Re: The pen is mightier than the sword.
Tin foil? Like those military/citizen blankets for treating people for hypothermia?
880 posts • joined 7 May 2012
Tin foil? Like those military/citizen blankets for treating people for hypothermia?
So $127 million to setup collection for about 7.5 million connections. So $17 ish per household. For something that can be bypassed for the price of a cup of coffee a month.
/posted from Romania, because why not, it demonstrates just what a stupid waste of money this is.
Also, 2^9? Really? You could kinda understand some numpty using the wrong type and ending up with a 256 limit. 512 is quite creative though.
OK, assuming some sort of signature based pattern can identify the infected video, why involve the telco at all? That would mean that the hangouts app itself could perform the scan before sending it off for preview. This is important, because hangouts can be pushed through Google play as an update.
Although it wouldn't eliminate the attack vector (too much insufficient storage-esq errors on old devices), the attack surface would easily and quickly halve.
OK Google, you've got 90 days.
The eBay's and Amazon's of this world aren't used as some sort of GST avoidance scheme. They are substantially more than 10% cheaper in most cases, are available at 10:30 at night, have detailed information about their products, user reviews and the like. No checkout queues (have you actually been to one of your shops Gerry? Do your sales team know what is available in the market or are they too busy pushing the lines offering the best bonus that month?)
Take something simple like a phone case for some modern smartphone. How much change do you get from $ 35? Now go to eBay and do the same. If you are paying more than $10 you probably weren't looking very hard. Jumping from $10 to $11 doesn't change the equation.
By all means, include online purchases for GST (and add healthcare and education while you are there). Then fix up the super tax concessions, CGT and negative gearing avoidance schemes. That'll fix your revenue problem.
Next micro business, some kid with Photoshop charging 20 bucks to change the times on the sign for your fine protest letter.
The sooner that we stop stumbling around the opportunities and take the threats with the same level of consideration, the safer we will be.
It just struck me about a discussion I have been having with someone who was complaining about their browser of choice's decision to block a certificate signed with an old broken algorithm. The inconvenience is real, but so is the threat. I was struck because I know they get the same emails as me and that they were again flooded with iot development technology's marketing. A lot of energy went into pushing people into such devices, but there is really nothing on security.
You wouldn't feel safe with a windows vista machine with no patches applied, yet we are building impossible to update firmware into all sorts of gadgets with life expectancies above and beyond. It is a weird world sometimes.
Maybe not, but assuming the very long bow that such connectivity of the core systems of your car is needed, why were they not NAT'd inside some walled garden?
You're reporting it wrong....
Stackexchange; is there anything you don't know?
>Why can't they bring these libraries under their own domain and take responsibility?
1. They would then have to pay for that bandwidth.
2. Chances are that their site is not the first you have visited that includes that particular framework. They can therefore leverage the cached (possibly even precompiled) version for better load times.
3. A website is never going to take responsibility for the resources your computer asks for.
Isn't evidence gathered outside the law inadmissable? Surely that u is the whole point of a warrant, to fairly evaluate whether the particular action which would in other situations be illegal should be deemed lawful as an exceptional circumstance, the judgement by someone independent and competent.
> PS Why are we allowed to play with < UL > but not < OL >?
One does not simply play with < OL >.
I have a scheme where I work out the letter number (a is 1, b is 2, etc) and add 64 to it. I then convert it to binary. Foolproof!
Already done. If the US government can't keep 20 million personnel records safe, why would I trust my ISP to?
.... because most of us smartphone users think that our batteries last too long.
I wish my company was that unsuccessful.
But it comes with a 3 month Now TV subscription. That's got to be worth at least 76K right there.
>Then drop time zones, and move to the 24-hour time format.
Seems like a lot of effort and you aren't even going to get it decimalised.
It is fine. It has sharp corners.
Even if I take them at their word, how it will or won't be used is a useless fact, because they can only promise what THEY will or won't do.
Good legislation is rather defined about what can or can't be done and whether some future activity will be ruled as legal or illegal under the act.
Why is this government doing its best to pretend they don't understand what separation of powers is for and why it is a good idea?
>I set it to just notify. If I'm tethered to my 4G phone, I don't exactly appreciate the laptop deciding it'll take my 1GB quota all to itself just for Windows update.
That is probably the most useful enhancement in Windows 8. If only they kept the Windows 7 shell.
I, for one, welcome our new eight legged banana munching overlords.
At least you will know when you have your finished.
and I never sign into my bank accounts when there is nearby pita bread. That is just asking for trouble.
I did not suggest that they would be exposed through their own form. Your privacy can be impacted by someone else's selfie uploaded to youchattwit. I don't understand why you would therefore suddenly believe that you can't be indirectly identified by a big data approach to this information.
Also, let us assume it is merely a cultural attaché. I would not be so quick to assume a big gap between business interests and government interests. Particularly in a one party state with largely nationalised industry. (Although for balance, the US has its own share of trying to sneak business protection rackets into various FTAs so to criticise that lack of separation is very much pots and kettles.)
It was. I see it as a gentle reminder to China that the US has the same info on them. Mutually assured destruction and all that, so play nice.
>useless for blackmail since Uncle Sam already knew
How does that argument even work. Say China identifies a US spy from this information.
They can now bring them in for a chat, show a picture of their daughter hopping out the school bus the previous day, then suggest the sort of information they want the said spy to report back to uncle Sam or, you know, sometimes horrible things happen.
>don't know how risky it is being logged into the register often
As long as your credentials are sent over https, it should be fine. Oh wait..
There is a relationship between code clarity and security. Case in point, Google GOTO fail bug, the one which borked SSL on osx or ios. Had the code been formatted correctly, it would have been very hard to miss that accidental GOTO fail line.
>But weird that Oz seemed to avoid worst of the GFC.
Only in the sense that we didn't have a recession and the economy actually grew during the quarter with the GFC.
The current government is right though. If only Rudd had spent less on stimulus and more on new NBN logos....
>At one time I worked out that it took $1m of stimulus to create each job.
Accepting your calculations at face value, I think there is an underlying assumption in your conclusion that you may want to consider.
How many billions was it worth to avoid a total collapse in jobs? Have you subtracted this from the cost of stimulus?
There is plenty of things you could hold up about the commodore as reasons for preferring something else. Understeer isn't one of them.
On an aside, the (allegedly) sentient beings setting fire to the joint here have passed laws to require ISPs to store all metadata for two years. Every website you visit, every email you send.
But don't worry, I'm sure that data will be perfectly safe from hackers.
The physics say that brown coal is about 3x more emissions intensive than black coal, and 25% of their power comes from a station that was ranked worst in the industrialised world (1.74 short ton/MWHr).
Transmission, charging and operating efficiencies of electric cars leave ICE efficiency for dead though.
I didn't down vote, but I will point out that coal != coal. And coal power generator != coal power generator. There are huge differences between black and brown coal and newer plants are much cleaner than older designs.
For example, your Nissan leaf plugged into a wall in Victoria (Australia) emits more than a Land Cruiser.
That is not to argue against progress as the balance can easily change once a few plants are decommissioned.
Commemorating a French military defeat? Hardly hens teeth.
I think we can agree with one voice that he is guilty. What kind of fool posts this sort of thing? My man, tell him that it had to be you and that you knew that they would send in the clowns. If not here then somewhere I guess. Sadly for him, the interwebs has memory.
/I shall now grab my coat as if we never said goodbye.
A directive by definition cannot be a runtime decision in a compiled language
>does this mean the world's population should line up to have their limbs amputated
Don't give them any ideas please.
>Stealing is permanently depriving someone of something.
Maybe they could really throw the book at him and label it copyright infringement?
>And people ask me why I won't use Windows anymore........
Because their beta testers in the bleeding edge stream of the unreleased version of their os had to download a full iso image rather than use windows update?
The price seems reasonable to me but the shipping cost is out of this world.
... And when caught the offending note would be read aloud for the convenience of the author and recipient.
>Do you understand that Facebook are in the pockets of NSA and GCHQ?
Let us take without any protest your assertion, and assume that they immediately give this public key to your favourite 3 letter acronym. Actually, let's make it worse, they put it on their homepage for world and sundry.
That does NOT help one iota in decrypting your message. That is the whole point of asynchronous encryption.
If you want your bank's website public key, double click the padlock. That key does two things.
1. Lets them create a message that you can verify wasn't forged by a man in the middle, and
2. Let's you encrypt a message that only their private key can decrypt.