Forgot your password?

Comment: Re:let them eat fries with that (Score 1) 712

I hope the walls on your gated community are high enough and you pay your private security contractors enough not to steal from you.

Automation is the answer to that problem as well. Security 'bots and sentry guns don't steal. And only rarely attack the wrong people.

Comment: Re:It's risky and unlikely to succeed. (Score 1) 697

by idontgno (#48207245) Attached to: FTDI Reportedly Bricking Devices Using Competitors' Chips.

You do realize that in most real business contexts, that's absolutely no help?

Your ship schedule is your commitment. "Our supplier gave us bad parts" gets you no credit. It's no excuse, and trying to use it like an excuse will get you on the "never let them bid on anything else" list.

If you're a manufacturer, subcontractor and supply chain management is on YOU. Your customer rightly blames YOU for the problem. You, as a manufacturer, buy counterfeit parts, and it's YOUR FAULT.

Comment: Re:Not the only problem (Score 1) 72

On top of that after looking through the firmware they've found that it's not custom software, but a badly configured OpenWRT build with a standard root password (set to "developer!"), an unsecured wifi ssid and sshd installed and running by default!

Interesting. Maybe "open-source", in the context that they meant it, means that all the users' private data should be open-source, rather than anything about the hardware or software.

Comment: Re:Maybe you would and maybe you would not. (Score 1, Troll) 111

by idontgno (#48158903) Attached to: Journalists Route Around White House Press Office

Lack of access to the First Lady's workout schedule is not what the people complaining about lack of transparency are upset about.

Explicit counter-example was right in parent post. David Nakamura clearly was upset about the lack of transparency in the First Lady's workout schedule.

I believe the next step is that you claim the cited example doesn't count, for reasons approximating "No True Scotsman".

You can do this in a number of ways. IBM chose to do all of them. Why do you find that funny? -- D. Taylor, Computer Science 350