Forgot your password?
typodupeerror

Comment: While I appreciate what Silent Circle is doing... (Score 5, Insightful) 67

by mitcheli (#47349103) Attached to: Ars Takes an Early Look At the Privacy-Centric Blackphone
I have to seriously hope that the phone is more than just encryption and access control. What types of intrusion detection does the phone have? What types of behavioral analysis to determine unknown exploit vectors does the phone have? Does the phone have decentralized communication methods? One idea I have pondered but seriously don't have the time to get engaged in is to try an SVOIP concept using peer to peer wifi connections, a mesh network of sorts. If the communications are decentralized and segregated from infrastructure, then you can bypass many of the eavesdropping techniques. If you have some form of behavioral analysis, then you can start to identify techniques to exploit the phone at the operational level. Encryption goes a long way to help, and software based access control at the OS level (assuming it's secure and not hackable) is also a good start. But maleware is getting far more customized and attacks on the platform are getting much tougher to detect on a pattern based methodology.

+ - US manufacturing adds only $4 to handset costs ..->

Submitted by Anonymous Coward
An anonymous reader writes "Motorola has been heavily marketing the "Made in the USA" credentials of the Moto X, and is assembling the handsets in its Fort Worth, Texas facility. Doing so allows the company to customize handsets individually for each customer and ship them out within four days of ordering. IHS estimates this adds around $4 extra to Motorola's costs, but makes the company more responsive and brings PR benefits."
Link to Original Source

Comment: Talk about a proactive jumpstart (Score 3, Insightful) 462

by mitcheli (#44703703) Attached to: Scottish Academic: Mining the Moon For Helium 3 Is Evil
I'm not really sure who to criticize here, the guy put out the research project on the reasons why we shouldn't mine the moon (Needless to say, we're probably a long way away from that). Or the guy who decided to write on how stupid it was to criticize the idea. Let's see, first we needs an economically viable method to land and return from the Moon. Next, we need that method to be capable of carrying significant weight. Then we would need the mining apparatuses necessary to work in those environments. And if memory serves, miners don't just mine anywhere, so there would needs to be substantial geological surveying to be done.

But I have to agree, it would be a waste to use all that energy on advertisements.

+ - Google's Director of Regime Change->

Submitted by Memroid
Memroid (898199) writes "'It has been revealed today, thanks to Edward Snowden, that Google and other US tech companies received millions of dollars from the NSA [...] Documents published last year by WikiLeaks obtained from the US intelligence contractor Stratfor, show that in 2011 Jared Cohen, then (as he is now) Director of Google Ideas, was off running secret missions to the edge of Iran in Azerbaijan. In these internal emails, Fred Burton, Stratfor’s Vice President for Intelligence and a former senior State Department official, describes Google as follows:

"Google is getting WH [White House] and State Dept support and air cover. In reality they are doing things the CIA cannot do... [Cohen] is going to get himself kidnapped or killed. Might be the best thing to happen to expose Google’s covert role in foaming up-risings, to be blunt. The US Gov’t can then disavow knowledge and Google is left holding the shit-bag."'"

Link to Original Source

Never trust a computer you can't repair yourself.

Working...