You still haven't answered the question to the problem at hand.
How do you securely exchange a one time pad in the first place, if all of your communications are being monitored?
That is the one and only thing public key crypto does. Nothing secret needs exchanged, and the only thing needing exchanged is perfectly fine to be public knowledge as it doesn't let an attacker do anything.
(Well, it would let the attacker send you an encrypted message that only you can read - but that's not a risk, that's precisely how encryption should work)
Apple is pushing for user privacy. This means that the voicemail would be transcribed by Siri on *your* phone. Nobody else would have access to it to store it or scrape it or learn from it. Not in "the cloud".
Erm... When you ask Siri a question, your voice gets recorded, the file gets sent over the Internet to Apple's servers, which do the voice recognition, and send the equivalent text back to your phone so it can act on it. It very much happens in "the cloud." Just like Android's voice recognition. (Which by the way predates Siri by about a year - I was using it for sending texts and doing web searches before Apple ever announced Siri. Google just didn't come up with the "brilliant" idea of anthropomorphizing it and and giving it a name.)
Anyway, this feature has been on Sprint phones since 2011, when they integrated Google Voice with your Sprint account (your Sprint phone number is your Google Voice number). They tried to sell it as a value-added feature at first, letting you try it for free for a month, charging a monthly fee if you wanted to continue to use it. But with Voice's integration into Hangouts last year, it seems to have become free. I'm getting it and I'm not paying anything for it.
I'm actually surprised at how accurate it is, though it obviously has problems with proper nouns, and when peoplespeaksofasttheirwordsslurtogether. On your computer, it's been available since 2009 with Google Voice (arguably Google made it to collect a varied sample of real-world speech to improve their speech recognition algorithms, not to showcase how good their voice recognition algorithms were.)
Why can't Alice and Bob agree that they will use the text of the first article posted on Slashdot after noon Central Standard Time each day that they have a message to send as their one time pad? In that way avoid the issue of having to transfer the pad between themselves in advance and they have a new text available daily.
How is Alice supposed to inform Bob of this scheme in the first place?
If I am intercepting their communications, I will know of their scheme and have the same access to Slashdot at noon CST to obtain their daily key just as well as they can.
If Alice and Bob do have some "magic" method to communicate this scheme, then why should they bother with the encryption scheme in the first place? Just use the "magic" method they would have used for all their communications since it clearly must be secure, right?
So... for a long time, various encryption algos were considered weapons and subject to ITAR controls. The same is starting up again now.
So... if code can be a weapon, a (very) loose interpretation of the 2nd Amendment and some Castle Doctrine would already allow someone to hack back
Even that very loose interpretation doesn't quite fit.
The second amendment after all only says we the people may posses weaponry, it isn't a blanket licence to shoot at just anyone willy nilly, let alone a license to kill someone.
At least so far it is still not illegal to simply own an exploit or its source code, which is a more fair comparison.
One might argue that it should/is legal to counter-hack a system, but to keep the comparison, only so long as they are the one that attacked you first.
The moment you attack some poor smuck infected with malware doing the attackers bidding, it is no different than pulling your legal to own and have firearm and shooting the mailman that brought the ransom note to your door.
That is murder far and clear even with the second amendment and castle laws.
Most attacks these days are carried out through such proxy systems, be they n00b level windows malware, or zero day exploits against a fully patched and updated system (which I don't think anyone can possibly blame the systems owner for), and should be just as illegal to attack them as to counter attack them.
Our fear is that won't be the case. Many innocents are at risk with this plan.
Not to mention, all a black hat hacker has to do is form a corporation, then wait for the inevitable botnet scans and "counter hack" all those infected zombies.
Now this law just made legal any hacking done by those with unsavory intentions. Yeay?
It's bad enough on the Internet these days, but this certainly will not make a climate I wish to be involved with at all.
"Furthermore, why all the hate over the credits? Tesla collects government incentives, Oil and gas companies collect government incentives, other automobile manufacturers collect government incentives."
So, your argument is that multiple wrongs make it right? Incentives are driven by special interests with inequitable influence. Let the people decide in a free market.
The amount collected in fuel taxes far, far exceeds the government incentives the oil companies receive. About $41 billion in 2012 vs about $5 billion/yr. So you can think of the oil companies subsidies as a fraction of the collected taxes apportioned to encouraging R&D into new oil production/consumption technologies which the government thinks will help in the long-term.
