Leaked video from Rehoboth about Biden's advisors convincing him to drop out of the race.
This is really funny, and really well done. I love how he gets names and dates repeatedly wrong. And was Corn Pop really a Soviet General? Who knew?
Leaked video from Rehoboth about Biden's advisors convincing him to drop out of the race.
This is really funny, and really well done. I love how he gets names and dates repeatedly wrong. And was Corn Pop really a Soviet General? Who knew?
In non-technical language, it''s like they built a house without external security lights or locks on the doors and windows, and had absolutely no idea what they had for furniture so anyone who wanted could come in and take or rearrange things as they like. Other than that, it's totes secure.Anonymous ballots are notoriously difficult to secure but it’s obvious that the current crop of electronic voting machines were developed by companies that have no interest whatsoever in even attempting to address that problem. Many of the issues mentioned in the report are what I would call amateur hour mistakes. There is no reason why these machines should have any unprotected ports on them. Moreover, there is no reason why the software running on these machines isn’t up to date. And the machines should certainly be able to verify the code they’re running. If the electronic voting machine developers don’t understand how code signing works, they should contact Apple since the signature of every piece of code that runs on iOS is verified.And therein lies the insult to injury. The types of security exploits used to compromise the sample voting machines weren’t new or novel. They were exploits that have been known about and addressed for years. A cynical person might believe that the companies making these voting machines are just trying to make a quick buck off of a government contract and not interested in delivering a quality product. A cynical man might even feel the need to point out that this type of behavior is common because the government seldom holds itself or contractors accountable.
Just put those voting machines in the cloud! Everything is magically fixed when it’s put in the cloud!Because everyone is hip to the cloud, right? All the Cool Kids are doing it, so it must be even toteser secure! Even Hitler knows that!
Libpurple was written by people who wanted their open source chat client to talk to every kind of instant messaging system in the world, and didn’t give a shit about security or encryption. Security people who have examined the code have said there are so many possible ways to exploit libpurple there is probably no point in patching it. It needs to be thrown out and rewritten from scratch. These aren’t bugs that let someone read your encrypted messages, they are bugs that let someone take over your whole computer, see everything you type or read and probably watch you pick your nose on your webcam.My only criticism of this post is that it isn't terrifyingly pessimistic enough. If you boot it, they will come. Remember, you're reading this from a computer screen right now.
This lovely tool, OTR, sits on top of libpurple on most systems that use it. Let me make something clear, because even some geeks don’t get this: it doesn’t matter how good your encryption is if your attacker can just read your data off the screen with you, and I promise they can. They may or may not know how to yet, but they can. There are a hundred libpurples on your computer: little pieces of software written on a budget with unrealistic deadlines by people who didn’t know or didn’t care about keeping the rest of your system secure.
Security and privacy experts harangue the public about metadata and networked sharing, but keeping track of these things is about as natural as doing blood panels on yourself every morning, and about as easy. The risks on a societal level from giving up our privacy are terrible. Yet the consequences of not doing so on an individual basis are immediately crippling. The whole thing is a shitty battle of attrition between what we all want for ourselves and our families and the ways we need community to survive as humans — a Mexican stand off monetized by corporations and monitored by governments.Even classified networks get hacked. I'm still the #1 Google result for "How to hack a classified network"**. If the Defense Department - with all their skilled security d00ds and financial resources - if they can't keep themselves safe, then what chance do you have?
If ignorant both of your enemy and yourself, you are certain to be in peril.Good morning. ;-)
- Sun Tsu
LOL, what if you're already PAST mid-life???That made me think of the fabulous scene from the film Tombstone, where Doc Holiday protests to Johnny Ringo that he (like me) is not retired, he's in his prime*:
Doc Holiday: In vino veritas. Best time to think about buying a Harley is when you're drinking.Like I said, my Latin is a bit rusty, but I think this conveys the original message pretty well.
Johnny Ringo: Age quod agis. Careful, an old guy like you will buy too much bike and get tatoos.
Doc Holiday: Credat Judaeus Apella, non ego. Nah, I'm not one of those Rich Urban Bikers. I'll ride every day.
Johnny Ringo: Iuventus stultorum magister. You might do better with a more modern touring bike, like a Yamaha FJR 1300.
Doc Holiday: In pace requiescat. Hey, that's your funeral.
I'm founding a thousand year Reich here. I need a bike that's going to last. I may as well go buy a Harley-Davidson.Heh.