Call me naive, but isn't it the job of the US Federal Government to protect the US citizens and property against incursion and spying by foreign powers? We cannot know what they will do with their intercepts.
PRISM and similar "you spy on mine and I'll spy on yourn" programs smell like conspiracy to violate the US Consititution, if not out-and-out treason. That those programs continue can only be attributed to institutionalized endemic corruption.
... all the more reason for a "fruit of the poisoned vine" doctrine to be adopted in the UK. The whole stop should have been thrown out in the US if it were based on an unwarrented bug. Not that it will be, nor that "poisoned vine" is safe in the US.
Agreed on the judge's odd mention (reliance?) of a failure to declare. Looks weak, but something for the Lords (err...Supremes) to rule upon. Perhaps deliberately.
And fully agreed the length of time came from higher up. Easy enough to establish in a proper cross-examination if defense access to all the participants were allowed. Tough to keep a large conspiracy together.
This was obviously an in absentia railroad job.
... so it is "absurd" to expect a government to be other than hypocritical? "Absurd" to expect a government to obey laws it creates?
Perhaps so, but I am not so cynical. This "sovereign immunity" is purely predatory behaviour and utterly inconsistent with human rights and "consent of the governed". That does not mean it will stop soon, but it is chipping away.
BTW, how did they know it was GCHQ docs? Did he confess? or Were they unencrypted and GCHQ attested?
"survival" of the fittest is mostly a euphemism for reproduction. Numbers matter, but so does quality for it influences grandchildren and beyond.
So, are the scarce-gametes (women) attracted to nice guys? I don't see any evidence amongst all the feel-good unsupported normative prescriptions. I strongly suspect women are looking for men practicing optimum predatation. Although I doubt they are aware of this "goldilocks".
'fess up -- who amongst us has NEVER EVER used someone else's login credentials to do some task? Perhaps the inexperienced, yet to understand security hypocrisy.
The entire yelpdesk industry lives by taking Remote Control" of users' machines.
(with apologies to Python's 4 Yorkshiremen)
But seriously, what matters is the reason. For the right reasons, long hours are fine. For the wrong reasons or in the wrong environment, 40h can be too much. Decide what matters most to you and follow it.
Then you won't be getting up half an hour before you go to bed!
p-value is just the probability the data/observations were the result of a random process. So a great p value like 0.01 says the results were not random. They do not conform what made them non-random (ie theory).
Epistimology is elementary, and often skipped by those who wish to persuade. "Figures do not lie, but liars figure."[Clemens]
You are being horn-swoggled by a boss who is confusing two types of contract: A builder will _not_ fix the wall without more pay if s/he is hourly. They will only fix the wall "gratis" if they have a contract for a specified job. Said contract will have some [unstated] provision for rework and the expectation of profit (especially on the change orders).
There is risk in every job. If he wants a supplier (employee/contractor) to assume the risk, he has to pay for it. If he wants minimum cost, normally owners assume it for themselves and manage. Your boss wants to have his cake and eat it too. Disgusting overreach.
For a spider (scraper?) to work, it has to get the filenames from somewhere, usually another file like
What might have happened is that netadmins like Snowden had uid/pwd that allowed ftp access (necessary to fix files). Then run the directories just as `archie` did 20+ years ago.
I _am_ still using text `links` and like it very much thank you. `lynx` I reluctantly abandoned many years ago when it would not do frames. The new JS site browses just fine, don't know about posting.
FWIW, I do have X installed, but try to avoid running it. When I do, it is mostly to open xterms. I vastly prefer my CLI but really don't want to convert anyone. I'm secure in my manhood and choices.
As for mobile site, I believe the biggest concern is not CPU but screen resolution. Many phone displays have abysmal pixel count - 320 x 200 . Finger scolling is easier, but still work. Apple gets this right, and is almost enough for me to buy an iPhone.
Russia banning Bitcoin will have relatively little effect on the use of Bitcoin there since enforcement is highly selective and not dependant on established law.
OTOH if Russia bans it, the US (and its hangers-on) will have to think twice about banning Bitcoin. Heaven forbid the old foe gets it right, and first. Absent strong motivation, the US does not want to be seen as supporting Russia, particularly not ideologically on some matter of principle.
Product "upgrades" always sound compelling to software "product managers" but are always less-so to customers. The managers do not suffer the upgrade costs (which are always far greater than relicence costs, especially when backwards compatibility is not advertised).
Any upgrade is always marginal -- the initial app solved the problem and captured most of the benefits. An upgrade hunts for scraps. Many upgrades are forced by obsolescence -- if customers could keep the old system running, they would.
Sure, with new systems you want the "latest" to have decent lifetime. And with really compelling uses (mobile), new systems will be bought.
I do not see anything remotely compelling about the new Adobe DRM, Amazon will eat their lunch even faster.
Good point. The question is whether TLAs can backdate NSLs so their ill-gotten trove can be used as evidence and not just threat identification/blackmail. Since NSLs are supposed to be secret, how can a judge rule on the [in]admissibility of evidence? One might hope that failing some authorization (warrent, unsealed NSL? etc) an intercept would be ruled inadmissible.
If anything, it is worse -- NSA is capturing 1.4%, some combination of good filters and missed streams.