We have a President right now that is acting like a Dictator! Stepping all over the constitution. If he doesn't get what he wants from Congress, well He has a Pen & a Phone and can just do whatever he wants anyway!!!
The President is part of the executive branch which has constitutional powers and responsibilities that are not subject to the approval of Congress. That's the "separate but equal" part of the Constitution.
The President is part of the executive branch which has constitutional powers and responsibilities that are not subject to the approval of Congress. That's the "separate but equal" part of the Constitution.
Why not stop rattling off textbook answers and actually respond to what anyone is saying?
Can we expect you to do that, or would that be a foregone conclusion?
From the story: "Pentagon technology security officials in 2011 opposed a joint venture between General Electric and AVIC over concerns that U.S. fighter jet technology would be diverted to AVIC’s military aircraft programs. The Obama administration ignored the concerns and instead has since promoted the systematic loosening of technology controls on transfers to China."
LOL…already resorting to the tactic of claiming that I'm not making a valid argument?
Make any argument whatsoever and then we’ll asses its validity. Again, you’re not even responding to what people are saying. You’re just rattling off what a textbook would say about the working of the government.
Why not stop rattling off textbook answers and actually respond to what anyone is saying?
Can we expect you to do that, or would that be a foregone conclusion?
When the text book holds the right answer, why should he avoid presenting it? The belief by people who don't like the current President (at any particular time) is that the President is abusing their power. It is remarkable how people align the world to their beliefs and are only able to see the person they don't like doing things they don't agree with.
It is weird and you have to wonder what computers this guy thinks the Military is using. Most of the military is using consumer or business grade laptops that average 2-3 years old just like every other major enterprise in the world. When you get into embedded systems and computers used in the field, the technology is actually older and less powerful. If he is talking about supercomputers used by the NSA and others, he missed the point.
Make any argument whatsoever and then we’ll asses its validity. Again, you’re not even responding to what people are saying. You’re just rattling off what a textbook would say about the working of the government.
That's a bit of a whopper coming from someone who posted a response earlier in the thread that simply said "The Fourth Amendment to the US Constitution is proof."
So, which developers are using the modified version of XCode. And how do we know if the malicious code with the backdoor has been installed in our devices? I might just have to purchase an iPhone and leave as is without installing any third party apps.
If the NSA hacks OS X' software update mechanism, any number of developers may use the wrong/hacked XCode, maybe even inside Apple, and all potentially without knowing.
Then, "the agency" is known to use companies as fronts for all sorts of activities, and they have plenty of funds: so they can fund/buy/bribe/coerce/blackmail any number of companies or individual developers of popular apps.
So provides Apple's iOS team isn't compromised, do not install any third party app if you value security.
Much better were if Apple would finally allow users root access on their own devices: that would make it possible to monitor the file system for unauthorized modifications, inspect running apps for unauthorized internet access, etc.
In a jailed device, security is only as strong as the trustworthiness of the vendor and his own security, or the coercion abilities of the government where the company is located.
Between the number of Apple developers, the Patriot Act gag-orders, potentially hacked 3rd party developers, etc. it's impossible to trust a closed off device one can't audit.
So while a jailed device may make it less likely for Joe Sixpack to fall prey to some social engineering phishing attack by some low-level criminals, it exposes everyone, including sophisticated users, helplessly to sophisticated hacking by advanced cyber criminals and government agencies.
It's time we get back the power over devices we paid for.
That's a bit of a whopper coming from someone who posted a response earlier in the thread that simply
said "The Fourth Amendment to the US Constitution is proof."
You see, the government has a set number of powers–things that they can legally do. These are written down explicitly in the Constitution. But the government has been increasing their number of powers without the consent of those they govern. They have also been ignoring the law and doing things they cannot legally do.
That better?
Originally Posted by Wovel
Look at the line above the last one and try not to let your head explode as you claim you didn't do what you just did .
Can you give me a direct link? Thread’s moving pretty quickly.
If the NSA hacks OS X' software update mechanism, any number of developers may use the wrong/hacked XCode, maybe even inside Apple, and all potentially without knowing.
It may be possible to hack an update caching server at a major developer and deploy the infected Xcode that way. I am not sure that would work though because I believe the end client still checks the validity of the package directly with Apple.
On another news .... Snowden revealed Larry Page & Vic Gundotra are already wide open to allow each and every agency worldwide have full access to their user's data! To return favor, they want spy agencies click on Ads and buy viagra online.
