Jump to content

AndThenThereWas1

Member
  • Posts

    405
  • Joined

  • Last visited

Reputation Activity

  1. Like
    AndThenThereWas1 reacted to AresKrieger in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Here are the senate votes for the bill, I have some angry letters to write now as a New Hampshirite, as both of our senators voted for this crap
  2. Like
    AndThenThereWas1 got a reaction from TheRandomness in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  3. Like
    AndThenThereWas1 got a reaction from MarvinKMooney in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  4. Like
    AndThenThereWas1 got a reaction from Miguel Batista in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  5. Like
    AndThenThereWas1 got a reaction from elfensky in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  6. Like
    AndThenThereWas1 got a reaction from Common_Courtesy in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  7. Like
    AndThenThereWas1 got a reaction from Memories4K in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  8. Like
    AndThenThereWas1 got a reaction from WelshDdraig in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  9. Like
    AndThenThereWas1 got a reaction from Tech_Dreamer in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  10. Like
    AndThenThereWas1 got a reaction from UnknownEngineer in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  11. Like
    AndThenThereWas1 got a reaction from GoodBytes in Congress passes budget bill; Hidden inside was the Cybersecurity Information Sharing Act[Updated]   
    Last year lawmakers attempted to pass the CISA act, however due to a major backlash from the public and major organizations including Apple, Google, Microsoft, Amazon, Twitter and dozens more it failed to pass. 
    This year lawmakers hid the CISA act inside the budget bill and as of today the bill has passed congress and it is expected to be passed into law by the president later today. If the president chooses to veto the bill it will essentially lead to a government shutdown. 
     
    The problem with CISA is that is creates a backdoor for wiretaps. It allows "for government agencies to more easily keep tabs on Americans without their knowledge."
     
    That was CISA of 2014, CISA of 2015 is even worse than last year. Many provisions have been stripped out. This Years act:
     
    Lawmakers finally found a way to get CISA passed into law. By putting it into a budget bill they are forcing the president to sign it into law. Not doing so would cause a government shutdown and would withhold an astonishing 19.3 Billion dollars from NASA. It is astounding the lengths that lawmakers will go to to get what they want. 
     
    Update:
    The budget bill was signed by Obama on Friday afternoon. This includes the approval of the CISA act.

     
    Sources
    theVerge
    engadget
    Wired
  12. Like
    AndThenThereWas1 got a reaction from ian223 in The UK's Web Surveillance Program, Codenamed "Karma Police", Wants to Track “every visible user on Internet”   
    Snowden has done it again. Documents revealed by snowden show a UK spy program, codenamed "Karma Police", with a goal to track the browsing habits of "every visible user on the internet". The program taps into intercontinental data cables. Of the roughly 1600 cables in and near the UK they were able to "“survey the majority of the 1,600” and “select the most valuable to switch into [their] processing systems.”"-theintercept This method alone has given them access to as much as 25% of the world's internet traffic since 2009.
     

     
     
    The program gathers 50 billion pieces of metadata per day with a goal of 100 billion by the end of the year. It catalogs the user's visits to websites such as porn, social media and news websites, search engines, chat forums, and blogs. To do so it uses the user's ip address and other information such as emails, usernames, passwords, and cookies. "In the documents, GCHQ analysts called cookies "presence events" and "target detection identifiers" and lauded their value in uncovering specific Internet users' identities. They can be used to analyze "pattern of life"—when a person is usually online and where they connect to the Internet from. Some of the sites targeted specifically for covert cookie collection include Facebook, Microsoft Live, Amazon, YouTube, Reddit, WordPress, Yahoo, Google, the YouPorn adult video site, and news sites such as Reuters, CNN, and the BBC."-arstechnica.
     

     
    All collected data is sent into the "The Black Hole" where it awaits processing. Between 2007 and 2009 the black hole stored as much as 1.1 trillion pieces of metadata.

     
    The worst part is that unlike the NSA which is required to get FISA court approval for using metadata, the GCHQ program has almost no oversite and a loophole in the law means that they have free reign on how they want to use the metadata. 
     
    The GCHQ has used this system to gather data and then coordinate directed attacks. One such example was the SIM card manufacturer Gemalto. They used the gathered passwords to compromise the accounts of employees and they stole encryption keys in bulk from the company.
     
