Comment Re:Security through Obscurity (Score 1) 129
Yep my mistake.
Yep my mistake.
Just curious, is their official
Sounds like a combination of torrents over I2P and an index site hosted on Freenet.
I know the methane clathrate gun hypothesis was disproven, but the difference between that and this becomes academic beyond certain amounts of warming.
At these pressures they most likely compress it with a hydraulic piston.
A high-temperature superconductor that requires ungodly pressures...kind of defeats the point doesn't it?
Who said that something can't be cooled after it's been heated through pressurization?
With closed source there are also no guarantees the bad guys won't see the source either. And it's far better to make the code visible to all then to wait for the exploit to be found in the usual ways while everyone was in the dark about it.
Security through obscurity is just like peril-sensitive sunglasses. Having the code visible makes you nervous for some reason? Well we'll just keep you from seeing it! Problem solved!
So Woz shared his fortune to give other Apple employees fair compensation that they weren't getting through official channels...does that make the origin story better or worse?
You say "spirit," I say "myth."
The idea is indeed powerful stuff. It wouldn't be so inspiring to realize that Apple didn't pull itself up by the bootstraps from a garage and that the real brains of the operation got a pittance compared to the smooth-talking asshole boss. Who wants a STEM education now?
The most lucrative programming career is one where you constantly jump between short-term fads.
Perhaps it's more like a sneeze which could one day be wiped up by a mighty handkerchief!
Most theists probably wouldn't want to believe that their god died in an explosion billions of years ago.
I think any OS will do it once the attacking program can gain root access, unless MBR protection is enabled in the BIOS.
Systems programmers are the high priests of a low cult. -- R.S. Barton