Doesn't matter how simple it is. Once the tool is created its simple for the end-user to break into their phone. Nothing stopping a malicious group creating a similar tool to pwn your phone instead.
DHT is very reliable. Once a node has been connected a while and established links with many other nodes, traffic is quick and you have the redundancy of many 100s of connections.
Encrypting the data prior to transport and using DHT would be no worse off from TOR.
I wouldn't firmly say SSDs aren't less reliable per se, they just have a limited but measurable lifespan. Being measurable is very important when purchasing with reliability in mind, as drive death can be predicted.
When SSDs were in their infancy they were plagued by problems, but we are passed those times. Nothing is in concreate however, I am on the fence on this subject as SSDs haven't been around long enough to make any solid judgements, but I'm leaning towards the fact that SSDs will out perform spinning disks in every area eventually, even reliability.
http://www.passwordmaker.org/ is what I actually use. It allows you to create per-site options if required.
I too get this issue.
It is repeatable by moving the cursor along the bottom edge of a monitor boundary and bringing it up at the other side a few times.
This is also the fastest way of returning the cursor back to normal.
I have had this issue for nearly 3 years with countless driver updates, no fix in sight.
The summary switches between third-party and first-person perspective multiple times which is confusing.
Is this the quality standard we are to expect from Slashdot now?
Man must shape his tools lest they shape him. -- Arthur R. Miller