It's tempting to reduce the whole sorry episode in our memory to a simple waste of money by Fianna Fáil on an expensive system that, for some nebulous technical reason, couldn't be used - but there is so much more to it than that.
Electronic voting is a fundamental threat to democracy. Voting machines - and vote-counting machines - are black boxes whose functioning is unknowable and unprovable. They may be programmed to perform correctly during testing, but produce false results on election day. This can be done by any employee of the manufacturer with access to the system during development, or anyone in a position to tamper with the machine - which may be easier than you think (one example: Security Analysis of the Diebold AccuVote-TS Voting Machine).
Furthermore, as anyone who's been paying attention to the news since last June is perfectly aware, practically the entire Internet is subject to mass surveillance by foreign intelligence agencies, such as the NSA in the US. They intercept deliveries of computer equipment and tamper with them [http://www.pcworld.com/article/2083300/report-nsa-intercepts-computer-deliveries-to-plant-spyware.html]. The US routinely imposes changes of government in other nations by force. What confidence can we have in the integrity - and secrecy - of a ballot conducted using such equipment?
We dodged a bullet when Fianna Fáil screwed up their misguided attempt to bring about this disaster, and we don't need another bullet to dodge. We might not be so lucky next time.
Frankly, I don't see the problem with a little bit of suspense that makes for interesting television, and if it makes some people feel irrationally impatient, that's a small price to pay for democracy.
It's back now, but still a great example of what's wrong with YouTube's takedown system.
The 2014 Ubuntu Community Survey needs your thoughts on everything from Ubuntu Touch to your choice of web browser. Results will be published once the survey is over.
It's open source (as Google's app used to be, but isn't anymore), which is reason enough to switch - all software, especially security-critical software like this, should be open source.
It also has a number of practical advantages. It allows you to reorder accounts in the UI. It hides the generated codes by default, for extra security (simply tap to display). It comes with its own built-in barcode scanner, so you don't have to risk trusting a third-party barcode scanner app with your secret 2FA keys. It requests fewer Android permissions - only the camera permission needed by the barcode scanner.
The latest version also adds two important features that Google Authenticator provides, that were previously missing form this app: copying codes to the clipboard, and the ability to rename accounts.
Of course, it's compatible with the same two-factor authentication system that Google's app uses, so it's compatible with Google, AWS, WordPress, GitHub, and any other other services that use that standard.
Also available on F-Droid: https://f-droid.org/repository/browse/?fdid=org.fedorahosted.freeotp
Although the iPhone one already allows reordering and renaming and includes a barcode scanner, but it doesn't allow icons and doesn't hide codes by default.
My commiserations to . I know it was once his baby.
How Apple and Amazon Security Flaws Led to My Epic Hacking | Gadget Lab ...
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter accoun
Dilbert comic strip for 04/17/2012 from the official Dilbert comic strip...
The Official Dilbert Website featuring Scott Adams Dilbert strips, animation, mashups and more starring Dilbert, Dogbert, Wally, The Pointy
Chief ACTA Eurocrat quits in disgust at lack of democratic fundamentals ...
I want to denounce in the strongest possible manner the entire process that led to the signature of this agreement: no inclusion of civil so
Cosmo, the Hacker 'God' Who Fell to Earth | Gadget Lab | Wired.com
I met Cosmo by accident and opportunity, after hackers used social-engineering techniques to circumvent Apple's and Amazon’s security mechan
Troy Hunt: Lessons in website security anti-patterns by Tesco
Troy Hunt on observations, musings and conjecture about the world of software and technology