Comment Re: GDPR (Score 1) 42
Combined with a barrier method.
Combined with a barrier method.
It's making them more extreme.
English eludes you as effectively as logic.
You still believe in that fairy tale bullshit that was created specifically to manipulate idiots? I guess it's still working after all these years.
Plus in most jurisdictions (especially China and more recently the US) it's quite easy for governments to get access to corporate data for "security" purposes. So any data corporate surveillance collects, government can get access to as well. Often just for a small fee, no ominous security laws required.
A lot of people don't realize this. Gun nuts in the US get bent out of shape about the idea of a gun registry, all while you can be pretty sure the NSA already has something similar based on data from buyer transactions with corporations.
I'm sure you can find some idiot, probably a false flag, saying that. Or twist something someone said to imply it, the classic one being that beyond 1.5C is pretty bad and we had about 20 years to prevent it. But that's all it was, fringe stuff and lies.
There were plenty of credible sources, plenty of people on the political left accurately relaying the scientific consensus.
What does it matter though? Even if what you claim was true, that's no excuse for you to continue to ignore the science.
Having my DNS queries encrypted is very low value. It just seems like one more tactic by large companies to squeeze out small companies, much like DKIM. It's got marginal value and "solves" a problem that spam filtering already took care of decades ago only to make it harder for small server operators so they'll hopefully throw up their hands and give the business to Google or M$, instead. That's what they want, not "security".
And what method do you propose that your DNS queries have not been tampered with? DNS runs quietly in background every time you use a web address. If someone were to redirect DNS queries of [yourbank.com] to their [fakebanksite.com] and got your banking credentials, I would guess you would not think that was of "marginal value".
Most people are not worried about their DNS traffic being examined.
That is not why DNSSEC exists. The reason DNSSEC exists is so that DNS queries cannot be altered so when when you ask for the IP address for [yourbank.com], a malicious attacker has not populated queries with IP addresses of [fakebanksite.com]
And the problems with DNS traffic being altered or redirected has yet to be a widespread enough problem for the masses to care about.
So we should wait until a fundamental part of how the Internet works is exploited for people to do something about it? DNS cache poisoning was found to be exploitable in 2008. DNS was patched to plug the exploit. It was not actually fixed.
The biggest lie is that there were all those credible claims that world would end in 20 years.
Working a job when you're young is good for you. That 15hr a week part time job provides a lot more value to a high school student then just spending money. I don't think any of the affluent parents who arent encouraging their kids to get jobs when they're young are doing them any favors.
Even with a part time job one still has plenty of time to get into all of the trouble one should when one is a kid.
Also for most everyday users, DNS-over-HTTPS band-aids a lot of the problems DNSSEC could fix.
Sometimes you have to play the game a bit.
Just like the students will need to do sometimes when they're in the workplace.
Entropy requires no maintenance. -- Markoff Chaney