its all ready is open sourced and that is what the soylent news guys did but the community didn't fallow.
But people are reacting because the Google glasses bring another dimension to this, when you get a lot of people that are potentially constantly filming you and uploading it to a massive data-aggregator with immense capabilities to correlate data and track people.
that keeps being repeted but it is bullshit, it does not have enough battery life to be constantly filming and the bandwidth requirements needed to upload hd video to google data centers would cost far to much to be doable even if anyone wanted to.
From what I've seen, and experienced myself growing up, it seems that if your kid is the type who might be bullied, sending him to private (or maybe religious) school is an absolute must. Private schools don't seem to tolerate it, or have as much of a problem with it. They have no trouble expelling problem kids, and they don't accept just anyone.
As long as the princeples kid and his best freind are not the one doing the bullying yeah that was a fun year. Not all privet schools stop bullying.
yes but they would not necessarily be able to patch the closed code
well even if it justs sets in you account you come out ahead thanks to intrest
The surprise is the number of users today who are screaming "Da fuq? Teh Intuit iz de DEVIL!!!!" who were all of yesterday shrugging off Google's lobbying juggernaut as "just playing the game."
Well, it's not a surprise but it still sucks an ass how Slashdot marches in lockstep to their latest fanboy crush. For people saying how cheep it is to own a politician it seems that most Slashdotters are willing to be bought off for a lot less.
The difference is Google is lobbying to do things that don't dirrectly affect my bank ballence. Additionally many things Google is pushing for actully are in the general intrest like net nutrality.
Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'
Traffic sniffing does not require files on the target and this is the biggest source of data for agencies like the NSA. It may protect you from key loggers being installed (unless they were inserted ahead of time).
All traffic sniffing will do is show they are talking to a TOR entree node. Everything is wrapped in multiple layeres of encryption between you and each of the nodes in between. Maybe they could tell from traffic analysis what type of traffic it is based on traffic profiling, streaming your pr0n over to will have a different profile than browseing a webpage wich will in tun be different than ssh, but they still won't know the end point and what the content is.
I'm pretty sure that part of Snowden's leaked information showed that exploits are occurring at the hardware level as well as software. Entry points like LOM modules were explicitly called out in the leaked presentations.
Yes but they would have to have had access to your computer to insert the hardware bugs. If you say pick up a cheap laptop at walmart paid for with cash they won't know who has it, and would not have inserted the bugs as they could not have known who would end up wih the computer.
I'd agree that forensics becomes extremely difficult, if not impossible (memory analysis can still occur).
if they are doing memory analysis thy have the computer in their posesion already and you probably have a much larger issues to worry over.
I don't agree that the systems are immune to malicious software at least in a general sense. Immunity would require a lot of control for the hardware running the OS, and monitoring to make sure things have not been tampered with.
Technically true. However you have to trust something, and as long as there has been know oppertunity to tamper with the computer you can assume your safe for most things.
Relying on a repository build of an OS imaged is still a target for potential a MITM attack feeding a user a kitted image.
That is why we have cryptographic signatures on repositories and iso images. If they can break a 4092 bit key in polynomial time we are f***ed anyway
Incognito Linux did not impress me. You can be more anonymous using Backtrack.
Backtrack is for cracking not staying anonamous.
Tails routes all of your traffic through TOR and keeps you anonymous as long as you don't share anything reveling.
But you are not responsible for crimes committed by your parents, we for example do not require children of convicts to finish out their parents sentence if their parents die in prison. That however is exactly the principle that is applied here.
As a taxpayer, I don't want people getting free money for the government at my expense. They need to pay it up in today's dollars - with interest. If your parent or grandparent abused the system, I'm sorry but it's time for you to pay up.
This is about taking money "back" when the government made an accounting error (not people that cheated or lied mind you) but not taking it back from the people they gave it to but rather taking it out of another persons return. If the government accidentally gave me $500 thirty years ago and I died after five years ago long after I spent it, would you be OK with them deducting $500 (plus interest and adjusted for inflation) from your return, simply because you happen to be a relative?
What we really need is for the federal government to step up buy the land put its foot down and say protest all you want we are building this fucker one way or the other. Anyone caught on the construction site will be shot for for trespassing in a secure location.
Cut the population from ~7 billion to ~3 billion. Start with ebola and work up a good one. That eliminates the problem of selection. Random chance will take care of it.
blacksmiths need fairly significant infrastructure behind to be of any kind of use.
yeas because there would be no scrap metal form our millions of cars left for a blacksmith to reuse. It would all need to be freshly mined oar.
if the clothing isn't stored properly, it won't last as long. Before air conditioning and modern insulation, cedar chests were the bees knees in providing protection for clothing and papers. so all is not lost and it won't be all that bad.
that may be true, thank god then that much of our clothes are synthetic those not eaten by creepy crawlies.
The post-apocalyptic world would also need blacksmiths, potters, carpenters, farmers and so on. Not to mention someone capable of swinging a sword and lopping the heads off marauders intent on dragging off the young women and torching the village. The challenge is that scientists and engineers do not necessarily have the skills most critically.
Says the man that has never seen a trebuchet cannon or a ballista.