Great, so I guess this standard will include the "normal", "micro" and the "mini" laptop charger, just like all other "standards".
This is intentional because they don't want people to keep on using Windows XP, therefore they add crippling code, and just throw up their hands and say it is a bug they can't fix.
>Why would Assange wiretap the Icelandic parliament and how could he? I doubt he has that powerful connections up there.
Actually he had an Icelandic person known here in Iceland as Siggi "the hacker" working for him, and he was actually implicated in a hack attempt at the parliment:
"In January 2011, Thordarson was implicated in a bizarre political scandal in which a mysterious "spy computer" laptop was found running unattended in an empty office in the parliament building. "If you did [it], don't tell me," Assange told Thordarson, according to unauthenticated chat logs provided by Thordarson."
It is possible this was the work of Siggi "the hacker".
He was fired from Wikileaks after he transferred money from Wikileaks to his personal account. He then contacted FBI and was thought he was to be used as some kind of bait for Wikileaks. He has then been connected to number of other shady deals here in Iceland. I believe he is currently in Prison for a sexual assault.
The issue management system usually includes two fields and one check box. One internal text field that includes information about the issue in great detail aimed for the core developers, and another text fields which includes simplified information about the issue targeted for the end user or management, and then a check box which specifies if this issue should be publicly visible. Usually an issue has both fields filled out and the check box checked, but if an issue is set as private it's usually because it concern a security issue, it's a really minor fix or it's a major embarrassment for the company
Are you mentally challenged? You of course just stand in the window normally and watch when the motorcade arrives AND THEN you go into the prone position. And of course the trees have grown a lot since 1963.
What? How does some text some dude wrote in a book 2000 years count as evidence?
I repeat there is no evidence for a creator.
There is no evidence for a creator.
But it is actually a cyber weapon. Instead of bombing the facility with conventional weapons it used software to sabotage the facility. Stuxnet was specially designed to be an actual cyber weapon.
No you can't just audit the output by starting with 1 line of C code and move up from there, because you don't know what is the actual trigger for the back door. It can be any number of specific lines of code, includes modules or at least some output size of the binary.
It doesn't have to be tiny, you can hide the code in data or other code. But even so just take a look at how tiny some programs are in the demoscene, you can build incredibly small code that does a lot. Also take a lookt at how some viruses are done, some use polymorphic code to hide their signature.
Are really saying that this type of thing can't be done? You have little faith in human intelligence.
That's a non-trivial hack, how do you propose it "detect specific enryption algorithms in truecrypt" to detect that its compiling truecrypt, and then modify it. How many bytes of code do you think it would take to program that?
You say it like it is complicated. This is just programming, Microsoft and the NSA has billions of dollars to throw at the problem. It doesn't matter how much space it takes it can be done.
Yes it has to be hidden, but you can have self modifying code and you can have code that looks like it does something innocent but actually does something else. Has anybody actually audited the MSVC binary? Didn't think so.
Of course it isn't something simple like if "solution name" = truecrypt, that is just stupid. It's more like detecting specific encryption algorithms in TrueCrypt and injecting code that makes the encryption weaker by either modifying the encryption slightly or storing maybe part of the key somewhere in the data. So for the right people who know about the back door, decrypting becomes an easy task.
How plausible is that? Well I guess you haven't read about the Ken Thompson hack for the C compiler. Doing something like this is VERY plausible.
Not injecting backdoor into everything, just into the TrueCrypt binary. What is the easiest way to inject a backdoor into TrueCrypt? By asking Microsoft to add a backdoor to the MSVC compiler.
All I see is woman with large breasts, woman with medium breasts, woman with small breasts, and this one looks like you... with breasts.
Yes and he used the MSVC compiler which could include the NSA backdoor.
The compiler doesn't have to attach the backdoor to everything, only when the TrueCrypt binary is being created.