Don't mix up dreams (free) and expenses (cost £££).
Stop calling them dreams and start calling them advertising and it's sorted or at least a lot easier to justify in the minds of some people.
2583 publicly visible posts • joined 31 May 2011
"They consist mainly of persistence mechanisms and simple instructions despite their different forms (...known software with open source code that can be backdoored...)."
One of the good things about open source is that more eyes on the code can improve it in many ways. Unfortunately, black hats have eyes too. While I do not like security through obscurity, complacency is the bane of open source. I'm curoius what the implementation was here. Perhaps adding the backdoors and just posting compiled code for download?
This usually keep them in contention with a dodgy product long enough for them to either get better or starve the competition to death.
Or to buy out the competition. There were many companies that started up with the business model of "do something Microsoft-adjacent in order to get bought out." This obviously still happens, though not as much with Microsoft any more.
I'd bet a very small fraction of the US population can name the capitals of all 50 states.
It's roughly equivalent to the proportion of 5th graders in the general population.
Missouri's isn't St Louis or Kansas City (though the latter would be a confusing choice, and both have the disadvantage of being located on the border).
It's not a disadvantage to live on the Missouri side of the border as much as it is unfortunate that folks in those cities haven't managed to escape yet.
This medium would seem to have promise, but I doubt it will be used in a data center. It is never going to be fast, which means it would only be useful for long-term storage. There are a number of solutions, though, that will last longer than this is likely to and are most likely faster than it ever will be. I wouldn't look to this to revolutionize the storage world. At the same time, developing this might lead to new technologies that will allow us to do things we cannot today, haven't even considered... or not. The point, I think, is to learn what is possible first and figure out a real world use for it later. Good luck to the researchers!
No, we don't ban videos of the holocaust. Apply thew same scenarios. These people shared the videos with "bring on the cull" or being happy about the body acount etc etc.
This points to the importance of accounting for intent and context in evaluating these acts rather than relying on content alone. While censorship can be and often is abused, using this to push the agenda of the person who killed these people is equivalent to yelling Fire! in a crowded theater.
A few years ago, I designed and deployed a McAfee ePolicy Orchestrator module for a customer whose contract I was on. I wanted to title it "John" but had to go with something more prosaic. Lesson learned. I will use "John" as the internal name for anything of this nature I write so it will live on in the code even if the display name is different.
In this case, however, a lot of people could be described as clueless because there was no way that they could find out how Facebook and its friends were slicing and dicing the personal data of their users for fun and profit.
Other than the well established and well published history of the company getting up to similar shenanigans over its entire corporate life? Just knowing FB has access to all sorts of intimate details of their users, that they make much of their money from advertising (directly or indirectly) and that they have been caught out more than once abusing their market position is enough that a clueful person would be able to work out that FB should not be trusted on any level. You don't need to know the exact details of how they are doing wrong to know that are doing something wrong.
We are taking reality here pal, not boundless paranoia.
From recent history, we have seen the paranoid among us proven right. While there may be no apparent use for this - malevolent or otherwise - at this time, we have seen that what initially seems trivial can be blown up into something major. For example, most people didn't realize how invasive Facebook and similar would become, how corrosive to privacy, but we continue to see that play out to the detriment of many. Finally, I truly enjoy the irony of someone posting anonymously arguing against privacy at any level. Well played!
At least you can compile and verify the PuTTY code. God know what's actually in the Windows OpenSSH code.
Code review is not the only tool in deciding if a given piece of software is secure, so it is best not to overstate the importance of open source vs closed in terms of security. Also, while the pros and cons of each are debated below, I would like to point out the consideration of increasing your attack surface by installing third party tools to do something that is already baked into the OS. In general, this should be avoided though YYMV.
They can force the companies they work for to abandon lucrative US military contracts... If employees start to routinely demand the companies they work for behave more morally, the change would be both swift and dramatic.
While I am aware of differing opinions on the defense industry, being a part of it is not the equivalent of immorality. @JLV makes a good point on those Googlers' ability to hold mutually opposing ideas at the same time. It's so easy to claim that you aren't doing anything wrong if it's someone else taking the action while you merely provide the support needed to enable it.
I wasn't even *born* when this PoS came out...
My kids were brought up watching at least a representative sample of different shows from when I was young. They get most of the jokes from the previous era and appreciate where entertainment has got better and know when it has got worse. I call out this twit's parents as being negligent in his upbringing. Respect the classics!
