Until encryption is not a pain, relatively fewer people are going to use encryption consistently on emails or text messages. Encrypted drives, that is much easier. However, wiretapping is, by definition, intercepting communications of the target not poking around on a drive.
Bruce made a throwaway comment that NSA should be spying on foreign governments and leaders. Obviously, more effort should be put on enemies and major rivals than others. What is not wanted is the NSA spying on Americans in America.
The issue is you did not preserve evidence according to the good comrades at DOJ. According to them you and just about anyone on the Internet deserve a few years in the Gulag (federal prison)
The comments on Arstechnica are made by individuals who are not employees. So he would have to sue each "defamer" individually. With the name Asman, the puns are coming.
I am not be surprised at the amount of useful intelligence that could be gleaned from social media sites. To expect your average ISIS dim bulb not to post actionable intelligence on a social media site is ludicrous. If they will post very personal details why would anyone expect them not post something juicier.
Whether the story referenced is true, plausible but not proven would be my verdict.
Agreed with the strong possibility of reasonable doubt in many cases.
A comment on the Simpson case; when I heard how the LAPD handle evidence - no proper chain of custody - I could not see how any competent jury would convict him. In fact, if Ito had a pair he would have slammed the DA's and the LAPD.
I suspect with the newer languages being developed (Go, Julia, and Rust for example) Java in particular and to a lesser extent C/C++ may see declining use anyway. When Java's APIs are being aggressively litigated many smaller developer houses and solo developers may not pay up and look for some other language.
The book "Statistics Done Wrong" by Alex Reinhart (No Starch Press) covers this (without any math). All too often studies are designed without considering the sample size required to reduce false positive and negative rates to a small number and the fact that most papers do not publish the full statistical treatment.
The study mimics, deliberately, the fact that too many medical studies are done using excessively small sample sizes. This means there is a tendency for false positive and negatives. Also, they are chastising the numerical illiteracy of the press who do not even try to understand statistics.
There is a little appreciated point about this debate: many chemicals in food have what chemists call stereoisomers. They have the same chemical components but in 3-d the structures are either left or right handed. This handedness may or may not be important; Thalidomide is a drug where one stereoisomer causes birth defects and the other is a useful drug. However this does not necessarily have anything to do with artificial or natural.
Sony's problems reflect badly on the movie industry to a degree but the movie industry has an image problem from before. Hollywood accounting is well known. Disney is in the movie/entertainment industry and I doubt they are clean.
The problem is with this is the disable almost always get the shaft. Part of the problem is the disable are disparate group with all sorts of medical issues. So there is often a fix for one group that could cause problems for others.
People can be divided into 4 groups on computer security: 1. White hats who try find flaws and alert the appropriate people about them so the flaws can be fixed (Roberts). This is relatively small group because of the skills needed to find the flaws. 2. The security aware who try keep up with the field but lack the deep technical knowledge to routinely find flaws. The is not a particularly large group but an important because they often provide a link to educate others about best practices. Readers of Techdirt and similar blogs are in this group. 3. The average user who does not keep up with most security issues and may not understand their implications. They are heavily reliant on their technically aware friends and family members for advice, training, and support. This by far the largest group of users. Often they confuse the white hats with the black hats, especially by the technical illiterates in the criminal injustice system. 4. The black hats who use flaws to harm others usually financially but occasionally in other ways. Many black hats are script kiddies who do not have the technical skill to find the flaws. They are reliant on more skill black hats to find them and determine how to exploit. This is a very small but dangerous group.
Fiber evidence and similar evidence is used to exclude not to prove. Say you find there are 30 sort of viable suspects for a crime. Fiber evidence proves that 25 could not have done the crime, you are now left with 5 good suspects to investigate.
Now multiple different types of fibers (hair, carpet, clothing) combined could narrow the list done to 1 or 2 people. But you should have other evidence to tie the case together.
The real scandal is not the dodgy fiber evidence but how much of the other evidence is equally dodgy.
