Comment Re:Holy Crap!!! (Score 1) 187
Depends.
Was the tested subject time machines, or temporal magics?
Depends.
Was the tested subject time machines, or temporal magics?
They went and collected a random sample of clamps out of the million(billion) clamps down there, and one out of their sample happened to be over 500 years old.
How do you see the chance that they randomly picked the oldest clamp on the planet?
By the laws of large numbers there are a lot of clamps still down there, that are older than this one.
So rest asured, the oldest animal on the planet was not killed (I would have said 'is still alive' but that's circular logic).
Why should anyone believe quantum "science"?
For starters, no picoturtles.
I believe it is intended that you came up with those associations yourself,.
So when presented with the list of your past answers and the same group of pictures, you will be able to do it again.
Trying to reverse another persons association-list will be much harder (and that is kind of the point here i guess).
Today's Google opener is Hermann Rorschach.
Is this story just a coincidence?
I wonder what he could have read out of peoples passwords?
Your account may be secure, but now the admin knows everything about your mother issues.
You are listing applications.
Of course, once these applications are on the horizon, the money starts flowing.
But without basic research, that would never have happened. They would instead have funnelled the money into developing better tubes.
Traditionally, domains and servers sized by the FBI become honeypots afterwards, right?
I would be disappointed if they were to break with this convenient reallocation of resources now.
And if someone said 'I did that at 13:00' the information is completely useless unless you also know where on the planet that person was at the time.
But at least you know that at that unknown point in time, the sun was up and it was right after lunch...
You only have to adjust your definition of 'terrorist comnnections'.
For the NSA, an Nth degree connection is most likely enough.
As in: your number has in the past called some number, that was also called by a number which had been in contact with a number which is suspected to have once been used by someone who's name is on one of their lists.
This kind of 'meta-information' is exactly what they are fishing for after all.
I am more interested in how they got 'some' with no terrorist connections. Maybe only brand new phone numbers on their first use?
By that definition any currency which undergoes deflation at some point is a ponzi scheme.
Or really any currency. After all, if no user B ever shoes up to take those dollars from you in exchange of wares, they are worthless.
Isn't the idea to use it as currency?
There is no 'making out' involved in exchange of currency, just a transfer of values.
The whole printing money out of cpu cycles thing was odd anyways and seemed more like a built in fundraiser/motiviation to get the thing started in the first place.
And how is fiddling with the route on a GPS only device different from fiddling with the route on a GPS enabled phone?
Because one of these seems to be legal as stated by the summary.
Goal is to be bought by some bigger corp for a rediculous amount of money.
It's a little surpising she manged to do all that, given how small she is.
Heightism.
I don't see how this is paranoia.
I wouldn't use the same password for my phone and my banking acount. But the fact you can't change your fingerprints pretty much forces you to.
Worse, you will use the same print in the future, forever.
So how long is that password going to last, with all the regular leaks, phone-malware and whatnot? How many years?
If any single application you gave the fingerprint to has a security hole, just one of them, then all other are immedeately compromised. And there is no way you can change that, even if you knew it happened.
And the best part is, because the 'password' is so strongly linked to your person, everyone who got it can easily figure out which other locks it might open for them, other than your phone.
Lastly, the argument of 'the xyz could do it if they really wanted' is just a bad one and I'm sick of hearing it.
This is still a question of economics.
Sure there could be agents following everyone around, grabbing fingerprints from the used glasses in restaurants and so on... would only cost like a trillion dollars until we have all the data.
Or we have them all upload their prints to their phones, which we already have backdoors into anyway, so it costs one of our IT people 10 minutes to issue the download command.
One thing will never happen, the other is more than likely.
Hackers of the world, unite!