Comment Re:NSA says fuck off (Score 1) 150
Why are you asking me? You know damn well where my papers are.
Why are you asking me? You know damn well where my papers are.
Bluecoat don't vet every site. They vet what they can, and let bayesian classifiers do the rest.
That said, when you find a mistake, you can submit it to them and they will look into it. I have had a 100% success rate getting them to adjust the classification of sites I've submitted to them over the last six or seven years.
The NSA implant known as SOUFLETROUGH allegedly uses SMM and is even referenced on the SMM page on Wikipedia.
Because even when using a client cert to auth, your credentials are indeed sent to the server. Otherwise, how could the server auth you?
The cert provides the server with your public key and an attestation from a third party that the public key belongs to a particular party. Once the server is satisfied with the validity of the cert for this particular account, it does this:
Most notably, at no time did your actual credential, the private key, exist in any place except in your machine. For bonus points, you can password-protect that private key, which will involve using your password as a key to a symmetric cipher to encrypt your private key.
Right, so you apply the Dalton principle: be nice. When (not if!) they ask you if you will follow instructions and law, then, and only then, nicely, tell them that you believe in the principle of jury nullification, and that you cannot promise such a thing in good faith.
Of course, IANAL, and what exactly you encounter will depend on the other people present as well as those doing the selecting, so whatever happens from there will depend a lot on the human factor. You should, therefore, only do this if you truly believe it (as I do). Trying to get out of jury duty is shirking your responsibility, but telling the truth, and getting out of it because it is the truth, is not your problem.
Agreed 100%. I considered network support to be a given if the software on the handset were updated to do this. Alternatively, you could (provided you have the data plan for it) use it against a third-party server. It would be analogous to running VoIP for your home phone even though your ISP might offer phone service.
That LTE phones don't use LTE for voice is clearly a software problem. Skype, FaceTime, Google Hangouts, and a myriad SIP applications are all able to route voice traffic over IP, and that can be routed over LTE with existing phones. Getting the main voice app to do that should be a software patch.
To do what, exactly?
I find myself wondering if it can be combined with MIMO. That would be very cool. Might not be practical on a handset (at least not at frequencies below 3GHz), because there is not enough space to put adequate separation between antennas, but it could work well with tablets and other physically larger devices.
Yeah, or you could keep it simple by building an antenna with traps in it. It's worked well for a very long time and is very well understood.
Or you could use a broad-banded antenna architecture, such as a discone, cone-cone or folded dipole. Again, it's worked very well for a very long time and is very well understood.
Or you could build multiple antennas coincident in space (think Copper Catctus in miniature) and switch for frequency range by selecting which feedline you use. Need I say it? Okay, it's worked well for a very long time and is very well understood.
Or we could use a plain vanilla antenna tuner. Worked well, long time, well understood, yada yada.
I don't want to detract from the idea of building SDA's that are "worth a damn" but let's get real here: we have approaches that do work, and should be employed until we get there. Until then, using an SDA makes you a beta tester.
Both parties suck, but they aren't the same. They are both bad for the country, and they both produce bad law and bad policy, and they sometimes agree in their badness, but they are not the same.
Well sort of... but I don't think it's that simple even in concept.
I put up the oversimplified example because people were not even getting the undlying concept behind the undlying concept behind the undlying concept behind the undlying concept.
Consider a case of a credit card number. A CC# consists of 15 digits plus a check digit for 16 digits total.
Now, in encrypting, validate the check digit and then drop it. Take the remaining 15 digits and express them as a binary value. It should be around 50 bits. XOR it against a 50-bit mask, and that will be your ciphertext value.
To decrypt, XOR against that same value and recompute the check digit.
Any incorrect value will produce a number that passes basic validation (as long as it doesn't exceed 2^15).
For bonus points, you can probably encode the first digit in only 2 bits, because most cards begin with 3, 4, 5 or 6, depending on the issuer.
Now, is this a good encryption scheme? Maybe not, but it does at least demonstrate the concept.
In regards to 1., wholesale electric prices do fluctuate. What that doesn't change, though, is that the price of gas fluctuated to where it was more economical to use jet fuel for a period. In such circumstances, the gas turbines are, appropriately, selected.
"Just think of a computer as hardware you can program." -- Nigel de la Tierre