Name: Anonymous 2014-12-03 12:55
Never waste a single cycle
disadvantage is portabilityyou know relevant systems of today all run x86 and other support it through emulation. So you can see, that x86 will always be supported, even 100 years in future.
For instance using a lexer and parser generator is more maintainable (read: easier to modify after it's written) than using a hand written lexer and parser.Bullshit.
In addition to the main site address, the court banned around 20 mirror websites and 50 proxy servers that allow users to download content from the Swedish site.
However, there has been some criticism of the encryption. The announcement raised the ire of FBI Director James Comey, who complained in late September, saying it would hinder law enforcement operations.
"There will come a day – well it comes every day in this business – when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper's or a terrorist or a criminal's device,” he said. “I just want to make sure we have a good conversation in this country before that day comes.”
“I'd hate to have people look at me and say, 'Well how come you can't save this kid,' 'how come you can't do this thing.’”
“Law-enforcement investigators are seeking the additional powers to better track and investigate criminals who use technology to conceal their identity and location, a practice that has become more common and sophisticated in recent years. Intelligence analysts, when given a warrant, can infiltrate computer networks and covertly install malicious software, or malware, that gives them the ability to control the targeted device and download its contents.”
“Our ability to act on data that does exist… is critical to our success,” Hosko said.
However, although Apple users will be happy to know their information is better protected than ever, forgetting a password could prove to be an even greater nightmare than any government intrusion of privacy.lol
Niki Christoff, Google’s spokeswoman, said the company has offered encryption on Android devices for over three years, but few users knew how to use the feature.
“As part of our next Android release, encryption will be enabled by default out of the box, so you won’t even have to think about turning it on,” said Christoff, as reported by the Washington Post.
The whistleblower has a list of FinFisher surveillance software buyers. Among the German malware developer’s clients are intelligence agencies and police forces from Australia, Bosnia, Estonia, Hungary, Italy, Mongolia, the Netherlands, Pakistan and Qatar.
“The police generally may not, without a warrant, search digital information on a cell phone seized from an individual who has been arrested,” the Supreme Court ruled.wow this is surprising.
“It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked,” Comey, speaking at the Brookings Institute in Washington DC, referred to the encryption technology calling the new service “a marketing pitch.”
“But it will have very serious consequences for law enforcement and national security agencies at all levels,” he warned.
“Criminals and terrorists would like nothing more than for us to miss out,” Comey said, adding that encrypted information on “a bad guy’s phone has the potential to create a black hole for law enforcement.”
"Justice may be denied because of a locked phone or an encrypted hard drive," he said.
“Some believe that the FBI has these phenomenal capabilities to access any information at any time—that we can get what we want, when we want it, by flipping some sort of switch,” he said. “It may be true in the movies or on TV. It is simply not the case in real life.”
The FBI director would like to see changes made to the Communications Assistance for Law Enforcement Act, or CALEA, “enacted 20 years ago—a lifetime in the internet age.”
Companies like Apple or Google, should be required to build lawful intercept capabilities for law enforcement, Comey says.
“We aren’t seeking to expand our authority to intercept communications,” he said. "We are struggling to keep up with changing technology and to maintain our ability to actually collect the communications we are authorized to intercept.”
CALEA only covers landline and cellphone companies, broadband services or internet phone services, which connect with traditional phones.
“We also need a regulatory or legislative fix,” Comey said, “so that all communication service providers are held to the same standard.”