Discouraging developers is unfortunate. But Mozilla does not win by freezing old code in place/ensuring 15 years of old tweaks apply to current browser model. What's an old-guard dev to do? They can't move to Chrome.. as you stated it has even less capability.
Fortunately, FF is open source so another browser can resurrect whatever capabilities Mozilla discards. Honestly I think they should shrink dramatically smaller than 9050 employees, light additional fires to further develop & modularize their core technologies. I do use Chromium mostly on the desktop but mobile-Firefox is my go-to, everyday, browser of choice on Android. It is capable, and i'm honestly more curious to see what benefits come from changing APIs then I care what happens to obscure addons like "OmniSidebar".
Tunnels in an earthquake zone! Brilliant!
Tunnels are actually extremely safe around earthquakes, because they are in/move with the earth,
Imagine the worst-case tunnel scenario, (essentially the only one where any sort of major collapse is possible): A tunnel somehow constructed parallel to & exactly on a faultline, which then shifts by several meters. That sort of shift also levels all but the most high-tech/expensive above-ground civilization (which also probably should not be constructed *exactly* on top of the faultline).
Modern construction is focused on consideration & compensation for the (relatively minor) damage/danger that could (realistically) occur. Even a tunnel built directly on a faultline but perpendicular to it would likely survive with only localized damage to the meters-long area where the catastrophic shift actually occurred. https://www.researchgate.net/p...
Senator, you do know there's a REASON we went to the secret ballot originally, right? Because without it, a political figure who wants to buy votes can easily see if the people he bribed or threatened did what he wanted. (http://www.smithsonianmag.com/history/the-vote-that-failed-159427766/?no-ist)
I've long considered Oregon insane for going to all-mail-in voting, for precisely that reason.
Here in WA ballots are SENT by mail but returning ballot by mail is just one of several options, to include: counties organize to provide large, physical dropboxes you can walk up to & place your ballot in.
The fairly long window for voting also greatly increases the cost needed to approimate the fabled 'thugs pressuring at polling places'. Partisan grousers are just mad their traditional methods of supressing/tampering with votes arent readily applied; "I already submitted my ballot" is a ready excuse to attempted coercion here.
It's my preferred way to vote. Saves me (and the impoverished/the state) from having to pay the $0.50 to mail it back individually.
when you can nod, never nod when you can wink...who knows who said it first. Huey Long?
Say no more, say no more!
A nod's as good as a wink to a blind bat!
tried it on Google Maps. If you enter "0, 0" it takes you to the North Pole. There are a couple of Comex drilling rigs there
Protips, the North Pole is "90, 0"
If you zoom out, you'd find that "0, 0" is a little bit further away from the Arctic circle. (And your drilling rigs appear to be humorously mis-located north-american paint stores; Certainly on-topic, as garbage location data goes though : )
they don't have a working exploit.
Yes they do. The abstract of the linked paper states clearly: "we exploit this flaw to define a forgery attack"
Their demo exploit is an app, malware, and could be used by any other user, criminal, three-letter agency capable of such advanced techniques as *getting malware* onto target device. The linked article further expands on this to point with comments from the author, highlighting that anyone with a 0-day or known exploit would be able to degrade KeyStore encryption to crackable levels, without first having to trick a user into installing their app.
To be clear, the issue is a hardware issue in Qualcomm chipsets rather than with Android itself
Incorrect. The threatpost author just threw in the comment regarding Qualcomm at the very end of his writeup, it has entirely nothing to do with the cryptographic weakness the researchers from Orange uncovered.
The uncovered flaw is entirely an Android software issue, wherein an attacker with malware or a 0-day priviledged exploit can silently downgrade the strength of certain symmetric keys apps use to store private/encrypted data to cloud storage services. (Thereby allowing the attacker to swiftly break the encryption of data which previously could be efficiently decrypted only via the unmodified secret key located on the users handset)
So will the 99% of women who insist on putting their phones in their back pockets and sitting on them.
I'm sure you just typed without thinking (or just have limited life experience), but let the record show I'm male & way back in 2005 my first 5" Nokia linux tablet lasted about 7mo because I had quickly started carrying it in a back pocket (sans bulky hard-cover) as a VOIP phone.
Free wifi calls & 'fast' internet in the palm of my hand was amazing... right until I sat down on a table-edge. Crunch.
Everybody does it, even geeks.
A committee takes root and grows, it flowers, wilts and dies, scattering the seed from which other committees will bloom. -- Parkinson