My old-timer moment was when I tried to discuss the Tiananmen Square massacre with one of my younger colleagues who had never heard of it. I was there as a tourist immediately prior to that happening. Another coworker, who was a college student in Beijing at the time, and I were talking about it and getting blank looks from our 30-something year-old neighbor.
Having seen some of these games aps in action, I am not sure how to differentiate between them and malware. I started to say "other malware", but I guess that some individuals actually want these on their phones and download them willingly unlike the add-ons described in the article. There's no arguing with taste.
It's getting more and more deranged.
And with this, we have ventured into the surreal. The bulk of your post proves this point while this single statement, if true, should not come from someone deranged, which would in turn beg the question of what the rest of it was if not that...
People need to get sick and die - that's what's supposed to happen - the human race needs to change and evolve
Natural order be damned! There are more ways to achieve growth than through the evolutionary process and the idea that you should get sick and die only holds water as long as there are no viable alternatives. As soon as there are, what you are supposed to do is choose.
It's a good example of how you can use a sensor - sensors are everywhere.
This! You have summed up the utility of this research perfectly. The experiment is merely a proof of concept that points out an entirely new class of exploit. While the implementation may vary from device to device, it is likely that the same code used for signal filtering can be reused across many.
I've yet to meet any portable electronics that can't be destroyed by a sledgehammer.
I had to decomm a bunch of non-functioning equipment for my first sysadmin job. This meant hauling it from all over campus and putting it in a disposal bin after filling out the appropriate paper work. The bin was located next to a retaining wall down a flight of concrete stairs. I could either dump materials directly in from above or from a door in the front if they were already on the same level. One of the items to be disposed of was a CRT monitor. I had always wanted to chuck one down a flight of stairs and my chance had arrived. I threw it directly onto the screen. It bounced. There were some scuff marks, nothing more. I did not, however, perform the sledgehammer test, but I would place even odds on the monitor.
I worked in the rat lab when I was in grad school. We destroyed animals that were used in training students and for acedemic research. The school would not give the animals away due to liability concerns. It was quite amazing the number of animals that "escaped" to the students' homes before their executions.
It is also worth noting that animals used for scientific research are typically bred specifically for the purpose and are not intended as pets or food. While this does not prevent researchers from becoming attached to them (especially the aforementioned students), it is worth understanding what ethics review boards have to consider.
...nearly limitless cloud speed and scale...
It's early and I had to break this down to process because not enough caffeine:
...nearly limitless...
So it has limits. Check!
..cloud speed...
It's the new Project Tartan cloud. It moves at the speed of plaid. Check!
...and scale...
And it's a fish. Got it!
To follow this up a bit, one of the reasons that facial recognition has had such miserable results has been due to the data set used in baselining. I do not know about the UK, but in the US it is typical to provide your fingerprint as part of getting a state ID. It is not a big leap to assume your next ID photo will be included in the data gathered at that time. With the data set approaching 100% of the population, the accuracy of these systems should be greatly increased. What then?
...Microsoft quietly reduced that list to just two Facebook domains... a Microsoft spokesperson told us: "We are nearing the point where Flash is no longer part of the default experience in Microsoft Edge..."
So at what point will they also block Facebook to further improve customer security?
...Ubuntu users who do install the update should also take a moment to make sure they have updated removed their versions of Flash Player...
When making changes, it is genereally a good idea to take a moment to review the scope of what should be done and act accordingly, especially when it comes to making machines more secure.
it doesn't get called aspergers round here
It was removed from the latest version of the DSM, so it doesn't get called that by mental health professionals either, at least not in providing a diagnosis that may have bearing in court.
Most government systems make it clear that your presence there is monitored and nothing you do on them should be considered private. The privacy issue issue is a red herring. What if I said "Let's install software that will take up plenty of system, network and storage resources; cost lots of money while providing little return and will open up plenty of opportunities for leaks and abuse"? I doubt I could offload much of my product if I were to be honest about it. However, if I bypassed anyone with a clue and went straight to those responsible for procurement, I bet I could sell a ton of this crap.
She's annoying, her portrayal of the Doctor lacks any authority. Colin Baker had a similar problem.
While I disagree with you concerning the current portrayal of the Doctor, I also had hoped that it would be a different actor in the role. As it had been established with Capaldi that there is a reason for the faces worn by the character, I wanted to see Michelle Gomez again... because whatever you think about which Doctor was the best, Missy definitely had it going on.