Comments
We have a President right now that is acting like a Dictator! Stepping all over the constitution. If he doesn't get what he wants from Congress, well He has a Pen & a Phone and can just do whatever he wants anyway!!!
The President is part of the executive branch which has constitutional powers and responsibilities that are not subject to the approval of Congress. That's the "separate but equal" part of the Constitution.
Why not stop rattling off textbook answers and actually respond to what anyone is saying?
Can we expect you to do that, or would that be a foregone conclusion?
From the story: "Pentagon technology security officials in 2011 opposed a joint venture between General Electric and AVIC over concerns that U.S. fighter jet technology would be diverted to AVIC’s military aircraft programs. The Obama administration ignored the concerns and instead has since promoted the systematic loosening of technology controls on transfers to China."
Why not stop rattling off textbook answers and actually respond to what anyone is saying?
Can we expect you to do that, or would that be a foregone conclusion?
LOL…already resorting to the tactic of claiming that I'm not making a valid argument?
That's a rather broad statement.
Make any argument whatsoever and then we’ll asses its validity. Again, you’re not even responding to what people are saying. You’re just rattling off what a textbook would say about the working of the government.
When the text book holds the right answer, why should he avoid presenting it? The belief by people who don't like the current President (at any particular time) is that the President is abusing their power. It is remarkable how people align the world to their beliefs and are only able to see the person they don't like doing things they don't agree with.
Because it isn’t an answer, as I literally just said.
And he is, as shown by the law.
It’s remarkable that you think anyone involved in this has that opinion, given that no one has stated as such.
It is weird and you have to wonder what computers this guy thinks the Military is using. Most of the military is using consumer or business grade laptops that average 2-3 years old just like every other major enterprise in the world. When you get into embedded systems and computers used in the field, the technology is actually older and less powerful. If he is talking about supercomputers used by the NSA and others, he missed the point.
Make any argument whatsoever and then we’ll asses its validity. Again, you’re not even responding to what people are saying. You’re just rattling off what a textbook would say about the working of the government.
That's a bit of a whopper coming from someone who posted a response earlier in the thread that simply said "The Fourth Amendment to the US Constitution is proof."
Look at the line above the last one and try not to let your head explode as you claim you didn't do what you just did
If the NSA hacks OS X' software update mechanism, any number of developers may use the wrong/hacked XCode, maybe even inside Apple, and all potentially without knowing.
Then, "the agency" is known to use companies as fronts for all sorts of activities, and they have plenty of funds: so they can fund/buy/bribe/coerce/blackmail any number of companies or individual developers of popular apps.
So provides Apple's iOS team isn't compromised, do not install any third party app if you value security.
Much better were if Apple would finally allow users root access on their own devices: that would make it possible to monitor the file system for unauthorized modifications, inspect running apps for unauthorized internet access, etc.
In a jailed device, security is only as strong as the trustworthiness of the vendor and his own security, or the coercion abilities of the government where the company is located.
Between the number of Apple developers, the Patriot Act gag-orders, potentially hacked 3rd party developers, etc. it's impossible to trust a closed off device one can't audit.
So while a jailed device may make it less likely for Joe Sixpack to fall prey to some social engineering phishing attack by some low-level criminals, it exposes everyone, including sophisticated users, helplessly to sophisticated hacking by advanced cyber criminals and government agencies.
It's time we get back the power over devices we paid for.
That's a bit of a whopper coming from someone who posted a response earlier in the thread that simply
said "The Fourth Amendment to the US Constitution is proof."
You see, the government has a set number of powers–things that they can legally do. These are written down explicitly in the Constitution. But the government has been increasing their number of powers without the consent of those they govern. They have also been ignoring the law and doing things they cannot legally do.
That better?
Can you give me a direct link? Thread’s moving pretty quickly.
"Check out the rack on her" is a broad statement.
Do women refer to each others’ ‘racks’ in that way?
It may be possible to hack an update caching server at a major developer and deploy the infected Xcode that way. I am not sure that would work though because I believe the end client still checks the validity of the package directly with Apple.
Broads do. May not women or at least ladies...
Actually it is a very secret organization, more top secret research is done there than you can imagine. Some of the top research minds work there.
On another news .... Snowden revealed Larry Page & Vic Gundotra are already wide open to allow each and every agency worldwide have full access to their user's data! To return favor, they want spy agencies click on Ads and buy viagra online.
I hear women refer to other women as "chicks" all the time, strangely enough. Even I never call a woman a chick.