Comment Yes (Score 1) 601
but I used to work for PGP...
but I used to work for PGP...
I'm a mathematician, not a physicist. In special relativity the Lorentz transformation has a singularity at the speed of light. Its perfectly defined below and faster than the speed of light. Richard Feynman suggested that unless the math prohibits it, it will be found in nature. Of course, if we see a particle hitting another before it was emitted, we'd likely interpret it as the target "pulled" the particle from the emitter. This explains the alternate view of physics -- all matter emits dark, and light bulbs and stars suck the dark in. Mathematically it makes just as much sense as emitting massless photons. Who's going to buy the idea of a massless particle that goes the speed of light? Its crazy talk.
This is just a reminder that like economics, scientific method is really a confidence game. Its all a matter of whether you believe the rules stated so far are consistent.
Where else is Google going to find someone that understands how to configure SELinux so it can be used in real life.
Oh, doh! I referenced real life in the same sentence as SELinux and Google in a Slashdot posting on the NSA.
We already know how to break into systems with buffer and heap overflows. We know how to do SQL injection into not-so-smart applications. If you work at it you can break into almost anything.
Absolutely no good purpose is served providing a toolkit that allows people to break into naively configured systems. Much of what you describe is akin to leaving the keys in your Maserati with the doors unlocked and the engine running. Please don't make things easier for joyriding teenagers.
If a site wants to know if they're secure, within the current limits of our knowledge, they can perform their own audits, and hire their own advisers to test their systems in a controlled fashion.
Applications, such as BOINC, have an unknown state of security review or audit. I doubt they applied the coding guidelines of CERT, or any of the Common Criteria levels. An administrator would only deploy such applications in the DMZ of their network. To call a Linux system, or Windoze system, secure means you've evaluated the risk of both the operating system and the applications on that system and decided it is good enough for you.
"If a burdensome regime of network neutrality is imposed on all parts of the Internet industry, it will inject an extraordinary amount of bureaucratic oversight into the economy's main growth engine to the future," Seidenberg said."We can't create a smart economy by dumbing down our critical infrastructure. "We can't move forward by pitting network providers and applications developers against each other when the real promise of broadband is an expanding pie for everyone."
""Holtzman also tried sending the mice to sleep with a drug that is being trialled for insomnia, called Almorexant. This reduced the amount of plaque-forming protein. He suggests that sleeping for longer could limit the formation of plaques, and perhaps block it altogether."
Genetics explains why you look like your father, and if you don't, why you should.