Nice assertion. I'll counter with one of my own: Battery swapping has negligible effect on the ability of EVs to compete with ICEVs for consumer travel. The only case where it's of use is in long-distance, non-stop travel, which is a miniscule percentage of road miles and which can in most cases be done with a rental vehicle.
You're thinking too rationally. People aren't rational. They buy a car and think that the miles they put on it are "free" (except for the cost of gas). I try to explain to them the required maintenance and depreciation they put on the car from a long trip means the rental may in fact be cheaper, and their eyes glaze over. I completely agree with your idea of using rental cars for long trips. But unless you can convince people that driving their own paid-for car incurs a cost beyond just the gas they use, the range on EVs is going to continue to be an impediment.
As long as the people in the car need to refuel every few hours, all you need is enough range to go as far as the people can, and a sufficiently-fast recharge time that by the time the people eat the car is ready to go again.
What's needed for EVs to compete isn't battery swapping, it's lower prices for vehicles with adequate range. The Model S has the range required, now.
No it doesn't. A 30 min supercharge only gives you a 50% charge, which is about 140 miles, which is a bit over 2 hours at highway speeds. Nobody I know stops to eat every 2.5 hours while on a long trip. (And no, solar won't help. People vastly overestimate the energy density of solar. Even if you covered the car with PV cells and drove under the mid-day sun, the solar energy you harvest would only extend the range about 5-8 minutes further for each supercharge. On average, the solar would only push the car about an extra mile between supercharges.)
There was never any room for Plus. instead of recognizing a subset of users who enjoy social media and offering a better product, Plus focused on offering the same product.
That's probably the best way to summarize it. Aside from shoving it down the throats of Youtubers and Gmailers who didn't want it, my biggest problem with it was that they dumbed it down to Facebook-levels. There's a Picasa plugin for Lightroom which makes it (relatively) easy to sync my DSLR photo database with my online photos on Picasaweb (Google gives you free storage for photos up to 2048x2048 resolution, so I just downsample my web photos to fit on a 1080p monitor).
When I first tried G+ and learned about circles, I thought it was the greatest thing since sliced bread. Not only would I be able to mirror my photos online, I'd able to selectively choose who got to view them via what circle I put them in. When I actually tried using it though, all the album management tools and a lot of other options which were on Picasaweb were gone. G+ Photos was basically Picasa stripped of nearly all the features except those those for using it to view pictures in a web browser - they dumbed it down to Facebook levels.
Eventually I learned I could still access the old Picasa tools (and my albums) by going directly to picasaweb.google.com, but none of the half dozen people I met who also used to manage their online photos with Picasa but had gotten slurped into G+ knew the site was still available. They'd just been living with the limited options in Google Photos or had switched to something else. So Google tried to put together different products to make G+, but to make it "competitive" with Facebook they stripped many of the features which made people use those products in the first place.
I guess it means:
a) We rent existing but empty channels/fibers from providers (otherwise 5M would be impossible)
b) We dont connect it to the internet; although they sadly dont mention if they have a private internet (not news) or if they use another protocol to avoid the negative side effects of TCP/IP (little news, unless they show the numbers)
c) If I assume they are talking about 10 to 100 Gbit per second, then it would not be so fast) as far as I understand, single channels in fibers go up to 40GBit/s
We have an existing and quite inexpensive container ship network. Is this rail project going to be cheaper than that?
Container ships are cheaper than rail. Their disadvantage is the labor-intensive step of loading and unloading the containers to/from the ship. For a couple hour trip across the English Channel, the loading/unloading cost is disproportionately large compared to the transport cost of the ship, so it makes economic sense to replace it with a tunnel or bridge.
But for cargo across the Pacific, the loading/unloading cost is roughly on par with the fuel cost. So based on the link, even if you doubled the cost per mile, container ships would still be price-competitive with rail. So there's no economic benefit to be gained by shipping goods from China to the U.S. by rail over a Russia-Alaska bridge. Add in the cost to build the bridge and it'll actually be more expensive than container ship. The only advantages you'll get are reduced transport time (from about a month to a week), and the ability to send containers directly by rail to more destinations than just port cities.
Me, I want Android to return the ability to selectively turn off stuff that apps can do. If your app keels over because I won't let it access my contacts, I don't want your fucking app.
If your phone is rooted, you want xprivacy (requires xposed). It lets you selectively control what info apps can access, plus it'll feed fake info to the app which refuses to run if you don't let it view your contacts or location or whatever. Works with Android 4.x, requires the alpha version of xposed for Lollipop.
If you want to put yourself on the map, publish your own map.