Bought a 1959 Chevrolet Apache 31 pickup truck in 1978. Motor blew up within fifty miles and I replaced it with a freshly rebuilt 235 L-six motor. Brand new.
Guy at the California Emissions Control Testing Center (actually, a major auto-repair shop which shall remain nameless here) say's "There's no smog control cannister on this truck. Can't pass it." I had to argue with him and make him look up the concept of a grandfathered vehicle, same thing that got me out of no seatbelt tickets later - but I digress. Mechanic dude, clearly unhappy that he can't sell me over a thousand dollars of unnecessary work to retrofit a PCR and catalytic converter on my Chevy, finally insists on probing the exhaust pipe.
His probe didn't even wiggle. Read around zero. Guy now insists that the probe is broken and he can't smog certify my truck. Another hour of arguing gets me the shop manager who's going to prove they can't smog my truck by probing his. Lo and behold! the needle obediently shows his truck is a filthy (yet legally compliant) pig. My truck, OTOH, still reads essentially zero - hey, it was essentially a brand-new, properly installed and tuned small-block six-cylinder engine.
Finally (after several more dirty looks and argument) I get my truck smogged in the state of California.
Any questions about why states do the smog control inspection thing? Anybody here still gullible enough to think it's actually to protect the ecology?
First, it takes a specific, intentional, not free step to implement this. Unless the manufacturer of a given device thinks security will be important enough to its customers to warrant a self-destruct they're not going to incorporate this. It's not like hardware manufacturers are thinking "Oh what the hell - consumers won't mind if our widget costs more than the competition's, let's build in an auto destruct and use Majel Barrett-Roddenberry's voice" or even "we can blow 'em up the day after the warranty runs out and defy everyone to prove our product isn't just plain crappy."
Second, it isn't fully tested yet. They're incorporating stresses into a component whose durability must now be examined - as previously noted, some highly specialized applications might benefit from a "failure before compromise" behavior, but most won't. Will these things spontaneously shatter five years after manufacture? Can this be triggered by anything other than the designed mechanism? Be a shame to have these things fail every eleven years because of sunspots, after all.
Finally, this is not the only tamper-resistant technology ever created. I can recall many items of military hardware which incorporate operationally similar safeguards, and it deserves remembering that the people who want to learn military secrets often have the resources to do ridiculous things like manually reassembling a three-dimensional puzzle consisting of thousands of nearly microscopic pieces. Combine this with our existing technologies and you end up with an incredibly effective tool . . . that's tool, not solution. Like anything else of security (and especially military security) multiple layers are the only possible approach. Multi-layered security includes physical security, information security, and resource security. This technology could serve as part of a tamper-deterrent system.
END OF LINE.
I'm sorry, do I not fit correctly in your pigeonhole? I didn't mean to cause you any discomfort.
Illegal filesharing could conceivably nuke the entertainment industry - not completely, but enough to get their attention. They should consider an alternative to the adversarial approach - deploy their own fileshares and make it economically and technically desirable to use those sources. It would be like nuclear power for the entertainment industry. But no - they just seem interested in garbage like the TPP, torrent cache posioning, idiotic lawsuits, domain takedowns and other WMD technologies. Entertainment is becoming the North Korea of industries.
With that said, I do routinely install PuTTY - I've gotten tired of the old arguments:
(ME): "What ports should I use on the jump server, and is Netcat installed there?"
(COWORKER): "Just click on PuTTY and go to the Tunnels part . .
(ME): "Can't you just tell me what ports to use?"
(COWORKER): "The only way I know how is in PuTTY."
Anybody but me ever felt the urge to punch the monkey?
The disks are getting full; purge a file today.