Not sure about the Google and Android solutions, but you don't need a network or cell connection to use ApplePay
Nor with Google Wallet.
Also, I dunno about you, but I always have my phone in my pocket, just has handy as my wallet, but with my wallet, I need to remove a card, swipe it, and usually either sign or enter a code.
My phone is actually handier than my wallet, because I use my wallet less and keep it in a less accessible pocket. Actually, most of the time while I'm in a checkout line my phone isn't in my pocket, it's in my hand.
(Disclaimer: I work for Google and bits of my code support Google Wallet. However, I was a fan of NFC payment before joining Google, and whether it's Google, Apple or someone else I'm really glad to see it finally taking off.)
The assessment of toxicological endpoints and BMD for the selected known and suspected human carcinogens was generally based on literature data, as own doseâ"response modeling would have gone beyond the scope of our study. Suitable risk assessment studies including endpoints and doseâ"response modeling results were typically identified in monographs of national and international risk assessments bodies such as WHO IPCS, JECFA, US EPA and EFSA. For substances without available monographs or with missing data on doseâ"response modeling results, the scientific literature in general was searched for such data. Searches were carried out in September 2011 in the following databases: PubMed (US National Library of Medicine, Bethesda, MD), Web of Science (Thomson Reuters, Philadelphia, PA), Scopus (Elsevier B.V., Amsterdam, The Netherlands) and Google Scholar (Google, Mountain View, CA).
The BMD/MOE approach was used for risk assessment.13, 14 In short, the BMD is the dose of a substance that produces a predetermined change in response rate (benchmark response) of an adverse effect compared to background based on doseâ"response modeling.14 The benchmark response is generally set near the lower limit of responses that can be measured (typically in the range of 1â"10%). The result of BMD-response modeling can then be used in combination with exposure data to calculate a MOE for quantitative risk assessment. The MOE is defined as the ratio between the lower one-sided confidence limit of the BMD (BMDL) and estimated human intake of the same compound. It can be used to compare the health risk of different compounds and in turn prioritize risk management actions. By definition, the lower the MOE, the larger the risk for humans; generally, a value under 10,000 used to define public health risks.15
So really, this is about the overall health risks of a substance. Certainly important but that is far from being an endorsement of any of the substances for routine use.
It doesn't seem like there's any way to know whether I'm googling afflictions of mine or had by family members or friends. (Many of which obviously apply to the other sex.) How is that supposed to work?
Yeah, same here. When I hear a term or a disease or a disorder I hadn't heard of, I usually google it, as computer or phone are usually nearby. That must have created a really eclectic list of ailments and behaviors.
A few days ago I got a letter that my doctor had retired effective immediately. Maybe she saw the list...
Well, neither am I, with a 6 pound piece of metal with propellers spinning at 3000+ RPM right above my head, controlled by someone who doesn't have the single clue of how to crab for a cross-wind landing.
So crabbing is irrelevant. RPM and weight are irrelevant.
The only point you made was that you don't know how to make a point.
The first article says they are just storing a secret key on the SIM and on the network provider's systems. That is just dumb and was totally insecure even before this happened. They should be using privat/public key pairs in which the private key is generated on and never leaves the SIM.
Symmetric cryptography is not "totally insecure", and there's no reason to accept the complexity, large key size and performance hit of asymmetric cryptography when there's a perfectly reasonable key distribution mechanism in place. Further, your proposal wouldn't even help... who cares if the private key was never off the chip? Given a public key how do you know that the corresponding private key was ever on any chip? Answer: You need to obtain the public key in a secure fashion in a controlled environment, such as during manufacturing. If you drill down on the requirements for the context and process needed to identify that public key as trustworthy you find that you have exactly the same requirements for a secure symmetric key injection, which is much simpler and easier to manage.
And as for attack by NSA/GCHQ, if those are your opponents, and they're actually focused on you, you can't win. At most you can make them work for it a bit, but not very much. So it really doesn't make much sense to include national intelligence agencies in your threat model.
This is only news to those who have had their head in the ground, listening to fox news and government shills.
Humans are not animals, unless you have chosen to fall for the lie of evolution.
We aren't animals, but animal testing works. How?
If you have fallen for that then by extension you believe that we have no morals to abide by (animals kill out of instinct so that means we can too).
No, I don't. Your logic doesn't work. Because you understand electricity, you must be a thundercloud. That's 100x more logical than your statement, but provably wrong.
So the question is, would you mind that?
What I would like to be reality doesn't change reality. So whether I'd mind is irrelevant.
Being mere animals also means we are no longer responsible for our actions because everything is an instinct rather than being based on a moral code of conduct. I advise you to rethink your statement. It has far reaching consequences.
It has no such consequences. Having instincts doesn't mean one has only instincts.
"The medium is the massage." -- Crazy Nigel