"(e) This section shall not apply to a law enforcement officer acting within the scope of the officer’s authority under applicable law, or by an order or warrant issued by a court."
I'll give you a hint, the reduced incidence of cardiovascular failure for people abusing power is the direct result of the reduced consequences of abuse
>> I like my cars like I like my women...
Ready to go home with me and geared up to drive both ways... and not associated with a lot of proprietary add on junk that will out date in a couple of years
>> U.S. Federal Reserve Chairman
Stopped reading here
The most obvious attack is control of a majority of the network, and of course correlations attacks which require access to many ISPs.
These, in addition "ownership" of VPNs, are feasibly within the capabilities of intelligence agencies.
>> Additionally the NSA's own documents released by Edward Snowden showed that the NSA can't break current TOR releases.
That was 2007.
Other things you couldn't do in 2007:
* Use an iPhone
* Use a Samsung Galaxy
* Use What's App
* Read anything except "this housing boom will go on forever!" in the news
In other words, that was forever ago.
Where is a more recent credible assessment of adversary capabilities specifically to the TOR network?
Sure... until you find out 400 years later that the new gene has a self destruct sequence.
Or worse, patent law follows the trend of copyright law in the US and half the population ends up owing royalties for the genes they were born with.
If someone stole my tequila, my response would be elevated from the TFS to TFH
The entity that benefits most from bastardization of ICANN is... Google.
You can always find Google and Google can always find where you want to go. And now typing addresses into the address bar is about to get more painful.
>> just that generally, VISA requires you to tell them who you are when you create an account
And of course anyone who has had their credit card copied (they don't even steal them nowadays) you will know that a merchant will process transactions even without having your name.
DDOS causes more lost money than other "security" breaches. Therefore it is a top priority of companies and by extension public/private partnerships.
Of course, this is an asymmetric attack and you can't stop it. In other words, it is a democratizing attack.
When I worked with the FBI on security issues in the financial sector, I was disgusted by how little attention and funds were available to fix problems like unauthorized transactions but attention is available for issues like this.
Why hire a nerd who can build one system at a time?
Hire someone who writes the contract so HP doesn't get paid in the situation where they fuck up.
There are two boxes here "Reply to comment" and this second one I'm typing in. Also, there's no way I can fit an "insightful comment" into this postage-stame-sized box.
And I can't even see your user number
Yeah... I remember being 14 years old too