127 characters is low?
It used to be 16 characters, but that was back in the days of Windows 98, and NT 4.0 service pack 6a, well before AD forests and trees were in common use.
I get the not-so-fresh feeling being devil's advocate here, but (and this is opinion here, so take it, leave it, or just laugh at it) BitLocker is something that MS did seem to make a decent effort at getting right.
Unlike TrueCrypt, BitLocker is written not just for security, but for enterprise recoverability, so come e-Discovery time, one can recover the data on a laptop after an employee left.
If MS did drop the ball with BitLocker, they would be in a world of hurt. There are many laptops lost out there, and having an encrypted HDD  is the difference between writing off some inventory shrinkage versus a major public disaster, with civil, regulatory, and perhaps criminal consequences. So, BitLocker is something that had major security issues, there will be big businesses wanting their pound of flesh, not just users.
(Of course, after I write this, watch one of the next
: Of course, there are varying degrees of encryption. Having the recovery key for BitLocker stored someplace insecure is just as bad as having the TrueCrypt recovery CD with its password stored in a bad location. This is why BitLocker keys often wind up stored in AD... if AD gets compromised, the jig is up in the enterprise anyway.
As an aside... I should have stated, "stun gun", as this was done before Tasers were the dominant on the market.
But there are a lot of cases where the crime hurts the family and friends of the victim more than the victim, especially the time it takes to get the person back to some semblance of a normal life if the beating or attack was brutal enough.
Being the one beaten is one thing.
Being a friend or relative of the one attacked usually is far worse. Stuff like having a friend's son whom you grew up with tasered to death (the thieves wanted to know "where the valuables were", and kept pulling the trigger until the victim's heart gave out) makes one not really empathetic with violent criminals who do this sort of stuff.
Nope. In the film continuity, he received a super serum, a la Captain America.
The Hulk is the result when you add expose a super serum recipient to gamma radiation rather than Vita rays.
If this were a theft, I'd say so. However, a gunpoint robbery is a trigger-pull from a murder (and often ends up that way.)
Not to mention the senseless beating of the people in the truck.
I wouldn't say death is appropriate, but pointing a gun in someone's face and then assaulting them is a lot more than just hopping into an empty truck that is still running and joyriding off with the cargo.
Acute radiation is ugly, but so is the long term damage from gunshot wounds, or the damage from being pummeled (the description was vague, but i'm sure it entailed use of some blunt objects as well.)
Encryption is not a one size fits all solution. I can say that I use encryption for everything because my HDDs use FDE (BitLocker, FileVault, and LUKS.) However, encrypting everything that hits the platters doesn't give any protection against remote attack. Scale that up to the enterprise, and having a low level PowerPath driver encrypt what hits a LUN doesn't matter much if the host machine gets breached.
While I do have faith that BitLocker and other items are not obviously backdoored, my eyes glaze over when companies say that they will just encrypt stuff, all problems over.
Encryption just makes the amount of sensitive data move from the data to how keys are stored, and attackers will just start hitting the key management system, either bribing/coercing an admin, or use basic social engineering techniques to get access to stored keys.
Even hardware key storage devices are not 100%. One can always hack a user account on one of those to sign/decrypt data even without access to the key material itself.
Encryption is just one piece. It can be equated to use of a safe. However, safecrackers tend to care less about the safe itself than the lock on the safe, and the key management is what makes or breaks security.
This might be a weakness of BitCoin eventually. As blockchains get longer and longer, it gets more unwieldy to keep everything updated.
The closest thing is having to calculate every transaction (vending machine, gas station, bank, etc.) a Loonie  coin has been through since it was struck at the mint. Even though big-O is a linear function, after a while, the cryptographic calculations required for each transaction can add up over time, and when a BitCoin is broken into subunits, each subunit down to the satoshi will have its own separate chain that has to be run through.
Not a big problem now, but as BitCoins circulate through large amounts of users, it might become an issue, especially for large volumes.
: Or quarter, or Euro, but Loonies are a decent unit for an arbitrary example.
When components like the motherboard start flaking out is when it starts getting expensive to do. Someone has to pay for the work - it may not be you, but the organization certainly pays those people and purchases the parts.
Failed hard drives happen to new machines. Failed motherboards should not.
Big wins? Everyone I know who's touched either hates them. The PHBs might love them, but the people who have to touch them certainly don't.
The original Sidewinder Precision Pro was awesome. The others, not so much - and MS dropped gameport support after XP (and the USB adapter did not use standard/HID protocols)
Thanks, MS. Thanks.
This is only going to hurt in the long run.
Code is going to be written. It will just be written in countries that don't have the non-functional  IP laws, and the products sold from there.
This reminds me of the 1990s and how cryptography development was stifled in the US by ITAR laws. It didn't stop crypto development. What happened was that Russia, Germany, and even China started on the process.
The same thing would happen again. It just means that innovation in coding moves to other countries, perhaps China, Russia, the Ukraine, Brazil, or elsewhere.
Of course, the genie can be put back in the bottle -- locked down devices can prevent code that hasn't been vetted to run, and on desktops, mandatory DRM stacks would ensure the laws are enforced regardless of borders.
: Well, functional for a few, but not as a gestalt.
Sure, if the port was naked and hanging outside of the case, and there was no screen etc nearby. How about flash drives? Bluetooth dongles? I'm sure you've seen those tiny wireless mouse/keyboard connectors who have a casing at all (not just the port itself) simply to give you something to grasp for handling?