I'm curious if this could be used with a FPGA card array to help with I/O or transaction processing, assuming the disk I/O isn't the bottleneck.
There used to be a utility called LBE Privacy Guard which did exactly this in earlier versions of Android, and on jailbroken iPhones, a utility called PMP (protect my privacy.) If the app wants contacts, it gets randomly generated cards. Songs, similar. Location, it gets where you select. Photos? Fake photos or an empty drive, ad id? Randomly generated.
Only thing is that LBE Privacy Guard has not been updated for the past few versions of Android.
Pretty much, one's best defense against a rogue fleshlight app is to have a firewall program like Droidwall or its successors and block the app from communicating on any interface.
I'm hoping you are right. Recently, one of the biggest changes in mainstream music was that the big labels stopped signing bands and started building bands. This difference doesn't sound big, but it means that instead of having an album from a group that has its own sound, stage presence, and lyrics, it means one is getting a singer who is especially chosen because he/she can follow orders, lyrics specifically chosen to appeal to a certain market segment by the MBA types, and then form a band around that.
The only downside of CDs not being a way of making money is that there are a number of bands which make better music in the studio than on stage. They are better off crafting their work and recording it than trying to get everything together in real-time and gigging. Plus, finding venues to gig in can be very difficult in some areas.
127 characters is low?
It used to be 16 characters, but that was back in the days of Windows 98, and NT 4.0 service pack 6a, well before AD forests and trees were in common use.
I get the not-so-fresh feeling being devil's advocate here, but (and this is opinion here, so take it, leave it, or just laugh at it) BitLocker is something that MS did seem to make a decent effort at getting right.
Unlike TrueCrypt, BitLocker is written not just for security, but for enterprise recoverability, so come e-Discovery time, one can recover the data on a laptop after an employee left.
If MS did drop the ball with BitLocker, they would be in a world of hurt. There are many laptops lost out there, and having an encrypted HDD  is the difference between writing off some inventory shrinkage versus a major public disaster, with civil, regulatory, and perhaps criminal consequences. So, BitLocker is something that had major security issues, there will be big businesses wanting their pound of flesh, not just users.
(Of course, after I write this, watch one of the next
: Of course, there are varying degrees of encryption. Having the recovery key for BitLocker stored someplace insecure is just as bad as having the TrueCrypt recovery CD with its password stored in a bad location. This is why BitLocker keys often wind up stored in AD... if AD gets compromised, the jig is up in the enterprise anyway.
As an aside... I should have stated, "stun gun", as this was done before Tasers were the dominant on the market.
But there are a lot of cases where the crime hurts the family and friends of the victim more than the victim, especially the time it takes to get the person back to some semblance of a normal life if the beating or attack was brutal enough.
Being the one beaten is one thing.
Being a friend or relative of the one attacked usually is far worse. Stuff like having a friend's son whom you grew up with tasered to death (the thieves wanted to know "where the valuables were", and kept pulling the trigger until the victim's heart gave out) makes one not really empathetic with violent criminals who do this sort of stuff.
If this were a theft, I'd say so. However, a gunpoint robbery is a trigger-pull from a murder (and often ends up that way.)
Not to mention the senseless beating of the people in the truck.
I wouldn't say death is appropriate, but pointing a gun in someone's face and then assaulting them is a lot more than just hopping into an empty truck that is still running and joyriding off with the cargo.
Acute radiation is ugly, but so is the long term damage from gunshot wounds, or the damage from being pummeled (the description was vague, but i'm sure it entailed use of some blunt objects as well.)
Encryption is not a one size fits all solution. I can say that I use encryption for everything because my HDDs use FDE (BitLocker, FileVault, and LUKS.) However, encrypting everything that hits the platters doesn't give any protection against remote attack. Scale that up to the enterprise, and having a low level PowerPath driver encrypt what hits a LUN doesn't matter much if the host machine gets breached.
While I do have faith that BitLocker and other items are not obviously backdoored, my eyes glaze over when companies say that they will just encrypt stuff, all problems over.
Encryption just makes the amount of sensitive data move from the data to how keys are stored, and attackers will just start hitting the key management system, either bribing/coercing an admin, or use basic social engineering techniques to get access to stored keys.
Even hardware key storage devices are not 100%. One can always hack a user account on one of those to sign/decrypt data even without access to the key material itself.
Encryption is just one piece. It can be equated to use of a safe. However, safecrackers tend to care less about the safe itself than the lock on the safe, and the key management is what makes or breaks security.
This might be a weakness of BitCoin eventually. As blockchains get longer and longer, it gets more unwieldy to keep everything updated.
The closest thing is having to calculate every transaction (vending machine, gas station, bank, etc.) a Loonie  coin has been through since it was struck at the mint. Even though big-O is a linear function, after a while, the cryptographic calculations required for each transaction can add up over time, and when a BitCoin is broken into subunits, each subunit down to the satoshi will have its own separate chain that has to be run through.
Not a big problem now, but as BitCoins circulate through large amounts of users, it might become an issue, especially for large volumes.
: Or quarter, or Euro, but Loonies are a decent unit for an arbitrary example.
This is only going to hurt in the long run.
Code is going to be written. It will just be written in countries that don't have the non-functional  IP laws, and the products sold from there.
This reminds me of the 1990s and how cryptography development was stifled in the US by ITAR laws. It didn't stop crypto development. What happened was that Russia, Germany, and even China started on the process.
The same thing would happen again. It just means that innovation in coding moves to other countries, perhaps China, Russia, the Ukraine, Brazil, or elsewhere.
Of course, the genie can be put back in the bottle -- locked down devices can prevent code that hasn't been vetted to run, and on desktops, mandatory DRM stacks would ensure the laws are enforced regardless of borders.
: Well, functional for a few, but not as a gestalt.
Seconded. This is a pile of manure just waiting to fall onto someone as a scapegoat, and it might be that the application is already compromised.
Approaching legal won't do the trick. They will immediately turn around and tell the boss that so and so have gone over their head... and this won't be good for future (or present) job prospects.
Were I in your shoes, I would be honing my LinkedIn profile, updating the resume, maybe shooting for a certificate or two for keywords, and starting the hunt.
In previous IT jobs, I've heard the mantra, "security has no ROI" plenty of times, followed by, "Geek Squad can fix it if we get hacked" when I ask the obvious followup question. When you hear that song and dance, run.
Without a sign, they have to be officially given a notice of trespass or warned off by the police. Shouting, "git off my lawn" won't do the job unless there is legal proof this was done.
During SXSW in Austin, there would be people who would pull up into driveways without permission, plug their travel trailers into outlets in the nearby house, use the nearby hose for their RV's water, and spend the night there. The homeowner would ask the people to leave, and the RV-ers would say some choice vulgarities. The police finally get called and then the trailer would get moved one driveway over. Without a posted tow away zone sign, the fact that a driveway would be a place to turn into a party spot and RV parking place was taken advantage of fairly often.
It might be just five cents of power, but it still is theft, same with the people who plug their travel trailer into the wall of someone's house without permission.
Would this be something to be arrested over? No. In most circumstances, a citation for a class C misdemeanor would be the best matter of course.
It seems to come in waves. Sometimes you get the old drives which work forever without issue, only being replaced because their capacity is pointless. Other times, your RAID arrays are constantly in degraded mode because a batch of HDDs are constantly dropping into prefail status, or just deciding to take a dirt nap.