Not synonyms, but private addressing is a good way to help enforce access around internal networks that don't need outside to inside access. You can certainly set up routing that does the same thing, but you want defense in depth whenever you can.
Some of them did. The people worst affected, particularly by unemployment, are the young ones who were only children or not even born when that stuff was going on.
The Greek government has a point. The only way out is for the Greek economy to reform and grow. Endless grinding austerity will just cause another revolution. The first one was peaceful, but if it fails the next one won't be. What do young, angry Greeks have to lose?
It was illegal at the time, but they quietly changed the law a few months ago to make it legal.
What an unfortunate name though, Cameron. Imagine being named after the act of shoving your tongue up someone's arse and cleaning it out. Possible even worse than that Santorum guy.
It's the media. When it was pointed out that Twitter informs users who are the subject of data access requests by the government they framed it as Twitter tipping off terrorists that they were being investigated. Not as Twitter protecting its users from over-use of surveillance and being transparent with them, but as colluding with the enemy. It was disgusting.
Also, what kind of bizarro definition of "socialist" implies wanting a surveillance state? If anything, the more socialist states in the EU tend to be the ones that have better protections for privacy and freedom because they understand that the government works FOR the people.
Tor isn't compromised, it's secure for what it does. Compromised end points are not something it is designed to protect against. It isn't a substitute for HTTPS or checking certificates. It doesn't stop you being an idiot and giving away your location or software on your computer leaking your real IP address. That's not what Tor is.
Also, passwords on zip files have actually been effective for over a decade now, when AES encryption was added. Zip file encryption is now actually quite good, covering both data and filenames, and using a secure hash to generate the AES key from your password. Essentially it is as strong as the password, and has been since V6.2.
When a Government must lie to the populace it is supposed to represent, and must operate in extreme secrecy, it is no longer a Republic.
Just because we are not seeing Government death squads you believe we are still being ruled by the people? If you really believe that, I'd recommend a lobotomy. The West has been gone for at last three decades, only existing as a fantasy for the masses who have enough "entertainment" to maintain the fantasy.
Party Votes Seats
Conservative Party 11,300,303 (36.9%) 330 (50.8%)
Labour Party 9,344,328 (30.4%) 232 (35.7%)
UK Independence Party 3,881,129 (12.6%) 1 (0.2%)
Liberal Democrats 2,415,888 (7.9%) 8 (1.2%)
Scottish National Party 1,454,436 (4.7%) 56 (8.6%)
Green Party 1,157,613 (3.8%) 1 (0.2%)
So as you can see, 3.8 million people voted for UKIP (a bunch of wankers, but still...) but ended up with just one MP and no power at all. The greens got the same number of MPs with juste 1.1 million votes. Only 1.5 million people voted for the SNP and they got 56 seats.
The system is rigged so that power is always held by either Labour or the Conservatives. No-one else can get a look in, even if like UKIP they manage to gain quite and impressive amount of support. 12.6% of the vote, 0.2% of the seats. See how it works?
So at election time the choice is basically Labour or the Tories. The Tories will sell our freedom off with glee, and Labour aren't much better. But no-one cares about that come election time. Since the system is designed to avoid hung parliaments and any kind of power sharing it tends to produce totalitarian governments who rip away our rights and freedoms (human rights are being flushed away as we speak).
Jean Charles de Menezes died because of botched surveillance. Many others have had their lives ruined, and we are all diminished by giving up your right to privacy. The "cure" is worse than the disease.
Sadly, there will still be a push to outlaw encryption just like there is a push to outlaw guns. Everyone should know the consequences of giving up everything to the Government. Cretins have always been attracted to public offices. Rights for you are expendable as long as their rights are covered. Every government in history has had to be overthrown because of the same damn problems. Too bad we never learn.
Can the politicians! Order the code red! Don your helmets! E... Dang it, I'm out of ideas for my cypher....
The email was sent to Amnesty International yesterday, and while it conceded that the organization was indeed the subject of surveillance, no explanation has been offered. It is now clear that, for some reason, communications by Amnesty International were illegally intercepted, stored, and examined. What is not clear is when the spying happened, what data was collected and, more importantly, why it happened.
There's better options than PBKDF2, like scrypt. Also, both require you to chose some parameters; PBKDF2 with a salt of String.Empty, hash algorithm of MD5, and iteration count of 1 is... just an MD5-hashed password. Obviously, those are terrible and stupid parameters, but if people were *good* at choosing secure options then this whole thread wouldn't exist. At least scrypt *only* has the work factor, and it's pretty straightforward.
There's generally no way to send the user a secure (i.e. encrypted) message. All you can do is make the token short-lived and hope that nobody is intercepting server-to-server email traffic (and that the user's email account is secure, both from malicious clients and from server-to-client interception). It sucks, but until email encryption of one sort or another becomes more ubiquitous, it's the only workable option.