Forgot your password?
typodupeerror

Comment: Re:well i'm reassured! (Score 1) 393

by G-forze (#46128523) Attached to: Confessions Of an Ex-TSA Agent: Secrets Of the I.O. Room

Please explain why wearing a beard displays a lack of discipline or lack of military readiness.

It is my understanding that beards are disallowed in the infantry, because they prevent the gas mask to properly seal around your face. (Same probably goes for fighter pilots, but in their case it's about the oxygen mask.) This would also explains why it was not a problem in the Civil War, when chemical warfare was not yet invented, or at sea where the risk of a gas attack is minimal.

+ - Inside General Fusion 1

Submitted by quax
quax (19371) writes "Slashdot first reported on the Canadian start-up company that attempts piston powered nuclear fusion back in 2009. This new blog post takes a look at where they are now, and give some additional behind the scene info. For instance, a massive experimental rig for magnetized target fusion in the US is currently underutilized, because ITER's increasing cost absorbs all the public fusion research funding. Yet, because this Shiva Star device is located in an Air Force base, security restrictions prevent any meaningful cooperation with a none US company. Even if US researchers would love to rent this out in order to advance the science of magnetized target fusion, this is a no go.

Is this just security paranoia, or should the US preferably not use experimental facilities rather than allowing foreign companies to conduct experiments with them?"

+ - NSA intercepts shipments of new computers and installs software.-> 2

Submitted by whoever57
whoever57 (658626) writes "According to an orginal report in Der Spiegel, and
secondary reporting in the Washington Post, the NSA intercepts deliveries of PCs and installs logging software or hardware on them before the customer receives them. According to a document cited by Der Spegel, interception is one of the NSA's "most productive operations"

Der Spiegel also reported that the NSA intercepts and uses Windows crash reports in order to gather information that is used to develop new methods to crack Windows machines."

Link to Original Source

Comment: Re: (Score 1) 511

by G-forze (#45800169) Attached to: US Federal Judge Rules NSA Data Collection Legal
What do you think would happen if a terrorist plot was uncovered? The NSA calls the perpretrators and tells them "hey, guys, we know what you are up to so please stop"? There would obviously be arrests and court procedures. Since we know of no trials where key evidence was collected through the NSA surveillance program, we must conclude that no such evidence has been collected.

Comment: Re: Hard to believe (Score 3, Funny) 804

by G-forze (#45794469) Attached to: What Would It Cost To Build a Windows Version of the Pricey New Mac Pro?
I bet you're one of those guys that use a pirated version of Photoshop to crop your camera phone pics at home, and then demand that your employer drops 4k on a PS license, because "GIMP is sooo useless, it doesn't even have the contrast settings in the same menu as I'm used to!".

Comment: Re:Enough (Score 1) 224

by G-forze (#45786677) Attached to: Snowden Gives Alternative Christmas Message On Channel 4

There is little room for genuine doubt that Jesus existed. The record is too extensive and close in time to his time on earth.

There is plenty of room for doubt. Actually, that is the rational stance unless one has already made up their mind before hand. There's hardly any evidence outside the bible that Jesus actually existed, most of it probably about someone else (it was a common name at the time, no wonders nor crucifixion mentioned, etc.) or doctored by some zealous monk later on.

I'd provide support for my statement, but since you didn't either I can't be bothered right now.

Comment: Re:Time for an addon... (Score 4, Insightful) 163

by G-forze (#45704121) Attached to: Facebook Tracks the Status Updates and Messages You Don't Write Too
Exactly my thoughts. This seems to be a good case for "poisoning the well", by using some simple Selenium script and a couple of e-books, for instance. Have the bot post random text snippets from the books to all kinds of people, events and pages, and then delete before sending. Make this data collection useless.

Comment: Re:Does it secure Finland-Geman comms from NSA/GCH (Score 2) 65

by G-forze (#45668143) Attached to: New Baltic Data Cable Plan Unfolding
Actually, no. Since we know from the Snowden leaks that the Swedish FRA is in cahoots with NSA and GSHQ, anything that passes through Sweden will automatically be scanned. A new undersea cable that bypasses Sweden thus has infinitely better chances of being secure.

http://www.theguardian.com/uk-news/2013/nov/01/gchq-europe-spy-agencies-mass-surveillance-snowden

We are Microsoft. Unix is irrelevant. Openness is futile. Prepare to be assimilated.

Working...