Comment Re:I do not consent (Score 1) 851
What if I want to consume it despite there not being a consensus that it is safe to consume?
I've heard talk of a marketplace for "fat credits".
What if I want to consume it despite there not being a consensus that it is safe to consume?
I've heard talk of a marketplace for "fat credits".
Store it on "the cloud"! Everything will be fine!
And guess what? If you used even the most basic security hygiene, especially with your LastPass master password, it still is.
Localhost is my home. You DO NOT touch my home.
Piss off, you mere citizen. If you're not a corporate citizen, you're little people, and little people don't have the same rights as corporate citizens. We will tell you what you can do with your property, and you'll like it, because the bread and circuses will continue to flow.
The idea that voicemail is dead is asinine.
I only have your phone number, and you don't answer (yes, I'm over 25, I actually call people on the phone), now what?
Dumb fucking emo hipsters, the rest of the world doesn't live on Instagram.
TFTFY
...and, no shit. Put down the iPhone, you little dorks and recognize that the world still communicates verbally, sometimes using a feature that your magic text box has actually had from the start. It's efficacy at communicating useful information larger than something like "lol" is unparalleled when compared to the other shitty input devices on mobile devices.
There are tens of thousands of fax machines and fax systems still in use today because, despite all of our technological advances, the fax machine is still the most secure way of delivering medical and legal documents between locations, where one or both locations can't figure out anything more complicated than stick the papers in it and dial a phone number, in a compact time frame.
TFTFY
Internally, our company uses several different mechanisms for securely transferring sensitive documents, all of which are superior to fax in speed and reliability, but we interact with hundreds of other businesses that refuse to abandon this mid-last-century technology for the same job.
Faith, the belief in things not provable, is extremely powerful and it doesn't help one bit when science relies on it for some of their biggest theories, such as string theory and a few others.
You were doing fine up until the point where you equated religious faith with scientific hypothesis. The two are alike in only the most superficial way. They are unalike in the most important ways. Only a fool would fail (or refuse) to note such distinctions.
Attacking his every statement with an ad hominem only hurts your argument.
If I observe that you seem to not understand the definition of ad hominem, I am not engaging in an ad hominem attack. Likewise, if I observe that a particular observation is "daft", it is the observation I've addressed, not the observer.
You are an idiot, and your mother dresses you funny. There. Now that was an ad hominem attack.
No. Vaccination rates are highest in the Bible belt, while they are lowest on the west coast.
[citation needed]
We keep hearing this. Please substantiate your assertion.
Because the list of things she knows clearly does not include the concept of "community based threat intelligence". The sharing of threat intel, especially among industry peers (financial services, healthcare, etc.) can be a very powerful tool. If the security people at Acme Widgets and Cogswel Cogs alert me that their seeing a specific attack coming from a particular IP address, we here at Spacely Sprockets can proactively take steps to defend against that attack.
FTFA:
"Opening debate of the bill on Wednesday, Rep. Devin Nunes, R-Calif., chairman of the House Permanent Select Committee on Intelligence, noted that the legislation “does not provide the government with any new surveillance authorities.”
“It only authorizes the sharing of cyber threat indicators and defensive measures – technical information like malware signatures and malicious code,” he said. “In fact, before companies share with the federal government, they must remove all personal information that might be attached to cyber threats. If companies don’t follow those requirements, they will not receive liability protection.”
By what stretch does Ms. Cohn call such activity "surveillance"?
Well some of us live in the real world and can't just hide under a rock because, ya know, we need to interact with people for personal and professional reasons via popular social media sites.
No. You do not "need" to do those things anymore than the dozens of fuckwits I see every day driving, walking, eating, pissing, with their heads bowed down to their smart phone "need" to communicate in such an awkward medium. Do those services make certain things easier? Of course, but that's the deal - "Here's your 'easy', now give me your life. Oh, and fuck your privacy." That, my friend is "the real world".
"Given the choice between accomplishing something and just lying around, I'd rather lie around. No contest." -- Eric Clapton