HP cartridges
I wondered about that too. If they are looking into helping out people with aggressively stupid quantities and pricing, they'd be helping out a lot more people by going after the OEMs who sell the ink for $2300 a gallon.
22 publicly visible posts • joined 4 Nov 2013
"The second-largest city in the US says that while it "thwarted" the attack, it is warning some residents that their personal information may have been exposed, and it's offering free identity protection services to the affected people."
Is there some sort of alternative California dictionary at work here?
I think if Verizon had sense they'd simply walk away. I don't think it's a question of it being one or two billion dollars less. It's the potential other pitfalls a legacy of incompetent management is going to bring.
Lastly, I doubt that there are even 100 million, real, current users of Yahoo.
So the email stating it was "legitimate" was widely derided as being stupid. And that's because it's a "typo" and not a stupid mistake? Some large helping of benefit of the doubt is being heaped here. Seems the more sensible explanation is that Delevan was duped by the phishing mail too.
Setting that aside though, the "Russians" didn't create the very real, very damaging information that was there.
Our Liberal Government here in Canada has taken to online polling as a means of providing some political cover for what they were planning to do anyway. It theoretically makes people feel all warm and fuzzy that they're being "consulted".
Of course it's worded like garbage, with leading questions. But it doesn't matter, since the results will in no way be public, or audited, or even likely read.
Hey, here's our new law, you told us it was what you wanted.
" As a chemist you should be doing what you did at university, READ."
The original article seemed to imply that it was a deliberate formulation decision, rather than inadvertent trace amounts used in tallow lubricants.
"there is a trace of tallow in the polymer pellets used in the base substrate...."
So, an even more ridiculous matter then.
But adding oddball things to the formulation isn't that insane. Back in 1991 the Bank of Australia had a polymer note, and the three resins used were chosen for being harder to identify specifically by analysis, when blended. So I was wondering if it was something more than "it's what we use to wax the pellet chutes". The University lab I was working in was contracted by the mint to see how easy it was to reverse engineer. The answer was still extremely easy if you have access to high grade analytical equipment.
"So why have we built a world where the security measures are hard for the average person to deal with? Things are really broken and the bad people are having a field day."
I think the problem is one of perception. People aren't placing a high enough mental value on their digital accounts. Nobody needs to remind anyone to lock their door or car, because the loss would be immediate and tangible. Yet few complain of the hassle of carrying around a set of keys.
Realistically, it might take identify theft, money theft, or some other personal disaster for most to take their online accounts more seriously.
"and a focus on doing what is right."
Is this new? Because the only reason people know who the hell you are is because you participated in a wildly illegal, and certainly unethical, scheme that materially harmed thousands of workers, and actually fired someone for a minor breach of your illegal policy in order to placate Steve Jobs.
"Samuelson added "He will be very unhappy if the conclusion is that he is the winning party here, he doesn’t see it like that at all: he wants to clear his name.""
Yeah, I too smell an odour of BS from that statement. You weren't "clearing your name" hiding out in a foreign embassy to duck extradition.
.. Don't worry at all if your password was complex enough? That's the takeaway I get. Is that wrong? Mine is 15 characters with all different types and not dictionary. I am aware of no breakthrough in GPUs or what-not that can realistically bust that before I am too dead to care.
I operate under the assumption that a hacker will have access to the hash database at some point. For every "breach" that's announced, how many happen that the company is either unaware of, or never cops to?