That's another advantage of forcing the snoops back to "direct access" methods -- every so often one of them will get caught red-handed snooping on the wrong (i.e. clearly innocent and rich/influential) target, re-focusing attention on them and forcing another round of retrenchment until it blows over.
Now, if a backdoor is found by the bad guys, it will be used almost immediately to destroy a company.
If it's found by really bad guys (e.g. North Korea on a day when Dear Supreme Grand High Panjandrum is feeling especially trollish), it can be publicly circulated to destroy every company.
Anybody can yell "Police" or wear a jacket reading "Police". I recall reading about at least one home-invasion gang doing just that.
Forcing them to switch to "direct access" methods puts pressure on them to follow the law. First, as I noted in my earlier comment, the non-scaling time and manpower costs (each tail, bug, etc requires significant additional resources) forces careful selection of targets. Second, "direct access" methods put the snoops at a nontrivial risk of getting caught and/or leaving recoverable evidence each time they use them illegally.
"Direct access" methods (tailing people, planting surveillance devices, etc) do not scale anywhere near as easily as network surveillance -- each "direct access" target requires a significant fixed cost in resources and manpower. This imposes discipline on the snoops and forces them to pick and choose actual suspects instead of trying to scoop up everything.
Hey, Bob, attend this class, make a list of attendees. Oh man, this is too easy!
It was easy; the instructor gave me a copy of the list. Now, we just need to pull up the physical and e-mail addresses of Mr. Dover, Mr. Jass, Mr. Jablome....
Link to Original Source
That's one advantage of mostly cooperative board games where there might be a hidden "traitor" among the players who wins if the group loses (e.g. Shadows Over Camelot, Battlestar Galactica). With that possibility on the table, players can't just trust somebody else to make decisions and have to pay attention to what everyone else is doing (usually in these games, exposing the traitor has some reward, at least insofar as it curtails his ability to continue undermining the group).
For the home market, they might not use their new UltraChrome HDR inks, but for the semi-pro and pro markets, they do. We have a 4900 here in the lab; amazing is a fair word to describe the output.
That's a nice idea, but the majority has been brainwashed into believing that any vote that's not D or R is "wasted". Ridiculous, but that's what happened.
Sadly, even the 3rd parties don't give some of us much to work with. I generally like Libertarian ideals, but the reality is that if they got everything they want we would end up with a government by and for the corporations. Which is basically what we have now, other than that they wouldn't bother to try to hide it. Greens would do basically the same, but only for corporations that support environmental causes. Those are the ones with the most support. Constitution party might be good, but are relatively unknown.
The first thing we need is term limits across the board. All the way down to local government.
Then we need to do away with the ridiculous idea that corporations have rights other than those we specifically give them. Corporate personhood needs to be abolished.
Asset forfeiture needs to be abolished as well. I don't mind the idea that you can seize property, but it needs to be in the punishment phase of a trial, not before someone is charged with a crime. And any proceeds from such seizures must not be directly available to enforcement agencies. That's an obvious conflict of interest and they were insane to allow it in the first place.
So, any parties that support such notions? The Pirate party sounds closest.. Not sure that's a good thing..
webmail kinda implies that the provider will either be storing the key or at the very least be able to access it
Obviously they need access to the PUBLIC keys in order to encrypt messages to the designated recipient. The whole point of public-key cryptography is that revealing the public key doesn't compromise security.
"secret 3G/4G reception inside of the CPU"
Ruh roh! I'd better put my CPU in the middle of a metal box or something....
The Russians thought the same thing about Simo Hayha: http://en.wikipedia.org/wiki/S...
Never underestimate the power of one man defending what he believes in.
It always was.