Comment Re:The private key would have to be handled locall (Score 1) 175
JavaScript virtual machines have no security between applications. Any script can replace the javascript API at run time, messing with other code running in the same window.
JavaScript virtual machines have no security between applications. Any script can replace the javascript API at run time, messing with other code running in the same window.
Any proposal in which users hand over their private keys to a third party (such as a webmail provider) should be assumed to be done with the blessing of, or at the request of, law enforcement or intelligence agencies
Where did it say in there that users would hand over private keys to a third party?
At best they would give the keys to software provided by Yahoo and running in their browser. Law enforcement could compel Yahoo to provide a backdoor to that software or they could compromise the encryption in the browser. Unlike java, javascript has nothing to stop code from a different source interfering with other code running in the browser.
Doctorow succeeds partly due to self promotion, but that will only work for a few prominent authors. Not everybody can be an editor on boing boing.
So create your own e-book and associated infrastructure.
DRM's e-books (like on Amazon) are hard to lend out or re-sell. Prices are lower but more books are sold. Taking geography out of the distribution equation means that more books can be sold, without physically shipping a supply to every corner of the planet. Simpllfying the supply chain doesn't have to mean that the producer gets less money.
Isn't that because it is burning rubber? All the burns with that engine type are dirty.
Paper eliminates itself over time but I would agree that content from Amazon is not immune to fiddling in the back end.
Come on. Nobody buys reading material from shops any more. The only bookshops which remain in my city sell junk. But I don't like the idea of buying everything through Amazon either.
Bomb belts really should have grounding points.
Its also great for detecting suicide bombers.
as it gives them
End of stream? Did the NSA not flush that last buffer they read?
If you act fast enough
GS could, if they wanted to, put a 30 minute delay in their outgoing email, or maybe a second step through a web form to authorise outgoing mail. It could be set to hold messages going to known non-professional domain names.
There is an ad for gmail business on this page.
Yeah I wonder what its support length is.
ezmlm works fine for me.
Lots of folks confuse bad management with destiny. -- Frank Hubbard