229 posts • joined 9 Jan 2012
Whether a settlement is taxable depends on the details. Which is why if you are ever suing (in the US) for a significant amount of money, it's a good idea to talk to a tax attorney before settling or before the court awards you anything. Even if the settlement or award is taxable, there can sometimes be ways to structure it to lower the taxes. For example, if the award or settlement covers your legal fees, often that can be structured so that you do not have to pay taxes on the money going to your legal team. But it has to be structured properly BEFORE the award or settlement is made. You can't play around with the paperwork after the check(s) is cut.
Re: Not sure what to think
"I wonder if her father made it clear that they couldn't tell others about the settlement?"
Typical "computer geek who knows zero about the law" statement.
The father violated the agreement the second he told his family. The daughter's post on Facebook simply provided irrefutable proof of his violation. The settlement's confidentiality requirement is no different than your employer's confidentiality requirement or a defense department confidentiality requirement. Disclosing to your family, even your spouse, is a violation.
Wow, a Maginot Line-like thing at sea. Looks great in calm waters. My money is that it won't fare so well in a North Atlantic storm.
Propeller needs a cage, like an airboat's. The tires are too narrow for any real use on sand.
Probably the best take on this deal
Re: It should be blocked by the anti-trust authorities
That, in a nutshell, just underscores the lack of competition in the US cable marketplace.
Re: Few CIOs or VP ITs can code
I've been with a number of startups in my career, as well as a couple of mature companies. In both environments, most of the people at all levels have mindsets that can be summed up as follows:
"Any job I don't understand & have no experience with is easy."
which is often seen in it's other form,
"No job is as difficult as mine."
The bottom line is that good companies require different talents for the different jobs, and they are all important. (Unless there are redundancies, in which case the place is over staffed.)
Re: A page from Google they can keep
No doubt that is the reason Mozilla abandoned Thunderbird without offering a viable alternative email client, thus screwing Thunderbird users.
Re: It doesn't matter anymore "Sieg Heil" NSA!!!!
"I'm quite sure that they have the worst dirt they have on everyone at the top of their respective folders and will threaten anyone that starts to be a real threat to the NSA's ability to crack any crypto."
All the more reason that when the Standards Bodies meet, all members should be required to wear these: http://www.thedailybeast.com/articles/2014/01/07/the-secret-world-of-men-who-dress-like-dolls.html
Then, it would be impossible for any intelligence agency to have worse dirt on them which could embarrass them any further.
The enemy you can see
Isn't as dangerous as the enemy you don't see. The bottom line is that all processes should be open and transparent so that "trust" in any participant isn't a factor. In other words, the processes should be designed as if every participant is untrustworthy.
The real issue with the Dodd-Frank Method
Is that it's trivial to fake the documentation as there is nothing objective to back up the paperwork. The refiner method, being a filter based on chemical analysis, would require the refiner to fake the results to cheat, and that is easy for a third party to monitor.
Dodd-Frank was written by NGO's to provide a revenue stream for the NGO's by providing source certifcations. It's also why the NGO's lied about costs to implement.
Re: Well I'm convinced.
"...the Everett many worlds interpretation is the correct one..."
You are making a distinction without a difference. The Everett many worlds interpretation is "the correct one", as it is entirely equivalent in all ways to the conventional collapsing wavefunction "correct" interpretation. Any competent Physicist could tell you that.
Re: Well I'm convinced.
I know this just proves that social media has no future.
None of this would be a problem if it was done right the first time
TOR suffers from the same fundamental flaw that SSL does, namely the fact that it's a single-path system. While multi-path isn't fool proof, it certainly makes the interception and tracking a lot harder. For a lot of purposes, the added latency is quite acceptable, and with a little thought, protocols can be envisioned that prioritize information so the less important goes the lower-latency pathways to increase the apparent responsiveness while the "important stuff" goes the tougher to intercept multi-pathways.
In a similar way, cloud services can be made more secure by having clients utilize liner functions. (i.e. Instead of encapsulating a complex function with a simple to call wrapper function, you "line" a complex storage functionality by lining it to make it appear simple.) For example, a locally encrypted virtual drive has its container file hosted on cloud(s) drives. If the cloud vendor proves untrustworthy by backdooring their services to others, the "other" gets the container file, and still has to compromise that to get its contents. (e.g. Something like Truthcrypt with the container file RAID 2 stripped, with part of the container file striped on Dropbox and part striped on Google Drive, yet looking like one Truecrypt drive to the user.) Tougher to get the "whole enchilada" container file, and then even if you did get it, you still have the fact that it's encrypted, and you have to deal with that.
