As soon as gays and lesbians can have children without scientific intervention, they can get married, until then, they can be lovers/friends/partners, but not married – that is reserved by definition for couples that can, under normal circumstances, conceive children for the survival of the human race.
“Modern country [music]“, isn’t that an oxymoron?
Considering most, if not all, country music played on the radio today is little more than rock/pop with a southern accent and possibly a violin (sorry, fiddle), on occasion, I’d say it’s not. I like all kinds of music. But solid body guitars with heavy distortion don’t mix well with what I consider to be country music. It’s kind of like adding a theremin to an a cappella group. Hell, the Eagles would be considered country music by today’s standards.
That period in the history of our universe may have been warm, but I imagine that, at the time, the average hospitable planetary surface would have been pretty dark. After all, if the Goldilocks zone is what you get without having a nearby star at all, then having a star nearby would make things too hot. So, any planetary surface suitable for life to evolve on would have been a necessarily dark place.
The TextSecure Protocol
TextSecure’s upcoming iOS client (and Android data channel client) uses a simple trick to provide asynchronous messaging while simultaneously providing forward secrecy.
At registration time, the TextSecure client preemptively generates 100 signed key exchange messages and sends them to the server. We call these “prekeys”. A client that wishes to send a secure message to a user for the first time can now:
Connect to the server and request the destination’s next “prekey.”
Generate its own key exchange message half.
Calculate a shared secret with the prekey it received and its own key exchange half.
Use the shared secret to encrypt the message.
Package up the prekey id, the locally generated key exchange message, and the ciphertext.
Send it all in one bundle to the destination client.
The user experience for the sender is ideal: they type a message, hit send, and an encrypted message is immediately sent.
The destination client receives all of this as a single push notification. When the user taps it, the client has everything it needs to calculate the key exchange on its end, immediately decrypt the ciphertext, and display the message.
With the initial key exchange out of the way, both parties can then continue communicating with an OTR-style protocol as usual. Since the server never hands out the same prekey twice (and the client would never accept the same prekey twice), we are able to provide forward secrecy in a fully asynchronous environment.
This is an insightful post. I’m persuaded that it’s possible to try to teach this too early, before some foundational knowledge has been instilled. But I’m not sure that it’s necessary to delay until the first term of a college, especially since everyone would benefit, not just those that end up going to college. I would support a mandatory course in senior high school year, with some of the principles being touched upon in science classes before that.
Back then, the early pioneers were not at all motivated by money. Our gratification was to share ideas with each other, do good technology and have others use it.
New York University has dropped claims that blind Chinese dissident Chen Guangcheng was given iOS devices pre-loaded with spyware by a supporter on his arrival at the uni last year.
A joint statement from NYU and the accused aid organisation claimed that the allegations had been made “in good faith” but were based on a “misunderstanding of the technology”.
Self-trained lawyer Chen made a dramatic night-time escape from house arrest in April 2012, eventually holing up in the US Embassy in what became a major diplomatic incident between Beijing and Washington.
He was eventually allowed to leave and was given the use of a Greenwich Village apartment and a fellowship at NYU, studying under professor Jerome Cohen.
However, things turned rather sour for Chen in June when NYU announced he would be leaving the uni after just a year.
It claimed his fellowship was only ever meant to last one year but Chen publically criticised the institution, arguing that it had bowed to pressure from the Communist Party as it tried to establish a lucrative Shanghai campus.
Soon after, Chen’s mentor Cohen claimed that an iPhone and iPad given to Chen on his arrival to help him keep in touch with family back in China, had been loaded with spyware.
The fanboi gadgets were given to Chen by religious activist and ChinaAid founder Bob Fu and his wife Heidi Cai, who denied the allegations as “ridiculous”, and that all that had been added to the devices was a Skype account.
The joint statement from China Aid and NYU released on Monday now appears to settle the matter.
It has the following:
Professor Cohen and NYU have confirmed that, contrary to media reports, an iPad and iPhone given to Mr. Chen by China Aid contained no software designed to monitor communications or spy on Mr. Chen. Professor Cohen and NYU regret that media reports may have had any negative impact on Bob Fu, his wife Heidi Cai, or China.
Chen was imprisoned and then held under house arrest for years before his escape for defending local residents in Shandong from various abuses in the Party’s infamous one child policy. ®
A Chinese hacking group managed to penetrate the networks of five European Union member states in advance of last year’s G20 Summit in a likely bid to lift data on the Syrian crisis, according to FireEye.
The security firm told Reuters it monitored the classic targeted attack campaign for around a week in late August 2012, ahead of a summit dominated by the escalating civil war in Syria.
During that time spear phishing emails with malicious file attachments with titles such as “US_military_options_in_Syria” successfully breached the systems of five unnamed foreign ministries, it said.
Unfortunately the hackers jumped to another CC server shortly before the September summit, losing their tail, but FireEye said it believed they were just about to begin exfiltrating data.
The group, nicknamed “Ke3chang”, has apparently been around for several years although this represents its official public outing. It’s suspected it may have previously targeted the G20 Finance Ministers meeting in Paris in 2011.
FireEye researcher Nart Villeneuve told the newswire that pretty compelling evidence links the group to China, including the language used on the CC server and the type of machines the group employs to test its malware.
However, as always, there are no hard links back to the Chinese government, which maintains it is a victim and not a perpetrator of cyber crime – even post-Mandiant’s APT1 revelations.
What the US, and the info-security community, really needs is a whistleblower behind the Great Firewall to even things up a bit. ®