bought it because was cheap & Arch linux guys seemed to have good luck with it. Touchscreen, pen, everything just seemed to work correctly out of the box. http://psref.lenovo.com/Produc...
Maybe paying for a business line will frame the cops expectations correctly before they roll up on your residence. Make them more willing to listen to your network setup and only take the publicly accessible _half of your kit.
The police will come to your residence, no?
would it have to be as extreme as having a 2nd address with your open WiFi and Tor exit node running? How do hosting companies convince the cops to "only" take one entire rack or server, and not every scrap at their location?
Keep your gate open for your neighbors, but if there is a crime on your patio - you want the doors to your house to be securely and _clearly locked.
Hardware is so inexpensive now a days; a participatory, community-building point of view suggests you should be running two sets of hardware. One set for your open WiFi and Tor exit node, and the other for your personal use.
With costs as low as they are you should not have to abandon your peers just to protect yourself from heavy-handed law enforcement.
Is there even more then one former staffer?
Can we get some names here please? - AFAIK wikileaks is a really small team, with only 1 former member, Daniel Domscheit-Berg.
This smells like a non-story to me.
Let's have some names please.
To my knowledge Wikileaks is a very small team, and there is only ONE former member (Daniel Domscheit-Berg)
DB seems to have a personal bone to pick with wikileaks,
The fine article reads like a hyped up smear piece trying to puff up the creation of OpenLeaks. Now I only skimmed it, - but Is there any demonstrable evidence out there that openleaks is something more then a non-starter/one-man show born out of a single bad attitude, or unwillingness to commit to the ball that is already rolling quite well?
Immediately i wondered if the videos will be hosted locally, or if they'll just slap a PC into a slot in the wall & stream it in a browser.
from event details, (linked to from youtube.com url in article)
maybe the physical display set up will be neat. Looks like they are jumping full in on the "gee there is content youtube.com" angle
is it just me or does that not explain how they are able to gain access to the messages?
are they relying on the fact the phone does not ring to quickly brute-force the PIN undetected?
Because that would be illegal in most states, ("Unauthorized use of a computing resource, etc.")
and policing a patch for a buffer overflow is a little easier then hunting through a whole app.