Forgot your password?
typodupeerror

Comment Re:and the question everyone is asking is (Score 1) 25

It's worth figuring out what your threat model is. There probably are ways that some government agencies can get into iPhones or decrypt these messages, and they probably are collecting all the encrypted data in case quantum computers can decrypt it later.

But are they going to waste any of that on you? Unless you are a high value target for them, and unless they intend to avoid any judicial process where their capabilities might become public, they probably aren't going to use their best tools to help the local cops break into your phone.

Comment Re:beat them senseless (Score 1) 95

That's the crux of it. We have a bunch of legislators squawking like frightened chickens about "printing guns" who don't realize that the essential parts that make it a gun can't be printed in plastic (unless you WANT to go have an ER physician pluck plastic bits out of your face).

Meanwhile, no regulation whatsoever on the plumbing aisle of your favorite hardware store where you can get parts for a useful improvised gun.

Comment Re:Damn, I'm old (Score 1) 86

I remember the nimbus!

My school had a network of discless machines.

They could also boot into BBC mode with a reasonably good BBCBasic interpreter and RM mode as xxx well.

They were pretty good in their niche, really though the Archi was a fool 32 bit very fast RISC computer that knocked the competition into a cocked hat. Struggled on a bit but then vanquished into the embedded space until a few years ago.

Slashdot Top Deals

The reward of a thing well done is to have done it. -- Emerson

Working...