Re: e-Cigs are not for quitting
No need to be surprised. E-pipes are available in a large number of shops in a large number of varieties (single, dual and triple cartomizer as well as tank models).
6 publicly visible posts • joined 6 Oct 2013
Why should anyone route traffic trough the US when the source and the destination is in Europe?
I certainly don't route my local traffic through my ISP, simply because my LAN is a lot faster than the connection to my ISP.
The "Shengen Cloud", at least as far as I understand it, does not address encryption, it's only concerned with routing.
And the current routing should already provide the proposed cloud, unless someone screwed the routing.
Conclusion: Either am I missing the point or whoever proposed the "Shengen Cloud" had no idea what they were talking about.
I Think you should opt for the two machine solution.
Having kids have access to a production machine is suboptimal (to say the least).
Regarding your no-space-for-a-second-machine-problem: Just strap it under the ceiling. Two U or Z shaped brackets should do the trick.
The way you don't need to worry. Your kids can toy with your windows machine. Your linux-machine is safe and sound out of their reach.
To me the question always was: How did the doctor stop/lock the time war.
The trailers seem to answer that.
Or at least there is one device that looks very much like the key to time and it seems to be indicated that this will play a crucial role.
If I'm correct, the BBC just managed to give away the ending.
just another conjecture:
I agree with the point on "non-linear behaviour". This leads to the following conclusions:
1. Let's suppose that the leaked information is correct. In that case the NSA could try to dissuade people from using TOR by stipulating that the leak could have been intended.
2. On the other hand the information could have intentionally leaked. If people now start to conclude that this could have been the case and assume that using TOR could be unsafe then it would be advisable to get someone to publicly conclude my first point and so to assume that TOR is actually safe to use.
3. On the first foot (as I just ran out of hands): GOTO 1