Why not show videos like this during the pre-flight safety briefing? Then passengers have only themselves to blame if they can't land it in an emergency.
104 posts • joined 22 Jun 2007
> My password has twenty five symbols. Be my guest
If the bad guys were specifically targetting you, they'd know enough now to put the HTTPS attack on the back burner and break out some of the more specific tools.
Chances are, they aren't specifically targetting you, so they keep fishing for passwords that are short enough to break, and profit from that. That you have a long password is a tip off to them that you may have other defences, so it'd be too costly to focus on you.
It's no different to having a strong front door lock. You either divert opportunistic crimes to your neighbours; or you cause the person seeking to specifically burgle you to look for other weak spots.
None of the scoffers so far have considered the practical uses when running in a (hypothetical) tethered mode: You re plugged into a power socket (perhaps your Tesla's cigarette lighter) via 50 meters of lightweight cabling.
You could now easily get, ohh, say fifteen minutes out of the current device, although not on a public road of course.
Plenty of time to poise as a low-flying acrobatic idiot with more money to burn that remaining IQ points. With enough make-up and some cross-over with synchronised swimming, it could be an olympic sport candidate.
UK Not much better
Quantum or LIDS (the article isn't clear which system had the problem) not so much better for the UK prison service:
One Computer Scientist, he say:
"Beware of bugs in the above code; I have only proved it correct, not tried it."
I would be happy to link to one of their pages.
Otherwise, how can my overworked and under-ferrari-ed lawyers ensure that we are still linking to the information we originally linked to?
Mal ad ware
I would not run random code on a server. So why should I run it on my personal machine?
If (it's a very big if) that random code came with a certificate proving it had been extensively tested, that it was believed by reputable authorities to be harmless, and that I was covered by ad-industry insurance in case it did any damage, then only only then might I allow it to put a big flashing distraction in the corner of my screen.
But until that happens, Adblock is an essential layer in my security perimeter.
> Unfortunately VeraCrypt does not currently support GPT partitions
"GPT support is on the top of the TODO list. It is a complicated feature to implement thus needing a lot of time. We hope to have it implemented between 6 and 12 months from now."
Veracrypt developer, 6-Sep-2014
Forks and future
Truecrypt as a single project may be dead, but development of the codebase continues by other teams.
One such project is Veracrypt. They have already addressed the (mainly minor) flaws found in Truecrypt's first audit. And now they are making various useful enhancements.
> I'm glad Snowden is releasing this info as a trickle
Snowden has ceded control over what is released and when to the media people he is working with.
That has several advantages, including the one you mention -- these guys are very savvy at timing and pacing.
The pressure will also be on a lot of place names around the world. For starters, I'm looking at you, Kilkenny.
Half truths because much of what Mr Snowden has released is up to five years out-of-date.
The other half - what has happened since 2008 - may be even more disturbing.
Some of us have extensive hands-on experience of the actual problems in prisons.
And we have watched for years as the government ignores the obvious, and ignores the expert testimony in order to pay for another study that will be ignored.
Cheers for sticking up with the man, but it's not much help long term.
We already know there are two main uses...
1. Staying in touch with families. It is cheaper in prison to hire an illegal phone than use the usuriously charged payphones on the wing landings. And more private too. A better phone deal with BT would cut this usage at a stroke.
2. Sending money out for illegal deals (such as drug purchases). In a prison, most drugs come in via the uniformed staff, but the money transfers have to happen via a different method. In the old days, you'd get friends or family on the out to give money to people in pubs for you. Today, it is much more online. Reduce the drugs going in, and you reduce the need for cross-wall cash flow.
"I believe at the time we thought we had done enough"
As the ancient IT maxim says: you don't get what you expect; you get what you inspect.
Their shoulder-shrugging approach to being caught out in a major security flaw is not a good pointer for the future.
A legally-enforced standard for power adapters in 2017 puts the EU where China was in 2006.
It's a sign of the changing times.
Privacy's a bitch, eh?
Successfully knocking out Cryptolocker will stop new infections.
But does it leave a way for the infected to (should they choose to do so) to pay the ransom? If not, the end result will be much worse for the unbackedup.
A controlled shutdown would be kinder to the victims.
The crazies, who will sit in their garden all day cursing the government that granted Amazon the freedom of the skies, still have options if they want to contest the airspace above their sovereign back yards.
Electronic countermeasures to mislead the drone. The drone might land in their garden or fly off in an wrong direction. The ECM could be mounted on permanently-aloft balloons.
Suicide drone conducting a kamikaze attack.
Re: Selfie, Girl Crush, Twerk
That's 11 in binary?
Re: New Security Application
It is, though, fairly easy to establish that a hidden TC file exists. They can then pester you for the passwords.
Better methods of hiding TC files are needed......Perhaps broken up and steganograpied across a whole photo album.
The War on Partners
So partners are now legitimate targets?
Let us hope that ceases to be the case very quickly before terrorists learn that lesson.
Bugs, features and no-nos
Odd. He had been specifically advised by facebook that the behaviour was not a bug.
So he used the behaviour exactly as facebook knew it could be used.
They then went all TOSsy with his ass, told him that Terms of Service trumps Security Team.
Tells us all we really need to know about facebook's technical priorities.
Re: the Doctor can take on any form imaginable...
Yes, they've cast their Baker's dozenth plus 1 or 2 (depending on who you count) white man to the part.
But there is hope yet. We have not seen his costume or make up. He may play the Doctor dressed as a Masai warrior with a ginger wig and in tasteful blackface.
That may not please the feminists I know, but it'd be a nod toward multi- culturalism. They have, after all, previously cast a Scot playing the part with a Lundunish accent.
You say "TOMATO".
West Midands police say "SOLICITING".
That's quite a drift in accent.
As any IT relationship manager knows, never try to search Google with Google. It could break the Internet.
Hmm, the "enormous value" for culture trumps the rights of the individual?
Thought I'd never live to hear that as a mainstream American view.
Though, replace "culture" with "corporations" and I'd be less surprised.
Plus ca change
This is reminiscent of the court orders of half a century ago on airline availability search systems,
Those early, specialised, search engines had a start-up habit of favouring flights operated by the AVS engine's operator. Legal rulings forced them to be "objective" - to the benefit of all:
Passengers (via their travel agents who ran most of the searches) need only search one system to find all flights, rather than multiple ones.
The better AVS systems could outcompete those from smaller operators, and eventually consilidate a grip on the market; today, there are only a couple that matter.
Fairness of display as a route towards further monopoly? It worked for the airline search engines; looks like Google is learning a valuable historical lesson.
That the Reddit hive mind has not learned any lessons.
During the next great witch hunt, they'll be claiming it's different this time because they are using iCrowd technology (or some such heat of the moment techno drivel) to confirm their biases.
Confusing the wisdom of crowds with the madness of mobs is a common online mistake.
Thunderbird suddenly would not talk to gmail, claiming my memorized password was bad; re-entering the pw made no difference. However, the web browser interface logged straight in no worries.
Guess I get what I pay for with Google apps.