It seems to me that his point was a bit muddled by his attempt to be pithy. Investing in better security is obviously a better use of resources than pointlessly sanctioning NK. (Are there any sanctions we aren't already using?)
This is just nitpicking about a poor choice of phrase.
Pick two separate targets you want to harm -- then attack one and make it appear like the attack is coming from the other.
Even when not intentionally trying to provoke a hacking war, it's common practice for hackers to use compromised third party systems as launching points for attacks. It is difficult to determine (by the target) which machines are owned by the attackers, and which are members of a botnet. Collateral damage is a real ongoing concern with counter-hacking.
Re: Re: Good thing this syndrome didn't begin in an earlier era
Take a look at Android fragmentation and Software/Hardware Smartphone battles for a good idea of what the Personal Computer would like if today's IP laws were in place in the 80s. There are a lot of parallels.
Re: Re: Re: Nit: The filenames contained the word "password"
All it takes is one executive with hubris and impatience (often IT are either unaware, understaffed, or ignored, or any combination thereof).
There is a fair amount of ambiguity and conflicting precedent involving the 100-500ft airspace. That's one of the things that needs to be ironed out. However, the idea of Air Rights has strong legal precedent, and it is (slowly) being applied to UAVs and Drones. While the case law is currently murky, I do believe that Air Rights is the best option at hand to mitigate the privacy concerns inherent in remote flying cameras. Certainly better than any ham-fisted approach that may be being considered.
In my opinion, if the Kite had a camera attached, I'd say yes. It's less about moving equipment over other's property, more so a privacy concern. Still, a valid question, and the entire point of my previous post was we need to ask these questions instead of making knee jerk reactions.
In this specific case the mode of transport is irrelevant, whether autonomous drone, remote piloted, or a camera on a string, but there is precedent for control of the air space above private land (up to a point). See Air Rights. While the FAA does designate the height (and to some degree, the activity) that those Air Rights extend to, I am unsure where the legal authority of private citizens exercising control over their Air Rights resides.
Tl;dr: It's up to the land owner. If you don't have their permission, you can't do it.
I have several points of view on Drones in general, and this regulation in particular. Firstly, regulations (of any kind) that can be exempted for those with enough clout, while restricting individuals and innovators, are always a recipe for abuse and discriminatory practice.
That said, blanket regulations by the FAA on Drone use are undeniably required. Common sense safety restrictions (avoiding airports for one) should certainly be implemented.
There are, additionally, privacy concerns. I do not believe that the regulation thereof falls under the FAA's purview, but piloting a Drone over private property without permission should be considered trespassing.
However, while common sense rules and regulations are indeed required, we also need to take care that said regulations do not hinder personal liberty or economic innovation. As I mentioned above, I have varied points of view on Drone regulation. In addition to my concerns as a citizen for my safety and privacy, I have concerns as a business executive. My company had to scrap a project and business venture due to FAA Drone regulations. (Specifically, the line of sight requirement.)
I'm not sure I have a conclusion, I just wanted to share what may be a unique perspective. I suppose I'll just leave you with this final thought. Too often have legislation and regulation been used as cudgels against innovation by those that fear it; if we wish for this nation to truly be as great as we like to claim, we must ensure that the Rule of Law is used to protect the People, and not to reduce them.
Yeah, that sounds like what would happen if SecuROM couldn't contact the activation servers. I remember it was very late in the install process, and if it failed you had to start all over again. If this was anytime near launch day, their servers were wonky for days, so you may very well have had been suffering alongside myself.
Ugh... I just had flashbacks of just how much SecuROM sucked... My first encounter with SecuROM was way back in 2007. I had purchased an honest to goodness physical copy of Bioshock from an old-fashioned brick and mortar store (which I walked to barefoot in the snow uphill both ways).
I brought it home, unwrapped it, popped the DVD in my computer and installed. That is, I tried to. This being launch day, their activation servers were overwhelmed, and I couldn't reach them. I give up for the night, and try again the next day. This time I manage to activate it.
I then try to launch the game. It does not. Instead, I get a SecuROM error message with an obscure error code, Error: 5024. After doing some research, I find this. (I'm a bit surprised that page is still up, actually.) So it turns out, it wouldn't launch because I was running Process Explorer. I mean, seriously, wtf? I quit process explorer and tried to run Bioshock again, but apparently process explorer leaves a trace on the system SecuROM could detect, so I had to restart my entire machine. Except I forgot process explorer was set to run at startup. So I had to disable that, and restart again. Finally, finally, I got it to run, but at this point I was too angry to actually enjoy the game, so I quit after 5 minutes.
I also sure as hell wasn't willing to go through that each and every time I wanted to play Bioshock, so I found this obscure program called ProcexpUnloader from a shady looking site. I spent 15 minutes throwing antivirus scans at it, poking at it with a hex editor, and wondering whether it was worth the risk. I decide to try it, and lo and behold it did exactly what it said on the tin and nothing more.
Anyway, sorry for the rant, but that was my first (and only) experience with SecuROM.
It depends on the specific content. You first need to realize that 99% of all media (including books) is crap. Acknowledge that and it becomes a matter of personal preference, not the platform.
E.g., I prefer the Walking Dead TV show over the books, it works much better as a animated (ha!) visual medium. The directing of the show does a much better job of presenting the fear and despair than the graphic novels manage. On the other hand, I prefer the Song of Ice and Fire books to the Game of Thrones show. The books do a much better job at delving into individual character perceptions and motivations, while the show tends towards gratuitous sex and violence (which are much more subtle in the books).
TV is not better than Books, and Books are not better than TV. They're just different.
Ignoring for a moment the sheer absurdity of needing a separate law for online acts (are these acts illegal in person, as is implied?), I'm curious about what the exact definition of trolling is, as far as the law is concerned.
Re: Re: Re: Re: Re: Re: A minor can't agree to a contract
This is why I feel it is important to talk about the crap that either side gives us... talking about each sides problems helps to break down barriers not build them up. Not talking about them and acting like they are not there is exactly what keeps them going.
I'm actually of the opinion that attributing general human failings to a political affiliation worsens the partisan divide. "Politics" is very damaging. Call out individuals on their failings, rather than fueling non-productive bickering. There should be no sides to matters of governance, and reinforcing that mentality just makes it more difficult for rational debate to be had.
So, yes, please pretend that there are no sides in our country.
You don't think so? In the past decade, IBM Research has made significant contributions to the fields of Artificial Intelligence, Cryptography, Telecommunication, Public Infrastructure, Data Analysis, Biotechnology, and Quantum Computing. And those are just the ones I'm aware of offhand.
Although well attested, this term is widely regarded as a nonstandard and incorrect. Its use is discouraged by many speakers, who consider it inappropriate in virtually any formal setting, except quoted dialog.
None of that is related to jailbreaking, though. Those are existing security issues.
As for no OTA updates, that doesn't mean you have to leave your system unpatched (in fact, jailbreaking often means you get patches sooner), you just have to do it yourself.
Side loading apps can be potentially harmful, yes, but that decision should be made by the user. Any apps from the app store are exactly as secure on a jailbroken or stock device (including code signing).
Saying that a jailbroken device has no security is blatantly false.
jail breaking (which means there's no security on your device, so take your chances)
That is... just... false. Even on a jailbroken iphone, apps still run in sandboxed mode by default. You need to explicitly give root to specific apps (which usually isn't necessary). Every single security feature is still active. The only real difference is no OTA updates, and Apple support will just look at you funny if you mention you've jailbroken. You also might want to eyeball apps before installing them, but that's nothing new.