     
    Sources:
    theverge
    theintercept
    arstechnica
  13. Like
    AndThenThereWas1 got a reaction from mikeeginger in The UK's Web Surveillance Program, Codenamed "Karma Police", Wants to Track “every visible user on Internet”   
    Snowden has done it again. Documents revealed by snowden show a UK spy program, codenamed "Karma Police", with a goal to track the browsing habits of "every visible user on the internet". The program taps into intercontinental data cables. Of the roughly 1600 cables in and near the UK they were able to "“survey the majority of the 1,600” and “select the most valuable to switch into [their] processing systems.”"-theintercept This method alone has given them access to as much as 25% of the world's internet traffic since 2009.
     

     
     
    The program gathers 50 billion pieces of metadata per day with a goal of 100 billion by the end of the year. It catalogs the user's visits to websites such as porn, social media and news websites, search engines, chat forums, and blogs. To do so it uses the user's ip address and other information such as emails, usernames, passwords, and cookies. "In the documents, GCHQ analysts called cookies "presence events" and "target detection identifiers" and lauded their value in uncovering specific Internet users' identities. They can be used to analyze "pattern of life"—when a person is usually online and where they connect to the Internet from. Some of the sites targeted specifically for covert cookie collection include Facebook, Microsoft Live, Amazon, YouTube, Reddit, WordPress, Yahoo, Google, the YouPorn adult video site, and news sites such as Reuters, CNN, and the BBC."-arstechnica.
     

     
    All collected data is sent into the "The Black Hole" where it awaits processing. Between 2007 and 2009 the black hole stored as much as 1.1 trillion pieces of metadata.

     
    The worst part is that unlike the NSA which is required to get FISA court approval for using metadata, the GCHQ program has almost no oversite and a loophole in the law means that they have free reign on how they want to use the metadata. 
     
    The GCHQ has used this system to gather data and then coordinate directed attacks. One such example was the SIM card manufacturer Gemalto. They used the gathered passwords to compromise the accounts of employees and they stole encryption keys in bulk from the company.
     
     
    Sources:
    theverge
    theintercept
    arstechnica
  14. Like
    AndThenThereWas1 got a reaction from Nup in The UK's Web Surveillance Program, Codenamed "Karma Police", Wants to Track “every visible user on Internet”   
    Snowden has done it again. Documents revealed by snowden show a UK spy program, codenamed "Karma Police", with a goal to track the browsing habits of "every visible user on the internet". The program taps into intercontinental data cables. Of the roughly 1600 cables in and near the UK they were able to "“survey the majority of the 1,600” and “select the most valuable to switch into [their] processing systems.”"-theintercept This method alone has given them access to as much as 25% of the world's internet traffic since 2009.
     

     
     
    The program gathers 50 billion pieces of metadata per day with a goal of 100 billion by the end of the year. It catalogs the user's visits to websites such as porn, social media and news websites, search engines, chat forums, and blogs. To do so it uses the user's ip address and other information such as emails, usernames, passwords, and cookies. "In the documents, GCHQ analysts called cookies "presence events" and "target detection identifiers" and lauded their value in uncovering specific Internet users' identities. They can be used to analyze "pattern of life"—when a person is usually online and where they connect to the Internet from. Some of the sites targeted specifically for covert cookie collection include Facebook, Microsoft Live, Amazon, YouTube, Reddit, WordPress, Yahoo, Google, the YouPorn adult video site, and news sites such as Reuters, CNN, and the BBC."-arstechnica.
     

     
    All collected data is sent into the "The Black Hole" where it awaits processing. Between 2007 and 2009 the black hole stored as much as 1.1 trillion pieces of metadata.

     
    The worst part is that unlike the NSA which is required to get FISA court approval for using metadata, the GCHQ program has almost no oversite and a loophole in the law means that they have free reign on how they want to use the metadata. 
     
    The GCHQ has used this system to gather data and then coordinate directed attacks. One such example was the SIM card manufacturer Gemalto. They used the gathered passwords to compromise the accounts of employees and they stole encryption keys in bulk from the company.
     
     
    Sources:
    theverge
    theintercept
    arstechnica
  15. Like
    AndThenThereWas1 got a reaction from Torand in The UK's Web Surveillance Program, Codenamed "Karma Police", Wants to Track “every visible user on Internet”   
    Snowden has done it again. Documents revealed by snowden show a UK spy program, codenamed "Karma Police", with a goal to track the browsing habits of "every visible user on the internet". The program taps into intercontinental data cables. Of the roughly 1600 cables in and near the UK they were able to "“survey the majority of the 1,600” and “select the most valuable to switch into [their] processing systems.”"-theintercept This method alone has given them access to as much as 25% of the world's internet traffic since 2009.
     

