Shhh.... I still use the goold ol' command line FTP.
Maybe it's finally time to graduate to lftp?
Their TOS explicitly states they can and will decrypt emails if asked to by law.
They can only do that if they have your key. If you use their web interface to generate your key, or to send and read email, then they can be forced to decrypt your email. But if you generate your key yourself and use it to encrypt and decrypt locally, your are fine.
They are not worth looking at
I think that's a little harsh. They're doing the best they can, and they are being very honest about the inherent limitations.
Except HushMail won't hesitate to deliver a unique java client-side applet embedded with a keylogger to intercept the target recipient's passphrase.
If you don't use their web interface at all - neither to generate your key nor to send and read mail - then that's not a problem.
At this moment IXWebhosting DNS is available again. Their status blog is here. They report that they there might continue to be "a few intermittent issues".
My understanding of Hetzner's report is that it works like this: there is a backdoor on a Nagios server (not clear whether that means a backdoor in Nagios itself, or some other kind of backdoor on a server whose purpose is Nagios monitoring). The attackers are able to use this backdoor to gain root on other servers within Hetzner, which they use to modify key daemons on those servers. The daemons are modified in memory as they run, and I'm sure the attackers are careful not to generate any logging events. So nothing at all is touched on disk for the servers being attacked. Nothing.
The backdoor on the Nagios server probably does persist across reboots. However, that also may be something that is remote in origin. For example, perhaps the backdoor is hidden in the Perl code of some Nagios module which is regularly updated by Hetzner (and probably plenty of other data centers) from some remote repository which the attackers have compomised. There doesn't even need to be any trace of the backdoor on the Nagios server most of the time. It only needs to be present for a few seconds every once in a while, say, once every few weeks, because the daemons it attacks are long-running processes.
Where's all the posts proclaiming the infallibility and universal superiority of PorsgreSQL?
Oh, you're right. There you go then.
(Seriously, is there a stipulation in the licences that obligates you guys to reply to threads about mysql?)
Actually, no. It's in the design, the features, and the source code.
Testing can show the presense of bugs, but not their absence. -- Dijkstra