Comment Re:FFS (Score 4, Informative) 398
The same journal has a study showing pot-smoking teens are 60% less likely to finish high school than ones who don't.
I would suspect alcohol also has an undesirable effect on high school graduation rates.
The same journal has a study showing pot-smoking teens are 60% less likely to finish high school than ones who don't.
I would suspect alcohol also has an undesirable effect on high school graduation rates.
Not sure about the Google and Android solutions, but you don't need a network or cell connection to use ApplePay
Nor with Google Wallet.
Also, I dunno about you, but I always have my phone in my pocket, just has handy as my wallet, but with my wallet, I need to remove a card, swipe it, and usually either sign or enter a code.
My phone is actually handier than my wallet, because I use my wallet less and keep it in a less accessible pocket. Actually, most of the time while I'm in a checkout line my phone isn't in my pocket, it's in my hand.
(Disclaimer: I work for Google and bits of my code support Google Wallet. However, I was a fan of NFC payment before joining Google, and whether it's Google, Apple or someone else I'm really glad to see it finally taking off.)
Hopefully more of the anti-drug warriors will start actually listening to this stuff.
Heroin isn't all that bad as long as it's medical quality and administered professionally.
The first article says they are just storing a secret key on the SIM and on the network provider's systems. That is just dumb and was totally insecure even before this happened. They should be using privat/public key pairs in which the private key is generated on and never leaves the SIM.
Symmetric cryptography is not "totally insecure", and there's no reason to accept the complexity, large key size and performance hit of asymmetric cryptography when there's a perfectly reasonable key distribution mechanism in place. Further, your proposal wouldn't even help... who cares if the private key was never off the chip? Given a public key how do you know that the corresponding private key was ever on any chip? Answer: You need to obtain the public key in a secure fashion in a controlled environment, such as during manufacturing. If you drill down on the requirements for the context and process needed to identify that public key as trustworthy you find that you have exactly the same requirements for a secure symmetric key injection, which is much simpler and easier to manage.
And as for attack by NSA/GCHQ, if those are your opponents, and they're actually focused on you, you can't win. At most you can make them work for it a bit, but not very much. So it really doesn't make much sense to include national intelligence agencies in your threat model.
Came here to say this if it hadn't already been said. Roll on fellow Browncoat!
Not my experience. I put Apocalyptica in there and every other song was them(for that station). I ended up unclicking that station from my shuffle because I got sick of them. I mean, with 9 stations I don't need to be hearing them every 5th song.
Build on a flood plain, make millions of dollars today, and let the tax payers pick up the bill after a catastrophic 100-year flood years later. Rinse, rebuild and repeat.
Seeing how those tax payers have spent 100 years eating cheap food from that fertile flood plain, and the bill only amounts to a tiny fraction of their direct savings - much less the increased economic opportunities inherent in a more populous nation - it works out quite nicely to everyone. Until, that is, someone starts making noices about taxes being stealing, the city remains a ruin, and everyone starves.
Other than the "ownership" hyperbole, you're right, regardless of the posterior plumbing of the douchebag.
The whole point of slapping - or other low-intensity violence - is to show the victim's very body is perpetrator's possession, to do with as they please. Please explain how describing this as ownership is hyperbolical?
Except the numbers show that, obviously, people do just that. And when a stronger target DOES hit back, the attacker takes more hurt than gives.
Half of population are below median intelligence. Bullies are no exception.
I used to agree with this just as vehemently as you seem to. When the bullies started coming up without a Y-chromosome, though, I'm sexist enough to content myself with discrediting them.
I'm sorry to hear that. Let's hope you get better soon.
It's a shame the company didn't offer a retrofit kit to bring the old design into compliance.
They don't have to do this stuff to sell their stoves anywhere else, so why bother? Just drop the market, and keep selling the old design which works fine as long as you don't overdamp it. But sadly, most of us have no idea that overdamping is what causes excessive wood stove emissions. I mean, nobody ever taught me anything about starting a fire, or maintaining one, even though I grew up in a house with a fireplace.
You can have end-to-end encryption right now if you are willing to do some work. Your Android phone has a built-in SIP client. Well, in theory; my SIP settings seem to have disappeared with Lollipop. I hope they'll come back by 5.1, if not sooner. But there's various SIP softphones available for all mobile platforms, probably even including windows phone. Android at least, and probably the others too, supports IPSEC. Everything you need is right there. The problem then becomes whether you can actually trust your phone. The answer is probably no.
If you truly want to protect against things like this, you're going to need a portable device with wifi and an open CPU. Best of luck finding one. It'll also need an IOMMU and a driver which prohibits the NIC from stepping out of line, or a NIC with open firmware. Otherwise, someone could (theoretically) own your NIC and then browse your memory from it.
Wait, you mean they were using the same equation? Did they discover it on stone tablets chiseled by ALIENS?
How about, ancient and modern cities follow same mathematical pattern? Because that could actually be true. Both ancient and modern cities weren't built from the same city planning manual, because most cities (even modern ones) aren't planned at all, except haphazardly and as they go.
Not irrelevant, because you can't impose these kinds of burdens (financial and otherwise) on people without the certainty that they'll make things better.
Why not? Of course you can. It's done all the time.
Most Unix stuff doesn't follow the Unix "way of doing things"...
Most of the stuff that the system depends on and that actually makes it Unix does follow the Unix Way. Maybe your favorite application doesn't, but we're talking about the actual system here.
Sex isn't trademarked, so domain squatting doesn't apply.
Uh no. That's not how it works. Domain squatting is buying a domain for the purposes of speculation, and trademark is irrelevant. It would help if you knew what we were talking about.
Intel CPUs are not defective, they just act that way. -- Henry Spencer