*** Yes, he did flee. The claim that Assange was "free to go" as promulgated by Björn Hurtig, a former attorney of Assange's. He tried that same line in court and got smacked down by the judge for trying to deceive the court, and then got an official reprimand from the Swedish Bar Association.
I can't confirm or deny your claim here, but the link you provide doesn't confirm it either:
Riddle was referring to testimony in which Hurtig had said he had been unable to contact Assange last year when he was sought by Swedish prosecutors for questioning.
Nothing is said about whether Assange was free to leave Sweden or not, but a court order banning you from leaving the country usually means you hand over your passport. Since the UK is not part of the Schengen Area, he would have needed a passport to enter the UK from Sweden.
Earlier this week, the agency sent a legal notice to Jayson Hanes, a Tampa-based drone hobbyist who has been posting drone-shot videos online for roughly the last year.
The FAA said that, because there are ads on YouTube, Hanes's flights constituted a commercial use of the technology subject to stricter regulations and enforcement action from the agency. It said that if he did not stop flying “commercially,” he could be subject to fines or sanctions.
Link to Original Source
Link to Original Source
IIRC, AWS ditched wikileaks.org like a hot potatoe after a simple phone call by some US official. Of all the services suggested here, AWS would probably be the last service one should look at for this purpose.
There is a solution for this class of malware, but it isn't anti-virus. Since cryptolocker only damages user data, the operating system should provide a secure and automatic backup of the user's data. Any time a user's file is changed, the new version is recorded on the backup, with its date. From the user's point of view, the backups are read-only, so malware can't damage them, and the user can retrieve an old version of a file at any time.
I hope you are aware that this could go wrong in terrible ways: there are some files that you actually want to have only in encrypted state. If your operating system always keeps a backup of their unencrypted versions, you may be secure against certain kinds of ransomwares, but open to all kinds of other data leakage.
There was a project going on, first at Carnegie Mellon University and then at Stanford's Rapid Prototyping Laboratory, where a very similar but more sophisticated process (Shape Deposition Manufacturing) was investigated to make precise metal parts with full strength (unlike the sintering methods mentioned here and elsewhere). A number of methods were used or tried to melt the metal, including TIG welding, laser fusing and induction heating.
The biggest hurdle to success was the huge internal stress that built up in the process. Remember that one puts layer after layer of molten metal on top of the previous one. The new metal layer solidifies and shrinks, creating lots of compressive on the previous layer. Put down enough of these layers and the part will crack.
And no, doing this process with Invar won't help, because Invar doesn't have this beautiful near zero thermal expansion close to its melting point.
Lets hope the blogger reads what has been published about this process before he commits more effort and resources to his project
Amazon: Big on Net Neutrality, not so much on Book Neutrality.
And biggest hypocrits, too. Remember the wikileaks saga? Wikileaks was hosted on Amazon cloud - for a few days, until some congress critters gave Amazon a nice phone call.
Amazon and net neutrality my ass. That was the day I decided to no longer do any business with Amazon. A bookstore and hosting service that engages in politically motivated censorship does not deserve my business, and the story posted here shows how far Amazon is willing to go.