Bags and backpacks with many pockets are not helpful.
Neither is groping every attendee and rifling through their stuff.
2488 posts • joined 16 Jan 2012
Neither is groping every attendee and rifling through their stuff.
Docking computers are a waste of money.
If you can't dock without losing your paintwork, you shouldn't be in space.
- Paraphrased from The Dark Wheel.
Adding my voice to what Guus has said above;
Why aren't VTech being held accountable for this? They've not lost anything trivial like their customers bank details or their credit card information. They've practically left the door open for hackers to walk off with the unencrypted details of over 6,370,000 children.
Craig Jones advising consumers to follow cyber-security advice is a poor sop to angry parents that have done nothing wrong and are quite rightly concerned that their children's details are out there on the internet and available to people that might not have their childrens best interests at heart.
You can follow all the cyber-security advice you like, but it will do you no good if they company storing your data gets breached.
What are the parents of these 6,370,000 children supposed to do? Move house and change all their phones? What deterrent will be put in place to remind companies that our data is valuable to us and will cause us a material harm if it is not kept safe?
Then there's every chance it can rack up another first. The first sandcastle on an alien world!
If only someone had seen this kind of tyranny coming... Oh wait! Someone did!
"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety" - Ben Franklin
Over 200 years ago!
Maybe if Elon Musk spent more time on his rockets and less time doing cameos in sitcoms he might actually get around to landing a rocket booster on a barge one day!
That's all of them isn't it?
And then Hengband. Which is absolutely awesome for killing half an hour while TFS decides if my code will build or not.
The really scary thing is that their algorithm is predictable. From what I gather from the article, from a single card number, you can predict what the replacement card number and expiry date will be.
So all I have to do is steal your card, wait for it to be reported lost or stolen, and then I can quite happily start spending money on your replacement card. I don't even need to know the pin. I can just pretend to swipe a dummy card with that gadget in my palm and just put a signature down.
Whoever implemented that algorithm needs to be sentenced to life at an Amazon warehouse.
We are not worthy!
If someone sells me a lock for my front door knowing that it can be opened with a screwdriver, then they haven't sold me the secure lock that I thought I'd bought.
It's high time that manufacturers were held accountable for the security holes that they leave in their products. These issues cost real people time and money to fix, and they can be so easily avoided with a little bit of diligence.
They just aren't very good at it.
Source: Clare Foges
Insert a few hundred frames of something in there to make absolutely sure that they watched the whole thing closely.
Like Sweden had ten years ago?
I can't wait!
The idea isn't to do all my surfing using TOR.
The idea is to soak up my excess bandwidth with a lot of extra data by running a TOR relay node. This then provides The Powers That Be with an awful lot of encrypted chaff to separate from my encrypted wheat.
If the government wants information, then I'll give them more information than they can handle.
Obviously this is some new meaning of the word seriously that can only be found in the Urban Dictionary.
"People and business in the UK should use encryption to protect themselves. "
Good. I agree with that. I don't want someone pinching my credit card number or masquerading as me online.
" All the government is saying is information needed for national security and serious crime purposes should not be beyond the lawful, warranted reach of the state when the need arises."
I understand that. But what that means is that the government wants us to have weak encryption that can be broken, or some kind of other method of decrypting the content of a transmission. And they want this method in place without anything that can be described as a "backdoor".
The fact remains that if the encryption is weak, then it can be broken by anybody. If there's a second method of decrypting the content, then that method can be discovered by anybody. The end result is the same.
Picture the scene:
You're quite happily going about your day when suddenly...
I had to look up that word too :
"Hummocky cross-stratification is a type of sedimentary structure found in sandstones. It is a form of cross-bedding usually formed by the action of large storms, such as hurricanes. It takes the form of a series of "smile"-like shapes, crosscutting each other."
I learnt something new!
At the moment about the only thing you're guaranteed to get after a three year engineering degree is a £36,000 debt.
This solution wont work. But it will be fun to see prison guards running around with butterfly nets trying to catch drones.
They are adorable little creatures.
Although training them is a lot harder than programming a computer.
So we need a double skinned dome! If one of them breaks, you've got another redundant backup to hold the atmosphere in while you make repairs.
Of course! Reverse the polarity!
I'm guessing she sleeps fitfully on a big pile of other peoples money.
Good idea, but why go to all the trouble when you can simply tile the floor in gravity plating?
What's it going to take to convince them this is a bad idea? Everyone in the UK putting on a Guy Fawkes mask and marching down to London?
And it will only be used against pedoterrorists.
And we all know how well that turned out don't we....
DavCrav showing his True Colours there :)
I'm no criminal mastermind, but I'd have thought that when the news story broke and people started getting arrested, anyone involved would have deleted absolutely everything that could possibly contain any forensic data.
Murder suicide pact. Eve was devastated.
Just scaled up.
Except that Baroness Shields says in the next breath "that companies that provide end-to-end encrypted applications [...] must be subject to decryption and that information handed over to law enforcement "in extremis"." blatantly contradicting herself.
The trouble is, any mechanism that enables the government to ask for decryption "in extremis" means that there's a mechanism there to be exploited by other people that might want to see my data.
That should be enough for anybody...
When else are you ever going to get the chance to use that line?
A degree in Philosophy, Politics and Economics and a peerage apparently. No wonder she doesn't have a clue about all this new fangled encryption and stuff.
Then they've got nothing to fear surely?
Does smoking pot give people hacking superpowers or something?
I remember getting the demo tape off the front of a magazine for this and on the B side they had the music from the arcade version.
It's basically a kettle lead with the end cut off and an exposed live wire.
(Why is there no BOFH icon?)
How do they compare to regular human meat drivers when it comes to spotting them?
Biting the hand that feeds IT © 1998–2017