"Longhorn is a tale of big ambitions, technical nightmares, and an extraordinary comeback,"
Nowadays the mantra seems to be "two out of three ain't bad."
40471 publicly visible posts • joined 16 Jun 2014
"I'd have thought it's pretty simple Mr Waltz; you're an incompetent fuckwit who typed the wrong phone number in, didn't validate the number, didn't validate the identity of the person you added"
It goes a step further. Apparently he's said he doesn't know Goldberg and yet must have had his number on his phone in order to issue a Signal invite to him.
"1 - use of unauthorised and clearly not well shielded messaging"
As it was CIA installed onto the devices it was authorised and technically well shielded. In practice its shielding depended on the users. Trump is now saying that Walz has learned a lesson. Most people would have thought that someone appointed as National Security Adviser didn't need to learn such basic security lessons and might wonder about the quality of his advice. However I'm sure he's being paid a lot so, as such things work at that level, it's expensive advice and so must be valuable.
It's a commendation that they realise its strength. However good any system might be it's no stronger than the human intelligence which controls it which in this case was .... shall we say pretty weak.
Of course the big question is how many more people were waltzed into the group that haven't been identified?
Legacy systems are the ones that run the enterprise and calling them that is the snake-oil salesman's method of getting them replaced. Once the new shiny has replaced them it instantly becomes "legacy" for the next salesman (who might even be the same salesman).
Ask Birmingham Council how the replacement of its legacy systems is going.
"The other is, companies that use the software may not want to donate / be associated with the software that they use for free. So their options are not to pay them, or to go via a 3rd party (support agreements) and hope that they actually contribute to the development via commits or contributions."
A few examples:
There are a number of Linux distros for which you can buy support or buy as supported from their maintainers, from Red Hat ans Suse down to Zorin. No problem there.
LibreOffice you can buy commercial support from the project website.
PostgresSQL's main site lists companies from whom you can obtain commercial support. A simple search through their lists includes many who state that they are contributors to the project. Some individual contributors are named.
This does not deny that there are individual developers who are unpaid but this situation now seems to be receiving attention.
It's all far removed from paying for a subscription for support and wondering if that support is going to break you system on the second Tuesday of the month.
The way it works is that you point out to somebody that they said something wrong. If they can accept that, they say "Oh, yeah" and move one. Some can't. Their only response is to downvote all your postings. Those downvotes mean that something you posted hit home because you were right and they were wrong. Cherish your downvotes.
You think so?
Synaptic lists 65,741 packages available of which I have 4,429 installed. The Devuan team may have modified some, but "most" would be beyond them. That includes KDE, various graphics editors including Gimp and Inkscape. There's QGIS there as well I ran apt upgrade to update Firefox only a few minutes ago.
It also includes the current LibreOffice which is not from any repository but the same .deb packages you can download for any distro that uses Debian packaging.
Then there are a few applications downloaded and installed by unpacking tarballs or running other, non-Debian install methods ranging from Seamonkey to the Informix database engine and tools.
There are a few which are compiled from source including Falkon and Pinta. The latter requires DotNet runtime and AFAIK that's not modified for Devuan.
Good try but I call bullshit.
My preference would for data on desk/laptop, sync with server at base. That leaves scope for data on device or a data-less device which will connect securely to the server when away from base according to use case. The latter has the option of being able to connect to alternative servers (unlike ChromeOS) so that if, for instance, the user were to be challenged at a border crossing it could be connected to a server which does not contain all the business's confidential data.
The back end should allow for versioning. Ideally the protocol between should be very selective to allow only the correct formats of data to be handled*. A network that allows executables to be handled as if they were data allows for transmission of malware through the network, particularly onto the server, and, of course, a network which allows files to be overwritten with anything is open to ransomware trashing them.
* I'm influenced partly by years of working with an RDBMS where, although we didn't take advantage of it, it would have been perfectly possible to have the server talk to the network via just the port that was assigned to the server and the server understanding nothing other than its own protocol. The other inspiration is using XML. A server designed to provide versioned storage of XML would be able to reject anything that wasn't well-formed and validated according to the schemas it was meant to handle - such as, say, the flat file versions of the Open Document files.
"a German desktop (according to Dr. Syntax)"
Not just according to me: "KDE is legally represented by KDE e.V. based in Germany, which also owns the KDE trademarks and funds the project." according to https://en.wikipedia.org/wiki/KDE which will also tell you it was founded by Matthias Ettrich when he was a student at Tübingen. For added Europeanness it uses the Qt framework from what was originally Trolltech which takes us back to Finland.
For a server they could also use Nextcloud from Nextcloud GmbH, i.e. based in Germany as is the Document Foundation, responsible for LibreOffice. I believe Collabora in Cambridge are major contributors to both of these but, of course FOSS development knows no boundaries.
Not an alternative but an additional step. If the law has been broken prosecute those who did so. Having made examples of a few making it clear that anyone subsequently found in possession of the data will not only be prosecuted under the original offence, they will also be in contempt of court.
Unfortunately it's not likely to happen for the next 4 years.
Punters are sick of being told "99% coverage of UK" when it's clearly not
It's exactly the same as FTTP being pushed when there are still areas with crap FTTC (and very likely some still stuck on ADSL).
The supply side is intent on producing and pushing newer tech while the delivery side is failing to complete roll-out of the previous generation and regulators are failing to hold delivery to the universal provision requirement.
I've said a number of times that the reason politicians don't see problems with backdoored communications is that they don't believe security is possible. They don't believe it because given a technically secure channel for a group of them to use one of them will leak the contents anyway. QED.