If the Swat team response to an unverified phone call is to put people's lives at such severe risk as you describe, the problem is with the police, not the teenage idiot who placed the fake calls.
The issue is two-fold:
1) 99.9+% of all calls that result in a 'SWAT' response are legit. The swat response might be overkill, but the call itself is honest and legitimate. Expecting police to prove that a call is real when the vast majority are real is going to be a far greater threat to peoples' lives and safety than taking such calls at face value.
2) Police responses can be overkill. In some cases, police have been known to open fire before even asking people to drop their weapon.
To blame police for the results of a swatting call is like pushing someone randomly into the street and then claiming that it's all the fault of the driver for not stopping in time. Although some blame may be assigned to the driver for not keenly watching for people darting onto the roadway, it was the push which caused the initial peril, and the impact was the completely foreseeable result of the push.
I had gotten a couple of small 6-volt jell cells from work (a UPS that had been in a plane crash), then I got a dead cell phone battery from the repair shop. I ripped the battery pack apart and put in a small voltage controller then ran the voltage controller to the jell cells. The whole contraption fit quite nicely into a fluke multimeter case.
Now I had a portable cell phone with 3days of standby PLUS 8 hours of talk time
Telus at the time had 'unlimited talk time' contracts, knowing that battery life would be the limiting factor -- but not for me! I regularly went over 1500 minutes, and Telus eventually changed 'unlimited' to '1000 minutes' after I taught my hack to a couple of other hardware types.
The original reason for IP4 NAT was necessity, not security. It was (and is) quite common for a house or business to get a single IP4 address for however-many machines. IP6, on the other hand, defaults to giving a normal end-user an address pool bigger than what IP4 provides to the whole planet.
This means that it's WAY harder for an external hacker to guess at the address of a random machine. I got a
If you add NAT on top of all that, then you've got a pretty good security regime.
However -- all of that being said, the main excuse given for NAT being 'secure' is that people can't get to a NATed machine from the outside world. However, between machines getting 48bit (or more) randomized addresses that change from day to day, and a simple stateful firewall, you would have the same security and then some if you moved to ipv6. -- before you even throw NAT into the configuration.,
The IETF knew that this was to small for the longer term, but the efficiency argument won out. (this was back at a time when a 1Mz mainfraim with 16Megabytes of ram could be timeshared to over 100 users). They figured that by the time the 32 bit address space was saturated, that the replacement protocol with a REAL address space (IP6) would be easier on the computers of the day and there would be lots of time to get it up and running (turns out to have been over 30 years).
What they didn't plan for was that the 'Net would be effectively in the control of business majors and bean counters and that IP6 adoption would be at the whim of financial considerations and a 'you first' attitude.
Now IP6 adoption is waiting for a 'killer app' that is on an IP6-only server
So what you have is a car, parked legally with a cooking utensil inside. INSIDE the car. Now paint me stupid if I'm wrong, but if I was gonna plant a pressure cooker bomb somewhere, I'd be most likely to put it OUTSIDE of a car because the walls and windows of the car would be likely to absorb most of the sideways explosive force
Consider that the Boston bombing pressure cookers were placed in backpack in the middle of a crowd. if those pressure cookers had been in a car you would have been looking at little more than a handful of glass shard injuries.
Correct! A car parked in that location, unattended, with a pressure cooker inside and a smell of gasoline warrants further action. No problem whatsoever with this. Anyone who thinks otherwise is a fool.
Leaders picked by birth are basically 50/50 wether they are power hungry despots or benevolent dictators...
That depends on the society. Your description fits European hereditary systems (oldest surviving son of the current ruler).
In West Coast native society, heredity chose which families the next chief came from, but matrons of the community chose which child from the candidate families would be the next chief. Needless to say, a more thoughtful and caring child was more likely to be chosen under that system.
There's nothing really wrong with this announcement -- It's just not a big breakthrough of any real sort.
3.415 +- 10%, 90% of the time
Right now, what we're seeing is the exhaustion of the earth's thermal buffer systems. Most Glaciers in North America are scheduled to disappear in the next couple of decades --- as is the permanent ice in the Northern Ice cap. Once that happens, we will start seeing stage 2 effects.
One counter-intuitive result is that Europe is likely to freeze over
What experts are really worried about, however, is the possibility of rnaway global warming. If global warming does enough damage to the earth's climatic buffering system, we could end up going to a different metastable system (partway to Venus' 400C climate). That could be very bad for life as we know it on Earth.
It matters even more what kind of scale we're talking about. Is this the kind of warmth that means a slightly warmer summer occasionally or the kind that boils the oceans and turns the Earth into baked desert wasteland?
Timescale is generally in decades / centuries, rather than millennia.
Bash is older than Linux and has been available for just about every version of **IX for a couple of decades, and even Windows (via cygwin).
3rd party certification of certs is a 'best we can do' thing for the 99.95% who aren't in that last group... and it depends on the fourth parties like google being willing to defend the integrity of the process, and give you warnings when it's broken.
If you want to blindly trust self signed certs, or you're willing to do the work of verifying them, you're free to do the two clicks to ignore them. For the rest of us, they serve a real purpose.
The absence of labels [in ECL] is probably a good thing. -- T. Cheatham