     
     
    The program gathers 50 billion pieces of metadata per day with a goal of 100 billion by the end of the year. It catalogs the user's visits to websites such as porn, social media and news websites, search engines, chat forums, and blogs. To do so it uses the user's ip address and other information such as emails, usernames, passwords, and cookies. "In the documents, GCHQ analysts called cookies "presence events" and "target detection identifiers" and lauded their value in uncovering specific Internet users' identities. They can be used to analyze "pattern of life"—when a person is usually online and where they connect to the Internet from. Some of the sites targeted specifically for covert cookie collection include Facebook, Microsoft Live, Amazon, YouTube, Reddit, WordPress, Yahoo, Google, the YouPorn adult video site, and news sites such as Reuters, CNN, and the BBC."-arstechnica.
     

     
    All collected data is sent into the "The Black Hole" where it awaits processing. Between 2007 and 2009 the black hole stored as much as 1.1 trillion pieces of metadata.

     
    The worst part is that unlike the NSA which is required to get FISA court approval for using metadata, the GCHQ program has almost no oversite and a loophole in the law means that they have free reign on how they want to use the metadata. 
     
    The GCHQ has used this system to gather data and then coordinate directed attacks. One such example was the SIM card manufacturer Gemalto. They used the gathered passwords to compromise the accounts of employees and they stole encryption keys in bulk from the company.
     
     
    Sources:
    theverge
    theintercept
    arstechnica
  16. Like
    AndThenThereWas1 got a reaction from Nineshadow in The UK's Web Surveillance Program, Codenamed "Karma Police", Wants to Track “every visible user on Internet”   
    Snowden has done it again. Documents revealed by snowden show a UK spy program, codenamed "Karma Police", with a goal to track the browsing habits of "every visible user on the internet". The program taps into intercontinental data cables. Of the roughly 1600 cables in and near the UK they were able to "“survey the majority of the 1,600” and “select the most valuable to switch into [their] processing systems.”"-theintercept This method alone has given them access to as much as 25% of the world's internet traffic since 2009.
     

     
     
    The program gathers 50 billion pieces of metadata per day with a goal of 100 billion by the end of the year. It catalogs the user's visits to websites such as porn, social media and news websites, search engines, chat forums, and blogs. To do so it uses the user's ip address and other information such as emails, usernames, passwords, and cookies. "In the documents, GCHQ analysts called cookies "presence events" and "target detection identifiers" and lauded their value in uncovering specific Internet users' identities. They can be used to analyze "pattern of life"—when a person is usually online and where they connect to the Internet from. Some of the sites targeted specifically for covert cookie collection include Facebook, Microsoft Live, Amazon, YouTube, Reddit, WordPress, Yahoo, Google, the YouPorn adult video site, and news sites such as Reuters, CNN, and the BBC."-arstechnica.
     

     
    All collected data is sent into the "The Black Hole" where it awaits processing. Between 2007 and 2009 the black hole stored as much as 1.1 trillion pieces of metadata.

     
    The worst part is that unlike the NSA which is required to get FISA court approval for using metadata, the GCHQ program has almost no oversite and a loophole in the law means that they have free reign on how they want to use the metadata. 
     
    The GCHQ has used this system to gather data and then coordinate directed attacks. One such example was the SIM card manufacturer Gemalto. They used the gathered passwords to compromise the accounts of employees and they stole encryption keys in bulk from the company.
     
     
    Sources:
    theverge
    theintercept
    arstechnica
  17. Like
    AndThenThereWas1 got a reaction from Bensemus in AT&T Will Charge Gigabit Customers More If They Want Privacy   
    The Future: Paying for your constitutional rights.

    Temp solution(If for some reason you chose to go with AT&T instead of Google Fiber):
    Pay for a VPN. It's a fraction of the price that you would otherwise be paying to AT&T and it will also be far more private than what AT&T promises for the addition $30.
  18. Like
    AndThenThereWas1 got a reaction from Beskamir in AT&T Will Charge Gigabit Customers More If They Want Privacy   
    The Future: Paying for your constitutional rights.

    Temp solution(If for some reason you chose to go with AT&T instead of Google Fiber):
    Pay for a VPN. It's a fraction of the price that you would otherwise be paying to AT&T and it will also be far more private than what AT&T promises for the addition $30.
  19. Like
    AndThenThereWas1 got a reaction from Trik'Stari in AT&T Will Charge Gigabit Customers More If They Want Privacy   
    The Future: Paying for your constitutional rights.

