It wasn't anything to do with freedom that gave the Nazis their power. It was the economic devastation (and huge damage to the national pride) caused by the outcome of the first world war that gave Hitler his foothold.
Actually, that would be really cool. Run Android under a hypervisor (Hyper-V maybe? It's a Type 1 so runs on the bare metal) and allow it to just open up in a window and communicate over the VMbus with the management OS (under Hyper-V, there is no host OS - the OS you see is actually just another VM but with access to more information about the metal it's running on). Possibly even snap it to the side somewhat like the Xbox One (actually, why can't Hyper-V be snapped?). Be awesome for devs.
Of course it overwrites the boot sector - how else would it enable the boot loader to run? Complaining that it installs the boot loader is just stupid. And expecting them to add Windows to grub's conf file is a bit rich, considering I don't believe I've ever seen a Linux install suggest "Do you want to install the boot loader, or add Linux to the Windows BCD?"
Ah, well. I didn't read the app summary, just the kickstarter update. Oops and oh well. Still, the goal is to have it work on RT as well (at least that's how they sold it to us in the kickstarter campaign).
You just described the adult webcam site business model, you know.
I tend to think Visual Component Library.
A file browser likely can't be done, since apps are sandboxed.
Because the whole point of writing VLC for Windows 8 was so they could port libvlc to Windows 8, which means that it can potentially run on Windows Phone and Windows RT without modification. They haven't done a phone app yet, but this release can run on Windows RT as well.
Also, it's open source. So others can leverage the work they did for media playback on Windows Store apps.
Except that the comment I replied to was specifically in the context of "Why hasn't the Disasters Charter been activated to find this plane?" and the answer is, "because this isn't a disaster of great enough magnitude".
Though we're now learning that more than a couple of spy agencies are turning their surveillance resources onto the task (finally! The NSA might be good for something!)
Simple. This doesn't meet the criteria required to activate a giant global collaboration of space agencies. There needs to be more than 200 people lost to invoke the charter.
However, I think the fact that the school initially denied what they had done and then reconfigured the network is quite telling.
No, it really isn't. Take off the tinfoil hat, the most likely scenario goes thus:
"No, we don't intercept SSL communications, student."
"Hey Bob, looks like we left that setting enabled that installs the CCA certificate on client devices."
"Ah shit. Can we disable that?"
"Yeah, but it's gonna mean restarting the ASA."
(Restarts ASA. 5 minute IOS boot time ensues)
The big difference is between this and the OP, though, is that my company owns these laptops.
Yeah... and you and YOUR COMPANY (rather) potentially get to share liability with your service provider, in the event that your CA's private key facilitates the commission of fraud or some other crime against the user, for example, if the zScaler CA or zScaler's infrastructure is used to steal banking information or PII from someone using one of these laptops; the person can sue your company and/or Information Technology professionals responsible for the intercept or misappropriation of information.
For what it's worth though.... the user could also sue if there was a keylogger installed on it by your company that lead to to damages against them, or possibly if there was malware -- that the owner of a laptop had a duty to prevent or detect.
It doesn't matter that your company owns the laptop. Legally you can surveil the activity of the laptop, BUT there is a duty of care that comes with you and your company's choice to do so and legal owernship of the laptop.
So your company best be darned 100% certain that zScaler passes all due dilligence for protection of crypto secured information.
Well, actually, no, since the devices are provisioned for work use. If your bank or passport details are stolen because you used your WORK laptop on the WORK network to access those PERSONAL sites, that's on you. The company only has a duty of care to protect information they know thy have.
I'm guessing the software they get students to install is Cisco Clean Access, and the CA is most likely only available by logging onto the Cisco device doing traffic management and network protection. "Protection" of the CA would be unnecessary, because it's entirely probable that it's not even possible to get the CA private key.
Most likely the IT staff didn't even realise that they had root CA provisioning enabled - Cisco configurations are usually mazes of poorly documented switches, commands and screens.
I would indeed contest that they are in part indirect methods of paying. Because they are not in part indirect methods of paying, they are in whole indirect methods of paying. And considering you said "Fuel, cars, land, and other big ticket items are now sold directly with Bitcoin" - you are wrong.
And no, a credit card is not "indirectly paying" either. It's directly paying as it is a direct transfer of funds from one party to another. Indirect is something like Paypal with an intermediary collecting the funds. And all those other options you mentioned are also indirect.