All apps are run in a sandbox. Unless there is some major privilege escalation exploit that also escapes the sandbox, this is extremely unlikely. I haven't heard of it ever happening in the large number of apps published so far.
OSX is far more open than Windows ever has been. The kernel and many of the non-Cocoa user apps are available under an open source license. It's mostly GUI components that are proprietary (but hell, you could always use Xorg).
They've never used the TPM chip.
They've always relied on modern computers having EFI disabled. (Most computers ship with the Framework, which is EFI based, but EFI support is complete disabled and only the BIOS compatibility mode is used.
bfwebster writes "Orin Kerr over at The Volokh Conspiracy (a great legal blog, BTW) reports on a US District Court ruling issued just last week which finds that doing hash calculations on a hard drive is a form of search and thus subject to 4th Amendment limitations. In this particular case, the US District Court suppressed evidence of child pornography on a hard drive because proper warrants were not obtained before imaging the hard drive and calculating MD5 hash values for the individual files on the drive, some of which ended up matching known MD5 hash values for known child pornography image and video files. More details at Kerr's posting."Update: 10/28 16:23 GMT by T: Headline updated to reflect that this is a Federal District Court located in Pennsylvania, rather than a court of the Commonwealth itself.
A. B. VerHausen writes to tell us that over 200 release-critical bugs continue to push back Debian Lenny's release date. Originally slated for a September release, there is still a long road to be traveled before Lenny sees the light of day. Project leader Steve McIntyre says they may consider dropping some packages for the release if they continue to cause problems, and while an end of October release is the goal, only time will tell.
from the accurate-problem-bad-analysis dept.
A recent examination of current scientific publishing methods shows that they are problematic at best, treating the entire process like an economic system, with publishers as bidders at an auction, authors as sellers, and the community at large as consumers. "The authors then go on to discuss a variety of economic terms that they think apply to publishing, but the quality of the analogies varies quite a bit. It's easy to accept that the limited number of high-profile publishers act as an oligarchy and that they add value through branding. Some of the other links are significantly more tenuous. The authors argue that scientific research suffers from an uncertain valuation, but this would require that the consumers — the scientists — can't accurately judge what's significant. "