Companies and developers should be cautious and thorough with features, but if you don't think there's any way to ever implement them, let me show you to the horse and buggy store.
So, a browser exploit was immediately patched? Because all the cars are Internet connected? This is exactly how it's supposed to work. That's the benefit to having devices connected; which you constantly poop FUD on. Programs will have bugs, computers will have exploits. That shouldn't keep us from using them and fixing them when necessary.
Sometimes the Internet flap can get stuck open on older modems. If you hear the Internet running, just jiggle the handle on the back and it should stop. A small leak can really add up!
As far as I'm concerned the modern olympic revival is dead and should be burned to the ground. Maybe a post-modern olympics could be reborn from the ashes after a break but the current machinery needs to stop.
Re: Re: Re: Treaty is quite explicit, and limited.
36 U.S.C. § 220501, et seq., vests with the USOC near monopoly rights over the words
So... not a trademark. Is this the kind of thing that could be tossed out as unconstitutional or is it a loophole of trashing citizens' rights to fulfill "international agreements"?
Also remember that Trademarks are designed to prevent confusion, not bestow ownership of words. As long as you're referring to the real Olympics when you say "Olympics" it's not a trademark violation. The IOC anc USOC are trying to push the bounds to mean that anyone who says the word "Olympics" is claiming they are affiliated with the Olympics. That's just not how our language works; for example:
"The once proud and inspirational Olympic Games, International Olympic Committee, and United States Olympic Committee have slowly transitioned into a rancid pool of self aggrandizement and exploitation more disgusting and dangerous than the actual virally fecund waters they hope to subject world class athletes to in exchange for billions in corrupt corporate sponsorships as well as untold costs in local revenue and societal wellfare."
Talking about the real Olympics? Yep. Not claiming to represent the Olympics? Nope. Then you're A-Okay!
Yup, I want Getty, Et Al in court on record saying "Whoa... you guys... these copyright infringement penalties are way out of control. How the hell can we be on the hook for that much?"
Re: Re: This is nothing compared to 3D printing fingerprints
Fingerprints make terrible authenticators (passwords). Think of all the best password advice and then try to apply it to a fingerprint.
1) Don’t post it in plain sight 2) Don’t just use one password 3) Change your password if it is exposed 4) Don’t use dictionary words 5) Include numbers, capital letters and symbols
We leave your fingerprints all over the place every day. You've got 10 fingers, so you've got 10 passwords. What happens when you injure one or a company you've trusted has its database hacked? 9 passwords... The complexity of the hack is correlated with the complexity of the scanner, not the complexity of your finger print. Some scanners check only a few points and allow leeway to prevent failed scans. The "dictionary" is limited by scanner technology, which is out of your control, not by the "password" you select.
Guilty people get equal protection under the law, that's how we find out they're guilty to begin with. Tossing all the law-abiding citizens under the bus with a terrible precedent to 'get' one scofflaw who sure as sh*t looks guilty is wholly unacceptable.
Re: Re: Re: This is nothing compared to 3D printing fingerprints
Most people don't appreciate the concepts of (or difference between) Identification, Authentication, and Authorization. Fingerprints can be fine for Identification, claiming you are someone, just like a username that may be public knowledge. But it's not an Authentication and all the fingerprint scanners in the world seem to ignore that for ease of access.
It's reminds me of those services that could charge fees to your account based solely on your phone number. Just because someone knows my publicly available identification info doesn't mean that that 1) are me and 2) are authorized to make charges.
Powell had a couple of "whoopee boo-boos" but he didn't intentionally avoid the secure systems provided for his entire tenure, physically leaving the SCIF rooms all his actual work was done in to use an unsanctioned blackberry in the name of "convenience".
Trouble is, the security they ran on the server was so bad they have no idea whether it was breached or not. The "logs" don't show any hacks, but they also don't show no hacks. There have been multiple statements from high level intelligence agency chiefs stating they would be shocked if the server had not been infiltrated by foreign governments. Essentially we'll never know the full text of the emails, but China has had them for years.
Does anyone know if this investigation was only about mishandling classified materials, or if it was also evaluating the Federal Records and FOIA laws which were obviously intentionally violated?
Yup, yup, yup. She never wanted anyone to see any of them, personal or professional. That was the whole point.
Her Dept signed sworn docs that they turned over all pertinent records, including all work related emails, even though NONE of her emails were archived. Woops! 21 months later they submitted 30,000 emails (as a result of Guccifer 1.0 and the Bengazi hearings) and swore (again!) that was it, the other 33,000 weren't work related. But FOIA emails in her staffers and other government officals' inboxes have repeatedly proved that to be false. The FBI (and the Russians and Chinese probably) are reviewing those last ones that were never willingly released.
