Bernoulli disks were technically floppies (they contained a flexible magnetic disk). Here's a fun examination of them, for those of us who consider this sort of thing "fun": https://youtu.be/TpqiahBKX7w
"The fans like music because they agree with the creator's message"
This is a very shaky assumption. Lots of fans of particular music are fans despite not agreeing with the message. Lots of fans of particular songs don't even understand what the songs are actually saying (e.g. "Born to Run", "Every Breath You Take", etc.)
Wow, a Daily Mail article that isn't actually that far off. I'm actually surprised.
But the article is talking about the SS7 hack, not cell phones. And the SS7 hack is only possible because of poor security on the part of the telecoms.
It does not have anything to do with being able to track the whereabouts of cell phones. The cold, technical fact is that if your cell phone can't send a radio signal out, it cannot be tracked. There's literally nothing to track in that situation.
I'm not sure what you mean here, or what advice I gave that you consider unsound.
Let me be very specific: the government cannot intercept and modify a large number of shipments of equipment, no matter how much they might want to -- so this isn't being done as a blanket policy.
If you ship you phone via parcel service, the government will not even know to intercept your package unless they're already keeping a very close eye on you, specifically. When I say that if you're in that select group of people, you'll know, I mean that either/or:
1) You are engaging in activity that you know is likely to be of exceptional interest to the government. Large scale crime, espionage, journalists covering very sensitive stories, working for a foreign embassy, etc.
2) Intercepting your packages will not be the only thing the government is doing with you. You will be under surveillance from many different angles. Enough so that it borders on certain that you'd notice something was up.
If you're just a regular Joe, even one that is on the bad side of the government for whatever reason, they aren't going to waste a very limited resource such as intercepting parcels on you. At worst, they'll go with actions that are less expensive, like temporarily seizing your phone from you and slipping some spyware on it.
They are a security issue. Not as bad of one as when Windows had autoplay turned on by default, but it's still a pretty big deal.
The main security problem with handing out thumb drives in a bulk way is that people will trust them, and are likely to go ahead and open risky documents or run programs they find on them.
If the drive they have is the one given out, that's probably OK. But there's no way to be sure that's the case. If I'm handing out hundreds of drives to people attending an event, there are plenty of opportunities for hackers to leave identical-looking drives sitting around, to surreptitiously swap out good drives for bad, etc.
No need for a list. I'm talking about people that the government thinks may be spies, might be important terrorists, might be engaged in very large crime efforts, etc. If you're someone that is incurring such suspicion, you're very likely to know it.
This is misleading. Crypto is not considered a munition by any US law.
It is considered a munition by ITAR (International Traffic in Arms regulations), but that only comes into play when in imports and exports. It has nothing to do with what US citizens can possess and use.
Yes, I think you're right. I would take it a bit deeper, though.
Military training consists of a whole lot more than just learning how to use the equipment. It also includes things like what sort of force is appropriate under what circumstances, focused conditioning to make it more likely to keep your head when under fire, how to appropriately handle the presence of civilians, identify friend & foe, etc.
It's a whole package deal, and is the sort of overall training that police don't get. I think the notion that giving them military equipment, even if trained on that equipment, is fundamentally flawed.
Of course I'm aware. However, they don't (and can't) do this in a blanket kind of way. You'd have to be someone they have a particular, and great, interest in -- and if you are, you probably know or reasonably suspect it.
If you are someone in that category, then your entire security game must be stepped up across the board anyway, and you shouldn't be using any cell phones except for burners that you only keep for a short period of time.