Google won't torture you by mistake. Well, as far as we know, anyhow.
The only weakness is that it needs to be repeated on newer ssds as they hit the market. The results of this test are relevant for drives released back when the experiment started in 2013, less so for drives released now and even less so for future drives. As the manufacturers realise that the drives are lasting much longer than they are specified to, they'll decide they are overengineered and rework them to wear out quicker. Aside from the obvious cost cutting benefit, it also keeps the market segmented in various grades between "low end consumer ssds" and "high end enterprise ssds".
> For bug tracking and reporting issues my experience has been either I get no response or I don't have the capabilities to supply the developer with the information they need to track the bug down.
You don't need to find the bug.... you just need to make it reproducible. A reproducible bug report is essentially as good as finding the bug itself; once the dev can follow your steps to reproduce it, he'll find it in short order. If you're getting no response, it's either a dead project, or your report is not specific enough. There's no upper limit on the time investment needed to solve a "it crashed when I was using it", but "it crashed when I open this file" is readily fixed.
So basically, youtube?
> "By orders of magnitude, when we find new vulnerabilities, we share them"
I wonder how many ways they've thought of to misclassify freshly discovered vulnerabilities as old.
So I assume all the deliberately introduced vulnerabilities are excluded from the tally because they technically "did not find them" ?
.. same as the old boss
> So, how to accomodate non-smartphone users? Different floors with bluetooth vs card key? Just don't go to that hotel?
They could have a box of 'loaner phones' that they hand out...
Hotel door app requires access to contacts, shared files, camera, microphone, GPS, SMS, internet, dropbox, google drive, online banking,
It's VPNs all the way down!
It seems like they are viewing tor as a "free vpn" so people can use facebook without their employer/school/etc knowing what they are doing.
Proprietary? You're ill informed. The code that writes those files is part of systemd. Anyone with a computer can grab a copy and rewrite them.
it's people in general. Anyone remotely famous gets plenty of "internet abuse". It's a side effect of being known. Politicians? check. CEOs? check. Bankers? check. Celebrities? check. Religious leaders? check. Reporters? check. Whistleblowers? check.
I can think of a $12 experiment that would answer that question
That would be because any (competent) backdoor will be encrypted and cryptographically signed with key(s) known only to the TLA. Consider a router -- it passes all packets normally unless it finds one that is properly signed, then it extracts and executes the payload, fully opening up the device to the whims of the TLA. In lieu of someone leaking or determining the key, it would be extremely hard to identify such a backdoor.