Forgot your password?
typodupeerror

Comment: Re:Reagan: the environmental governor? (Score 1) 327

by ebrandsberg (#47668085) Attached to: California May Waive Environmental Rules For Tesla

Good point, in addition, the question can be asked that if Tesla builds the factory (which they will in one state or another) will they be controlled under the remaining CA regulations better than other states. In other words, CA can say "this is such a big factory, we need to look at the big picture and understand that if we can regulate them, it will be better for the overall health of the WORLD than if they go somewhere else. As such, we will reduce some of the requirements such that the overall benefit will be greater." It isn't necessarily a "one state vs. another" but what is best for the world. This is such a big project that it is likely to be better managed than most by both the company and the state, that they can agree to cut some regulations simply because others will be better enforced.

Comment: Re: Automated notice not necessary here (Score 1) 368

by ebrandsberg (#47657965) Attached to: Comcast Drops Spurious Fees When Customer Reveals Recording

The infamous commerce clause trumps states rights

No it doesn't. It's just abused as a power grab. It was only meant to apply to a limited number of things.

See, it DOES trump states rights, as proven by matters of law. You may not agree with it, but that doesn't change the facts. In this particular case, I think that there should be Federal Law to unify what everybody should expect as far as recording rights are concerned, and the law should be "anybody can record any conversation they are having at any time through electronic means". Since any conversation could in theory result in a verbal contract, it is only reasonable that said contracts should be legally recordable to protect the individuals entering into said contracts.

Comment: Re:PCI Compliance (Score 1) 348

This requirement is normally done at the network boundary, so a hardware firewall will meet this requirement, although for web facing servers, often companies also like having application level firewalls (protocol level) that can inspect for suspicious activity at layer 7, not just the simple stuff. There is a huge business around certification and auditing for this, nobody should just jump into handling credit cards without knowing what they are getting into.

Comment: PCI Compliance (Score 4, Informative) 348

As soon as they start handling credit card transactions, they will need to conform with PCI standards, which will mandate much much higher levels of protections. There are significant fines associated with non-compliance so you may want to forward them over information about this.

Comment: Re:Child Support Nightmare (Score 1) 146

by ebrandsberg (#46361915) Attached to: UK Government Proposes Rules To Allow 'Three-Parent Embryos'

DNA testing would see the parentage of the third doner without specialized testing. Mitochondrial DNS are ONLY passed to offspring by their mothers, and given the procedure, there will still be a "DNS" mother involved, insuring that a reasonable set of parents can still be determined using the normal procedures. Not a nightmare at all.

Comment: Re:Still abusive (Score 0) 511

by ebrandsberg (#46276651) Attached to: Gabe Newell Responds: Yes, We're Looking For Cheaters Via DNS

Not a valid comparison, because even then, they don't actually send the dns names. They send a hash of them, meaning you can't reverse the hash and find the name. In your comparison, they would send a value that allows them to determine if someone else's webcam had the exact same image visible, but nothing more. Privacy is protected.

Comment: Re:Still abusive (Score 2) 511

by ebrandsberg (#46276297) Attached to: Gabe Newell Responds: Yes, We're Looking For Cheaters Via DNS

If you think looking at DNS is abusive, you probably don't want to know what it takes to find installed rootkit based cheats or similar. The fact that they are only sending hashes of the names found, in my mind, makes this a reasonable approach as a 2nd pass to verify that they don't have false positives. From the way I read this, the idea is to do a 2nd check just to verify that the first check didn't flag you incorrectly.

Comment: Re:Still abusive (Score 5, Informative) 511

by ebrandsberg (#46275693) Attached to: Gabe Newell Responds: Yes, We're Looking For Cheaters Via DNS

did you even read his response? They look for indications that the cheat is in play, THEN they check DNS as verification, and send a HASH of the dns name to their servers for comparison. This means they don't even see the actual dns name on their side, they can just check against known hashes of the sites the DRM used for verification. That is why it is two staged. Simple existence of the names in your DNS cache won't trigger the ban hammer.

Comment: Re:Unemployment rate 17,7% (Score 4, Insightful) 398

by ebrandsberg (#46080811) Attached to: Detroit Wants Its Own High-Tech Visa

I think the idea is that if they have visas to hand out to companies, the companies will be willing to put offices in Detroit for those people to work in. From there, services will be needed from the lower-skill people in the area, think food service, etc. This will then eat into the 17.1% unemployment. The problem isn't the number of workers but the type and skill of the workers, and getting things back in balance. I'm not sure this is the right solution to the problem, but I am willing to consider that it may be A solution to the problem for now.

Privacy

Switzerland Wants To Become the World's Data Vault 131

Posted by samzenpus
from the leave-it-to-us dept.
wiredmikey writes "Business for Switzerland's 55 data centers is booming. They benefit from the Swiss reputation for security and stability, and some predict the nation already famous for its super-safe banks will soon also be known as the world's data vault. For example, housed in one of Switzerland's numerous deserted Cold War-era army barracks, one high-tech data center is hidden behind four-ton steel doors built to withstand a nuclear attack — plus biometric scanners and an armed guard. Such tight security is in growing demand in a world shaking from repeated leaks scandals and fears of spies lurking behind every byte."

The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford

Working...