If your button was on the home page, then it is a convoluted process as it changes from user to user. I followed the instructions on the T-Mobile help site and still had to go digging to find the setting as the instructions were wrong.
Not all that long ago my mom offered to get me a cell phone on her family plan. She would pay, I'd never have to worry about it. I said I'd rather stick with T-Mobile than go to Verizon. Think about that, I currently pay $80 a month and chose to keep that rather than getting a free Verizon phone.
Now I'm rethinking the offer.
But my big question is this. If I'm paying $80 a month just so I don't have to worry about the data caps (I spent half an hour on the phone with them making damn sure of that), why the hell did I just have to turn off Binge On? I refused their $35 "unlimited" plan specifically so I don't have to worry about "network optimization."
You're not crazy, but a lot of your points have already been dealt with in the physical market.
No, you wouldn't be able to sell outside of your chosen walled garden. It's a game on the Steam platform, why would you expect to sell it to a different platform? Same as selling a used Xbox One game. Why would you expect to sell it to a PS4 user? Different companies will setup their own markets (just like how there are plenty of other markets to sell Steam games), but it'll still be just Steam keys.
The price is, yes, going to be linked to the price of the full game. Just like the current used market. Ain't no one going to buy a used game that cost more than a new one and the seller is always going to want as much money as possible.
Steam credit is possible as a payment method. Game Stop only pays in store credit. But having a system for Pay Pal could easily be set up.
CDs, DVDs, Blue-Rays (while all have DRM) are easy to copy. What's to prevent someone from buying a CD, copying it, and selling it? In all practical sense, nothing but the law. The same would apply with digital goods.
You do make one vary good point, why would anyone buy a new copy if a "used" copy is available? The used copy is identical since the source files are the same. This is something we're going to have to figure out sooner or latter as more and more of the world becomes digital.
Self driving cars are not going to be out there without a licensed driver until it can be proven that they will be able to handle themselves in all situations that are likely to happen on the road. And when the unlikely happens, the fallback will be exactly the same as it is for humans, pull off to the right (or left) side of the road, stop, and call for help.
Figuring out what the likely situations are and accounting for them is exactly what Google and others have been doing for the past several million miles.
Then the erratic humans will not be driving with the flow of traffic, now will they?
If people are driving 10mph above the posted speed limit because it's the flow of traffic then when the flow of traffic drops to the speed limit, then those same people will be driving the speed limit.
That's what it comes down to isn't it. Person A is right and set a line in the sand. Person B is vary wrong and set their line in the sand. If person A steps over their line, they step into the wrong. But person B wants to compromise. Just step a little into the wrong, just a toe, I promise I won't pull you further in.
One would think we would have learned better by now.
Didn't know that, but it helps my point, not yours.
Why does Apple have end to end encryption for their chat service? Think about that for a second, why would they spend that much effort into creating that? Is it to help the criminals stay under the radar? Or maybe because Apple knows that keeping everything in a central repository is a stupid idea.
Your compromise will end up like the 6 strike compromise the ISPs put in place. Utterly worthless yet still being ratcheted up. ISPs should have stood their ground and Google and Apple should as well.
You're confusing two different things. You're talking about local encryption and communication encryption at the same time and getting confused.
Google's chat encryption is not end to end, it's from your PC to the central server and from the other PC to the central server. The government doesn't need to crack encryption to get that information.
Google chat and Apple chat are not secure systems, we all know this.
Local encryption is something else entirely. If I encrypt a file on my phone, say a password list, there is no central server between me and the file. I expect that file to be secure. At least as secure as the software used to encrypt it, not some unrelated, uninterested third party. I expect my communication with my bank to be as secure as the bank, not some unrelated, uninterested third party. Google should not have access to this information.
The government doesn't want access to Google chat, they want access to everything encrypted. Your compromise will never be enough for them because they already have it.
So you're saying that there should be one central database holding the passwords for each and every device out there? As much as there is wrong with what you're saying, there's one giant flaw that even those who don't understand encryption should be able to see:
You're still making one central target to crack everything.
The biggest advantage of encryption is it's decentralization. Crack one device and you don't crack everything. But with your idea, crack Google or Apple's database and you've got everything. And it wouldn't take a master hacker, all it would take is one lazy/malicious/mistaken employee.
This, of course, assumes that the government would even allow a database like that to exist outside of their control.
And why are we even bothering? Smart criminals will never be caught by this. ISIS has their own encryption now, drug dealers use burner phones (and they don't even bother with encryption), smart criminals would just use the not intentionally flawed software we already have. Stupid criminals already incriminate themselves. Why make everyone else less secure?
So, one key to unencrypt all phones of a specific manufacturer? One key that can be copied infinitely and can't be returned to the manufacturer? One key that becomes a vary large target for all hackers out there?
Like the HDDVD encryption key? How long did that take to crack? How often does Blu-Ray have to change their encryption keys?
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Enough strawmen to fill up a dozen fields.
"My thoughts on this are the same as many others."
Yeah, other trolls like Angry Dude and Avarage Joe. You're just another in a long line of people intentionally antagonizing other commenters by false accusations, insults, and dragging the discussion off topic.
The truth has outlived those trolls, it'll outlive you.
Re: Re: Re: Re: Enough strawmen to fill up a dozen fields.
You have a bank account, right? You're an upstanding citizen (OK, I'm making an assumption there), so I'm sure you do. You are aware that if encryption is broken, you don't even have to be on the Internet to have your account information stolen? Banks use VPN encryption to transfer data between offices and other banks. Break encryption, that information is no longer secure. You suddenly find your account balance $0.
Do you telecommute to work? Go to the doctor's office? Use a credit card? All of that stuff and far, far more rely on secure communication. Break that and everything you know falls apart around you.
Constantly hiding under the "Copyright Infringement" banner just shows you have absolutely no idea of the horrors you're calling for.
Despite what anyone thinks about the government and it's trustworthyness, you keep forgetting (probably intentionally)that it's physically impossible to give the good guys a way to monitor encrypted traffic without giving the bad guys the same ability.
If anyone brings up that point, you tend to not ever respond.