Comment Re:Six terabytes (Score 1) 37
Yeah, I'm hung up on that too. You can come up with some outrageously huge numbers for mass and angular velocity, but once I multiply them by zero distance... I'm missing something.
Yeah, I'm hung up on that too. You can come up with some outrageously huge numbers for mass and angular velocity, but once I multiply them by zero distance... I'm missing something.
the outer edge of the mass exceeding the speed of light
That intuitively makes sense, but I thought part of the black hole cheat is that it doesn't have an edge. I thought they were literally singularities, with a circumference of zero. Apparently not the case?
How a thing with a circumference of zero could meaningfully "rotate" is beyond me, but I thought this (and many other suspected properties of rotating black holes) was supposed to be beyond my ignorant layman understanding!
An adversary can coerce a proprietary software producer to compromise the code. That's what we're going to see here.
An adversary cannot time-travel to when a protocol was invented, and compromise the protocol. (Though I guess the NSA can come kind of close to that, by "helping" as it's being developed, w/out the time-travel part.) That's what we're not going to see here.
Ergo, proprietary apps will remain unable to provide secure messaging, but secure messaging will remain available to people who want it.
It gets weirder. Rhapsody had been Sonos' partner streaming service - and Rhapsody is also... I HEART RADIO. Now the whole Napster lot got dumped in the lap of venture capital vultures.
AFAIK Peacemaker S02 comes out in August. Of this year!!
https://youtu.be/FB5C_p6p_Do?si=ogITM1lCsDi_Dxk2 is an interesting counter-argument.
Tracked? Mossad isn't interesting in tracking, they're interested in explosions.
Nah, social media shown me that chugging raw milk and invermectin has literally zero downsides
If we don't preprogram them in advance, then how will kids learn "Math class is tough!"?
Selecting office software is not a political statement
That's right, it's not a statement. It's just a position. You either hold the position that it's ok to be dependent on a third party and it's ok to fail if that third party turns against you, or you hold the position that it's not ok and you would prefer to stay up no matter what adversaries want.
It only becomes a statement once you tell someone that security and reliability are among your values.
Scale isn't the main problem, interoperability is. If you've solved interoperability (i.e. you've got SPF, DKIM, etc working so gmail.com and outlook.com will receive emails sent from your system) then you're in good shape.
Not that running large systems is necessarily easy, but it doesn't have enemies the way interoperability has enemies. Scale is a merely conventional problem that Google and Microsoft aren't making worse for Linux users. Nobody's pushing back, trying to make you fail; your only foe is savage reality.
And man-vs-savage-reality is a pretty nice conflict to be involved in, compared to man-vs-man.
You CNAME it to a domain that expired.
How do they measure this? Did all the pirates magically agree to put Google Analytics on their web pages and share reporting with Muso? Or, in accordance with The Pirate Code (?!) do all pirate pages request the browser load http://muso.com/arr-trackme-1x... and (again, in accordance with The Pirate Code, I guess) the visitors configure their browsers to whitelist and load it? I am skeptical of any third parties who claim they "track" pirate site visits.
Surely whoever bills for Trump's services knows exactly what has been sent so far. Trump doesn't "work" for free.
Paper strips don't depend on anything to persist.
Get that desk fan out of here!!
Where are the calculations that go with a calculated risk?