Does it sit between your gateway and your router, and transparently redirect all packets to the tor network?
Do you just plug it into a router port and point your devices at it as a proxy?
Where is the source code? If we're going to be paranoid enough to use Tor for everything, shouldn't we demand to audit the code for security holes and possible backdoors?
It just seems like a product without a niche. Most users have no desire to use Tor, and those that do are typically savvy enough to set it up themselves.
The transmitters aren't owned by the cable companies, and transmit power has nothing to do with how the cable networks operate. The rebroadcasters simply don't see a return on upping the transmit power.
My three year old has picked up and walked off with one of my five current micro-USB devices at least once (probably a dozen times with the tablet) while they were still plugged in. I do have a healthy supply of partially functioning cables, but I've never had to repair a port.
Papyrus isn't paper, it's papyrus. The first paper was made in China around 100 BCE, and was made from hemp.
This is not a copyright case, and copyright wouldn't prevent me from handing my mail to my assistant and saying, "Open these, read them, throw away the ones I don't want, stack them in order of importance, and if you can think of anything I might want based on these letters let me know."
And, I'll retract my comment that must jurisdictions (US) require it. Turns out only 12 states do (honestly, a little shocked by that fact).
California's law prohibits "intercepting and recording" without all-party consent. Now, clearly no intercepting is going on. A Google mailbox is the desired endpoint.
Recording is a little less clear cut. E-mails must be recorded by definition. I argue that, since Google is using the "original" copy stored in my mailbox, no additional recording is going on either.
However, none of this addresses my point that once an e-mail is in my mailbox (just like a physical letter) it is mine, and I am free to do as I please with it.
Hackers of the world, unite!