I'm assuming the MPAA spent good money creating their stupid protocols too; from the Content Scramble System to HDCP.
Spoken out of true ignorance.
Obscurity doesn't work for *any* form of security; someone will figure it out and then it will be broken.
Good security can be published and peer reviewed and is *still* secure.
The only thing that should be obscure is your encryption key.
And I'm not just talking about creating new ciphers. Even when I go to them with novel requirements that seem to demand some sort of new construction using existing algorithms and techniques, the very first thing they do is go to the literature to see what has been done, how long it's been in use, how widely it's been reviewed and analyzed, etc. The less knowledgeable (like me, frankly, though I'm getting better) tend to start by cooking up some new scheme. Real experts avoid that if at all possible, and if they have to do something new they look really hard at how they can prove its security by reducing it to known constructions.
I reiterate: No one who knows what they're doing creates new crypto for production work.
There's no such thing as 'water proof' -- everything is simply water resistant up to a certain level, see http://en.wikipedia.org/wiki/I...
What we really need is IPv8, based on IPv4 with a larger address pool and no other irrational changes to the protocol. IPv6 simply adds too much complexity to the system.
The vast majority of IPv6 addresses being assigned aren't routable anyway -- do you really think those random local addresses you gave on your LAN at home can be globally routed from anywhere? Sure, if you get an assignment from your ISP, but do you really want your home alarm system, clock radio and fridge globally routable in the first place?
Why do you believe IPv6 routing is faster than IPv4?
Don't confuse people with the facts -- money spent on their own pet subject is legit, and money spent against it is wrong of course.
You might want to consider understanding the language you use before making a point in it
Weak encryption is *worse* than no encryption because it gives people a false sense of security they shouldn't have. It makes them feel safe to say or do things they wouldn't do if they realized how bad the encryption they're using really is.
I was thinking the same thing -- I've even used kernel code to explain certain C techniques to new programmers.
I have the same comment about nearly every networked camera system ever.
That's a flood-length post? How much do you suck at typing exactly?
Those 174 words took me no longer than 2 minutes to write; maybe you should do something more productive than troll.
Actually they have 16 GiB of RAM; its a number very close to a billion but based on powers of 2 instead of 10.
Words have meanings, and so do prefixes; the metric numbering system was usurped (stupidly) to mean something it didn't mean.
One wonders if disabling that last 500MB of RAM would in fact improve performance.