..the sale is criminalized in The Netherlands.
My point is that the court's recent decision suggests the above is an outdated, quaint law which no longer reflects the society that The People wish to have, nor which reflects the new way of thinking about reponsibility and the relationship between demand and the victimizing acts which serve that demand.
Thus, I'm sure the Dutch people will soon be revising their kiddie porn laws. Huh? Whaddya mean, "no?" Why not?
Look, just install the telescreens in our homes already.
Be patient. We're still in the voluntary phase of that, right now. If enough people say no to the unauditable smartphones and smart TVs, we can eventually get to compulsory installation, but for right now, what's the hurry? People are doing it without even being told to.
Did YOU look at the graph? The bars are comparing all of 2013 against the first half of 2014 (obviously, as the second half is in the future). So the fact that IE already matched last year's record is where the 100% figure comes from - it's another way to say "doubled". Unless the second half of 2014 has a lower exploit rate then the conclusion will be correct.
Though we'll face some risks from our own governments, it's a relief to know at the Dutch government would have no problem with me selling kiddie porn (as long as it was made in America) to Dutch citizens. "No crime happened here, within our jurisdiction," they'd say.
In fact, the Dutch government should tolerate our new businesses even more than this NSA thing, since the victims (whereever their rights were violated) won't even be Dutch citizens. No Netherlander will have any reason to say their government let them down.
The special magic thing is to hit the Windows key + X. That brings up a menu that has pretty much everything you'd want to do from a start menu. Win + X also works on desktop Windows 8.x.
The hilarious thing to me is that the Windows 8/Server 2012 line is ironically the most keyboard centric version of Windows I've used, but all people want to do is bitch about the Modern (Tile) interface that you can completely, totally ignore if you're on something that has a real keyboard and mouse.
Also, Windows RT? It's not awful. Printing and scanning work great and they have real USB and storage support. Surfaces ship with Office pre-installed. RT is missing a lot of media consumption tools that are present on other mobile OSes, but as a device for doing work they're credible. I'd rather have an RT-based Surface than anything that runs iOS, though I'd prefer a good quality Android device to either.
The same exact reasoning to justify TSA
They're incomparable. TSA is mandated by governments, you have no choice in the matter. Using a particular brand of smartphone is not. You are free to use a smartphone that doesn't use Google services and indeed are free to buy a Nexus 5 and then say "no" to the billion and one "trade data for feature?" prompts that appear when switched on the first time. No government goon is going to step in and insist that you send all your data to Google.
In fact, if you would prefer a smartphone that has a different data/features tradeoff then - conveniently! - Google provides a rather good open source operating system for free that you can use to build one. If others feel the same way you do you can even sell them without paying Google a dime.
Depends how you define "very popular" I guess. The most popular way to bypass state-level censorship in the Arab world and elsewhere is a product called HotSpot Shield. When Turkey blocked Twitter some time ago, HSS experienced 1000% growth and reached 1.1 million installs in the iOS App Store alone within only four days, with 800,000 regular users.
In contrast Tor went from 30,000 to 40,000 "direct connects" from Turkey.
HSS doesn't get much press in the geek world as it's just a plain old VPN run by a company in California that inserts ads into people's web pages to pay for the bandwidth costs. But usage wise it utterly dominates Tor.
Thanks for the insult. It hardly stung.
Unless you worked at Netscape in the mid-1990s, no insult was intended.
All I meant is that by the very early 1990s, we (and by "we" I mean people smarter than me; I was clueless at the time) had a pretty good idea that CAs wouldn't work well outside of real power hierarchies (e.g. corporate intranets). But then a few years later the web browser people came along and adopted X.509's crap, blowing off the more recent PKI improvements, in spite of the fact that it looked like it wouldn't work well for situations like the WWW.
Unsurprisingly, it didn't work well. Organizing certificate trust differently than how real people handle trust, 1) allows bad CAs to do real damage, and 2) undermines peoples' confidence in the system.
A very nice way of saying this, is that in hindsight, the predicted problems are turning out to be more important than we thought most people would care about.
Keeping the same organization but with new faceless unaccountable trust-em-completely-or-not-at-all root CAs won't fix the problem. Having "root CAs" is the problem, and PRZ solved it, over 20 years ago.
I expect you to start the project shortly.
It's a little late to start, but I do happen to still be running an awful lot of applications (web browser being the most important one) which aren't using it yet.
He was obviously talking about building your own hardware. Did you really think his parts list of "A small controller, an LCD display and a keyboard," was in reference to writing an alternative to OpenBSD?
How does Diffie-Hellman key exchange provide identification of the other party?
.. It is not possible to determine who the other party is
It's possible. It requires an extra piece beyond the DH, but that extra piece isn't PKI. The user is the trusted introducer. The user looks around and says "Yep, these are the only two devices physically here that I have ordered to peer, right now." They are identified by being in the right place at the right time, triggered by the user saying "Now." That's a pretty good way to do things unless you're just totally surrounded by spies.
RTFS? It says that in the summary. The goal here is to alert people who don't know their internet connection is being used for piracy and who aren't OK with freeloading, parents being the given example.
> Just because a corrupt judge signs off on it, doesn't make it legal.
Actually, when a judge signs off on it, like it or not, the warrant by definition becomes legal.
Only through hard work and perseverance can one truly suffer.