136 private links
"We can’t continue to craft firewall and access rules based on IP addresses. Not feasible and ultimately, it’s not secure or accurate enough. We need ID-based access rules that not only consider who but what. Not just Bob, but Bob’s phone. Not just Bill, but Bill’s refrigerator. Not just Alice, but Alice’s television. ... A traditional IP-based perimeter just isn’t going to be enough to meet the new requirements for application delivery….”
“The Internet Of Things is coming. Rejoice! …Mostly. It will open our collective eyes to petabytes of real-time data, which we will turn into new insights and efficiencies. It will doubtless save lives. Oh, yes: and it will subtly redefine ownership as we know it. You will no longer own many of the most expensive and sophisticated items you possess. You may think you own them. But you’ll be wrong.
Inhaltlich bleibe ich dabei, dass man nicht das Unrecht der eigenen Seite gegen das Unrecht der anderen Seite aufrechnen kann. Wer Unrecht begeht, hat die Legitimität seines Anliegens verloren. So einfach ist das. Das gilt für "Männerrechtler", die das Wort "Feminazi" gebrauchen, genau so wie für "Frauenrechtler", die Passanten als "Masku" oder "Nazi" beschimpfen. Und egal um welches Anliegen es geht, wenn jemand das Wort "menschlicher Abschaum" in den Mund nimmt, hat er vollständig und auf Jahre für sich und seine Mitstreiter verkackt, egal worum es ursprünglich mal ging.
- how does antispam currently work at large email providers - how would widespread E2E crypto affect this - what are the options for moving things to the client (and pros, cons) - is this feasible for email? - How do things change when moving from email to other sorts of async messaging (e.g. text messaging) or new protocols - i.e. are there unique aspects of existing email protocols, or are these general problems? Brief note about my background, to establish credentials: I worked at Google for about 7.5 years. For about 4.5 of those I worked on the Gmail abuse team, which is very tightly linked with the spam team (they use the same software, share the same on-call rotations etc).