I wonder what the fallout will be for Mozilla. The definition of marriage varies through out the world. How will Mozilla and Firefox be viewed in parts of the world with a different marriage definition now that Eich was forced to resign? I believe there will be unintended consequences, some negative consequences for Mozilla and Firefox in the developing world.
How do you define marriage? That seems to be the issue. The definition in the USA is changing, but it varies through out the world. Is marriage defined as
Between one man and one woman who are both adults
Between to two consenting adults
Between one man and up to four women
Between one man and many women
Between a man and a girl entering puberty
Between a boy and a girl as dictated by the families
Or something else that is less common than the above
What determines what is acceptable? Is it trampling on one's human rights if you disagree with some of the above options? How will Mozilla and Firefox be view in parts of the world with a different marriage definition if Eich is forced to resign? There are likely unintended consequences if Eich is forced to resign. Is this the best way to advance gay rights?
After the hearing, De added that service providers also know and receive legal compulsions surrounding NSA’s harvesting of communications data not from companies but directly in transit across the internet under 702 authority.
De and his administration colleagues were quick to answer the board that companies were aware of the government’s collection of data under 702, which Robert Litt, general counsel for the director of national intelligence, told the board was “one of the most valuable collection tools that we have.”
But what was not said was
Neither De nor any other US official discussed data taken from the internet under different legal authorities. Different documents Snowden disclosed, published by the Washington Post, indicated that NSA takes data as it transits between Yahoo and Google data centers, an activity reportedly conducted not under Section 702 but under a seminal executive order known as 12333.
So they did not lie but they did not tell the whole truth either.
“Hacking routers has been good business for us and our 5-eyes partners for some time,” notes one NSA analyst in a top-secret document dated December 2012. “But it is becoming more apparent that other nation states are honing their skillz [sic] and joining the scene.”
This is the really scary part. Other nations are doing it and soon criminal organizations will be doing it, if not already. They are destroying the internet as we know it. Purchase something online and have your money routed to elsewhere or have your credit balance jump to new heights as others use your credit information. Here is a possible senario: "You charged me for 10 widgets." "No sir, we charged you for one and you received it. We did not receive money for 10 but only for the one."
It does make sense. The summary confuses things and the article is not much better. But if you start with the very last sentence of the article it starts to make some sense.
"Asteroids’ compositions tell us about where they formed. Where they are today tells us the whole evolution of where they’ve gone since," DeMeo said.
The composition of an asteroid tell us where it was formed. The old theory was that asteriods can be found close to where they were formed and there was some evidence of that, however with a larger sample the theory is found lacking and things are more complicated. At least that is how I read it.
My big concern is how easy it is to abuse this information in big ways.
"Mr President, we have information from an anonymous source (wink, wink) that you opponent is talking to Joe Smith. Now we know (wink, wink) that Joe has some connections to some shady characters. Your official reelection campaign does not need to worry about this. I am going to pass on this information to some of your supporters and they will break the news with some attack ads."
That temptation is use this information to gain an advantage is great. The argument that it will only be used to fight terrorism assumes that those with access will always work for the good of all and ignore any personal advantage they could gain. We all are by nature selfish and will usually act to our advantage. That bunch of good old boys that will not always do the right thing, especially since they operate in secrecy with minimal checks. It is too easy to abuse this information.