![]() Tim Flannery | New York Review Of Books | 5 September 2013 Our best defense is to make surveillance of us as expensive as possible.” The less obvious you are, the safer you are. Do use Tor: “Yes, the NSA targets Tor users, but it’s work for them. Keep private stuff on a computer with no internet connection, and if you want to send it somewhere, walk it over to a connected computer on a USB stick. If you use a commercial product, the NSA probably has a back-door into it. ![]() Sensibility alert: The explanation given here involves a certain amount of algebra, and lots of prime numbers (1,400 words)īruce Schneier | Guardian | 5 September 2013 But since the Department of Defence spends $11bn a year on cryptanalysis, it may just have risen to the occasion. If the NSA really has worked out how to break the encryption used for banking transactions, that would be “a serious mathematical accomplishment, far beyond being just Internet security”. Asserting that an emotion is really real because you can somehow see it happening in the brain adds nothing to our understanding.”ĭid the NSA secretly make a major math breakthrough? It can tell us how our minds are made to hear music, but not why Mozart is more profound than Manilow. “Neuroscience can often answer the obvious questions but rarely the interesting ones. On the reaction against neuroscience as the answer to everything. Thirty is a crucial threshold because it allows for living grandparents.Īdam Gopnik | New Yorker | 9 September 2013 Older people accumulate skills, wisdom, knowledge, and pass them on to younger people. Longevity and human development form a virtuous circle. “If came to a company like us and said, ‘Here’s $15 million,’ we could turn a North Korean missile into a brick.”īasic structure of populations has changed twice in human history: around 30,000 years ago when people started living beyond the age of 30, and in the 19C when the average lifespan doubled in much of the world. Security contractors are booming, and boasting. If you know how to break into the Chinese government’s computers, chances are the US government would like to use your services – and vice-versa. US government and corporate recruiters vie to hire hackers, as cyberwarfare escalates. And that baby grows into the Adolph Hitler that Heigl’s character set out to kill.”ĭavid Kushner | Rolling Stone | 11 September 2013 She succeeds in killing the baby by jumping into a river with it, but Adolph’s mother buys another baby and raises it as her own. ![]() For example, you may find you are part of a predestination paradox: “Katherine Heigl travels to 1889 Austria in order to kill the infant Hitler. Why you can’t travel back in time and kill HitlerĪll kinds of reasons, according to writers who have gamed this one through. ![]()
0 Comments
Leave a Reply. |