1) It is true that diamonds are not rare, and that the jewelry "value" is completely artificial due to the De Beers diamond cartel. The cartel had to operate outside of the US until 2001 due to it's violating US antitrust laws. Former CIA chief, Admiral Stansfield Turner, claimed that De Beers restricted US access to industrial diamonds needed for the country's war effort during World War II. As Turner's statement indicates, diamonds have considerable industrial uses as polishing grits. Diamond grit is slightly harder than silicon carbide grit and much harder than alumina (aluminum oxide) grit.
2) True, that was part of Cecil Rhodes (who founded De Beers in the late 1800's) marketing campaign.
3) Most diamonds mined are used for industrial purposes, not jewelery. Since diamond is a rather common gem stone with an industrial use, the fact that most diamonds mined are not "gem quality" does not matter much. Remember, the whole reason the cartels limit the number of diamonds on the market is because even though gem quality diamonds are rare compared to non-gem quality, diamond is so common a mineral that not restricting the gem quality ones would cause their value to plummet to a fraction of their present value.
One little problem...
Who's going to teach the "Genius Bar" kiddies how to program, so they can teach the classes?
Re: Who the hell cares what any Iranian News Agency has to say?
You know the story is fake because of the Dr. Evil-like "$1M". Only an ignorant Iranian propaganda hack would think $1M is enough money to develop a cyberweapon.
Re: Excellent Article
I'd rather see an iBeacon app or gizmo that I can take into the store and flood their system with misleading data.
Yes. As bad as Outlook is (and it is really bad), Yahoo mail is one of the few mail systems that is worse. I've yet to see any webmail service that was as good as using a mail client like Thunderbird.
Re: How long...?
To sue the US govrrnment for damages in a US court, the government has to agree to be sued. Under normal circumstances, this is granted. But often in National Security cases, it's not. In addition, the US hss been holding billions of dollars of seized Iranian assets since the Iranian revolution due to damage claims by US entities from the Iranians seizing property during their revolution. The bottom line is that the Iranians can't do squat in US courts until they decide to normalize relations with the US. And to do that, they need to start behaving in regards to nukes, terrorism, etc.
Re: The first selfie? Really?
Actually, the oldest selfies are about 40,000 years old.
AWS and Google will throw GreatFire and others under the bus in a heartbeat.
It's basically the EM equivalent of noise cancelation
Noise cancellation does the acoustic equivalent of this. It's amazingly simple, as you can see by reading the Physical Review X article.
Re: Plenty of standards...
Encryption should be thought of in the same way as for physical containment systems, namely as barriers that take time to breach or errode, not as impenetrable shields. As such, it is false logic to claim that you should do nothing because what you can do isn't perfect.
Never send a computer guy to do a material scientists job
Sapphire is very hard and strong, which is why the best watch glasses are made from it. However, it's crystal structure makes it cleave pretty easily, as anyone (like me) who has worked with it knows. And the probability of tapping it just the right way to cleave goes way up the larger the piece of sapphire is. That's why it works well for small windows like on watches. It would not surprise me if Apple goes to all of this trouble only to find the incidence of iThing (other than watches) displays cracking when dropped stays the same or goes up.
Wasn't that compromised by the NSA?
Re: This is useful
It seems like the reply "Better yet, go f*ck yourself." to the users meets all advice criteria.
Iran & China must be so proud
Google giving them a browser that makes the whole country Supervised Users.
"... automatically analyze code, find its weak spots, and patch them against attack."
If it's your own code.
If it's the others, then attack.
So it beings.
Re: Switching from big iron to x86 virtualisation
Probably pleases the NSA very much.
Re: iPhone and iPad?
I had both an Apple II and an Atari 800 computer in 1981. Plus a pile of CD's. I'd suggest this family jump back another couple of decades.
The other takaway
The other takeaway from these latest revelations as published in the New York Times is the NSA's infiltration of the cryptography community to influence implementations. In other words, many of the "talking heads", perhaps even ones The Register talks to, are NSA moles who will try to misdirect the community from improving the standards and such.
