Obviously Putin is embarassing Obama and yanking Obama's string. Putin can claim with a reasonably straight face that Snowden will not get a fair trial in the US because of Manning's conviction. Also, as an old intelligence hand, Putin realizes the real value of Snowden's leaks is that the NSA is run by idiots. Concentrating on collecting vast amounts of useless metadata is not smart and Putin knows this. Both Manning and Snowden showed the incompetence of the US Government and embarassed some very narcissitic people. These people want their pound of flesh out of both.
Reading the original post, if the poster had any evidence why did he not go to the authorities. The post alledges criminal behavior not incompetence. I can see why Mr. Goren sued; the poster made comments about alledged criminal actions without apparently having proof. I wonder if the poster (or family member) lost money due to bad investment and are now making false accusations in the hope of recovery their losses.
Also, I can see why Mr. Goren would like the post deleted given there is no evidence of its accuracy or factualness.
The Section 230 provisions are there to immunize any displaying third party content from damages relating to the content. I can post anything on this site as a commenter and the post may be libelous/slanderous. The site owner is immunized against my actions; however, I am not.
In the case of blog comment, the issue is whether the site has any editorially control over the comments beyond moderation.
Is she confusing Fair Use with plagiarism? Fair use allow one to quote or use other works in your own work without needing to get permission. Understandably, fair use is conceptually easy to understand but difficult to precisely define without context. Plagiarism is a stealing other's work/ideas and claiming it as your own. Plagiarism again is easy to understand but difficult to precisely define (e.g. the accidental inclusion of a few paragraphs uncited in a book has been cited as plagiarism rather than the more likely forgetting to cite the source).
Except for blackjack, the odds favor the house on each game. Tho odds for the house vary. Blackjack has a statistical flaw that makes card counting work in favor of the player.
If Section 230 is weakened could comments on websites be the next target? After all some very sharp, sometimes offensive statements are made by commenters when discussing an issue. By this idiotic "logic", websites are responsible not only for their content but for the content of commenters also.
Or is this a fascist ploy to control independent thought? Free speech and a free press (not media companies) create problems for politicians because their collective lies could be exposed and careers ruined.
Free speech means that someone will say something I find objectionable or offensive. But as Mike said it works both ways. If I want free speech then others have the exact same rights as I do. The problem is hypersensitivity to being offended by some or worse having their opinions honestly challenged.
People choose to use Facebook, Google, and other online services because they find the service useful. Yes, these services collect information to aid advertisers and thus make money. No one is forced to use these services and often have a some control over how much information is shared.
However, NSA data vacuuming is not voluntary and no one has control over what is collected and with whom it is shared. The IRS scandals should make one very, very, very wary of too much information in the hands of any government agency.
Blood type can be used to eliminate a suspect but not to prove the identity. If your blood type matches the type of suspect it does prove you did not only that further investigation is needed to prove guilt or innocence.
Hair samples appear to do the same; eliminate suspects only. If one's hair matches the hair at the scene guilt can not be assumed. But it should cause a more thorourgh investigation.
Something unique like fingerprints or DNA (no identical twins) places a specific individual at the scene. Strictly speaking this evidence may not prove guilt (depends on exactly where the evidence was found) but certainly requires a very good reason why the fingerprints or DNA were found.
Wrong! If the information is readily available, say Wikileaks, then reading an article about it is not going stop the leak, it has already happened. The NDA would cover leaking further information. This issue here is not leaking further information but reading about already leaked information. Also, to assess potential damage one may need to see what is being written in real time and what is actually available.
The idiotic policy of the DHS ignores the fact that most of the people who might view the news article probably do not know any specific details about leaked information. One of the very basic principles of information security is to limit access to the information. What you do not know or never have access to you can never leak.
For example, I know that signals are encrypted or encoded but do I need to know the details of how it is done? Only if my position requires me to decrypt or encrypt the signals and for this scenario I do not directly handle the encryption and I only see the final/initial plain text. So my reading about signal encryption will not harm signal security. Also, anyone approaching me about signal security will learn very little if I have only a vague idea of what is happening that could learned by reading Wikipedia. Now what I should not comment is the content of the signals to verify the accuracy of any plain text I know about.
The company's concern is ultimatey to get customers to spend money on their products. If potential customers refuse they go out of business. MS specifically has problems with consumer preceptions about their products (fair or not). But if customers are scared to trust you and your products you are toast. Ultimately businesses rely on trust, the customer has to believe they are providing value and will keep confidential information confidential.
In the recesses of MS' collective brains it must slowly be dawning on someone they need to come clean or they will have more serious near term troubles.
I have seen this prank pulled by someone at Heathrow about 15 years ago. At one point I had a recording of the announcement. What was hilarious was the fact no one apparently bothered to read the names until they had been had.
On the note of checking sources, why was the airline not asked to confirm the pilots' names by the studio?
They are getting free publicity with Mods. I think part of the problem is the proliforation of entertainment and social media has reduced the time spent on other activities. Putt-Putt is not only competing against other outdoor activities but social media, computer gaming, and the Internet. Money and more importantly time spent on these newer activities can not be spent on Putt-Putt.
"And furthermore - should you trust proprietary, closed-source software written by a third party?"
You raise an interesting question because with third partry closed-source software you can not review the code for any back doors. With open-source software, you can review the code for back doors and it would be harder to hide a back door in the code. The issue is how much do you or I trust the specific vendor of the closed-source software. The openness of open-source software is inherently more trustworthy because the developers are not deliberating hiding anything.
