And to some, "research" means gathering evidence, conducting experiments, interpreting the results, publishing, getting peer-review, incorporating peer review and possible re-publishing.
To others, it means reading a bunch of unattributed stuff from the web.
I'd rather see bugging of rooms and physical observation of actual suspects rather than weakening the security and rights for absolutely everyone.
Besides, it's not like organised criminals will stop using encryption just because it's illegal. (I almost can't believe we're talking about effective encryption being illegal)
Tor provides anonymity. It does not provide authenticity or secrecy, and doesn't pretend to. If you want those things, you should use something else in addition to tor. For example, TLS or SSH might suit your needs.
Indeed. But that's a different class of problem. Or are compilers optimising constant time comparison routines to not run in constant time these days?
Use a language that does bounds checking automatically. Its not the 1970s any more.
(I hope the sarcasm in my comment was obvious.)
Programmers are human. They'll make a ton of mistakes
Humans make certain classes of mistake. Things like array bounds checking are really easy to miss.
If only machines were good at this stuff. How come we don't have any languages that do this for us yet?
1) Go is a modern "better c from the people who didn't bring you c++"
2) Go is designed from scratch to make concurrent programming simpler, and believe me they achieved this.
3) Go is fast, portable, lightweight, simple.
4) Go is designed and worked on by the likes of Rob Pike & Ken Thompson.
5) Programming in Go "feels" like c, but with the simple expressiveness of a scripting language. It's both low level and high level, depending how you use it.
6) The standard library is really good, especially given that go 1.0 only came out in 2.12
7) The community is even better.
And they achieved this without DRM as a part of the standards.
Just like it did for music?
Someone did I believe, but it doesn't support encrypted root filesystems out of the box.
Also your eyes get to see the unencrypted content. You have to trust that your eyes know what they are doing and how to keep a secret.
You can do that with your hosts file instead. Or use an alternate DNS server. Or run your own. (etc.)
Saying that someone can understand my code because I followed some coding standard is like saying someone can understand the rocket engine I built because I used standard sized screws to assemble it.