Unless they extradite Kim Dotcom
Unless they extradite Kim Dotcom
What type of attack is being mitigated against and how does the risk of failure of the encryption solution compare to that of the attack vector? There are many ways encryption can fail, including loss of keys or too much exposure to the passwords for these keys.
For example, are we talking about hardware theft or software based intrusion?
For hardware theft, then you would probably want to find a solution where no one needs to know the keys, but it is part of the local infrastructure. This would mean that once hardware is taken out of said infrastructure then it can't access the keys it needs to make sense of the data. Just like anything there are still scenarios where this could fail or be a hinderance.
For software there are so many variables and use cases, I am not going to try to list them, but remember there are both internal vectors of attack and external vectors of attack. Sometimes the hardest one to defend against is social engineering.
If a patent or copyright makes a reasonable profit during it's term, the intent of those exclusive rights is met. Beyond that, locking up IP impedes progress, since others can't freely build on the original. Disney built their business using the works of the bros. Grimm, Hans Christian Anderson, Mark Twain, Lewis Carroll, Kipling, etc., but now work diligently to steal our culture from us by preventing newcomers from doing similar.
In the world of software I would argue that patents impede more than they help promote innovation. Many of the motivations for developing software aren't because there is a promise of a patent or monopoly, since if it were we wouldn't have the huge number of open source solutions. If a company hasn't capitalized on a software 'invention' within a couple of years, then there is a good chance someone will come up with and equivalent solution, without evening needing to see how the 'original' works and in a number of cases we even see evidence of parallel creation.
It has been argued that copyright is more valuable to software than patents.
One interesting article on software patents is here: https://www.forbes.com/sites/e...
People need to complain and stop this nonsense. Patents and copyrights should expire at 20 years max. Maybe less. This stifles creativity and productivity, and has nothing to do with the original intent of protecting inventors and writers. It has to stop.
If an idea can be conceived in an hour and implemented in a under a month, then 20 years is far in excess of anything reasonable. This is part of the problem with software patents: many of the patents can be designed and implemented in less than a month. Contrast that to hardware, where the cycle can often closer to a year, or more, and many hundreds of thousands of dollars are spent, so an extended protection makes some sense to recoup R&D costs.
I am sure there I plenty of people who could Be mistaken for a robot or their job is just that mundane
We all know how well this type of vision has worked for Google and Microsoft. Unless you have a healthy market of third-party manufacturers you may well end up needing to go your own way.
I think this may be a case of Apple rushing things. The MacBook Pro feels the same, where they could have left one legacy port as a compromise?
Wasn't Java open source at some point? And besides why is anybody using it now? (Here's looking at you Libre/OpenOffice) Rewrite Android in C, or better, Assembly, and the problem is solved.
Wikipedia's entry, has this to say as intro:
OpenJDK (Open Java Development Kit) is a free and open source implementation of the Java Platform, Standard Edition (Java SE). It is the result of an effort Sun Microsystems began in 2006. The implementation is licensed under the GNU General Public License (GNU GPL) version 2 with a linking exception. Were it not for the GPL linking exception, components that linked to the Java class library would be subject to the terms of the GPL license. OpenJDK is the official reference implementation of Java SE since version 7
There is a post here on StackOverflow on this: http://stackoverflow.com/quest...
My cynical side feels whatever the reality is, this is Oracle and well lets just say that I haven't ever felt Oracle to be a community player, unless that involves providing consults at cost.
I am looking forward to Vancouver, Toronto and Montreal becoming the new North American travel hubs. Of course flying around the USA will be a bit of a challenge.
I don't know if there is such a thing as 'data extradition', but surely working with Ireland would be the best approach? Anything else should surely outside of the immediate jurisdiction of US law enforcement? Maybe Google should invesigate the flip question: would the US accept e-mails on a foreign national stored on a US server to be handed over without the necessary legal paper work?
A lot of the moves that new administration suggested as making things better for the US worker, actually undermines the USA's position in the world and actually will end up potentially hurting jobs. Often the "take it all" approach it actually the less ideal position of giving up a little.
Helping NATO's members and the UN, while maybe not the best sounding when it comes to money, it does end up allowing the US to have sway over the politics of other countries and therefore help keep the US as a focal point for business.
The worst offender is Apple's iCloud, IMHzo. Backup your photos onto your own drive: I can offers you hoops and dead-ends. I really feel cloud services should provide easy options.
Just like the stupid URL display choice in the address bar. Maybe they are secretly wanting to recreate an AOL experience, minus the coasters?
Looks like we aren't waiting for the Changlings to create the Jem'Hadar. A little on the small scale, but maybe they had to start somewhere?
Maybe I have been watching too much DS9?
Given the regulatory requirements this makes sense. At one major US financial institution, where I worked, this is the norm, because the risk of information leakage is an issue. You even need to use application such as Mobile Iron or Good for accessing company e-mail. Company issued iPhones had the the essentials an nothing more, with certificates limiting what you could do with the phone.
At the same time, there was a move towards BYOD, which does provide a bit of a chink in the wall, but still requires Mobile Iron or Good for accessing company e-mail and a certificate limiting certain operations. You can't copy/paste from Mobile Iron or Good, for example.
These companies need to show to regulators that they are meeting requirements and maybe even going slightly beyond. All e-mail in and out is recorded for 7 years.
"When the going gets tough, the tough get empirical." -- Jon Carroll