Comment Re:What Could Go Wrong? (Score 2) 102
Instead of one target to attack (the target website), there are now 2 targets to attack: the shapeshifter obfuscation box and the target website.
Instead of one target to attack (the target website), there are now 2 targets to attack: the shapeshifter obfuscation box and the target website.
I’m sorry to inform you that he has been taken in by unsupportable mathematics designed to prey on the gullible and the lonely. The only way this will work is if will be blackmailed with a hidden dirty sock.
Maybe some chinese guy had his last day on the job, have a long newyear holiday , and Start a new job after the new year holiday.
Is it free? Do you broadcast? The proof is in Big brother/ robinson island. Enough people will line up for one minute of fame.
I bet the marketeer is some kid that got trained playing Rollercoaster tycoon 3 and now can do that al in a "real"(but fabricated) world.
Why did nagios take out the server out the hands of the community. Was there a fight in the community? Is this just a "it is named nagios, so it is ours"? Want do to some subscribtion? Sombody in the community took to big consulting fees?
At first it looks like that nagios has a name to loose, and more work to do by maintaining a lot of plugins and a extra site.
In some countries the shutter should (was?) mandatory to prevent abuse in the locker rooms...
And to make it clear; LEDs should be a hardware feature, not a firmware feature.
Hardware feature I would like to see:
-LED on when camera is taking pictures/recording.
-LED on when microphone is recording.
-Looking like a normal phone, If it screams PRIVACY phone, one might think ik have somthing to hide.
Software features:
-Restrict apps to a sandbox without telling them that. (feed apps fake data instead)
-Some kind of firewall/virtualiszation between apps i use at home and work and real private part.
-Secure boot. rootkit prevention. Including option by bypass the secure boot for open source mods.
Marketing features i would like to see:
-Real use cases. (like work/home phone virtualisation.)
-privacy is always a tradeoff. being online means giving away some of your data. what trade offs are made?
-Access to some more technical details HOW the pricay part is implemented and what has not been implemented.
-Respected names from the pricacy industy who did have to do something in the design/implementation phase. trust is important.
and
Yes.. that is right.
developers do not care about users. They are just a statistic that is needed to get to the very small percentage users that manage to report a good reproducable error report, create some overrated documentation.
And the stats are pretty accurate: for every 100 binary download there 1 one source download in my expierence. after that i am not sure who of those 1 percenta actually compile and look at the source.
On related news: the earth is round,
round like a pancake.
PS, the acticle starts nice, and simple, and then it introduces something called vacuum energy, which is a catastrophe in current observervations of the real world.
Just one thing. Work password one would store in a work containers. However to start accessing that one first has to log in to windows domain.....
after that keepass can dot its work... after that...
The real story:
You have a good password, that changes every 2 months. It is complex, and the previous password does not look like the current password.
Then you come back from a 2 week vacation and you have only 3 tries to remember your password.
happens way too often.
Everybody knows that the handshaking and the first impression at the start of a interview detemines 75% of the talk. Looking at the facebook first impression is equal. Any test would give better results.
Nope, it is more complex than that. In the US the ration for working age (15-65) is 1.0
For babies there are more males, for elderly there are more females.
or in other words:Let it be someone elses problem.....
If you have a procedure with 10 parameters, you probably missed some.