That's interesting. The rule here has always been that you must clear the intersection before the light goes red. I wonder why you'd ever be in the intersection after it has turned red?
There are a few reasons. One is the lights are normally timed based on the road's speed limit, so if traffic is going a lot slower for some reason, then the time to cross the intersection may be greater than the yellow light interval. Another reason is the people who set the timings may be idiots. For example, there is an intersection near where I live that is many lanes across in both directions, and if you enter the intersection to make a left turn on a green light, not even yellow, the light will often be red before you exit it since you must travel a long way and slow down for the turn.
I'd like to know how Jim Comey reconciles his position on encryption with the requirements set for in the CJIS Security Policy
Because he isn't saying people can't encrypt, he is saying the keys must be available such that the government can get in if needed, even if the owner would like to block the access. The CJIS Policy allows for escrow as well.
What he doesn't seem to get (though I bet he actually does), and where some of the arguments here are missing the mark, is that if someone else holds a key that will grant access, even if the holder is the government, that provides a path for a bad guy to abuse the ability to access. The bad guy(s) can be hackers/attackers from down the street, on the other side of the planet, employees of our government, etc.
And the issue regarding the 4th amendment is somewhat misleading because he is saying a REASONABLE search is what is being prevented, namely one where conditions like a valid warrant exist or an imminent physical threat is present (I am not going to argue the problem here about anything can be claimed as an imminent threat). So the question is does the Constitution allow a person to use technical means to prevent the government access to data even when a valid warrant is presented? Many here obviously believe the answer is yes, mostly for reasons like those I gave above, but understand that this doesn't appear to be a protected right under the 4th since the 4th only says you and your effects are secure until a warrant is issued, not after.
Who do you think create NSA or DMCA - a king? A dictator? An anarchy? Or a democracy?
A republic, where the authorized representatives have been corrupted by the corporate state. There hasn't been a country operating as a real democracy in over a couple thousand years. Everytime you see a country called a democracy it is really a republic.
Not invented there
To be picky, the showing of prior art does not prove the creators of the identified prior art were the original inventors. There are many cases that predate the one you cite. In this case, perhaps the Chinese did invent it and the NSA copied them.
Gee, I crack myself up sometimes.
The content is obviously left leaning. But it's well researched and quite professional. AFAIK, there's no journalistic ethic that says you need to publish articles for conservative interests along with those for liberal interests.
I wouldn't know Pro Publica from a hole in the wall of a newspaper building, but there is a difference between publishing well-researched articles though only those that favor your leanings, and publishing tripe for the sake of publishing. The first are still informative even if they aren't want you would like the reality to be, while the second makes you question anything such an organisation publishes. This all assumes one really is a critical thinker since too many people who claim to be are not.
Those places use javascript on webpages to upload what has been typed so far so they can do predictions and make suggestions. When you are entering the phone's passcode or phrase it is a very different matter since that isn't being entered into a browser, it is being entered into the phone OS's native interface. Still, as long as the software was created by someone else, in theory they can do anything they want with it, including after using it to unlock the storage, store the passphrase somewhere on the device or upload it to a server. But given people jailbreaking iDevices and tearing the Apple and Google code apart, as well as analyzing all the device traffic looking for security flaws, how long do you think such a backdoor would remain undiscovered? And why do you think Apple or Google would risk being caught doing it since it would be THEIR software, not some non-attributable thrid party? Just being caught once would be devastating to their sales, likely into a death spiral.
Having said all that, I do think these third party keyboards Apple is now letting take over typing on iOS 8 do present a large security risk for applications, website, etc., but not for the device's passphrase since the device won't use it for that.
Billions of Android devices have the encryption capability already implemented. It just isn't turned on by default. Thus, it is not vaporware at all.
No, more like smoke and mirrors. Present but off is an illusion of security.
Presumably, the apps on the phone have access to the encrypted data on the phone, right? So there's a simple solution. The user is happily using their iWhatever. The government sends a Nation Security letter to Apple forcing them to put a backdoor into the phone of the target, such that this app can read whatever data it wants on the phone. So when the user boots up his/her phone, and enters the password, the rougue app should be able to read all the data on the phone.
Can anyone tell me why this WOULDN'T work?
Because National Security Letters cannot be used for that. They can only be used by the FBI to demand the handing over of data in the possession of or passing through the control of the receiver, not the performance of actions (and how the data is produced is up to the company receiving the NSL, not the FBI).
Now what is in the Cloud is a different matter since Apple would have access to that, though again it may be encrypted with a key only the iDevice possesses so Apple wouldn't be able to decrypt it for the FBI.
You have a message from the operator.