Comment Re:Better article (Score 1) 113
I would imagine that it get most troublesome only if you use the card for computing and rely on a homogenous memory access....
I would imagine that it get most troublesome only if you use the card for computing and rely on a homogenous memory access....
but fight pedophile criminals.
That being said, i doubt that i wnat to put justice in this respect in anonymous hands.
IMHO the biggest advantage of pascal was that data structures were well denfined and that strings were not nul terminated.
Two year ago: Openvpn was fine, but webpages of providers were blocked (not a bad strategy...).
Last year: private Openvpn server worked, but connections dropped after ~1Gbyte was transferred, and well known providers were blocked
This year: openvpn was detected (not sure how!) and private server seems to have ended on some "gray" list, ssh connectionsafter that were very slow (although that could coincide with slow internet); sshing to singapore AWS cloud was fine, but i had the feeling that switching between ports for ssh helped after big data transfers or long conenctions. Connecting by mobile (state telecom) was better than by WLAN.
Blocking seems to happen solely based on target (outside China) IP.
The rationale behind blocking vpns but not ssh is simple: China is not interested in blocking perfectly. They don't care about (or even may like) that you can set up cloud servers which you need for your thing outside China. They dont care about 1% of the population and all foreigners getting unfiltered access to the outside world. As long as they can filter the information for the vast majority. Which implies that the material they mostly care about is video, which means that intentionally slowing ssh still enable you to do your admin work, but you can not copy 1000 youtube videos quickly. Also, for ssh there is no "1-click-vpn" client available......
The relevant question is: could you trust the devices firmware in the first place? The las tfew year put a solid upper bound to my trust in this respect?
i did not say that this is a new idea.
The way out would be that i would have to license and register private keys for encryption. This is dificult to enforce since there is no way to judge if you use unregistered private keys without entering your home and looking at your harddrive.
The result would be that criminals would continue to use it, and that normal people would be criminalized.
on 4 weather ballon, you can place ~ 8 km of nylon fishing line.
So you can randomly traverse a 100x100x100m volume 80 times.
Not unlikely that you crash the papparazis expensive drone with this approach.
The average tone on the kernel mailing list is not an incentive to participate to an unbiased observer.
If you care about results, dont drive people away. And yes that applies for the whole OS community. Whenever I consider to take part in an OS project, because i find it interesting, i look at the development process/communication and find the tone, way of discussion, and egocentric behaviour inacceptable.
Do you really think i contribute to a project which barely builds in exactly your environment with hundred of obscure dependencies, and when i try to fix it, getting barfed at over the inacceptable choice of standard tool X (yeah, i know, build processes which work out of the box on all linux distributions are *evil*), which seems to be directly from hell?
Do you really think i participate in a discusssion where three dickheads call my approach "SHIT" because they dont like it, without a proper argument, and often referring to episodes which happened 20 years ago as justification?
Do you really think i invest time into projects where the goals are defined by the means, and not vice versa (see the systemd debate)?
I really think i have better things to do with my life.
Wrong confessions are a big problem for courts.
so solving the comple problem will be reduced to the not less complex problem of weedign out the spam created by idiots?
Put 4 big helium ballons and place nylon wires between them. Operates 24h a day and is cheap.
Yes. if they told me that t oconnect the fridge you build a new network, i would have declared them mad.
OTOH: I worked in a related topic and we figured that the biggest part of the potential savings could be implemented by a timed switch, and a little thought. It's not like the the time of the peak consumption in a country changes day by day, usually you should think about decades.
(The 80-20 rule also applied here: do the simple measures first, and get the biggest part of the saving)
I hope not.
Honestly, when i bought my 6310i i changed the default ringtone in two days. Not because i disliked it, but because i reached for my phone every 5 minutes in the city.....
I think there's a world market for about five computers. -- attr. Thomas J. Watson (Chairman of the Board, IBM), 1943