This isn't about DNA or road safety it is a test to see how much shit people will take from their government and what additional compliance can be purchased with money.
Recently had to install a new thermostat to run additional gizmos.
Checked around in local stores and online. Rejected Nest out of hand and anything else with a full color display and or wireless radios and settled on a Honeywell model with equivalent feature functionality.
Years ago I realized I am not a gadget whore.. I simply don't give a shit about technology unless it helps me in some tangible way to get something done.
Full color displays, Internet connections wireless radios don't help me they work against me. Additional complexity that can malfunction, break, get hacked or spy on me. Why in the hell would I want that?
Because its "new" and looks "cool'? I know how much energy my crappy old furnace uses and I know exactly when it is "on"
If I want to save energy I'll freeze or invest in a furnace/heat pump. All I need is the ability to set an away schedule.
Of course they won't just accept a Bluetooth or local browser interface they all want to call home and have you register the damn things with a mothership.. after all of the epic security failures over the last few years effecting millions per failure this is exactly the kind of thing I want to do.
Finally I want a thermostat that works.. Nest is a great example of what happens when the primary goal of a device is "looking cool" while miserably failing to reliably perform its primary duty.
"The North Koreans possess no such technology"
I can just imagine the military "Fuck the perimeter, if the enemy gets inside the base it's going to be all knives and hand to hand combat anyway. Sell the guns boys, we're all getting HUGE KNIVES!"
RL military analogies often map poorly to network security space yet it rarely prevents people from making them anyway.
Because Google is an engineering company.
Google is an advertising company.
In addition, the cost of protecting and cleaning up Windows computers is non-trivial and the cost of a data breach can be enormous.
Currently the most effective and most used method of attack is social engineering. How are MACs less vulnerable and cheaper to fix? Please be specific.
This is not just a VPN, it is a VPN from a known, verified secure computer.
I've seen this technology before by various names yet the core principal by which it operates is fundamentally insane. Where the rubber meets the road you are essentially asking a potential liar if they are being truthful and acting on their response alone... "what a joke" indeed.
The objective function is value. If your solution adds enough value even disruptive change can be tolerated and accepted.
What is unacceptable is what almost always happens... a creative solution which while technically better than an existing solution in some aspect is in some way unmanageable, unprofitable or simply not worth anyone's trouble to change given the bigger picture.
I see this kind of thing all the time with people inventing things they think is all great to them but everyone else sees as impractical. Or fools whispering their brilliant ideas to you so others don't hear and steal it from them which while "creative" are half-baked reflecting their ignorance of technology and or that which is necessary to be successful.
If you can use your creative energies to create a battery with 10x density, 10x safety, 10x charge rate, 10x reliability at 10x lower cost of production vs current state of the art you are likely be taken seriously yet if you repeat the same with 40x cost of production your much more likely to be ignored regardless of how great and transformative your ideas are.
Sure there are barriers to showing of value to the excessively cautious or irrationally change adverse yet these are temporary conditions bypassed with creative diplomacy and ultimately market pressure over time.
More often than not I tend to get creeped out when companies become so big they start to see value in tweaking the rest of the world to give themselves advantage on anything from lobbying/regulatory capture, having their way with standards organizations and invading or buying out entire verticals just to control and or add barriers to meaningful competition.
In the case of Amazon I would much prefer to see the FEDEXs of the world working on flying robots and self driving delivery vehicles. If there is a need for that by all means use your weight to communicate your needs or collaborate with your vendors.
Look what happened after Ebay bought out PayPal for another example of what happens when you get too big.
As for Ebay and delivery why would they care? Does ebay even have a single warehouse delivering anything to anyone? As far as I know it is the ebay users and their resellers that manage all of this. All ebay needs to do is add a few ultra fast shipping speed categories to their backend systems. They don't need to actually implement them.
Knowingly trying to bring down web sites is a crime.
How many web sites have been slashdotted?
Most of the time it is not hard to guess that outcome in advance based on trivial knowledge of where site is hosted, web stack and content on site but TFAs are posted anyway and mostly predictable and obvious happens. How many times have you glanced at TFA and thought to yourself oh dear that site is screwed? Even after articles are tagged slashdotted they have never been removed and continue to remain up while site remains down. How much more knowingly is required before your condition is met and a crime committed?
Should we also not arrest people if they only throw one brick through a store window but do not take anything? Should we also not arrest people who kick someone only once when lying on the ground?
DDOS attacks are about as lame as anyone using LOIC. I don't think many would argue conducting an intentional denial of service attack to be lawful means of protest. Having said that to pretend sucker punching someone should yield the same liability as putting them in ICU or traveling at 10 over posted speed limit is the same as traveling 100 over. It is disingenuous to ignore the specifics as irrelevant. I don't understand why you would not expect to incur additional charges by walking by a strip mall and throwing a brick into each building vs. only one building. This makes no sense. There has to be some meaningful proportionality.
