Was a photo also found of a someone making a gun shape with their fingers and holding a note making no demands?
Long polls? I don't think you realize how long the polls would have to be.
You are also mistaking the buildings these things are in for simple, flimsy structures into which one can simply drill a hole and drop a cable.
http://www.nrc.gov/waste/spent...
https://what-if.xkcd.com/29/
Nuclear Material in/near Reactors Secure's Itself.
Dry fuel pellets are harmless.
Fuel rods are made by welding dry pellets into steel I-Beams or similar big, heavy, structures.
Used (wet) fuel pellets are _fantastically_ _dangerous_ to handle, so much so that they have to kept wet at all times to keep them from roasting everything while they cool.
Back in the seventies my father (nuclear engineer) said he'd love to stage, and televise, a "raid" on a nuclear power facility... The _months_ necessary to get the stuff off the premises (let alone ground up into nuclear dust) would have probably lost its audience. But the "Fast As Possible" "Smallest Crew" version of the raid that the anti-nuke people were putting in movies and scare politics would be thoroughly disproved.
Even if I installed a pebble-bed reactor in your garage (and one _would_ fit), any attempt to turn it into a "dirty bomb" would fatal to the person attempting it. Someone could blow up the pebble-bed itself, but that would move a few of the "pebbles", if any, a short distance. Someone with a radiation counter and a radiation suit could then just go pick them up with tongs.
So the terrorists "want{ed} to build a dirty bomb" is about as likely to lead to that end as my personal desire to own all of Google _and_ Tesla Motors outright as a pure proprietorship.
called nEmesis
emesis
Someone has a sense of humor at the University of Rochester!
A public key block would flag a back door very obviously. The data has a unique look. It also has a unique profile of use, in that someone would have to initialize a cipher session or whatever. Even a trivial code review would find a fully encrypted back door.
Hiding the public key block within an obfuscation generator adds a huge block of code instead of data, followed by the same need to invoke the cipher system.
To function as a "back door" the door, by definition, has to be pretty damn simple and innocuous enough to go unnoticed.
So "creating a back door that only you can use" is actually creating a separate front door with all the trappings, which kind of moots the point of sneaking it in.
Back doors are, pretty much by definition, mechanisms that only implement security through obscurity.
Fully secure ingress is way too hard to sneak into place and remain hidden.
Moving forward, WhatsApp will only support the latest and greatest iPhone, Android and Windows Phone platforms.
They didn't say that, they are actually supporting older versions, just not REALLY old versions
So, by the end of 2016, we will be ending support for WhatsApp Messenger on the following mobile platforms:
Android 2.1 and Android 2.2
Windows Phone 7.1
Create a master key, keep it to yourself. We won't ask you to give it to us, we promise. We don't care how you do it, we promise. It's only this once, we promise.
But whatever it takes, you go ahead and do it.
As a bonus, you will perform this work using people and equipment you get to pay for all by yourself. I'm sure it will be no burden at all and you should be ready to pay these expenses now because you didn't have the foresight to compromise all your products proactively.
And of course we'll never use this a precedent to force you do to this for all other products you make, and we'll not be forcing all the other companies to do likewise.
It's such a simple request... and besides "Teh Terrorestors!"
The biggest difference between time and space is that you can't reuse time. -- Merrick Furst