Comment " why T-Mobile finds it profitable" (Score 3, Informative) 482
T-Mobile is losing money. Something in the $100m/year range.
T-Mobile is losing money. Something in the $100m/year range.
And cloned cards were a major vector of fraud in the Target attack.
From Page 3 of this:
The C++ STL, with its dyslexia-inducing syntax blizzard of colons and angle brackets, guarantees that if you try to declare any reasonable data structure, your first seven attempts will result
in compiler errors of Wagnerian fierceness:
Syntax error: unmatched thing in thing from std::nonstd::_ _map<_Cyrillic, _$$$dollars>const basic_string< epic_mystery,mongoose_traits < char>, _ _default_alloc_<casual_Fridays = maybe>>
internet providers are obliged to keep records of users' access for six months
Nothing like making it easy to build the list of links for an ISP by putting all the data in one place. Bet it's online accessible, too.
I rate this troll as Adequate.
Snowden is a hero, and now he is working to support Russia's effort to protect its people in Ukraine! Soon the Russian Army will complete the liberation of the Russian nationals in Ukraine and all with the help of Snowden! He has tremendously boosted the Russian security services! He is hero to the world!
Comcast would have a vested interest in having customers use Apple's services.
Lawsuit on line 1...
That seems to be the foreign policy he's following, actually.
People have been cloning mammals for 20 years now.
So used to typing "user" in various contexts. I meant "/usr".
A lightweight one with X and xfce. Put
I wonder how hard it is to hack the bootloader?
the act of deleting the data will also delete the evidence that would be used to establish a citizen's grounds for suing the NSA over its illegal data retention.
That's what the NSA said when they asked for permission to hold the data for more than 5 years.
It was only while scouring a database that contained the registration cards of naturalized U.S. citizens that a Satoshi Nakamoto turned up whose profile and background offered a potential match. But it was not until after ordering his records from the National Archives
Guess the Privacy Act doesn't apply to individuals.
How hard is it to set up a router with the network ssid "xfnintywifi " and gather up all the username/password combinations that people use to log on? Not hard at all.
Intel CPUs are not defective, they just act that way. -- Henry Spencer