Comment Re:So does this include (Score 3, Funny) 380
The Inquisition.... What a show... wait, shit wrong movie.
The Inquisition.... What a show... wait, shit wrong movie.
LOL see it back fired for me, probably because I'm in a swing state. I'm also independent & voted in the republican primary for the same reason. Now I get flyers, postcards, & door to door petitioners for both parties.
I can't wait till this stupid thing is over & I don't see another MD yes/no on 7 / Attack ad for either of these bone heads
In Holland you can buy liqueur infused with coca leaves & other botanicals that while not cocaine will give you a nice speedy drunk feeling. No issues getting it into the US either.
my folks went to cuba a few years ago no problem. Few extra hoops to jump through but it's not illegal, they made it back just fine
Except as someone else in this thread said embassy grounds are not sovereign soil of the county, populated but immune diplomats.
Close embassy
Evict diplomats
Collect Assange
No guns, no force, just diplomacy
Of course sorry that was silly of me. If the hash is made of arabic character directory names & registry paths your right.
So what identifiable parts could be used? MAC I suppose although as you said that could be spoofed if known. What about the processor clock, are there any uniquely identifiable parts besides the network card?
/Puts on my black crypto-anarchy hat
My understanding is the first thing LEO does when it encounters encryption or drive analysis, is pull the drive & make a copy. Then take the drive and analyzes it on a separate machine or using forensic hardware.
Would something like this be useful in reverse, because without the original computer that contains the correct configurations, the key could be given out but the since the hash needs internal qualifications to match it would not jive because they wouldn't plug the drive back into the old computer.
of course there is always rubber hose crypt, and permanent lockup, NOT obligatory xkcd, blah blah blah yeah I know all that & doesn't add to this conversation.
(it's impossible to make _any_ server 100% guarantee secured, I know)
So...Bitcoin is insecure. Period
Nope try again. There are such things as physical / paper wallets & cold storage which is secure.
If your trying to troll you need to try a little harder
like so many others I got my first programming chops & computer knowledge from the TRS-80 my dad brought home. Did anyone else try copying the software from the back of the old compute magazines?
I remember soldering a speaker wire up to the unit since there was no computer speakers back in the day. I described that one day to my much younger sister, and realized how silly it sounded 30 years later were a pair of speakers are $10 and actually sound good.
Best was when we got a disk drive instead of the tape which was such a hassle.
My dad has it still in the closet and kids that it is part of my inheritance. Figures in another 10-20 years it will be worth something.
God I feel old, Now get off my yard!!!!
In the mean time if your on a JB iPhone you can use the teatherme app from cydia to over ride the provder settings. But I know from all the slasdot haters the only reason to JB an iPhone is if your a Gasp... Pirate.
Thanks for the link, I did not know that.
The most scary part was intended uses. They figured it could be used for fracking natural gas & wanted to blast the p-canal wider, & a new e-w passage. Can you imagine what panama might have had to say about that?
And of course fracking caused radioactive gas that was worthless, & we still haven't learned that lesson.
Sigh... BTW nice name, Good to see other mush heads around friend.
That is actually not uncommon from the previous generation. My wife was told the same by her grandmother, and to this day always makes sure there is a penny or some change in a gift wallet, handbag, purse, or piggy bank.
"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight