GPS signals include the time. Replaying encrypted signals that include time information can be trivially detected. Now, if encrypted stuff only includes positioning data, then just spoof the unencrypted time+position, plus replay encrypted position.
I wouldn't be too surprised if it was Foxconn...
All the disappointed OEMs will be turning to Linux, making this year (yes, I promise this time is for real!) the Linux Desktop year.
First, reverse the order, I totally agree, to go from general to specific all the way in the URI.
Then, do whatever you want with TLDs, ccTLDs, etc.
Actually, NP stands for Non-deterministic Polynomial, i.e. An NP-complete problem can be solved in polynomial time in a nondeterministic Turing machine. In practice, this means that a candidate solution can be verified in polynomial time in a deterministic Turing machine (e.g. a normal computer). Normally this means the problem is exponential or factorial in a deterministic computer.
Now, NP-hard problems are those that are *at least* as hard as NP-complete, i.e. they need not be NP, so "polynomial verification" is not required.
Also, he is Moroccan native, and his seemingly arabic name probably doesn't help him either. So much for racial and origin equity.
And most of the traffic (HTTP) has cleartext headers preceding the actual data, which size can be matched to Content-length, and can be easily decompressed to verify. I'm not saying they should verify all of it, but they can always take some samples of suspicious connections (e.g. those with unreasonably high traffic where there doesn't seem to be a reason for it). In the end, it's all about finding suspicious traffic (or users?) and inspecting them more closely.
And when we all brake we'll restore the energy back into the earth. At least what the air friction left us with. And, again, the air itself moving and then "braking" will probably destroy our purpose.
From now on carriers are allowed to sell both locked and unlocked phones, but they have to clearly state which is the case, and what are the conditions of the lockdown (e.g. monthly discount, preferential prices). Also, the phone lease contract must be independent from the line contract. And the phone lease contract must provide a way to get the phone unlocked. The typical case will be something like "I give you this phone if you pay $X upfront and $Y monthly for Z months. If you have a voice plan with us, we'll discount you $Y for the first Z months".
I agree that changing previous contracts is somehow abusive against carriers, but IMHO it's the only way to encourage the first big wave of people switching. The market appears to be OK with this so far, and carriers already started aggressive marketing campaigns to steal each others' customers.
(Yes, I live in Chile. Sorry for suboptimal english
Or maybe now we'll see the race to buy "easy" IP addresses. "Visit us at 188.8.131.52".
Now, thinking again, that could actually halt the long-awaited migration to IPv6. Who'd like to see an ad like "find our products at http://200147023aef0/. Please remember the square brackets or you won't reach our website. And the double colon between 470 and 23. Unless you want to fill the omitted zeroes."
"graphene" is single-atom-thick carbon.
You definitely hit the nail! We should establish a new system that proves the CA's are trustworthy. I'd name it CACA*, for Certification Authorities' Certification Authority. Better yet, it should be decentralized, so there should be many independent CACAs all around the world, and every computer out there will have every CACA's certificate installed. This will definitely be the ultimate, perfect, unbreakable trust system.
* Pun intended: "caca" is spanish for poop.
Link to Original Source