Feedback: VLC is my first install regardless of OS. Damn thing just runs anything I throw at it. Used it for years now.
I hope you're not running on Dell hardware...
Why not perhaps a more majestic creature?
Similar facial hair...
Or what about renting a server? For the RAM requirements you're going to need, you'll likely need more than the entry level offering, but the capital expenses are lower than having to buy a new computer...
At least these eight are making noise, rather than just hoping the issue fades from the public's consciousness. Here's wishing there was a telecom provider that wasn't so obviously in bed with the spooks...
It's not clear from the context whether you're calling the parent an idiot, or if that's how you normally sign your comments.
Many researchers have concluded that overuse of antibiotics is linked to the increase of MRSA. (citation)
So are you saying that if the files had been encrypted, they wouldn't have been confiscated, all of this would not have happened?
What else precautions one should make not to become the victim of one's own government? Is leaving home allowed? Is there a list of approved websites to visit?
You are making the case that the government is a bullying criminal. And while you can and perhaps should avoid getting the attention of a hooligan/bully/criminal, the government is at least in principle there for you. And in my mind this makes the situation completely different. One shouldn't bow to bullies, but having a bullying government is worse.
And yes, of course the files should have been encrypted. I wonder if they would have detained her in that case.
If the files had been encrypted (after transcription, if needed), then this would be a case about overreaching warrants and illegal government actions, not a case about overreaching warrants, illegal government actions, and wrongful terminations, as that last item will undoubtedly be the end result of the intelligence DHS has collected on the whistle-blowers.
You are right in that she shouldn't have to protect herself and her informants from the government, but such is the imperfect world we find ourselves in while we try to dig our way out of it. She failed her informants. She should have known better than to depend on legal principle to protect her informants from the current administration.
That killed it for me when they added that "feature" a few years ago now... I think it was the first major release after Oracle took over.
A bit AWK-ward, though.
Yes, I did enjoy it. So you didn't. To each his own.
p.s. Vitriol is no way to go through life, son.
Good job, Jeff! Welcome to the exciting world of security research!
I applaud you for (re)discovering these techniques on your own. Your out-of-box thinking and problem solving are to be commended, but your research skills could use some polish. Please don't let the negative comments above discourage you from exploring this rewarding field of knowledge, however I would recommend you run your findings by some existing security folks before announcing your next big discovery, lest you find you're just rehashing something else that has long been known.
Seriously; good job! I enjoyed reading how you worked your way up to your conclusions, even though I knew from the start how it would end...
While the kernel source is the epitome of transparency, and the NSA is the exact opposite, there will always be people who cannot or will not read the source. That does not mean they don't want to know some of the details so they can make informed decisions. That curiosity should be welcomed, not derided.
Instead of blowing a gasket, why not nicely suggest that a read of the source code will show that rdrand is just one of the entropy sources used, and it is used in such a way that it cannot compromise the end result. Vitriol is no way to go through life, son.
...Most of your time is likely spent parsing the patterns.
I second that. And as your rules have built up, there are likely some that have never been used beyond when they were first put in. I'd instrument your next solution to identify outliers and cull them over time so your parser doesn't have to work so hard.