There is a standard, it's called MirrorLink. Even Apple supports it.
The problem is that if they do prosecute you in the UK the failure to mention when questioned anything you later rely on in court can harm you defence. It is assumed you making it up later if you didn't mention it when questioned. Maybe you could convince a jury you just didn't want to talk to the police, because they are well known for being corrupt scumbags, but it's one hell of a risk.
Some manufacturers, like Toyota and Subaru, have been offering MirrorLink capability for a few years. It lets you mirror your phone screen to the in-dash screen, complete with touch control, and you can use any navigation app you like.
Already exists, it's called MirrorLink and several manufacturers of cars and after-market head units support it. There is also the proprietary but well hacked Pioneer AppRadio. Plug your phone in and stash it out of the way, the screen is fully mirrored with touch control in the dash and you can even use the car's GPS antenna.
Toyota and Subaru both offer MirrorLink capable head units, even as standard on some models. No real need to replace it when you can replace the entire UI, unless you really need a bigger amp.
Most of us are gonna have to trust someone at some point. We can't build our own CPUs out of sand, we have to hope that Intel didn't install an NSA sponsored backdoor. Fortunately all the evidence so far suggests that the NSA avoids creating pre-exploited hardware and firmware, instead relying on more subtle techniques like weakening encryption or making use of genuine bugs. Maybe they insert a few bugs too, but again the evidence suggests that using systems like Tails is pretty effective.
At any rate, it seems to be far better than using Windows, even if I haven't personally audited the millions upon millions of lines of source code needed to build it.
Tor mitigates traffic analysis attacks by padding data, generating extra random packets, combining packets it is forwarding or splitting them up again etc.
The problem is that it isn't clear from Theo's statement if they are dropping support just for old platforms, or if they are dropping Win32/64 and MacOS support as well.
True, but if you are that paranoid you can use a VM with the hardfile in an encrypted container on the host OS that is protected by a keyfile.
It's actually a nice way to do it because you can have the host OS as something like a read-only bootable Linux DVD, and use it as an outer layer that somewhat mitigates attacks on the host OS. For example if the host OS was running a VPN/Tor and sending all traffic from the inner host OS over that there would be no way, short of the user making a mistake, for the host to get the IP address of your internet connection. It also prevents apps in the host OS from leaking data outside of the VPN/Tor, and allows you to spoof the network card's MAC address at a (virtual) hardware level, and limits hardware fingerprinting of the machine the host is really running on.
You can also Wireshark the host OS if you are really paranoid, see if it sends any packets to nsa.gov.
The problem is that in order for people who do a public facing job where their personal reputation and popularity affects the company's fortunes to have free speech without consequences everyone else would have to be forced to support the company no matter what. Boycotts could be made illegal, but how would you stop people uninstalling Firefox after his appointment?
Like it or not personalities matter when it comes to CEOs. Remember all the personal hate for Bill Gates and the way he acted at Microsoft? All the love/hate for Steve Jobs, who arguably was responsible for much of Apple's success due to his strong personality, his outspoken views and "reality distortion field". There have been endless cases where people paid to advertise a product have been dropped over things they did or said, because their actions tarnish the advertiser too. At least in the case of a CEO they have some involvement in the thing being tarnished and aren't just a pretty face.
I agree that leaks are worrying, but in this case I'd argue that donations to political campaigns should be public. If someone without money to spare wants to endorse or promote a cause they have to speak, revealing their position. Just because you can afford to give up $1000 shouldn't excuse you from that responsibility. Yes, you are free to say what you want, but you are never free from the consequences.
Actually it's demand from the networks that keeps the IMEI writeable. They want to buy phones in bulk from the manufacturer, program their own IMEIs and load up crapware, and sell them to customers. When the customer decides to upgrade they will offer some pittance for the phone, then sell it on to another network in another country who change the IMEI and sell it to their customers.
The argument doesn't extend to areas other than lighting. I can only drive one car at a time and the time spend driving is mostly limited by the fact that I need to spend 8 hours a day working and maybe 10 eating and sleeping, so have to keep commuting time down no matter how cheap it is. Similarly I can only watch one TV at a time, so there isn't really much point turning two on. Even if I did a modern TV uses less than half what an old CRT did anyway.
A lot of the techniques for reducing global warming involve removing the need for things like air conditioning and heating most of the time by making buildings more efficient. If there is no need for air con most of the time I'm not going to use more of it under any circumstances.
With lighting specifically I'd be amazed if demand had increased faster than population growth, considering we went from a 60W incandescent bulb to a 15W CCFL and now a 6W LED. In a few years when LED is the main type being sold there would need to have been a 10x increase in lighting use just to maintain the old level. Do you have any citations for the claim that it has gone up?
You should use a passfile as well as a password. Makes it much harder for an attacker because something like a hardware keylogger or audio analysis to recover keystrokes can't see which file you selected. When it comes to breaking your key there is no way to know after the fact that a keyfile was used, so they will probably waste a large amount of time trying a dictionary attack on the password before even realizing that they need to also try any of the 100,000+ files on your computer as well. That is assuming you used a file on your computer, if it was on an external drive they didn't collect when they grabbed it they are screwed. Keep a few corrupt USB flash drives around just to make the wonder if they had it but broke it.
Yes, but who will audit the audit? Because it is open source we can meta-audit, much like how Slashdot meta-moderates. Otherwise the audit would be useless to us, much like a corporation paying for an audit of itself and presenting that to the public as proof of its good work.
Obama and Clinton have both publicly reversed their positions, Eich has not so we must assume his has not changed. It's okay for people to be wrong about stuff, as long as they acknowledge that when they realize.