On the post: Hackers Able To Control Tesla S Systems From Twelve Miles Away
Re:
On the post: Hackers Able To Control Tesla S Systems From Twelve Miles Away
Re: Re: Hey there Elmer!
http://www-odi.nhtsa.dot.gov/owners/SearchYesterdayRecall
On the post: Hackers Able To Control Tesla S Systems From Twelve Miles Away
Re: Re: Hey there Elmer!
Companies and developers should be cautious and thorough with features, but if you don't think there's any way to ever implement them, let me show you to the horse and buggy store.
On the post: Hackers Able To Control Tesla S Systems From Twelve Miles Away
Hey there Elmer!
On the post: Users Say Comcast Broadband Usage Meters Don't Work, May Result in Hundreds Of Dollars Of Errant Charges
Re: But it does work
On the post: Study Says Police Body Cameras Have Contributed To Increased Uses Of Deadly Force
Re:
http://tylervigen.com/spurious-correlations
On the post: Here Is The End Result Of The USOC And NBC's Over-Protectionist Olympic Nonsense
What is this "olympics" you speak of?
On the post: Here Is The End Result Of The USOC And NBC's Over-Protectionist Olympic Nonsense
Re: Re: Re:
On the post: Will DNC Email Hacking Make Legislators More Friendly To Encryption?
Spoilers
On the post: How The Olympics Bullshit Ban On Tweeting About The Olympics Is Harming Olympic Athletes
Re: Re: Re: Treaty is quite explicit, and limited.
On the post: How The Olympics Bullshit Ban On Tweeting About The Olympics Is Harming Olympic Athletes
Re: Treaty is quite explicit, and limited.
Not claiming to represent the Olympics? Nope.
Then you're A-Okay!
On the post: Getty Makes Nonsensical Statement On Photographer Carol Highsmith's Lawsuit For Falsely Claiming Copyright
Re:
On the post: Whether Or Not Russians Hacked DNC Means Nothing Concerning How Newsworthy The Details Are
Re: ?
On the post: Court Says Cop Calling 911 With Suspect's Phone To Obtain Owner Info Is Not A Search
Re: Re: This is nothing compared to 3D printing fingerprints
1) Don’t post it in plain sight
2) Don’t just use one password
3) Change your password if it is exposed
4) Don’t use dictionary words
5) Include numbers, capital letters and symbols
We leave your fingerprints all over the place every day. You've got 10 fingers, so you've got 10 passwords. What happens when you injure one or a company you've trusted has its database hacked? 9 passwords... The complexity of the hack is correlated with the complexity of the scanner, not the complexity of your finger print. Some scanners check only a few points and allow leeway to prevent failed scans. The "dictionary" is limited by scanner technology, which is out of your control, not by the "password" you select.
On the post: Court Says Cop Calling 911 With Suspect's Phone To Obtain Owner Info Is Not A Search
Re: No sympathy
On the post: Court Says Cop Calling 911 With Suspect's Phone To Obtain Owner Info Is Not A Search
Re: Re: Re: This is nothing compared to 3D printing fingerprints
It's reminds me of those services that could charge fees to your account based solely on your phone number. Just because someone knows my publicly available identification info doesn't mean that that 1) are me and 2) are authorized to make charges.
On the post: FBI: Clinton 'Should Have Known' Private Email Server 'No Way To Handle Classified Info', But No Charges Will Be Sought
Re: Re: Re: Re:
http://www.thompsontimeline.com/1422/2015/08/01/august-2015-secretary-of-state-powell- received-two-classified-emails-but-under-very-different-circumstances-than-clinton/
On the post: FBI: Clinton 'Should Have Known' Private Email Server 'No Way To Handle Classified Info', But No Charges Will Be Sought
Re: Did any classified get our?
On the post: FBI: Clinton 'Should Have Known' Private Email Server 'No Way To Handle Classified Info', But No Charges Will Be Sought
Scope?
On the post: Emails Show Hillary Clinton's Email Server Was A Massive Security Headache, Set Up To Route Around FOIA Requests
Re: Re: Why the Vitriol?
Her Dept signed sworn docs that they turned over all pertinent records, including all work related emails, even though NONE of her emails were archived. Woops! 21 months later they submitted 30,000 emails (as a result of Guccifer 1.0 and the Bengazi hearings) and swore (again!) that was it, the other 33,000 weren't work related. But FOIA emails in her staffers and other government officals' inboxes have repeatedly proved that to be false. The FBI (and the Russians and Chinese probably) are reviewing those last ones that were never willingly released.
Next >>