Comment Re: Legitimate concerns (Score 1) 282
Go suck a dick faggot
I suspect he's ok with that (if not with the way you phrased it).
Go suck a dick faggot
I suspect he's ok with that (if not with the way you phrased it).
I've heard of lazy, but this takes the cake. Or maybe, in your case, has the cake delivered, not to your front door, but to your sofa.
I think the reasoning is fine, because of these words: "...if the behaviour which is currently criminal is to remain criminal..."
Your example is a simple crime, where the victim had an experience related to the crime (so there's a body to be found by the police, or a surviving victim who says "ouch, someone shot me"). They are talking about certain types of crimes where neither the victim nor anyone closely watching the victim would never have any idea that a crime happened. All the evidence is completely disconnected from the victim.
I publish a magnet link. You read it, and use it to acquire a file. Someone who isn't there and sees absolutely no effect on their life, is defined as a victim because the action is "currently criminal." Maybe it's because they hold a copyright on the contents of the file, or because the file contains a picture of them without clothes (taken by hidden camera when they were 17 years and 364 days old), or because the file contains some other information related to them.
You can't detect these kinds of things.
The House of Lords is saying that if these are going to remain crimes, then the laws should be enforced, and if we ass/u/me that getting laws enforced is far more valuable to our society than liberty, efficiency, etc then it's important that the watchers know about every transaction that is happening and who is involved. They need to know that I transmitted information to you (and who both of us are) and what that information was. Until they have all that information, they can't even begin to guess whether or not a crime occurred. Maybe the file contained a picture of my dog rather than a 17-year-old human, and they need to know who took the dog picture and that I sent it to you, so that they know it wasn't a copyright violation.
Of course it's absurd, but that's because the premise is absurd. Their reaction to it, is quite rational. But that's my point: it almost looks like (especially in the paragraph that I quoted) they might be calling the bluff, pointing out the inevitable consequences of having externally un-detectable things be crimes. If they weren't that clever and didn't mean to do that, too bad, but even if it's an accident, they did it.
It's not an accident, though. Look at it (emphasis mine): "if it's to remain criminal" (see the wiggle room there?) and "currently criminal" and "there is little point in [doing this] at the same time [as doing that]" and "difficult question."
I'm not saying this is ingenious, but it really is a fairly well-crafted.
An 'unboxing' is only half of the modern way of reporting on new hardware. The more interesting question in this case is "will it blend?"
The techdirt article quotes this delicious excerpt:
From our perspective in the United Kingdom, if the behaviour which is currently criminal is to remain criminal and also capable of prosecution, we consider that it would be proportionate to require the operators of websites first to establish the identity of people opening accounts but that it is also proportionate to allow people thereafter to use websites using pseudonyms or anonymously. There is little point in criminalising certain behaviour and at the same time legitimately making that same behaviour impossible to detect. We recognise that this is a difficult question, especially as it relates to jurisdiction and enforcement.
I can't even say I really disagree with that reasoning. Can't you see how there are two completely different ways to reach a conclusion from that paragraph?
You can do computer science just with paper and pen. That is entirely feasible and totally common in any computer science curriculum at any halfway decent university. Oh, you thought that computer science = programming. Well, yeah, no... it isn't and technically you can program without a computer too. You just can't run your programs.
Yep, at least, our real biology- as opposed to a made up biology from a bunch of "sexual revolutionists". It is important to separate the sane from the insane, after all.
While keeping those two groups separate, I suggest your reread (or review) "One Flew Over the Cuckoo's Nest".
You went and ruined the sarcasm.
Sorry. I missed it the first time.
The two times I've had in-store card referrals (high value transactions: the first time was buying a P3 laptop, which was quite high end in those days; the second was furnishing a new apartment after moving to Houston), I'm pretty sure it was the issuing bank ultimately handling the call - I can't imagine the bank would have transferred the personal information they were asking for as a security check to the merchant services provider: past unlisted contact details, previous transactions etc. I suspect the call may have been transferred to them, though, rather than called directly.
I had a similar issue this year with British Telecom working on a broadband fault. The service manager wanted to speak directly to the field engineer working on the fault (different divisions: the engineer's BT Openreach, the manager was BT Wholesale) - but the Openreach guy said he couldn't call the Wholesale one directly. So, the Wholesale one called my number and asked to speak to him
it is the retailer who is supposed to make the call to the financial institution on the retailer's own phone line
To be fair, the Apple Store staff tried phoning on their own iPhones first, but none of them could figure out how to hold it to get a signal, so they had to borrow the customer's phone instead...
They'd sold thousands of them. In a market counted by the millions that's very insignificant.
FTFY
"Apple didn't come from behind in the smartphone market. They created the market. "
Well, that's one view into the reality distortion field.
And I bet if he had said something along the lines of "Apple came from behind in the smartphone market and knocked the heretofore industry leaders on their asses", you'd have an equally useless and snarky rejoinder.
Sometimes the inverse RDF is just as strong as the RDF itself...
Don't feed the troll.
The hardest part of climbing the ladder of success is getting through the crowd at the bottom.