Linus Torvalds himself created, and then ported to jQuery, the entire kernel source code. Or so I've heard.
This is like a virtual machine for all instances of strcmp?
I'm not sure, but your vibrator doesn't have feelings, I think.
Lucky for us, Diffie-Helmann requires a random sources on each side. If your RNG is broken and your counter-party's isn't, you're still good.
It also means that you're allowing an outside source, which is extremely easy to manipulate (a van parked outside your house with a transmitter) to create your random.
Sweeping statement - not necessarily. Pre-shared keys and all that. It is possible to make good crypto systems without using random. Sorry to be autistic about it.
To find out where the NSA put the twist.
'Cross platform' and 'manage memory usage and disk access at a very granular level' do not readily go together. And not in Java either. Abstract your 'granular access' away in a C (I said 'C', not 'C++') library of your own. Use a lot of #ifdefs. On top of that, build in whatever you want.
Oh god. Don't *do* that. The nightmares - they keep on coming back!
"just make your troops leave their personal devices at home."
The impression I get is that it is exactly this that all armed forces all over the world are struggling with. A lot. Apparently, you can order a youngster these days to do a lot. But not that they leave their phone at home. Also, bear in mind that when soldiers get to take their own phones, then armies don't have to buy expensive welfare network capabilities.
According to Russia, the West helped stage an undemocratic coup there. And although there have been democratic elections since, this still has a ring of truth to it.
The F117 was taken down with a SAM. Someone had discovered its radar signature when it opened its bomb bay door.
A new language without support for regex literals is worthless to even consider.
Most of the recently proposed crypto algorithms aren't American. The cat is out of the bag - crypto is an academic subject now, and everyone's participating.
Every single source address that a listener outside your network can find. That's how many machines you have. At least. You couldn't find that information from a NATted network.