Snowden docs have been available for years. ShadowBrokers. Just this week a 20GB dump of private Intel source was dumped with backdoors included. It is beyond a reasonable doubt that x86 hardware has NSA backdoors in it. You're now sitting on a time bomb.
Remember when the NSA tools were dumped with their secret Windows exploits? WannaCry? North Korea picked that up and launched ransomware attacks. That's the sort of thing that's going to happen again with the newly published Intel backdoors. Just wait and see. Tim Cook is 100% vindicated this week about not adding intentional iPhone backdoors.
I don't remember WiFi or CPU backdoors in Snowden, ShadowBrokers, or Intel 2020. Unless by "backdoor" you just mean NSA holds zero days on various important technologies, which is reasonably likely given EternalBlue. Is that what you mean?
They don't need 0days when they can just easily corrupt the standards process. They've been doing it everywhere.
The Wifi Alliance has made some heinously bad choices that if you attributed to incompetence simply make no sense, they treat anyone who questions them with disdain and shoots down attempts to fix the mess they make. WPA3 was hilariously broken a month after getting rolled out.
> Just this week a 20GB dump of private Intel source was dumped with backdoors included.
> That's the sort of thing that's going to happen again with the newly published Intel backdoors.
This is not even remotely true. You have to read more than just the headlines.
> Anyone on WiFi AC or up are backdoored right now by NSA. All of them are compromised, no doubt in my mind. All the LTE. All the x86 hardware on the market. All of it.
Extraordinary claims require extraordinary evidence. Please provide some.
there is proof that NSA has been mass hacking WiFi since at least 2005. that batch of Snowden leaks came out one week after the Shadowbroker's first leak.
NSA programs SECONDDATE and BADDECISION were used to mass hack into WiFi routers in Iraq in 2005-2007. note the slides say NSA breached the WiFi routers of EVERY INTERNET CAFE IN IRAQ. that is the Collect-It-All scale we expect from NSA.
also note, NSA did this FROM THE SKY! SECONDDATE is a sensor installed in Cessna and low flying planes. NSA flew over every WiFi hotspot of every Internet cafe in Iraq and deployed the BADDECISION exploit to install implants on the WiFi routers to then mass surveil everyone.
no futher leaks about BADDECISION have come out. we dont know if it is a protocol attack or crypto exploit. we dont know if WiFi is still vulnerable to BADDECISION.
how much do you want to bet that NSA only used SECONDDATE and BADDECISION in Iraq and NOT back here at home in America?
how much would you bet that NSA is NOT bulk hacking WiFi routers of ENTIRE US CITIES FROM THE AIR?
consider how much cheaper and easier that would be now in 2020 compared to 2005?
Interesting article, but I think you're way over drawing your conclusions.
> how much would you bet that NSA is NOT bulk hacking WiFi routers of ENTIRE US CITIES FROM THE AIR?
I would bet very good money that they are not doing this. If SECONDDATE has been around since 2005, and they are bulk installing it on millions of routers in the US, where are the people coming out saying "I found some NSA shit on my router"? Is there a _single_ example to support this?
those FBI planes are equipped with DRTBOX's--cell site simulators and wifi interception sensors.
in the TAO ANT Catalogue leaked by Snowden, it shows NSA SECONDDATE is manufactured by Harris.
Harris also makes DRTBOX, and Stingray.
wanna bet FBI is using DRTBOX in exactly the same way NSA used it in Iraq? wanna bet NSA is actually helping FBI run this little domestic program?
why would NSA and FBI surveill all US cities from the sky? because you dont need a warrant or even a subpoena. "reading the air" is free--it's public space with no expectation of privacy. and radio signals you emit through your phone or wifi router are also public space.
but what is FBI and NSA's endgame to run a real-time monitoring program over US cities?
back in 2004-2008 in Iraq, the Pentagon deployed something called GORGON STARE. it stiched together the video feeds from all drones and jets and satellites into a composite video watching entire cities.
> Anyone on WiFi AC or up are backdoored right now by NSA. All of them are compromised, no doubt in my mind. All the LTE. All the x86 hardware on the market. All of it.
Still _zero_ evidence of any of this. Why not post some?
You also ignore questions like..
> If SECONDDATE has been around since 2005, and they are bulk installing it on millions of routers in the US, where are the people coming out saying "I found some NSA shit on my router"? Is there a _single_ example to support this?
> Just this week a 20GB dump of private Intel source was dumped with backdoors included.
> That's the sort of thing that's going to happen again with the newly published Intel backdoors.
>> This is not even remotely true. You have to read more than just the headlines.
> If SECONDDATE has been around since 2005, and they are bulk installing it on millions of routers in the US, where are the people coming out saying "I found some NSA shit on my router"? Is there a _single_ example to support this?
Heh, look up "vacuum cannon" on youtube. The tunnel would need to be slowly depressurized, otherwise anything in it would turn into a bullet when the atmosphere rushes in.
This also applies to any sort of failure that compromises the vacuum. A dipshit with a rifle could kill anybody in the system in a fraction of a second. Burying the tubes is probably the only way to avoid this, but thankfully the whole thing is vaporware anyway.
You don't need a full vaccum. Even half an atmosphere would greatly reduce air resistance and allow for 4x the velocity in 1 atm.
Humans can survive (uncomfortably) at .5 atm and you eliminate the vacuum cannon problem simply by putting pressurization valves periodically throughout the tube.
Hyperloop is not a full vacuum, only partial vacuum if I'm not mistaken. I don't know what kind of difference that would make on pressure but I assume that means that the tubes are not air tight and actually breathe.
Hyper-loop requires 99.99% of the air to be removed from the tube, so it is complete vacuum from the lethality / safety and structure / pressure perspective.
I am not sure what do you mean by 'ubes are not air tight and actually breathe', but they definitely are not air permeable.
> This being any faster than Pandas is a huge compliment to Julia the language in general and its JIT compiler in particular.
Indeed. This 'whole stack under the same language' is an important feature to have. You get to reap the advantages of an improved JIT. End to end autodiff is easier. Some of these things are a problem, for example, in PyPy because of the Python <-> C bridge.
I think what author said is explained in the article, as that such approach undermines small businesses which provide informational services. They won't be able to hire data analysts and researchers anymore, hence quality of information in info boxes will decline as information gets outdated. In other words Google is stealing data presenting as it's own taking all the benefits of embedding ads data
The consumer is harmed because there is no one incentivised to create new content, or at least the incentives are severely diminished.
In the story here the celebrity net worth data had to be created and this was worth doing due to the ad revenue. Making the existing data available to consumer is a benefit but the negative is the lack of new content. So now consumer have easier access to old, inaccurate data.
There are far more devices running Linux in the world than Windows & macOS combined. That would seem to be a much more useful comparison than how many people own those devices.
Parent post was updated to say "not counting servers and embedded", but dismissing smartphones -- literally the most popular type of personal computing device in the world -- this way seems to completely invalidate the point.
The parent thread was about possible backdoors; more devices running a piece of software = more surface area for any possible backdoor in that software.