Comment Re:From who? (Score 1) 361
Well, the BBC is British and presumably paying in pounds. 2000 pounds to a ton...
Well, the BBC is British and presumably paying in pounds. 2000 pounds to a ton...
The idea wasn't to not overfly the Soviets, it was to only overfly them once.
Any second orbit would have been extremely predictable and run the risk of being intercepted.
If we're going that far, we might as well assume that he won't speak English (and it will in fact be a dead, lost language) when the archives need reading. ASCII is really just a substitution cipher on the alphabet plus some punctuation. It can be trivially cryptanalyzed. (Even if we, the entire planet, magically forget the order the alphabet goes in.)
Unfortunately, planning ahead is a dying art. I used to have to plan hanging out with friends a week in advance to make sure everyone would be there. Now you have to call people at the time when you want them to be there in order to get anything out of them.
Federal government is federal. LEOs are, in most cases, paid for by local and state governments. There are a few exceptions (DHS, FBI), but one could make the argument they
1) don't contribute much to day-to-day safety anyway
2) shouldn't really constitutionally exist to begin with (DEA, I'm looking at you)
Rijndael and RSA are both deterministic. However, your implementation may be adding a random salt/initialization vector to the plaintext pre-encryption. I'm not sure why it would be doing this without being asked, especially in ECB mode, but I'm not familiar with BouncyCastle.
RSA encryption and decryption are both just modulo exponentiation by the public and private parts of the key. No random there.
The AES algorithm is slightly more complicated, and I don't have time to fully analyze it, but it is also deterministic. The issue is somewhere in BouncyCastle and how you're calling it. (AES was designed to be fast. Cryto-quality RNGs are really slow and complex: it wouldn't make sense to use one)
Also, imperative program flow is not "more real" than a functional-programming language definition of a function...
I understand how that is true, in a sense, but in another very "real" sense, your processor is imperative. Function calls are just a clever trick played on you by your compiler, your standard library, and some assembly macros.
(Well, unless you're running on a Reduceron or something.)
But there's no need to make the copyright on BSD-licensed stuff go away, for exactly the reason you described: you can make closed-source derivative works.
hindsight is 20/20
Go back and read the rest of the comment before you complain about it.
The US Constitution overrides state law, if the Supreme Court feels like it that day.
Although it looks like all of Amendments 1-8 (with 2 clauses of exception, related to excessive bail and right to a jury in a civil trial) have been held to apply to the states, the 9th and 10th have not.
Probably they tried to hide it. It looks like this breach took a month to expose? You can't backdoor a system without having a backdoor, and with sufficient scrutiny that's going to show up.
You appear to be right in the specific case, (which surprised me), but you're completely wrong in the general case. Most prototypes are given Y designations. For example, the F-22 started life as the YF-22, while the X-22 is a V/STOL technology demonstrator, not an air superiority fighter.
The production energy may be the same for a bioreactor vs. PV, but what he's saying is, the bioreactor has a longer lifetime to amortize production costs against.
Cobol programmers are down in the dumps.