Re: She could always have taken the offending banana and throne it in the freezer....
I, for one, welcome our new eight legged banana munching overlords.
2545 publicly visible posts • joined 7 May 2012
I did not suggest that they would be exposed through their own form. Your privacy can be impacted by someone else's selfie uploaded to youchattwit. I don't understand why you would therefore suddenly believe that you can't be indirectly identified by a big data approach to this information.
Also, let us assume it is merely a cultural attaché. I would not be so quick to assume a big gap between business interests and government interests. Particularly in a one party state with largely nationalised industry. (Although for balance, the US has its own share of trying to sneak business protection rackets into various FTAs so to criticise that lack of separation is very much pots and kettles.)
>useless for blackmail since Uncle Sam already knew
How does that argument even work. Say China identifies a US spy from this information.
They can now bring them in for a chat, show a picture of their daughter hopping out the school bus the previous day, then suggest the sort of information they want the said spy to report back to uncle Sam or, you know, sometimes horrible things happen.
>At one time I worked out that it took $1m of stimulus to create each job.
Accepting your calculations at face value, I think there is an underlying assumption in your conclusion that you may want to consider.
How many billions was it worth to avoid a total collapse in jobs? Have you subtracted this from the cost of stimulus?
The physics say that brown coal is about 3x more emissions intensive than black coal, and 25% of their power comes from a station that was ranked worst in the industrialised world (1.74 short ton/MWHr).
Transmission, charging and operating efficiencies of electric cars leave ICE efficiency for dead though.
I didn't down vote, but I will point out that coal != coal. And coal power generator != coal power generator. There are huge differences between black and brown coal and newer plants are much cleaner than older designs.
For example, your Nissan leaf plugged into a wall in Victoria (Australia) emits more than a Land Cruiser.
That is not to argue against progress as the balance can easily change once a few plants are decommissioned.
I think we can agree with one voice that he is guilty. What kind of fool posts this sort of thing? My man, tell him that it had to be you and that you knew that they would send in the clowns. If not here then somewhere I guess. Sadly for him, the interwebs has memory.
/I shall now grab my coat as if we never said goodbye.
>Do you understand that Facebook are in the pockets of NSA and GCHQ?
Let us take without any protest your assertion, and assume that they immediately give this public key to your favourite 3 letter acronym. Actually, let's make it worse, they put it on their homepage for world and sundry.
That does NOT help one iota in decrypting your message. That is the whole point of asynchronous encryption.
If you want your bank's website public key, double click the padlock. That key does two things.
1. Lets them create a message that you can verify wasn't forged by a man in the middle, and
2. Let's you encrypt a message that only their private key can decrypt.
"Adequate" is inadequate (excuse the pun). It is a weasel word that makes it very easy for the customer to think that they have one policy but learn a hard lesson when they try to claim.
In principle, I agree with the insurer. Failure to take "adequate" precautions makes you a higher risk, and if that is not recognised against your policy cost then everyone else's must increase to socialise the loss caused by your lack of foresight.
But adequate must have provable definitions if you are going to deny claims based on it. If my car insurer stated that my car must be adequately maintained, a current certificate of registration proves that my car passed the required certifications. If they have other additional expectations, like 6 monthly services etc then they need to stipulate that explicitly.
Back to the case in point. If adequate means that patches should be applied within 30 days, what do they mean by that? Windows update? Sure. What about that old version of jre that is still needed to run that legacy system? What about that system that has been powered down for 6 months with its user on some type of extended leave? Is your policy torn up because they switched their computer back on and it was not updated for a few days? Is your router patched?
Most people don't want to accidentally leave their networks open to pwnage. For many, it is a case of being naive rather than reckless. Providing easy to digest guidelines for your customers had the double advantage of protecting them, making your offering more valuable in their eyes and by extension more profitable for you.
1. Suspected criminals; if they had been found guilty by a competent court then these logs would hardly be necessary.
2. Yes. Privacy of citizens should be the default position.
3. Microsoft Ireland is subject to EU laws. If Belgium fills out the right forms through established EU processes, they will get the data.
4. Even if held by an entity outside Europe, Interpol processes are available to them.
How does one detect that a file is encrypted? It is just a sequence of 1's and 0's until an application decides how to process it. Detection online just moves the problem further down the stack. Take an xlsx file as an example. It is just a zip file holding a set of XML documents and other artifacts. What makes it valid? A valid to an online scanner? Is a valid zip file header enough? If so you can expect the encrypted xml document to be added to a valid zip file. It is a seriously hard problem to solve. Regular test restores to clean VMs are the best we have at the minute.
Driving is more than yaw computations. Sorry, was that a packet of crisps that can be safely run over or a rock that must be avoided by an aggressive manoeuvre. No time to get a response from Watson in this crappy 4G zone.
It stands to reason that a mesh of autonomous cars can process more information and not do the stupid things is humanoids do from time to time. But! What would happen if you were overtaking this car at the moment it decided that the abovementioned crisp packet was to be aggressively avoided? This could easily create accident scenarios that are not so today.
I would argue that your GPS coordinates can be easily spoofed by anyone who can type "fake GPS" into the play store search window and as such its effectiveness as a fraud detection is rather limited.
You have to look at the perspective troy would be coming from. When you witness large multinational companies accidentally letting 150 million accounts be breached, you have to recognise that step 0 for security is to not collect the private information that isn't necessary to fulfill the transaction. Or to put it another way, how much do you think the home addresses of papal customers would be worth to identity fraudsters?
Minimal access levels is a good idea because the attack surface is reduced and the bad things the malware can achieve is more limited. But I will point out that encrypting all the xlsx files under "My Documents" doesn't require any privileges beyond what such a user would have.
>I haven't heard ten centimeters referred to as "excessive" before, but I digress
From my understanding the force required follows an inverse cubed relationship. So it is 8 times less energy to pick 5cm or 64 times more energy than an inch.
I am sure that there is a good reason to elevate it so high, just curious.
Identification and voting should not go through the same system. Also, you ideally need to share between identification systems whether a given voter has already cast a vote to prevent someone voting multiple times.
Also, ss numbers alone are probably insufficient for authentication because they are guessable.
Some back of the envelope calculations...
148 x 100W fluorescent lights would draw 14800.
Switching to LED would realistically drop them to 85W but let's pretend that the laboratory achieved lumens per watt could get us to 70W.
This would save 4440W.
If we assume an average draw of 850W per server, that is about the same power reduction as switching off 5.5 servers. In the scheme of things, that won't be a measurable blip on the building power usage.
The only way I can see the savings becoming significant is that LEDs are dimmer friendly, so you could far more easily control the lighting to follow you as you walk around the building and be at very minimal levels elsewhere.