It's really quite simple. We do not record the content of phone calls under the program that collects phone call metadata, and we do not record metadata under the program that collects phone call content.
There, now we can deny anything just by putting it in the context of the right program.
Could a privacy service use a separate subdomain for each customer (or group of customers) with a separate SSL key, allowing them to comply with a pen register order for one customer without revealing all customers' traffic?
Yes, the price of SSL keys could be a factor, but perhaps a different CA would be appropriate for this.
Cable companies are picking up an unencrypted signal on public airwaves, and relaying it to viewers that could get it anyway. Why do cable companies (let alone Aereo) have to pay a single penny to the networks?
Anyone remember why NASA's Challenger space shuttle blew up?
"The Rogers Commission found NASA's organizational culture and decision-making processes had been key contributing factors to the accident. NASA managers had known contractor Morton Thiokol's design of the SRBs contained a potentially catastrophic flaw in the O-rings since 1977, but failed to address it properly. They also disregarded warnings from engineers about the dangers of launching posed by the low temperatures of that morning and had failed in adequately reporting these technical concerns to their superiors."
"He urged website operators to act responsibly to protect children from bullies,"
And who is protecting the children from bullying text messages right now? Or bullying phone calls? Wonder how the phone companies would react to a similar call for them to moderate text messages and phone calls! They have an even better argument about scale.
PROBABLE and PARTICULAR do they not understand in the below?
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
The study does not establish cause and effect -- only correlation. They didn't split kids into two different groups and have one go to bed at a regular time, and the other at varying times.
It's quite possible that the less intelligent kids (for lack of a better term) have varying bedtimes because of less rigorous parenting, different demographics, a common underlying biological cause, etc.
The last paragraph of the article sort of alludes to this, but only after going on at length about how kids need their sleep.
"The technology works by bisecting video into two layers. First is a base layer, which streams during viewing, then there would be a higher layer, which the user would pre-download from some high-bandwidth location like the home or office. While the higher layer would be useless on its own, and thus in compliance with intellectual property laws whose aim is to prevent free sharing, it would nonetheless comprise about 3/4ths of the total data."
Hmm, let's take this a bit further. How about we reduce that 1/4 required to work to, say, 2048 bits, an encryption key? How is this different?
And what's to keep a jailbroken device from saving that 1/4 live stream anyway, so the entire video could be viewed as desired, off-line?