Apparently treason against the US Constitution is now a requirement to be employed in US Federal Law Enforcement.
This is the OTHER way some people in Silicon Valley get very rich.
Re: The computer that 'lives on your head' will change mankind
Google Glass is the poster child for "Just because you can, does not mean you should."
Re: Won't somebody think of the children!
Ironic given the Russian Government being the protector of most web scams and malware.
Re: What is needed
Maybe combine the split routing with the spam suggestion (AC 13th August 2013 13:47 GMT), which is really a form of chaff. The idea is that since one can't make the fact a message is being transmitted undetectable, at least make it complicated to detect and winnow the grain from the chaff
What is needed
Is an email scheme where the email is encrypted/decrypted at the client level and the bulk of the routing is done in a torrent style with random routing and forced splitting ( & routing) so that no one route handles the entire encrypted message.
Re: What is needed...
Or a dynamic peer-to-peer network analogous to a torrent.
Re: What is needed...
It's not just the encryption, it's the metadata the NSA values because that maps the organization for you. One needs a method to at least complicate the that part as well.
What is needed to to at least help obfuscate the connections would be to do something like the following: Have an email client that automatically encrypts the message, splits it into N pieces, emails those N pieces out via N email addresses hosted by N independent email providers to the true recipient's M email addresses (M <=N) also hosted at M independent email providers, the recipients email client gathering those N email sub-messages, assembling the intact original encrypted email message, and decrypting the original encrypted email message.
A New Email RFC is Needed
A fundamentally new RFC for email is needed that combines intrinsically encrypted message subject & body, and separately implements a bind (or double blind) encrypted and/or secure route addressing scheme.
The only way that US based cloud storage companies can address clients fears is to create systems where everything is encrypted on the clients hardware with open source software to insure there are no back doors before leaving their premises, stays encrypted in the cloud, and can only be decrypted when back on the clients hardware. And have the whole thing under some type of non-US (and non-cahoots country like the UK) based third party certification.
Of course, anyone using cloud storage should have been doing all of this anyway from the get go.
Agreed. On my home planet, we figured out long ago that the uniqueness of the atoms is immaterial. In other words, you only need to transport the location of each carbon, hydrogen, oxygen, nitrogen, etc, as every atom of a specific type & isotope is interchangable. In addition, no interstellar species would use puny microwave frequencies for teleportation, you use the highest frequency that will do the job, which usually means optical through gamma data links. So between the lack of uniqueness (and the resulting data compression) and the faster data links than you near-hunter gatherers can envision, its doable.
Dealing with you hunter gatherers is a pain.
The integration drift on INS is small enough over mission times you don't casually reset it like that.
This is why good navigation systems, for military aircraft & weapons (e.g. JDAM) for example, also have an inertial navigation system (INS) in them and use that as the primary navigation sensor. If the GPS location is much outside the INS integration error, then one knows something is amiss. Since INS isn't jammable, you know the GPS is the thing that is messed up. Especially if the INS system has redundant INS sensors.
Re: Yes, it is a retransmission fee avoidance tool...
If you live within about 100 miles of a major metro area of the US, you can just unplug from cable and go over the air with a $100-$150 antenna on your roof. If you do that, and keep high speed internet service, you'll never miss dropping the cable TV.
Yes. How many do you want?
Yes. How many do you want?
As any smart Banker will tell you, making purchases with debit cards are for people who can't get credit and/or don't know how to manage money. Credit cards don't charge interest if you pay your balance off in full every month, in which case they are an interest-free 1-month loan, during which your actual money is earning interest. And if you are smart, you only use credit cards with zero-fees and good reward programs, which adds icing to the cake.
Re: And by dammit!
You mean there are people using Firefox without the Ghostery, BetteryPrivacy, NoScript and Flashblock plugins, plus settings adjusted to delete all cookies, history & cache upon exit?
- Updated + vids WHOA: Get a load of Asteroid DX110 JUST MISSING planet EARTH
- Very fabric of space-time RIPPED apart in latest Hubble pic
- 10 years of Facebook Inside Facebook's engineering labs: Hardware heaven, HP hell – PICTURES
- Dell charges £16 TO INSTALL FIREFOX on PCs – Mozilla is miffed
- Google! and! Facebook! IDs! face! Yahoo! login! BAN!