Escalating and unanticipated requirements, especially without added budget to meet those requirements, can have devastating effects on both a project and the larger software company.
Not to mention the company's workers, who are likely to be burnt in the process before getting lay off
Dividing the key makes sure a single individual cannot have access. But since all individual workers obey to their employer, it does not prevent any NSA access.
This is just a measure against rogue NSA employee access, not against NSA access.
Detailed report on the hack (in french): http://www.breaking3zero.com/cyber-attaque-contre-tv5-qui-comment-pourquoi/
I note the malware was able to spread from user's PC to broadcast server, which suggests some kind of OS monoculture.
Here we enlighten doctors that believe a knowledgeable patient is a good thing.
At the other end of the spectrum we have some doctors that learned nothing since they graduated 20 years ago and seem to feel threatened with patient's knowledge. What doctor flavor did you encounter most often?
Israel isn't actively involved in exporting Islamic terrorism around the world.
Indeed, Israel role is different: their behavior actually create terrorists wannabe in middle east
What do they actually count? When a device was compromised, the attackers should cover their tracks and the device should be difficult to identify as being compromised.
In other words, there is no "compromised' flag to easily identify on devices. Which leads to the question: what does Google's number mean?
That information is useless: you are not going to impersonate Obama because you have his passport number.
By the way I am surprised diplomatic missions have to show a passport.
Modeling paged and segmented memories is tricky business. -- P.J. Denning