If Linux can accidentally brick your system due to major screw up by the device vendor then a virus writer or a foreign power targetting business or military users can do it deliberately, not to an annoying re-install but to a factory return and we all know how quickly those get handled even when it's the odd system not a mass attack.
Not only that, but in this case they now have a worked example of how to implement such an attack.
Encryption isn’t at stake, the FBI knows Apple already has the desired k...
The FBI knows it can't bypass the encryption; it just wants to try more than 10 PINs.
The Growth Mindset : Telling Penguins to Flap Harder ?
I’m not sure whether this particular blog might lose me friends. It’s not intended to, but I’m going to stumble into an area where I know so
The cruel crucible of open source development | InfoWorld
The open source development community is not the vicious hellhole some describe, but what goes around often comes around
'Wetenschapsselectie van de NWO is ontmoedigende farce'
NWO wijst talent af met foute argumenten en ontmoedigt zo de wetenschappelijke avonturiers, meent hoogleraar Willem Trommel. De Nederlandse
Stanford’s password policy shuns one-size-fits-all security
University relaxes hated character complexity as password length increases.
After marking text, the address bar is gone - Google Product Forums
After marking text, the address bar is gone, maxzilla82, 4/3/12 1:02 AM, When I&#39;m on a website, marked some text and clicked somewhe
ISC Diary | Internet Storm Center Diary 2011-10-17
SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries