Re: 'Evidenced and verified'
You're thinking of the normal police. The CoLP are a law unto themselves.
1546 posts • joined 20 Jun 2007
So we've a situation where users have a legal right to do X, but doing X is only technologically possible by breaking DRM, which cannot be done legally - thus making their legal right impossible to exercise. Or, viewed from the other side, a provider of media cannot prevent their customers from doing certain things via contract, but can impose a DRM scheme that has the same effect via another means.
Makes perfect sense to me. The US has had a similar situation for years with their DMCA exceptions. It's legally untidy, yes. But it makes sense.
Civil war? With the Senate effectively powerless for a generation and the emperor dead, there's no central government any more. Any number of empire underlings try to make their bid for power, while our heroes join a movement of republic loyalists searching for a famous former-senator-now-in-hiding who might still have the influence and legacy to serve as a rallying point and inspire the rest of the galaxy.
There was little bitching about XP. As I recall, it was widely regarded as about time Microsoft finally abandoned the atrocity that was 9x.
This bitching is more like that that followed Vista: A lot of people complaining about a new interface that seemed to be change for change's sake, and grumbling that the new version provided little if any benefit over the previous.
The standard way is to remind people of the vast wealth to be made. That worked in the dot-com boom, but these days people are able to see through the lie and realise that for every Zuckerburg there are a million code monkeys slaving away and getting paid peanuts.
I can't be the only IT worker still getting annoyed by the parents demanding to know why I'm not a millionaire yet.
Compatibility. If you did that, the JPEG wouldn't open in an unmodified browser or viewer, which means it'd be effectively unuseable on the internet. New formats like that are always in a chicken-and-egg situation: No-one can use them until all major browsers support them, and there's no reason for the browser developers to support a format no-one uses. See JPEG2000 - an intended successor to JPEG which has been stuck in this situation for years, complicated further by being patent-encumbered in a way which makes it legally very difficulty for open-source software to support it anyway.
Animated PNG is superior in just about every way. Smaller files and, unlike GIF, it can handle more than 256 colors.
Not that it gets much use. Microsoft refuses to include support in IE. They dragged their feet for years about supporting non-animated PNG. It's company policy never to support any open standard unless it has become to popular as to leave no option. Apple is no better.
Sort of. Bitcoin transactions are public, but the identities behind the accounts are not, and it's trivial to create a new account. That means it is possible to identify people, but takes a little detective work.
eg: You buy a file from some dodgy internet guy. All anyone sees is that address A paid address B. Who are those addresses? Not obvious. But an investigator could keep tracing, and determine that address B in turn paid address C, and address C paid address D... and that address D got a lot of payments, so it's probably important. A little asking-around finds that D is the holding pool for an exchange that buys and sells bitcoins for dollars, and they can then confirm that C was one of their incoming disposeable addresses, and that the person who sent them bitcoins via C from B was doing so in exchange for dollars at a known paypal address.
There's a lot of information you can get hold of, especially if you know enough about data mining and crawling to gather up a pool or known addresses to use as reference points.
Nice idea, but after a while someone who looks very much like a trader in child abuse images will get off with it because the jury couldn't be convinced completly about intent - and the resulting media outrage would leave any politician with hopes of reelection no choice but to close this 'loophole' and bring strict liability back.
Which is why if I ever happen across some, I'm not going to report it. I don't want every hard drive in the household seized as part of an investigation. The witch-hunters have shot themselves in the foot here: Stories of overzealous prosecutions and trial-by-media are now well-known enough that even the innocent are afraid of them.
I'm expecting some people to argue that the NSA/CIA/GCHQ/Other 'got to' the writer and pressured him into helping with some character assassination. A month ago, I'd have dismissed these as paranoid ramblings. After all the recent revelations though, about the NSA's policy of manipulating online debate and deliberately spreading stories attacking those they believe hostile to US interests? I'd consider such accusations entirely plausible.
The best solution is encryption. Let them intercept. You'd still need the operator's server for billing and key management, but the mesh can handle the bulky traffic.
Make sure to pad the bitrate or use a CBR codec though - it's possible though tricky to reconstruct a good guess as to the words uttered just by the bitrate fluctuation after compression.
It comes up. Two men renting a single-bed hotel room would be rather suspicious. Catering, transport and photography contractors for a same-sex wedding would quite quickly realise there may be gay involvement somewhere. Even just going to a restraunt, the staff might well notice the holding of hands and longing gazes, and ask the couple to leave.
The religious lobby in the US has been pushing what they call 'covenant marriage' - a voluntary agreement couples can enter into on marriage which makes divorce legally near-impossible, and always very expensive, baring exceptional circumstances like domestic abuse or abandonment. They are currently a little disapointed that few couples are aware they have this option, and even fewer are taking it. It's the 'burning bridges' form of romance.
Christianity and Islam inheritated the same. But 'shalt not kill' is a mistranslation. It actually says 'you should not murder' or 'you shall not kill unlawfully.' It still allows for exceptions where the killing is authorised by appropriate law, and later sections of the texts describe many of those exceptions.
A somewhat poor quote, as other non-TV but still official novels establish that others had done so too. Scotty in particular, by realising that the computer used a simplified almost-realistic model for disrupter/shield interaction and calculating an attack that would cause this model to glitch - though he admitted it couldn't have worked outside of a simulation. After that stunt, he was strongly urged to switch career track from command to engineering. Other tricks included invoking an obscure Romulan custom to challenge their captain to a 1-on-1 duel, thus buying enough time to achieve the primary rescue and escape objectives, even if at the likely cost of the commanding officer's life.
Opt out is fine, if you wish to declare your porn viewership to everyone who shares your house. Children, spouse, visiting girlfriend. Not to mention the many over-eighteens who still live with parents - with the cost of living what it is, many people are doing that well into their twenties.
The obvious next step is hotswap: If a module fails the server can illuminate a light on the mainboard to indicate it. Press a button, channel is taken out of service. Swap memory, press the button again, channel comes back up. Zero downtime, if your server case allows you to access the RAM without having to get the whole thing disconnected and out of the rack.
Anonymous uses DDoS as a form of protest. There's no lasting damage, it's just disruptive. A common comparison is the sit-in protest in the real world: Get in the way and refuse to move. At worst, it can disrupt business operations and cause serious lost profits, which is why it's rather illegal just about everywhere. Just like DDoSing.
GCHQ's actions could be compared to figuring out where the protestors are going to rally before the event and arranging a 'coincidential' road closure.
The final section of I, Robot has a similar theme.
Shortened version: A group of scientists discover a conspiracy. A group of advanced AIs - fixed computers, rather than robots - acting together to subvert government and effectively take over the world. The scientists debate how best to act on this knowledge, until they realise that these AIs are superhumanly intelligent, near-infallable, have no personal desire for wealth or power, are incapable of harming a human being except to prevent harm to another, and are by nature of their design incapable of acting in any manner that is not in the best interests of mankind collectively. The scientists decide that the best action is inaction: Let the robots win.
There's a lot of interest from political enthusiasts. The libertarians view it as a way to escape the tyranny of government control and usher in a new economic utopia, while the usual anti-corporate types see the potential to escape from the corrupt clutches of the financial industry.
Why would they want IPv6? Deploying CNAT instead allows them to not only render near-useless all forms of p2p file sharing and home server (and thus get rid of a lot of users who place disproportionate demand on their network) but to do so in a deniable manner. De-facto filtering made to look like an unintended side-effect.
The court-ordered blocks for copyright infringement require blocking access to specific domain names.
The no-porn blocks are semi-official government requests*. There is no official standard as to what needs to be blocked, or how, so it's up to each ISP to decide what they want to do.
* "Please block all porn. We ask in a non-legally-binding manner and you do not have to comply. But if you don't, we're coming back with a law to compel you. Probably a really badly-written one, with harsh penalties for failing to meet impossible goals."
They move. Not with much coordination, but they do move. I expect they pull expressions too. That'll be the 4D part: I expect they take voxel-video over a reasonable period then go through each frame and pick out the most photogenic. Throw away all the ones where it looks like something by H R Giger, and pick the one where it looks like a smiling happy baby.
They brute-force SHA256. That's all they do. That's all they can do. It's how they are wired. Useless for anything else. With some software hackery you might be able to make them brute-force SHA256 in a slightly different manner and use them for password cracking, in the unlikely event you get hold of some unsalted or known-salt SHA256 password hashes, but that's the most you an possibly hope for.
ASICs are designed and built to do one thing only, and do it well.
Biting the hand that feeds IT © 1998–2019