    Temp solution(If for some reason you chose to go with AT&T instead of Google Fiber):
    Pay for a VPN. It's a fraction of the price that you would otherwise be paying to AT&T and it will also be far more private than what AT&T promises for the addition $30.
  20. Like
    AndThenThereWas1 got a reaction from Demonking in California Approves Comcast/TWC Merger   
    The California Public Utilities Commission(CPUC) has approved the Comcast/TWC merger, however with a few conditions. Some of those conditions are: they must expand their program of cheaper priced internet for the poor (the program began due to the acquisition of NBCUniversal), stop pressuring customers against canceling their subscription, stop trying to block towns and cities from building their own network, offer broadband speeds (the newest definition by the FCC) throughout their territory within 5 years, protect customer privacy, improve reliability of their service (it’s that bad).
    How does Comcast feel about these conditions?... Well, as you can probably guess, they don’t like it and think that the goals are “unattainable”.
    What Comcast said:
     
    Longer list of Conditions:
     
    The Comcast/TWC merger will still need FCC approval before they can merge, however this gets them that much closer and lets them claim they have state and local approval when presenting their case to the FCC. Although some of these conditions are good, they should already be required of ISPs. Letting Comcast merge will not solve these problems and, as they have already pointed out, they think these conditions are unattainable. This merger will create a monopoly that will not favor the consumer.
     
    Source: arstechnica
  21. Like
    AndThenThereWas1 got a reaction from SpaceCore in Don’t Stress About Smartwatch Battery Life—It’s A 500 Year Old Problem   
    The article is comparing power stored in a mechanical device vs an electrical device. Regardless, the title is implying that the battery life for electrical watches has been an issue for 500 years.
    It's no different than if i said "Don’t Stress About a vehicle's fuel range—It’s A 6000 Year Old Problem" and then went on to talk about how wagons had a limit on how far the donkeys and horses could pull them.
  22. Like
    AndThenThereWas1 got a reaction from mikeeginger in EA Will Have Microtransactions on Car Gas in Need For Speed: No Limits   
    Ever feel like racing games aren’t real enough? Do you want something that makes you cringe when the low gas warning sounds? Well, EA has got you covered. In the next Need For Speed on android and IOS, instead of having to sit there waiting for your car's gas tank to refill(because that is what you've always wanted to do in a racing game) you can pay for the gas! Hip hip hurray for microtransactions! *sarcasm

    Although the game has not yet been released on android, it has been released on IOS in several regions. Here are the screen shots:
     

     

    The microtransactions don’t just stop at gassing up your car, the purchased gold can be used to upgrade your car and well.... pay to win.
    I’m tired of games that add negative factors to get you to pay more(ie having to wait for gas to regenerate).
    Please don’t buy this game, we need to send EA a message. 
     
    Source
  23. Like
    AndThenThereWas1 reacted to mr moose in Google Got A New Patent To "Automatically enabling private browsing of a web page"   
    And microsoft's version of this would be a paper clip that says:
     
    "It appears you want a wank,  would you like some privacy? I can close the curtains and delete your search history"
  24. Like
    AndThenThereWas1 got a reaction from minibois in Google Got A New Patent To "Automatically enabling private browsing of a web page"   
    Google wants to implement automatic privacy protection within a browser. When the user opens a webpage, Google’s software will decide if the webpage warrants privacy and if it does no data will be collected by the browser. It would also let the user set filters for webpages that should be automatically open in privacy mode. Unfortunately this feature will probably only be applied to Google Chrome.
     
    The Patent's abstract:
     
    Key Points:
     
    ....and yes it will also work when browsing "mature" content ;-)
    (FYI The claims do not refer to the embodiments from the above quote. To see the claims look at the patent source below)

     
    source:
    Patent
    http://thetechportal.in/2015/01/15/google-chrome-incognito-automatically/
     
    Google has realized that people are lazy and dont want to take the time an effort to protect their own privacy. Personally, I think this will be a great feature for google chrome.
  25. Like
    AndThenThereWas1 got a reaction from dadasmithywinkle in Watch SpaceX's rocket launch and historic barge landing   
    SpaceX just launched the Falcon 9 rocket. After delivering its payload it will attempt to land on a barge about 200 miles east of Jacksonville, Florida. The spacex team believes there is a 50-50 chance that the landing will be successful.
    http://new.livestream.com/accounts/142499/events/3665355
     
    Update:
    The launch was successful and the Falcon 9 rocket successfully delivered its payload into orbit. In the next few min, spacex will attempt to land the Falcon 9 rocket on the barge.
     
    Update 2:
     
     
    Would of been cool if it had landed correctly, but im sure this failed landing will provide some very valuable data that will be used to make a better landing next time.
     
    Update 3:
    Unfortunately for those who want to see a video of the failed landing, this is what Elon Musk had to say:
×