On the post: As FBI Fearmongers About 'Going Dark' Because Of Encryption, Actual Wiretaps Almost Never Run Into Encryption
Use of Encryption
On the post: Two Overlooked Aspects Of Those Leaks About NSA Spying On French Presidents
Bruce Scheiner
On the post: Feds Who Didn't Even Discover The OPM Hack Themselves, Still Say We Should Give Them Cybersecurity Powers
OPM = Office of Personnel Mismanagement
On the post: According To The Government, Clearing Your Browser History Is A Felony
Re: What happen when?
On the post: Lawyer Asman Drops Lawsuit Against EFF, But Claims That 'Ass man' Comments Are Defamatory
Who is going to sue
On the post: If US Is Really Able To Target ISIS Sites Based On Social Media Posts... Why Is It Trying To Stop ISIS From Using Social Media?
Do not underestimate stupidity
Whether the story referenced is true, plausible but not proven would be my verdict.
On the post: Orange County DA's Office (Along With 250 Prosecutors) Kicked Off Murder Case For 'Widespread Corruption'
Re: Re:
A comment on the Simpson case; when I heard how the LAPD handle evidence - no proper chain of custody - I could not see how any competent jury would convict him. In fact, if Ito had a pair he would have slammed the DA's and the LAPD.
On the post: What The Oracle-Google Copyright Fight Has To Do With Klingon... And Lots Of Other Innovations
Re: Oracle really didn't think this one through
On the post: Lawyer Stupidly Sues EFF For Defamation After It Called His Stupid Patent Stupid
On the post: Sting Operation Shows How Full Of Crap Health Journals Are When It Comes To Dietary Studies
A book on this subject
On the post: Sting Operation Shows How Full Of Crap Health Journals Are When It Comes To Dietary Studies
Re: The actually scary thing is:
On the post: DailyDirt: All Natural Doesn't Necessarily Mean Good For You...
Stereoisomers
On the post: Obama Administration Files Totally Clueless Argument Concerning Software Copyrights In Supreme Court Case
Re:
On the post: Disney Warned Fusion Not To Do News Coverage That Might Embarrass It Or Others In Hollywood
Re: Re: Not journalism
On the post: Prenda Lawyer's ADA Shakedown Efforts Running Into Resistance From Public, Judges
On the post: New York District Court Denies Immunity To NYPD Officers Who Arrested A Citizen For Filming Them
Re: Re:
On the post: Verizon Buys AOL, Because Two Lumbering Dinosaurs Who Can't Figure Out The Modern Internet Must Be Better Together
Re:
On the post: FBI And United Airlines Shoot The Messenger After Security Researcher Discovers Vulnerabilities In Airplane Computer System
Re: Re: Re: 4 types
On the post: FBI And United Airlines Shoot The Messenger After Security Researcher Discovers Vulnerabilities In Airplane Computer System
4 types
1. White hats who try find flaws and alert the appropriate people about them so the flaws can be fixed (Roberts). This is relatively small group because of the skills needed to find the flaws.
2. The security aware who try keep up with the field but lack the deep technical knowledge to routinely find flaws. The is not a particularly large group but an important because they often provide a link to educate others about best practices. Readers of Techdirt and similar blogs are in this group.
3. The average user who does not keep up with most security issues and may not understand their implications. They are heavily reliant on their technically aware friends and family members for advice, training, and support. This by far the largest group of users. Often they confuse the white hats with the black hats, especially by the technical illiterates in the criminal injustice system.
4. The black hats who use flaws to harm others usually financially but occasionally in other ways. Many black hats are script kiddies who do not have the technical skill to find the flaws. They are reliant on more skill black hats to find them and determine how to exploit. This is a very small but dangerous group.
On the post: Report: 'Nearly Every' FBI Forensics Expert Gave Flawed Testimony In 'Almost All Trials' Over A 20-Year Period
Re:
Now multiple different types of fibers (hair, carpet, clothing) combined could narrow the list done to 1 or 2 people. But you should have other evidence to tie the case together.
The real scandal is not the dodgy fiber evidence but how much of the other evidence is equally dodgy.
Next >>