Comment um... what? (Score 1) 127
But can Firefox OS make any headway in a mobile-device crowded with options?
Um, yes. Yes it can. It will be installed on the device. Consider that its headway.
But can Firefox OS make any headway in a mobile-device crowded with options?
Um, yes. Yes it can. It will be installed on the device. Consider that its headway.
on Slashdot, Bitcoin is widely considered unstable and generally considered to be a Ponzi scheme
Have the courage to speak for yourself and only yourself. Everybody here wants you to do that.
Wonderful idea, you and a few thousand buddies are all going to crapflood the NSA. The NSA, an organization that is arguably the best in the world at sorting noise from signal. Check your ego at the door and realize your an amateur pretending to play in the big leagues.
Wow, I don't know how many NSA cocks you've sucked, but I'm sure they're appreciative.
First they came for the child rapists and I said nothing because everyone would think I was one, too.
Paraphrasing a related quote I recently happened across: "The trouble with fighting for human freedom is that you spend most of your time defending scoundrels, because it's against scoundrels that oppressive laws are first aimed, and oppression is best stopped early."
From what I'm reading, if the judge doesn't believe him, he'd just find him in contempt of court and detain him until he remembers.
Remedy for this: enact a practice of having various hard encrypted hard drives around your house that are encrypted with passwords you don't know (i.e. were loooong randomly generated strings you copy/pasted and forgot), and document your practice of creating/keeping such drives. That your purpose is to have plausible deniability if asked for a password to a given drive may be offputting, but the plausible deniability part is now, well, highly undeniable.
Second, since the drives are now known to be his because the FBI encrypted a drive, refusing to decrypt would now be taken as evidence that he's got something to hide, basically an admission of guilt.
Ah, the old "if you've done nothing wrong, you have no legitimate objection to a complete invasion of your privacy" argument.
That's been the case with bitcoins since day one, the anonymity claims were always pure hyperbole.
Please feel free to support your claim with facts.
Kind of funny, isn't it... Windows malware? Blame Microsoft. Android malware? Blame the user.
If you're trying to point out hypocrisy, you miss. The WIndows OS code is so full of security holes it's pathetic... and yes, that is squarely Microsoft's fault. Android/linux is much much better, and when we're talking about malware that specifically must be cert-installed by a user, yes, the user is most definitely complicit. Get off your high horse.
How after they loose the package are they going to view the video footage?
Maybe the notion that some packages have cameras in them will result in better package handling, resulting in fewer lost packages.
"The purpose was" is now irrelevant. The patent law now serves the interests of those who own the government just as they wish it to be.
Stating the purpose is hugely relevant in terms of educating many who do not know. You're correct to state that that patent law is currently abused in ways directly contrary to the motivations of its creators. You're very incorrect to imply that educating people about this travesty is meaningless.
All it takes is you wearing some kind of odd underwear or
... hell, whatever. Freak accidents happen. You slip, try to steady yourself with the table, knock it over, trip the cupboard with all the cake... you get the idea. How long 'til it's a meme?
I feel like the above pretty much captures the essence of the Harlem Shake video phenomenon.
The salt's actual job is not to prevent a hacker from breaking that user's password, but to prevent the hacker from being able to break all the passwords at once.
That may be *part* of a salt's usefulness. Another possibly bigger part is to prevent rainbow table attacks, i.e. making it so a cracker can't just take a precomputed list of hashes of common passwords and match them to what's in the database.
Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker