Comment Re:Confucius say: (Score 1) 355
What stopped you from using your Dell after 3 years? Did it break? Did Dell refuse to fix it?
What stopped you from using your Dell after 3 years? Did it break? Did Dell refuse to fix it?
I blame the mobile OS vendors for this, especially in case of Android. A modern mobile OS must give full control for the user to understand and control which apps are accessing which data services. The user should be able to have a log of all these requests. The user should be able to wire fake data sources to these apps. There are very few apps that I would trust with my contacts list, account names and location information. Cyanogen Mod is working towards this and Google's attempts to acquire it do not engender any trust. The last company with legitimate use for Cyanogen Mod would be Google.
Next up, after negative user response, ChromeOS to publish full source code and become free user-respecting software.
ChromeOS tends to ship on Tivoized hardware, which isn't exactly Gnu-Freedom; but, in terms of the software on top of the bootloader, what are the deficiencies? I know it ships a proprietary Flash, and whatever bullshit makes Netflix work; but is there anything else?
Jokes aside, Democracy game series is critically acclaimed and regarded as even educational.
birth control is escapist fantasy.
Tell that to basically anywhere in the first world... Unfortunately, despite our best efforts, countries seem to go through a generation or two where modern sanitation and medicine have kicked in; but modern prophylaxis hasn't, which goes really badly; but once you get past that, results have been excellent the world over.
Making Tor dead simple to use is great, but this is such a nice device for three-letter agencies to target inserting a backdoor into.
While that is a possibility(albeit one that could theoretically be ameliorated, barring hardware-level backdoors, by 'here's how to build Tor from mainline and replace our firmware' documentation), I'd be more worried about the fact that Tor isn't dead simple.
The project itself has a list of handy warnings concerning What Not To Do on Tor and expect the anonymity to keep working, even assuming there are no unknown attacks and vulnerabilities at play. Tor has no magical ability to scrub dangerously identifying information from the assorted dumb, lazy, or just plain user-hostile chatter generated by various programs on your computer. It also, as a necessary side effect of its design, exposes some traffic to the exit node, which requires that you be careful about SSL/TLS for anything that the exit node shouldn't see.
That's what makes me nervous about the projects(hardware or software, boxes like this or Android VPN plugins, or whatever) that make it dead easy to route all traffic through Tor. Unless you know exactly what you are doing, that probably isn't what you want. Your day-to-day OS is very likely to be far too dangerously chatty(which means that you really shouldn't use it at all, unless booted to a liveCD; with the Tor browser bundle, that passes only traffic from the Tor browser as a distant second best); but you definitely shouldn't just plug it into the magic Tor box. Some applications you just don't want going through Tor at all. If the traffic is intrinsically personally identifying the best case is that you'll gain nothing and the worst case is that you'll be less secure than you were.
Things that keep people from running the browser bundle on their poxed XP machines and expecting anonymity are good; but Tor simply isn't easy to use, even if it is made easy to set up, and that can bite you in the ass.
"If you want to know what happens to you when you die, go look at some dead stuff." -- Dave Enyeart