Also, consider the fact that the minute is only the point they could prove what he did, if he was
willing to aid in DDOS attacks who knows how many other people he helped attack in the past?
Or maybe he ran LOIC out of curiosity and stopped after becoming fully cognizant of what it was doing? We are all entitled to our assumptions.
I'm the first to admit that anything quantum blows a wormhole through my head. I struggle to find anything that will allow me to grasp it. I'm a programmer, dammit.
Perhaps a close mental computer analogue is the transaction.
Software is not allowed to peer into a transaction and act on details while open or consistency could not be guaranteed. Only outcomes are exposed to the system when transaction is committed. Various interactions force existing transactions to commit and resulting outcome to be known.
So. When you observe the particle its window comes to the top
In scalable systems "reading" or "observing" is often a liability to be carefully minimized. Anything read out stands a good chance of becoming stale and outdated the second it leaves the computer. In the real world "observing" is almost certainly an illusion.
What we see as "read" operations are emergent properties of layers of interaction. Our eyes only see by absorbing photons and similar disruptive explanations likely exist for all methods of "observation".
Chimps are chimps not people. To declare otherwise is to declare 2 lights + 2 lights = 5 lights.
Besides abusing legal system to get your way short-circuiting normal legislative/consensus building paths to get the change you seek is poisonous to the democratic process. It does not matter what the issue is or how you feel about it.
There is also some evidence from the Snowden leak that standards procedures and committees have been weakened by members acting overtly or secretly on behalf of government agencies. So they should be really cautious about such offers.
In some ways IETF is almost a joke. "Consensus" building is supposed to be the key to movement yet there is no barrier to entry other than having sufficient number of brain cells to send a message to a mailing list. I have observed several instances of "ballot stuffing" where hoards of random people who very likely know and have contributed nothing at the last moment express support for x. The arbiter of what consensus means is always WG chair(s) who themselves mostly always work for a corporations with skin in the game.
The IETF process is most successful as a middle ground where there is market incentive to work together. In the case of tor there is no market to speak of to incentivize such behavior.
And why re-invent the wheel and make something fro scratch? Tor is working well, even too well in the eye of some people
My guess they might start with existing specification and evolve standard based on IETF process.
An example of this SSL v3 was mostly Netscape's doing while TLS v1 and later were products of the IETF. In this case there were no radical changes between versions and backwards compatibility was retained. There was also huge market incentive for broad compatibility and getting security right.
And no, spoofing source addresses is rarely useful. You can't use TCP for most purposes with a spoofed address (or at least one spoofed to be on a different network), so spoofing almost automatically renders you incapable of communicating. The same goes for UDP if you care to hear a response, which most protocols do. That gives it very limited utility outside of diagnosing local network problems.
While general purpose protocols do not work consider a messaging system of anonymous users where the outcome is known/broadcast globally while contributors remain secret. You can send a one-sided UDP message anonymously and be informed via public channel. I think on balance getting rid of amplification is likely more important but I do see some value in it especially in states ruled more by fear than consent.
Firstly IP level fragmentations problems are self inflicted. IP fragments get though fine if you haven't put up a firewall to block them.
Even with fast open one needs vastly more compute power to support DNS over TCP to the equivalent level of DNS over UDP.
What does vastly more compute power mean and does it matter? Lets assume it costs 100% more CPU time and 100% more RAM per DNS query to use TCP.. who cares? The long tail of DNS servers sit idle and every server that becomes a TCP only server is a server that cannot be used for amplification.
cookies needs more work though as a general idea it is the way to go.
Yet for countless years it sits and **NOTHING** gets done. The only leadership I've seen in addressing this issue is futile attempt at discriminating thinking human adversaries from legitimate users (e.g. DNS RRL)
Seriously, what the hell more do you want from a tablet?
Shit, at some point why the hell aren't you using a desktop or laptop?
This is something I will never understand. All of these devices are computers. Even the smallest of form factors today have multi-core CPUs, multiple gigabytes of RAM and 1080 displays. Why should software availability differ based on the form of the device? If it is capable of executing software why artificially prevent it? What is the difference between a laptop and a tablet? Availability of a keyboard? What if you get a bluetooth keyboard for your tablet..what is it then? None of this shit makes any sense from the users perspective. It only works from the vendors side who collects a cut of all software sales and curates all execution. It is impossible to justify.
I'm not sure what people mean when they whine about no apps,
Wah I can't run any of my software on this this computer...wah I'm whining because none of my shit won't run and the computer is therefore useless to me.
except that I must assume they are gamers. I have Netflix and Hulu installed. It has Outlook, Word, Excel, Powerpoint and OneNote. Its base apps allow you to browse the web, read the news, check the weather, play local videos, etc.
Zombie consumers have it made. Everyone else not so much.