Comment Re:How would they stop us? (Score 1) 437
By finally securing the CANbus so that you can't just patch in anywhere and control the car with it.
By finally securing the CANbus so that you can't just patch in anywhere and control the car with it.
http://bogofilter.sourceforge.net/
I haven't timed it to see how well its been doing in the 6 years I've had it though.
I would like to keep my shoes on and be able to take a 2L through the checkpoint.
I believe the legal term is tortious interference and Facebook could pursue civil action for it. Possibly even pursue criminal action under the CFAA by arguing it is still unauthorized access despite the fact that the password was disclosed.
"Tortious interference with contract rights can occur where the tortfeasor convinces a party to breach the contract against the plaintiff, or where the tortfeasor disrupts the ability of one party to perform his obligations under the contract, thereby preventing the plaintiff from receiving the performance promised."
Fun Fact: The MS Exchange team thought this was hilarious and named their blog msexchangeteam.com
Ugh, I worked at a place that was still running P4s, that should have set off alarm bells in my head.
It occurs to me that someone may not even have been in HS yet when the game was announced, graduated from HS, gotten a college degree, and could now be working on DNF.
I'm well prepared for the zombie apocalypse.
Ah the old NSA DES conspiracy theory. The NSA suggested two changes to DES: 1) shorten the key 2) changed the S-boxes. They gave no public explanation for the latter and for years the story was that this somehow introduced a backdoor into the algorithm. The truth came out over a decade later:
"Some of the suspicions about hidden weaknesses in the S-boxes were allayed in 1990, with the independent discovery and open publication by Eli Biham and Adi Shamir of differential cryptanalysis, a general method for breaking block ciphers. The S-boxes of DES were much more resistant to the attack than if they had been chosen at random, strongly suggesting that IBM knew about the technique in the 1970s. This was indeed the case; in 1994, Don Coppersmith published some of the original design criteria for the S-boxes. According to Steven Levy, IBM Watson researchers discovered differential cryptanalytic attacks in 1974 and were asked by the NSA to keep the technique secret."
Of course, they could still be lying, better keep the tinfoil hat on.
From the TFO (the fraking order):
In this Third Report and Order ("Order"), we remedy shortcomings in our CableCARD rules in order to improve consumers' experience with retail navigation devices (such as set-top boxes and digital cable-ready television sets) and CableCARDs, the security devices used in conjunction with navigation devices to perform the conditional access functions necessary to access cable services.
Maybe they should get around to actually implementing the provisions of the Telecommunications Act that requires the cable system to be open to innovation!
Call me when I can watch digital cable through a non-crippled device. Then I might be willing to subscribe to it again.
In theory, a SAM classified as a destructive device and you could buy one with the right ATF paperwork.
ICANN considered this option, but decided that it didn't extend the deadline out far enough to be worth the costs.
http://blog.icann.org/2008/02/recovering-ipv4-address-space/
So Michigan is the new middle east, eh?
If the facts don't fit the theory, change the facts. -- Albert Einstein