Churches and other religious affiliations are not allowed to perform marriages in general. They can perform a church wedding afterwards, but that's a private decision of the couple and has nothing to do with the legal marriage.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
If you don't want to serve some groups of people for whatever reasons, you aren't open to the public. And then you have to say that first, e.g. by calling you a club or a closed society.
Otherwise why would they care about the sexual orientation of someone else? As long as they don't actively look for a mating partner, the sexual orientation of everyone else is none of their business, the same that it's none of their business what type of wallpaper that person has in his bedroom.
I know the buggy whip maker is some nice metaphor, but some people don't think it through.
Lets say you have two systems A and B. System A has very important data, and it is important not only that the data is protected from access, it is also important that if it is accessed unauthorizedly, to know at least, if any data was sent to the outside. System B is less important and in a DMZ. If system B is compromised, you just power it off and reinstall it from a known good backup, but normally you don't do a thorough forensic analysis, you might not even have the right monitoring in place as there is no important data on system B (maybe it's just a web server serving static content like pictures for your corporate website, data that is known to the world anyway).
With this attack you can tunnel data from System A to the outside without the attacked being aware. Even if the victim does a thorough analysis of system A and all paths from and to system A known to the victim, it will be not aware of the actual data leak.
So yes, the severity is low, as the attacker has to be within your LAN in almost all scenarios.
You can still deplete your supply of renewables by using more than the refill rate - at least temporarily.
The problem I have with laws like this is that you ONLY catch the stupid people anyway.
Always remember: They have to succeed only once. Yes, a smart criminal might get away again and again -- until he doesn't get away any longer because of some stupid mistake. Outside of our special talents, knowledge and education, all of us are stupid.
I for instance would buy one as soon as they are affordable.
The League tried to conquer the Union states with two armies, the Bavarian army led by Gen. Tilly, and the Imperial army lead by Gen. Wallenstein (Waldstejn), who was Bohemian despite his German name. They devastated most German protestant countries till 1631, when the King of Sweden entered the battle to "save Protestantism".
When France entered the battle, it was trying to oust the Habsburgs from Spain or at least to weaken the Habsburg influence in Europe.