I thought the FCC classified them as "common carriers" now.
Also I thought wording under the CDA was that "Service Providers" were not liable for content posted by their users.
It sure seems like they would be covered either way.
We've been here before in the 90's, when CS and CIS degree programs were flooded by people in the field solely for the money
Calling those training courses "degree programs" is rather generous. I remember those days, there was a serious shortage of skilled IT people, and I don't mean shortage in the sense of "let's pretend there is one so we can import cheap overseas workers"; it was genuinely hard to find staff of any qualification. What we had then is similar to the current boot camps, short track training to quickly get people up to speed. They enrolled literally anyone into these programs: housewifes re-entering the job market, jobless artists, high school students looking for a summer job... and the results were to match. Very few people stayed in IT very long, the exceptions mostly turning out to be decent project support staff or project managers rather than qualified IT techs.
This is like taxing car owners, period
FTFY. Your first question should be: where does the other 75% go?
Firefox forces me to obtain the self-signed certificate each time afresh, so each time it could be intercepted. Making hacking the cert very much easier.
I never really could imagine what posessed them to handle self signed certificates that way. But isn't there a check? Does FF actually remember the certificate and warn you if a different one is presented? That would make more sense: warn you every time that the cert cannot be verified, but also guard against a MITM replacing the cert with his own.
We want to test the subjects, not torture them.
Depends on the subjects...
"Truth never comes into the world but like a bastard, to the ignominy of him that brought her birth." -- Milton