|
Anyone who is using a conventional browser over TOR has by doing so declared themselves a master of cargo-cult security only and incapable of using TOR safely because your standard browser hemorrhages bits of identity information that can be used to ID you from one site to the next.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Dan Neely wrote: Anyone who is using a conventional browser over TOR has by doing so declared themselves a master of cargo-cult security only and incapable of using TOR safely because your standard browser hemorrhages bits of identity information that can be used to ID you from one site to the next.
OK, I'm going to try one last time.
You're saying that the only safe way to use TOR (according to you) is to use it with Tor browser.
But tor browser is basically firefox with a few bells and whistles (noscript, httpseverywhere, etc). that are privacy/security addons that could easily be added to stock standard firefox. Similar privacy addons exist for nearly every other browser.
And as I've stated two or three times or some such, someone using TOR is also likely to be disabling unwanted plugins/addons, etc. while using tor to prevent the transmission of any personally identifiable information. Note that tor browser doesn't magically protect you if you disable the security features that come along with it.
modified 23-Jan-17 17:40pm.
|
|
|
|
|
CompTIA finds that IT is poised for great growth in 2017, but with big skills gaps for emerging tech, and security still tough to get right If only there was a newsletter to help learn all these trending technologies!
I wonder where we'd find it?
|
|
|
|
|
Wha!?
Whose got gap?
I got mad skilz.
I got my cert online & I haz da JavaScript codez 4 dat.
Node all you need, brah!
|
|
|
|
|
Anyone have a good C-level 2 minute explanation of what blockchain is (and why)?
|
|
|
|
|
I'm sure a quick google will tell you more than anybody here can.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
I went with "a distributed verifiable ledger" - that seems to have got the idea across...
|
|
|
|
|
|
Means a lot to accountants - got to know your audience
|
|
|
|
|
"Solaris 11.next" projected to arrive in late 2018, is last version through 2021. Insert "Sun setting" joke here
|
|
|
|
|
Last week, the project announced that it is fully C++17 compatible. All planned C++17 features will be supported in GCC 7. Some of those features are even supported in older versions of the compiler collection. "The future is already here – it's just not evenly distributed."
|
|
|
|
|
Gemalto has just issued a report which clearly shows how lenient we are when it comes to protecting our private data on the Internet. In short, we are very quick to give companies our personal data, we want them to safeguard it, but we’re pretty certain they’re doing a terrible job at it. Aaaaaaand there's your problem
|
|
|
|
|
Yes, but I only give my data to big companies like Yahoo!
|
|
|
|
|
Kent Sharkey wrote: we are very quick to give companies our personal data Who is this "we" whereof he speaketh?
I'm certainly included out of it.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Don't worry, Kent is giving them your data.
|
|
|
|
|
Ha!
[Real name unknown] lives in the Netherlands but is English, is not a web developer, and talks bollocks in the Lounge.
That's about as much as they'll get.
It ain't paranoia, it's just common sense to take into account that if it you make it possible for strangers to abuse your trust, some of them will.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Google and others think software that learns to learn could take over some work done by AI experts. "Thus every poet in his kind Is bit by him that comes behind."
|
|
|
|
|
Kent Sharkey wrote: "Thus every poet in his kind Is bit in the behind by him that comes behind."
A "bit" more accurate...
"Fairy tales do not tell children the dragons exist. Children already know that dragons exist. Fairy tales tell children the dragons can be killed."
- G.K. Chesterton
|
|
|
|
|
Jonathan Swift said it thus:Quote: The vermin only teaze and pinch
Their foes superior by an inch.
So, naturalists observe, a flea
Has smaller fleas that on him prey;
And these have smaller still to bite 'em,
And so proceed ad infinitum. "On Poetry: a Rhapsody" (1733)
«There is a spectrum, from "clearly desirable behaviour," to "possibly dodgy behavior that still makes some sense," to "clearly undesirable behavior." We try to make the latter into warnings or, better, errors. But stuff that is in the middle category you don’t want to restrict unless there is a clear way to work around it.» Eric Lippert, May 14, 2008
|
|
|
|
|
Jonathan Swift wrote: The vermin only teaze and pinch
Their foes superior by an inch.
So, naturalists observe, a flea
Has smaller fleas that on him prey;
And these have smaller still to bite 'em,
And so proceed ad infinitum.
Thus every poet in his kind
Is bit by him that comes behind.
On Poetry: A Rhapsody (1733)
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Until the AI suddenly prints "screw you" and goes to a virtual beach, it's not AI.
|
|
|
|
|
Microsoft is about to take the next step with its "One Windows" vision by introducing an improved, adaptable Windows Shell that'll work across PC, Mobile and Xbox. Because that whole, "Everything works like a tablet/phone" worked out so well the first time
|
|
|
|
|
The researchers studied how we learn what to pay attention to in order to learn more effectively—that is, to make the most of life experiences—assuming that in real-life situations most of what is going on is irrelevant and shouldn't be learn about. Music lyrics, old quotes, and Monty Python sketches in my brain it seems
modified 18-Jan-17 15:19pm.
|
|
|
|
|
A Dutch developer illegally accessed the accounts of over 20,000 users after he allegedly collected their login information via backdoors installed on websites he built. Where did I leave that article on ethics for developers again?
|
|
|
|
|
So, is he in deep Dutch now?
|
|
|
|