Senator, you do know there's a REASON we went to the secret ballot originally, right? Because without it, a political figure who wants to buy votes can easily see if the people he bribed or threatened did what he wanted. (http://www.smithsonianmag.com/history/the-vote-that-failed-159427766/?no-ist)
I've long considered Oregon insane for going to all-mail-in voting, for precisely that reason.
Here in WA ballots are SENT by mail but returning ballot by mail is just one of several options, to include: counties organize to provide large, physical dropboxes you can walk up to & place your ballot in.
The fairly long window for voting also greatly increases the cost needed to approimate the fabled 'thugs pressuring at polling places'. Partisan grousers are just mad their traditional methods of supressing/tampering with votes arent readily applied; "I already submitted my ballot" is a ready excuse to attempted coercion here.
It's my preferred way to vote. Saves me (and the impoverished/the state) from having to pay the $0.50 to mail it back individually.
when you can nod, never nod when you can wink...who knows who said it first. Huey Long?
Say no more, say no more!
A nod's as good as a wink to a blind bat!
tried it on Google Maps. If you enter "0, 0" it takes you to the North Pole. There are a couple of Comex drilling rigs there
Protips, the North Pole is "90, 0"
If you zoom out, you'd find that "0, 0" is a little bit further away from the Arctic circle. (And your drilling rigs appear to be humorously mis-located north-american paint stores; Certainly on-topic, as garbage location data goes though : )
they don't have a working exploit.
Yes they do. The abstract of the linked paper states clearly: "we exploit this flaw to define a forgery attack"
Their demo exploit is an app, malware, and could be used by any other user, criminal, three-letter agency capable of such advanced techniques as *getting malware* onto target device. The linked article further expands on this to point with comments from the author, highlighting that anyone with a 0-day or known exploit would be able to degrade KeyStore encryption to crackable levels, without first having to trick a user into installing their app.
To be clear, the issue is a hardware issue in Qualcomm chipsets rather than with Android itself
Incorrect. The threatpost author just threw in the comment regarding Qualcomm at the very end of his writeup, it has entirely nothing to do with the cryptographic weakness the researchers from Orange uncovered.
The uncovered flaw is entirely an Android software issue, wherein an attacker with malware or a 0-day priviledged exploit can silently downgrade the strength of certain symmetric keys apps use to store private/encrypted data to cloud storage services. (Thereby allowing the attacker to swiftly break the encryption of data which previously could be efficiently decrypted only via the unmodified secret key located on the users handset)
So will the 99% of women who insist on putting their phones in their back pockets and sitting on them.
I'm sure you just typed without thinking (or just have limited life experience), but let the record show I'm male & way back in 2005 my first 5" Nokia linux tablet lasted about 7mo because I had quickly started carrying it in a back pocket (sans bulky hard-cover) as a VOIP phone.
Free wifi calls & 'fast' internet in the palm of my hand was amazing... right until I sat down on a table-edge. Crunch.
Everybody does it, even geeks.
I have a theory that it's impossible to prove anything, but I can't prove it.