For all the janky looking URLs I get from eggs that only have like twenty tweets, half of them janky looking URLs, I don't believe anything is trivial for Twitter's spam filters.
> Ironically, there's a Nissan car that does enable and disable the limiter based on the GPS detecting it being on a race track or not. But they're transparent about it.
That's so indescribably worse than just killing that process the mind boggles. Breaking in a simple, predictable, and detectable way vs. corrupting data and hoping (excuse me, "praying") nobody notices.
Spying on all of the email isn't simple either. When there's a will and a bottomless font of taxpayer money in the name of national security, there's a way.
I was going to facetiously suggest that if designers wanted to work on another ephemeral product, they should redesign the patterns printed on TP (first suggestion: chevrons indicating which direction to pull). Then I remembered http://www.getshitter.com/
Yes, this is pretty common for printers installed in service desks at the airport. However, they tend to not have overly-branded stock because in the irregular circumstances you tend to get a pass from a service desk, you might be rebooked on a different carrier, and would therefore have a mismatched boarding pass.
Usability. One time pads have been around forever, are provably secure, but a pain in the ass.
Modern symmetric ciphers solve the "you need to securely exchange as much key material as you wish to send data" using mathematical formulas to stretch key material. Asymmetric ciphers use mathematical formulas to fix "you need a secure way to exchange keys."
Unfortunately, the math can't be probably secure, only believed secure and proved insecure.
>Usability. One time pads have been around forever, are provably secure, but a pain in the ass.
With cell phones so widespread, I wondered why someone doesn't write a one time pad app. People could share gigabyte-sized pads via trusted wireless or a cable if they prefer.
The only reason to use one-time pads is an extraordinary level of paranoia. If you are paranoid enough to need a one-time pad then it makes little sense for you as a private citizen to trust that hardware you take into public places hasn't been compromised. Manual creation and transmission of the encrypted message is the only approach that makes sense.
If lots of people adopted one-time pads it might hinder NSA et al but this would be akin to trying to convince people to wear masks whenever they are in public to hinder monitoring with CCTV.
Re-ordering tokens in the Google Authenticator app is janky as hell too, and the only way you'll know if it's going to work is if the regular view switches to one with subtly different font sizes.
Authy's not without its rough edges, but it never looks that bad.
From down-thread, regarding Google Authenticator:
e.g. setting up 2-factor with MS with the same email you use for Google will overwrite the Google one unless you rename it.