GeorgeBMac

About

Banned
Username
GeorgeBMac
Joined
Visits
130
Last Active
Roles
member
Points
11,556
Badges
1
Posts
11,421
  • Bill Maher declares Apple CSAM tools a 'blatant constitutional breach'

    tedz98 said:
    The general public has no understanding of what a file hash is. So the techies at Apple have no understanding of how the general public perceives what they are doing. They just think Apple is scanning their phone. I’m not a huge Bill Maher fan, but I agree with him here. It’s a slippery slope that Apple is embarking on.
    I rarely ever post but as a dad of 3 I’ve got to voice up. I 100% agree this is a slippery slope and hate any twitch that could lead to infringing on rights but I think this discussion could involve more watchdogging since we’ve got the tech to minimize pedos. I don’t trust humans as far as I can throw them but there should be a transparent solution to allow CSAM but with a lot of scrutiny to ensure it’s limited to just that. I see the argument from both sides but at the same time I think we can all agree efforts should be made to protect our kids somehow and I believe most if not all beliefs can unite to defend both sides of using the tech and making sure engineers don’t abuse it into anything. I don’t have a solution for this but there’s a lot of intelligence on these boards which is why I’m bringing it up. 
    You just nailed the single biggest benefit to democracy and a free press:  Decisions (whether by government, private industry or even private individuals) that impact society are discussed and debated.

    Is this a great idea to protect kids?  Or is it slippery slope that will have unintended consequences and collateral damage?
    And, who decides?

    Maher's position and the responses to it show that few have the answer -- or is it everybody has AN answer?

    emig647sagan_studentbaconstangDetnator
  • T-Mobile says 5.3M more customers affected by breach, IMEI data stolen

    I was apparently one of those whose data was hacked.  I got this message from T-Mobile last evening:

    "T-Mobile has determined that unauthorized access to some of your information has occurred, like name, address, phone number, and DOB.  Importantly we have NO information that indicates your SSN, personal financial or payment information, credit /debit card information, account numbers or account passwords were accessed. .... [the rest is "Don't worry, be happy - we love you and care about you" nonsense]".

    Critically, they made no mention of IMEI numbers.

    All of this supports the question here in this article about how this might impact 2 factor security.
    While I always welcomed vendors who use it I think Chase has the best method:  When logging in on a browser, they don't let you in until you log on to their mobile app -- it's one step beyond 2 factor authentication.
    caladanian
  • Google shuts down unified health division as chief leaves company

    While mobile, digital, and home based monitoring may be the key to promoting American health, Electronic Health Records collect the profit.

    So, despite Google's wealth, Cerner, backed by their EHR profits could likely offer this guy far more.

    Why?  While they have failed the nation and the people miserably, EHRs help insure the profits of the medical industry because, medical systems have full, easy, cheap access to a person's private health information as well as cheap, easy access to data for billing.
    A prime example of how they have failed us:  Despite almost all health care information being stored in electronic records, public health agencies are still using paper, pencil, spreadsheets and fax machines to report and monitor the spread of the Corona virus.  Another area where they have failed is in the use of epidemiologic studies that could reform the broken healthcare system but where they are seldom, if ever, used.

    The one area where they have helped is the near elimination of hand written, nearly indecipherable physician orders that left much to the expertise and imagination of the person executing those orders.



    Alex_Vdanox
  • Future Apple keyboard could have one key that can pop out and be used as a mouse

    IBM Thinkpads had this over a decade ago:   a little red button squeezed between the G-H-B keys that could manipulate the cursor.
    I think they call it a "TrackPoint" or something like that.   I never use it.  The trackpad or mouse is much easier.
    darkvader
  • Apple applied list of terms censored in China to Taiwan & Hong Kong

    xyzzy01 said:
    Why would these apply to Taiwan?

    While China would love to remove democracy from them, it's still an independent island - and after how China has been going on in Hong Kong, they're obviously not going to tempt Taiwan into trying "one country, two systems" as China pretended to allow earlier.


    That's bullshit.
    Taiwan is an automous region, not an independent nation.
    China would be happy to leave it as an autonomous region -- unless the west forces its hand with its standard 'freedom and democracy" line that it used to justify the invasion of Iraq.  Then it will end that just as it did in Hong Kong when the west incited separatist insurrection on that island.
    cornchip