yes because one is much cheaper and easier, thus, there will be much less accountability and much more likelihood of unethical operation. It's not just what it's used for today, it's what it will be used for 5 years from now, if there is no public blowback.
This is in fact a slippery scope, because we haven't developed city-wide immune systems* yet, unless i've missed something
One of the things about most of Colorado is that the people that live there experience privacy in their homes and land that is unknown in places like urban Maryland or New York.
As a policy, i am completely cool with maintaining that privacy against an influx of civilian, largely un-regulatable (as opposed to unregulated) drone activity. No thanks!
Where ALSA fails in it's most basic configuration is it's ability to handle multiple simultaneous audio streams. One stream going directly to an ALSA device, locks that device for playback thereby preventing any other application from using it.
This is only true if you have a shite sound card which doesn't support multiple audio streams.
(plus, if your area of expertise or interest is something related to data mining, the NSA might count as honest work compared to, say, Facebook)
When did the NSA and Facebook become separate entities?
Is the world ready for web-applications available anywhere, totally secure, that meet your social media needs with fun and immediacy, without any tradeoffs? What do you think?"
Link to Original Source
The result? It transforms your web-browser from an over-abused public "billboard" into a "safe-house" that normal people can use, complete with the familiar feed- friend- and group-based interfaces they expect from HTML5/CSS3 powered sites. Developers can go farther, creating and exporting any of those apps into their own sites, all without sharing anything with your service provider; it's that powerful. Finally, it already has two social media apps ready to go, to get people started.
The IndieGoGo campaign is the first public unveiling. From web hosting, to hiring designers, it will take resources I no longer have; my savings bought full-time research to create the kernel, if you will. In fact, the demo itself is just "frozen" from the actual working version I use everyday! With your help, a world where you can speak honestly and openly with your friends and family is possible; Is it important to you? I hope the community backs the idea; this is how it will be done.
With so much self-censorship and risk attached to the daily use of traditonal, insecure personal social media, how long will we allow it to continue?
Disclaimer: i'm the author of TagOS"
Link to Original Source
Fiber Throughout The Network.
Sometimes, people you want to like do things that are wrong - even criminal. And there doesn't always have to be some big conspiracy behind it.
And sometimes people are afraid to outwardly admit agreeing with said acts.
It's not illegal to discriminate against people on the basis of their brain activity. Should it be? Can you judge someone on the basis of their biology? Is it really that person's fault anymore if a part of their body predelects them to wrongdoing? Where does liability start? Can you fix people? Should you?
Too many questions about really understanding the brain that our primitive moral system could begin to address.
Does it really matter whose "fault" something is? Discrimination based on assumptions, regardless of the basis, should certainly be illegal. However, discrimination based on objective, observable things shouldn't be. For example, it should be illegal to discriminate against potential employees based on ethnicity. It should not be illegal to discriminate against people with a measurably low IQ when the job can be shown to require a higher IQ. It doesn't, or shouldn't, matter that a person's intelligence quotient isn't exactly their fault.
Wake me when American military hackers are targeting Chinese civilians.
Is it so hard to believe that something like that may actually be happening already? Afterall, many of the operations conducted by our intelligence agencies (namely the CIA) are aimed at people many would consider civilians.
If I'm a national intelligence service and I want to create a botnet for military purposes, I also want to have plausible deniability. So, I construct my botnet the same general way criminals do. I hijack civilian computers, I purchase services through stolen credentials and fake ID's, etc.
Or maybe they hacked our Internets and burned down our firewall? Seriously, IP spoofing is not as useful as the movies make it out to be.
Spoofing IPs is easy, but it's only effective in a few situations, such as when you're sending a message with no expectation of a reply (e.g. spam e-mail, DDoS attack, etc.). If you're trying to break into someone's system, you need to be able to get a response back, and that means providing an IP address you can be reached at to your target. Now, you may try to anonymize your IP address somehow, such as through the use of proxies, VPNs, and other such technologies that can allow you to hide behind or within someone else's system, or you may spoof an IP address of a zombie computer you control and can use to route return packets to you, but at some point, an IP address you control needs to be provided to someone else, otherwise you have no way of getting back a response, and that address can be traced.
I think the point still stands that it's possible for an attack to appear to originate from a location different from where it actually did. What is to stop someone from using a hijacked wifi access point to attack servers in, let's say France, and then use those French servers to launch attacks on Australian businesses?
I have personally witnessed an attack where computers owned by an American company were infected with a persistent agent designed to infect computers in a specific business in China (during a visit of the American execs to the Chinese location), for the purpose of then using the hijacked Chinese computers to conduct industrial espionage against another American company which also conducted business with that Chinese company. The actual attackers were neither American nor Chinese.