Re: The year is 2065...
And having brought at least one of them back, he'll retreat to his perfect-acoustics room, fit that last stylus and...
... hears LBJ telling the story of who REALLY killed JFK.
16005 publicly visible posts • joined 3 Jun 2008
Just by having a significant proportion of faultless robo drivers won't make the meatbags drive more recklessly thus raising premiums.
You seem to assume that the insurance market is a monopoly. Not so. "Do you own a robo-car? Our premiums are 30% less than the competition, and we will thrown in a free lawyer in case of accident against meatbags. Call 1-800-DRIVERATOR now!"
If it is this one, it will surprise you that it is based on TCP/IP among others.
Sounds like a standard identification method, like, you know, exchange of certificates in SSL...
See also RFC6538
The Host Identity Protocol architecture introduces a new namespace, the "host identity" namespace, to the Internet architecture. The express purpose of this new namespace is to allow for the decoupling of identifiers (host identities) and locators (IP addresses) at the internetworking layer of the architecture. The contributors to HIP have expected that HIP will enable alternative solutions for several of the Internet's challenging technical problems, including potentially host mobility, host multihoming, site multihoming, IPv6 transition, NAT traversal, and network-level security. Although there have been many architectural proposals to decouple identifiers and locators over the past 20 years, HIP is one of the most actively developed proposals in this area [book.gurtov].
The Host Identity Protocol itself provides a rapid exchange of host identities (public keys) between hosts and uses a Diffie-Hellman key exchange that is compliant with Sigma ("SIGn-and-MAc") to establish shared secrets between such endpoints [RFC5201]. The protocol is designed to be resistant to Denial-of-Service (DoS) and Man-in-the-Middle (MitM) attacks, and when used together with another suitable security protocol, such as Encapsulated Security Payload (ESP) [RFC4303], it provides encryption and/or authentication protection for upper-layer protocols such as TCP and UDP, while enabling continuity of communications across network-layer address changes.
The primary reason given for the changes is to stop repressivedesignated regimes THAT ARE NOT DANCING TO UNCLE SAM'S MAD PIPING around the world from buying sophisticated software that can be used to spy on political opponents and others.
FTFY. Also: List of authoritarian regimes supported by the United States
Did I mention that the staunch supporter of NATO"freedom", Monsieur Saakashwili, currently on the run from his own home country for various kinds of nastiness, has just been appointed governor of the freedom-loving Ukrainian province of Odessa? Seriously. Can I export debuggers to Ukraine now?
It's time to tell the USA to go be barking mad elsewhere until it gets better.
Did you miss another T in that?
Not this is correct. As is the case with "PATRIOT" and "FREEDOM", USAnians like to have loud-sounding acronyms to cover a sordid reality. I suppose it was meant to be FATCAT but I guess that would have sounded too much like old-style german word-smithery about removing certain ethnic groups from premises, even in the current mindset of obtaining total state control over pretty much everything.
You would come home to find your obese moggy sat in the middle of a debris field, chewing on one of your bluetooth coffee cups.
Real cats are like anime Super Robots to the Internet of Things.
Very irritable, too.
Breitenberg's vehicles better scurry.
TCP/IP is not appropriate for 21st century needs
Yeah well maybe you should go back to the course on "Infosec 101" because if you think TCP/IP is the problem, I have a bridge in lower Manhattan, very cheap...
"He overdosed on alcohol? Clearly the fault of the glass bottles!"
Data communication must be encrypted at the SOURCE, by DEFAULT, across the world. Period. Anything else is simply a continuous data theft, waiting to happen.
You may want to explain how encrypting data communications will prohibit data being exfiltrated in the first place. Your voodoo is weak...
Ok, start with The Orange Book and work your way forward, slowly...
NSA presently is being savaged
The smallest fiddle in the world is heard playing.
Alos, 5 minutes until the suggestion emerges that the breach was actually due to the 5-minute interruption in metadata collection between the sunsetting of the P.A.T.R.I.O.T. act and the inception of the F.R.E.E.D.O.M. act.
The important part however is that without Wikileaks publishing this treaty no one outside government teams and large corporates would have any idea what was law until it was passed: something that rankles, especially in the era of the internet.
There must be 10⁴ copies of this shit floating around on the devoces (mobile or otherwise) less-than-practically.skilled-in-IT political operators. How come nobody has dropped core onto the sidewalk yet?
You can be sure that escrow will continue to be acceptable practice. Assholes refusing to conform will just suddenly have no customers. No code in the notary's safe? No deal!
Indeed, in my book, we are now in the era where inspectable open source code (and not only "read after my death" escrow) is becoming necessary in quite a few business dealings.
In an emergency those LAND LINES could be OVERLOADED...or worse, CUT.
That EMERGENCY would then turn out to be a SKOOL SHOOTING, in which case you would be in a DIRE PICKLE as all the blue-clad people meant to "guard the campus" (i.e. harass and taser students for incontinent speech freedomization) would have left due to ELF AND SAFETY regualtions, waiting for the SWAT team to arrive. Which would then trundle in about 4h later.
For example, it seeks to extend American copyright laws to participating nations, possibly even going so far as to make ISPs responsible for any copyright infringement by their users, and impose criminal charges on downloaders.
National laws are not passed via secret treaties, bilateral or otherwise. They need to be voted on by parliament. These things are null and void. Next there will be secret ententes promising military assistance in case bullshit happens during dickwaving with the neighbours. Oh wait...
Cue ominous music: "Probably not a problem"
"Collisions releasing greater energy occur millions of times a day in the earth's atmosphere and nothing terrible happens."
One can apparently have fun with Smartphones used as cosmic ray detectors: crayfis.io
I joked with Microsoft that the release would include manga wallpaper. After all, that reflects the Insiders' tastes pretty well.
I hate to say it, but ALL of the tech is determined by the "Insiders". The fact that a "Start Button" has become lore and part of the expectation does not mean it comes from "Outsiders" or is a good idea.
Why doesn't the BND add selectors for Trojans and send those to the NSA, who will analyze them and then warn of an intrusion
In which part of the multiverse would this actually work? How can you select for Trojans, why would the NSA analyze them and why would it warn anyone of anything?
Because suggesting that the aircraft was at fault might impact the manufacturer's profitablilty which would put the defence of the realm (and jobs in a marginal constituency) at risk.
I hate to bring this message but some Yuropean countries have the hots for their "friend's" F-35, so your "risk" is already in the intestinal zone.
Evidence, transparency, proper legal procedure.
You know, nowadays you can actually *copy* black box contents while maintaining evidence, transparency and proper legal procedure and getting the engineers to work.
An Adama Drop (apparently also called a Husker Hailmary) on Washington D.C.
Just after the P.A.T.R.I.O.T. act expires and the F.R.E.E.D.O.M. act does not get the required number of votes.
If it has a chotic orbit, is there any explanation for why it hasn't drifted off into interplanetary space or dropped onto Saturn expect the evident postselection explanations ("it just managed to stay in the neighborhood with no reason, otherwise we would not be talking about it"
The Entrepreneurial State
I opened it then closed it.
It's total, utter crap and totally at odds with anything real and what I encounter around me. Or with common sense. The author must be pissing from high up the ivory tower.
Indeed, as Keynes noted, it is the publicly funded organisations of the state that have the animal spirits.
Keynes was also one of those people that manage to actually NEVER be right about anything. But he managed to lather his writings into so much high-falutin bullshit that politicians and academics alike could reasonably claim that reasonable policy was being described, and thus could follow their instincts to generate free money. Which brings us to today's neverending economic meltdown.