BitCoin drive
1) Hire a few sappers.
2) Dig a tunnel.
3) ???
4) Profit!
2097 publicly visible posts • joined 16 Mar 2008
... and interesting issues about cross-national jurisdiction, the applicability of US civil rights to non citizen/residents, treaties, and various requirements that entities doing business in a country comply with its local laws.
This is why I confine my sh-t posting to citizens within my own country.
... but the brain is hierarchical. The sensory I/O certainly operates at much higher rates than 10 b/s (the authors quote a rate of 10^9 b/s). But specialized areas "distill" this raw data into symbols (concepts?) which are percolated upwards into the higher levels of consciousness. At the highest levels, we probably do think very slowly. Fortunately, the lower levels that do the input as well as output can handle rates equaling the tasks at hand. Sometimes, not even the brain, but lower level processing is done outside the brain in the bodies neural system. Some modes of motor control involving balance, for example, don't need to pass data through the brain. Dedicated connections in the spinal cord being principally involved in such tasks.
Out highest level of thinking involves symbols that encode complex inputs to drive our conscious "state machine". And, for some of us, when those states are restricted to the small set of sleep, eat, defecate, procreate, it doesn't take a lot of bits to manage.
... I have tracking protection set to "Strict". And there appears to be no limit to the number of websites that put up a nag box to the effect that strict tracking restrictions will interfere with the operation of their site.
Actually, its not the DNT flag that causes them grief as much as its the cross-site cookie blocking and other f---wittery that Firefox blocks. But, the more that they scream, the happier I am.
"After construction and build out completes, the only taxes paid are those via payroll tax."
And how many people will a 4 million square foot data center employ? Not nearly as many as 4 million square feet of manufacturing facilities. Those systems will be managed from Menlo Park, CA. With a few people on site to do what h/w maintenance needs doing.
"Thernostats should, like all HVAC controls, be locked off so staff can't fiddle with 'em."
On newer commercial HVAC systems, the sensors have no user interface. The temp setting is done via a (password protected) system console.
Back several decades ago, I worked for a little aircraft manufacturer that had been around since WWI. Our group was located in a 1950s era building, which was maintained at around 80F (27C) year round. When I asked some facilities people what was up with that, I was informed that the ancient air conditioning system couldn't keep up with modern occupancy requirements (everyone with a beige tower PC and CRT). Furthermore, the Big Boss had mandated that the AC was to be set at 80F "to conserve energy and save money". And anyone caught fiddling with it would be fired. And that was the end of discussion.
And then the Nisqually Earthquake hit in 2001. Upon returning to the building after safety checks were completed (in mid-winter) the building temperature was 68F (20C) in the morning, warming to around 72F (22C) at quitting time. It turns out that the natural gas heating plant had yet to be inspected and approved for use. So we were running off internally generated heat (people, computers, lighting, etc.). Again, I asked a facilities guy what was up. 68 to 72F was pretty comfy instead of running the building at 80F during the winter. Turns out the Big Boss had been adamant about nobody fiddling around with the heating system "or else". Which included not installing more modern thermostats with separate AC and heat set points. The set point was to remain at 80F "to save money on air conditioning". Never mind how much we were spending to (over)heat the place.
Also known as the Dilbert Principle.
"You are nuts to even consider having this on a PC"
Unless your boss wants it on your company PC. I'm sure Microsoft has made statements to the effect that only the user will have access to Recall data. But on enterprise/corporate systems, who is the system owner/user? And what hidden policy switches are there to give a peek to IT security or management?
Of course, the boss' laptop will be exempt. Because visits to Hentai/Yaoi sites by C suite members during working hours will be considered corporate proprietary.
Please don't. It will just give Customs and Border Patrol an excuse to confiscate jewlery on the pretense that it could be used for smuggling intelligence info or kiddie porn. The way they seize cash now. Because of a remote probablity of drug trafficking, despite the absence of probable cause.
Microsoft is one step removed from the '"material financial risks" from its links with the fossil fuel industry of Big Oil. If BO has the money to pay for their products and services (and they do) then the risks to MS are minimal.
Is it anyone's business what a customer does with their product? As long as they adhere to the instructions for use and warning labels on the procuct, I'd say 'No'. Holding that nebulous accusation of "material financial risks" (I interpret the quotes in As You Sows statement as denoting opinion rather than substantiated fact) as a hammer held threateningly over ones head to elicit behavior changes as bordering on unethical. 'MS, don't you sell product to BO because we don't like what they do.' You don't like what BO does? Fine. Then go after them directly. Microsoft (and any other supplier) is not your personal army.
I'd go so far as to say that MS caving to such indirect pressures on their customers is a far greater material financial risk, as I don't know if I'd want to use a supplier that might cut me off because someone else doesn't like me.
Assuming Congress is willing to go public with what "we know" in an appropriate venue, I don't have a problem with it.
"Steganography"
This.
You can hide data almost anywhere. Trick is to get an application to extract and execute it. And the prerequisite there is to get someone to install that particular (evil) application.
But first, Ghostpulse has to find a way onto a system. And into a location with executable permissions. Which I, as a plain old user (even on my own systems) do not have the permission to install.
"The reason criminals typically do not obey such laws - including gun registration laws - is because it makes them hard to catch and prosecute them for their crimes."
Sort of. Unlike an automobile, with number plates, registering a gun creates no opportunity for police or witnesses to observe a crime and report a serial number for the purpose of tracking. It does create an opportunity to add extra charges once the perpetrator has been apprehended. Or charge additional people as suspects in some (but not all) gun transfer violations.
For a gun serial number to be of any use, one would have to have a suspect in custody already.
"Sometimes the alert tone is followed by a few seconds of digitally encoded data."
This
Actually, I've heard some test broadcasts where the alert tone is not heard. But the digital tones are. And the "This is a test of the EAS system ...." message scrolls across the TV.
"Russia, Iran, and North Korea are the main guilty parties here"
I'm sure Russia, Iran and North Korea will be extraditing the guilty parties posthaste. Yeah, right.
Failing any substantive action on the issue, we could always push an update to BGP to make their national networks disappear from the global Internet. At least they'll have trouble hacking something they can't reach.
But configuring sendmail was no job for a novice. First, learn M4. Then be aware of all the vulnerabiities that each configuration item involves.
The default distributions of sendmail often had some serious holes in them. Which allowed your home PC to become an evil mail relay. Hence the default blacklisting of most home e-mail systems.
Many systems (particuarly Linux) were set up by people who really shouldn't have. And only got configured with a domain name and ISPs MTA address.
I did something similar with my work Linux system. Fortunately, our IT people had seen fit to provide Unix (HP-UX, AIX, Sun, etc.) users with access to Microsoft "productivity" apps. They had a set of NT boxes in the data center, populated with the standard Windows app suite. And some software that enabled them to export display, keyboard and mouse to any specified Xserver (remember the bass-ackwards definition of client and server in the X protocol). And connect the NT user account file space to my system using NTFS. So I had an entire Windows desktop as one window on my Linux PC.
I managed most of my career without a stinkin' Windows box on my desk. Only had to fire up the NT environment once a week to handle "Windows-only" stuff.