So, that's all right then. No evil done here. Move along.
It's terrifying, really, that it seems like there's no granular, highly-tuned security system in-place for all this; rather a "You have permission to view", "You do not".
To reply to myself; no, the shock and horror should be that there is a database out there with everything in it.
Shouldn't the shock and horror be that Snowden was able to scrape the juiciest pages from the NSA information dump on basically everyone, without so much as a 403 error?
I used Plex and Chromecast all over Christmas. It streamed very well indeed. It'd occasionally crash (as in the movie would stop playing suddenly), but it'd usually remember where the movie got to, and pick up where it left off - and I never needed to restart the media server.
All in all, very impressed with how Plex and Chromecast play together - mixture of file formats / quality were attempted, and all played at first time of asking.
As a by the by, I'm British, and got mine via the grey-market; if you're considering it, I can highly recommend it. All I need now is an UltraViolet player for Flixster, which will hopefully come with the SDK out, and my movie needs are completely sorted.
The best manager I ever had was non-technical.
The worst manager I ever had was non-technical.
The best manager was best, because she was a superb manager of people.
The worst manager was worst, because she was a crap manager of people.
not collecting everything, but we do need the tools to collect intelligence on foreign adversaries who wish to do harm to the nation and its allies.
Like the Germans, French, Spanish, British, Israel and other Americans?
The majority of posts, on
This guy has effectively destroyed his own life, and the lives of those around him, to tell us, the plebs of the world, the truth that our Governments have been hiding from us.
And you're tearing a strip off him?
All they need to do is drop an 'A'.
Posting to cancel moderation.
£500 a year for 20 users, and 15 GB?
Another service offering:
SpiderOak uses AES256 in CFB mode and HMAC-SHA256. SpiderOak uses a nested series of key scopes: a new key for each folder, version of a file, and the individual data blocks that versions of files are composed from. Having keys with such limited scope allows for selective sharing of chosen portions of your data while keeping the remainder private.
Most importantly, however, the keys are never stored plaintext on the SpiderOak server. They are encrypted with 256 bit AES, using a key created from your password by the key derivation/strengthening algorithm PBKDF2 (using sha256), with a minimum of 16384 rounds, and 32 bytes of random data ("salt"). This approach prevents brute force and pre-computation or database attacks against the key. This means that a user who knows her password can generate the outer level encryption key using PBKDF2 and the salt, then decipher the outer level keys, and be on the way to decrypting her data. Without knowledge of the password, however, the data is unreadable.
SpiderOak accounts also include a 3072 bit public/private RSA key pair. This is currently not used for anything, but is included with all accounts with the expectation that SpiderOak will add multi-user private collaborative and sharing features which would necessitate the use of the the public/private keys.
I will give you that. I'm hoping a new Doctor gives it a chance for a personality reboot. And writers reboot.
e-credibility: the non-guaranteeable likelihood that the electronic data you're seeing is genuine rather than somebody's made-up crap. - Karl Lehenbauer