I wonder long-term how the NSA spying scandle will affect Windows or MS Office in particular if customers decide enmass MS can not be trusted.
All commercial transactions rely heavily on the buyer believing then can trust the vendor and manufacturer (if different). Contracts are often used to codify and clarify the relationship but do not remove the element of trust.
Oddly it may be in MS' long-term best interests to consdier making their products open-source.
On the post: US Officials Freak Out Over Russia Giving Snowden Temporary Visa
Asylum, etc.
On the post: Lawyer Gets Court To Assign Copyright On Negative Review To Him, Then Sues For Copyright Infringement
The orginal post
Also, I can see why Mr. Goren would like the post deleted given there is no evidence of its accuracy or factualness.
On the post: Lawyer Gets Court To Assign Copyright On Negative Review To Him, Then Sues For Copyright Infringement
Re: Heh, heh. I admit this is innovative!
In the case of blog comment, the issue is whether the site has any editorially control over the comments beyond moderation.
On the post: Author Claims That 'Fair Use Is Theft By Any Other Name'
Fair Use vs Plagiarism
On the post: Georgia Claims Its Annotated Laws Are Covered By Copyright, Threatens Carl Malamud For Publishing The Law
Re: Duh! It's Georgia
Also, do not forget that the Nazi Germany eugenics laws were heavily based on California state law. California was never a part of the CSA
On the post: DailyDirt: Bank Error In Your Favor....
Re: Re: Re: Re: I'd bet it all on red or black..
On the post: State Attorneys General Want To Sue Innovators 'For The Children!'
Users
Or is this a fascist ploy to control independent thought? Free speech and a free press (not media companies) create problems for politicians because their collective lies could be exposed and careers ruined.
On the post: Student's Free Speech Victory Is A Victory For Everyone Even If You Disagree With His Speech
Free Speech
On the post: National Intelligence Lawyer Wonders Why People Are Fine With Sharing Data On Facebook But Not With The Government
Letter
People choose to use Facebook, Google, and other online services because they find the service useful. Yes, these services collect information to aid advertisers and thus make money. No one is forced to use these services and often have a some control over how much information is shared.
However, NSA data vacuuming is not voluntary and no one has control over what is collected and with whom it is shared. The IRS scandals should make one very, very, very wary of too much information in the hands of any government agency.
Yours truly
A. User
On the post: DOJ/FBI Admit They May Have Abused Hair Analysis To Convict Hundreds To Thousands Of Innocent People
Hair = Blood Type
Hair samples appear to do the same; eliminate suspects only. If one's hair matches the hair at the scene guilt can not be assumed. But it should cause a more thorourgh investigation.
Something unique like fingerprints or DNA (no identical twins) places a specific individual at the scene. Strictly speaking this evidence may not prove guilt (depends on exactly where the evidence was found) but certainly requires a very good reason why the fingerprints or DNA were found.
On the post: More Sanctions Issued Against Team Prenda
Ouch
On the post: Head Start: College Kid Gets Prison For Rigging Student President Election
Party?
On the post: Homeland Security Threatens Legal Action Against Employees Who Read News About Leaks
Re:
LOL
On the post: Homeland Security Threatens Legal Action Against Employees Who Read News About Leaks
Re: You're thinking about it wrong.
The idiotic policy of the DHS ignores the fact that most of the people who might view the news article probably do not know any specific details about leaked information. One of the very basic principles of information security is to limit access to the information. What you do not know or never have access to you can never leak.
For example, I know that signals are encrypted or encoded but do I need to know the details of how it is done? Only if my position requires me to decrypt or encrypt the signals and for this scenario I do not directly handle the encryption and I only see the final/initial plain text. So my reading about signal encryption will not harm signal security. Also, anyone approaching me about signal security will learn very little if I have only a vague idea of what is happening that could learned by reading Wikipedia. Now what I should not comment is the content of the signals to verify the accuracy of any plain text I know about.
On the post: Microsoft Fires Off Rebuttal To Latest Leak; Angry Letter To Eric Holder
Re: Money
On the post: Microsoft Fires Off Rebuttal To Latest Leak; Angry Letter To Eric Holder
Re: Re: Damage control
On the post: Microsoft Fires Off Rebuttal To Latest Leak; Angry Letter To Eric Holder
Damage control
On the post: Asiana Air Says It Will Sue Over Stupid News Program Broadcasting Offensive Joke Names Of Crash Pilots
Old Gag
On the note of checking sources, why was the airline not asked to confirm the pilots' names by the studio?
On the post: Putt-Putt Fails To Comprehend User-Generated Content, Sends C&D To Mojang Over Mini Golf Games Recreated With Minecraft
Re:
On the post: Latest Leak Shows Microsoft Handed The NSA And FBI Unencrypted Access To Outlook, SkyDrive And Skype
Re: Re: Re: Untrustworthy...
You raise an interesting question because with third partry closed-source software you can not review the code for any back doors. With open-source software, you can review the code for back doors and it would be harder to hide a back door in the code. The issue is how much do you or I trust the specific vendor of the closed-source software. The openness of open-source software is inherently more trustworthy because the developers are not deliberating hiding anything.
I wonder long-term how the NSA spying scandle will affect Windows or MS Office in particular if customers decide enmass MS can not be trusted.
All commercial transactions rely heavily on the buyer believing then can trust the vendor and manufacturer (if different). Contracts are often used to codify and clarify the relationship but do not remove the element of trust.
Oddly it may be in MS' long-term best interests to consdier making their products open-source.
Next >>