I'd expect Google to actually be good at it.
Is having Google be your ISP just asking for absolutely everything to be spied on?
If I get it, I'm thinking of renting a cheap VPS and running all my traffic through that over an encrypted tunnel. How bad would latency be? Other thoughts?
There's already a perfectly good word: "incited". You don't need to make up "incentivized".
Nope... Remember the old "camcorders"? Those were really cool because you had both devices, the camera and the recorder, in the same box. Previously you'd have the camera and also be lugging around a recorder.
Point being that a camera does not by definition require an integrated recorder.
He wasn't comparing addresses to addresses. He was comparing IPv6
No. There are 2^64
You can use less than and greater than signs if you HTML-escape them, eg: "<" (<) and ">" (>).
If piratebay.se was seized, then how is it redirecting to piratebay.org?
No, you've drawn the opposite of the correct conclusion. This demonstrates that no matter how much money you plough into a campaign, it's the votes that really matter.
Do you mean Natchitoches?
I'm not disagreeing with you. But posting the key in the content would make people look there instead of at the real key.
A real solution is probably something automatic like Perspectives.
Of course, there's also key-pinning, which can help a lot.
Posting the key would be extremely counterproductive, then. They should get the key from their browser.
How exactly is verifying a site's identity by relying on the site itself, via the same channel, any better than zero authentication at all?
When connecting to Slashdot, I'm now cryptographically guaranteed to be talking to (drumroll please) Dice Holdings, Inc!
So... are we being MitM'd by Dice, trying to get their old property back?
...when fits of creativity run strong, more than one programmer or writer has been known to abandon the desktop for the more spacious floor. - Fred Brooks, Jr.