Sorry, no.
http://www.serendipity.li/wot/other_fires/other_fires.htm
Here's one example:
In October 2004 in Caracas, Venezuela, a fire in a 56-story office tower burned for more 17 hours and spread over 26 floors. Two floors collapsed, but the underlying floors did not, and the building remained standing.
See http://www.cbsnews.com/stories/2004/10/18/world/main649824.shtml
But... how do you KNOW they're doing what they say they're doing? Really? Without an intentional MiTM machine you can use to analyze what is ultimately being sent upstream to SpiderOak, you can't be sure.
Remember too, peeling apart and masquerading SSL/https sites is VERY easy to do, including certificate forging. Many companies do this today to decrypt (yes, decrypt) SSL traffic to then scan the plaintext content of the request. Heck, you can even set up Squid to do that if you want.
http://blog.blackfoundry.com/2011/06/02/break-open-dropbox-ssl-traffic-with-squid-proxy/
That's fairly easy to subvert: Don't ever use the same salt. Ever.
Look at something like PFS for where this is heading:
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Google is already using this today.
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Google is already using this today.
His point was that the system maintainer might be forced by a spy agency to alter the code so that the password variable is not temporary, but instead logged in persistent storage.
That's easy: Build your hashing systems such that there IS no persistent storage. Make it out of DRAM, and enforce rules to scrub the memory and temporary storage before and after each password hashing request or attempt. Additionally, just create a tmpfs volume, encrypted with a one-way hash/salt, and write your scratch data there, then dump it and scrub those bits when done. Problem solved.
rm -fr
It starts by de-humanising people by calling them something inferior (cockroaches, rats,
Be aware if you want to prevent the next Holocaust
Have they been asked? Do they keep a copy?
I guess that's why you won't see them with an Android load and a discount. MS has probably contracted with ASUS not to do that.
I mean, does a tablet with a removable CPU card make any sense whatsoever?
ah you've heard of the openmoko and the openpandora, then? how long did their designs take, and did the components go end-of-life in one case before they'd completed the design?
"If it ain't broke, don't fix it." - Bert Lantz