna be ok.
In this case, wouldn't there be as many false negatives as false positives?
Re:This is why Microsoft software sucks (Score:5, Insightful)
No, it means that they were able to cut the field of their immediate focus nearly in half while not missing any issues. For such a complex system without any precise mathematical model, that's pretty good.
In this case, flipping a coin is statistically likely to let an unaddressed issue through, and that's a big no-no for applications like this.
Re:This is why Microsoft software sucks (Score:5, Informative)
Hint: 40% is worse than guessing.
No - from TFA:
The index, launched last month, rates each vulnerability using a three-step system.
Random guesses would be expected to yield 33% success.
Re:This is why Microsoft software sucks (Score:4, Insightful)
If the steps are sequential, it's less than 33%. The correct figure is 12.5% (50 percent of 50 percent of 50 percent).
Re: (Score:2)
If the steps are sequential...
They're not - they are three discrete levels of severity.
The term 'three-step' used in the article is a little misleading.
Re: (Score:3, Informative)
40% is worse than guessing only if you have only two choices (e.g. heads or tails). If you have more choices it is a bit better than guessing.
MS was predicting not just whether exploits would appear but the kinds of exploits that will appear. Depending on how specific (e.g. there will be a buffer overrun in module XYZ) or general (e.g. there will be an exploit in Windows *somewhere*) they were about the kinds of exploits, 40% could be either pretty good (i.e. they were insightful) or pretty bad (i.e. t
It depends on which exploits they call correctly (Score:2)
For instance, if they patched the priv. escalation to SYSTEM that has a broad surface area (think, say, remote IIS exploit) over 9 exploits that require physical access and can only get guest access. If someone else has physical access to your box, it's n
Re:This is why Microsoft software sucks (Score:5, Interesting)
40% accuracy in predicting with no false negatives? There are plenty of distaster agencies around the world who would be incredibly pleased with that kind of accuracy
the new bar (Score:2, Interesting)
Microsoft Security Research Centre is a success as a disaster agency? A bit harsh, but I suppose so...
Re: (Score:2)
Actually 40% is quite good considering, as others have mentioned, that 33% would be the random chance.
it is also worth noting that they have 40% prediction of KNOWN threats.
I would bet there are about as many undiscovered exploits re: these updates, which could drive up or down the percentage.
If I can predict the stock market by +7% over random guessing, that is pretty damn good predicting.
Re: (Score:2)
Hint: 40% is worse than guessing.
I'm assuming you meant "worse than flipping a coin". But this was not a heads/tails judgment; it was "for this given defect, is it Highly Likely, Somewhat Likely, or Not Very Likely that it will be exploited"?
Here's why only 40% of the time (Score:2)
"This month, we're going to predict whether evil hackers will exploit bugs in our code. What do you predict?"
Steve Ballmer: "No."
James Allchin: "Yes."
Mike Reavey: "Yes."
Jim Gries: "No, I fixed all the bugs."
Sarah Ford: "I dunno. I'd say no; I'm confident in Microsoft."
Val Mazur: "No."
Rui Chen: "Well, the possibility is there, but they'll never prove that they did, so it's the same as no."
Kathleen Dollard: "Of course I will! er --I mean, THEY will. Yes."
Michel Fournier: "How am I supposed to know? How m
Re: (Score:2)
My understanding is that they (implicitely) assessed thousands of potential exploits. Of these, thousands minus 20 were classified as safe and 20 as dangerous. All guesses from the "safe" category were correct and 8 out of 20 from the "dangerous" category were correct. If all those thousands minus 20 assessments would be taken into account, their statistic would be much better. Even more: it would be fishy if all of the 20 potential exploits would have occurred.
Re: (Score:2)
It's ZERO false positives, and many false negatives. FFS, elevating 2.25 issues to "immediate priority, someone will exploit this soon" status for every one real issue seems damn good to me.
Shows the confidence they have in themselves (Score:2)
Interestingly what they are saying here is that they think that
a) Hackers are smarter than they actually are
b) Microsoft code is easier to exploit than it actually is
So the perception is that Microsoft is better than their prediction, but the implication of that is that Microsoft think they are rubbish.
Maybe all these years of "Microsoft sucks" posts on Slashdot have actually come from the MS security team.
Re: (Score:2)
No. What they say is:
You should fix this bug first, since we believe it is the most likely to be exploited.
You can save these for later, since we don't believe it will be immediately exploited.
There is, however, something to be said for hackers referring to this list to find "unlikely" bugs to exploit.
Re: (Score:2)
So Microsoft thought their code was exploitable and said so, and it was, and instead of doing something about it they just congratulated themselves on predicting it!
Now here's an odd idea rather than predicting if something is exploitable and then publishing it, why not just not write code that is easily exploitable....!
and note the 40% is only the exploits they know about ....so even that is suspect....
Exploitability Threat Level Announcement. (Score:4, Funny)
Microsoft Exploitability Threat Level Indicator is a series of color codes starting from Dazzling Arctic White to Heart of Dick Cheney. Though exact number of these colors is considered a secret, from the past announcements we deduce there are at least 22 million of them.
For PRNewswire, copy edited by Anurag Chakraborty in Bangalore and supervised by Robert Zimmermann in Pittsburgh.
but but but... (Score:2)
there is so many to chose from...
Being right 40% of the time... (Score:2)
...is the same as being wrong 60% of the time.
Doesn't look so impressive when you look at it this way.
Re: (Score:2)
Re: (Score:2)
Without knowing the baseline they're working on, this could range from extremely impressive to completely useless.
Ok. So 4 out of the 9 bugs they expected to see exploits codes for actually had exploits meterialise. How many bugs had exploits coded that were not in thier 9 candidates? What is the total number of bugs taken into consideration?
If you were playing "battleship" on a 3x3 board with 4 "ships", taking 9 guesses to hit all 4 would be pretty dismal. Change that into a 30x30 board and suddenly 9 gues
Re: (Score:3, Insightful)
Doesn't look so impressive when you look at it this way.
Depends on the payoff.
It's not good if you're betting even money on coin tosses. But if you're a venture capitalist, it's great. The general rule for tech VCs is that 7 bets out of 10 will fail, 2 will do ok, and 1 will be a big success. If that 1 success is buying 10% of Google in the very early days, your 70% failure rate is still pretty awesome, because you're still up billions of dollars.
This is what it's come to? (Score:2)
I realize that Windows is a complex hunk of crap...errr...operating system, but wouldn't they be better served trying to find and correct these issues rather then just releasing them into the wild and keeping their fingers crossed?
Their attitude is sort of like pointing the gun at your foot and firing five times, and bragging that you only hit two of your toes.
This is why, every day when I arri
Re: (Score:2)
I use Windows at work. I'm not a sysadmin or network admin (not anymore; I was for 10+ years). I don't work in security (I did, as part of the above). I'm a developer on a very large, distributed and secure network. I don't concern myself with bugs, security, malware, Trojans, etc. etc. because I don't need to. My work is secure and replicated, and if
Worse than random (Score:2)
With such low standards of good performance, it is no wonder that the software coming out of Redmond lately has been so horribly poor.
More fail from MS (Score:2, Insightful)
How can a PR team for one of the largest corporations in the US seriously release a statement like this? What kind of company fails so badly that they can only predict 40% of exploits in their own [proprietary] software?
If a major car (or car part) manufacturer "accurately" predicted that 40% of their automobiles would explode and burn their owners alive due to a fuel system defect....would people still
Re: (Score:2)
They had zero false positives. So, put it this way, looking at the source, they came up with some number of exploits that had to be fixed. Other people came up with only 40% of that number.
It's a good thing, both that MS fixed them all, and that outside people seeking exploits are only 40% efficent.
40% with only two possible outcomes (Score:2, Interesting)
They tried to predict if a hole will be exploited or not. Those are two outcomes. If you were to guess you would end up with a 50% chance of guessing right.
And they were only 40% right and 60% wrong?
What about old bugs with old exploits? (Score:2)
That's odd... (Score:2)
Does anybody else think it's really funny that Microsoft's predicting abilities are better than their patching abilities?
Thanks, Microsoft! (Score:3, Interesting)
No one seems to be looking at this from the opposite angle.
If I'm writing malware that's going to need to exploit Windows, this gives me an easy chart of which exploit I should pick -- the ones with the lowest patch priority, of course.
deep into the 4's? (Score:2)
Warning. If you love Microsoft, don't read. Your delicate sensibilities might be hurt 40% of the time.
Engineering sector 99.999 Microsoft 40.000 Sounds about right.
Re: (Score:3, Funny)
With the exception of points 7. and 9. it all seems quite reasonable.
Maybe one day you'll learn to drive on the right side.
And vinegar is acceptable on salad only, not potatoes.
By the way, I live in Continental Europe and my ancestors, at the time you were wearing animal furs and piling rocks in bizarre patterns, were building aqueducts.
So, in the end, Her Majesty, please
1. learn to drive
2. learn to cook
3. understand that fox hunting isn't a sport
4. stop using that absurd currency that is the pound sterling
Re: (Score:2)
I think it's about time to go fully metric, though. It's a much simpler system. Practically all of the rest of the world uses metric. The sciences and military use metric. Alas, "yeild" doesn't seem to be in the American psyche anymore.
Re: (Score:3, Funny)
Alas, "yeild" doesn't seem to be in the American psyche anymore.
It's also not in any dictionary that I'm aware of either. Yield is though. Sorry, couldn't resist :)
Re: (Score:2)
[Sigh]
Re: (Score:2)
Well, roundabouts (aka traffic circles) would make a lot more sense than four way stops [...]
I ran into a few 4-way stop signs on a recent holiday to the US. Exactly how *is* the stalemate of 4 cars arriving at the same time supposed to be resolved ?
Re: (Score:2)
To be honest, I don't know, and I don't think I've ever experienced it. I've been at 4 way stops with cars in all directions, but there was always a clear order of who went next, it's basically clockwise or in order of
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Actually it originated with One Alan Baxter of Rochester and expanded by other people on Usenet. So if you do give credit where it's due give it where it's actually due.
Re: (Score:3, Informative)
Ahh, here we go.
http://www.snopes.com/politics/satire/revocation.asp [snopes.com]
More exciting than reading about how badly microsoft can classify security bugs eh? :)
ps. NO FIREFOX, I WILL NOT CAPITALISE THE "M" IN mICROSOFT!
Re: (Score:2)
Re: (Score:2)
Yeah by allowing homeless people to register to vote they basically rigged the election.
I mean who the fuck wants homeless people to be allowed vote, society has made it clear that they aren't wanted
Re: (Score:2)
No... this was a Triumph! [wikimedia.org]
* sorry, as much as I love portal... it's getting old!
Re: (Score:2)
Research also shows Slashdot readers read the articles less than 100% of the time:
FTA:
and in the previous paragraph:
Wow, and I didn't even have to read the article to respond to you. Simply clicking on the link and s