Maybe not understanding the problem with a tool that may be used to work on proprietary code containing trade secret information silently and unexpectedly sending information out to the Internet is the reason for software becoming spyware...
Starting with "Lol, probably just an oversight" and ending with an emoticon is excessively dismissive and flippant... that's how you lose customers, or potential ones.
You store trade secrets in your configuration file? I still don't understand what the big issue is. Can you clarify that instead of critizising my lack of knowledge?
This was a dickish thing to do on his part (although far form rape). I think that the seven years he spent at the embassy are enough of a punishment. The only thing that I believe would be fair to have is monetary compensation to the victims.
He was in the embassy on his own free will. I can't rape some women and then hide under a rock for 5 years and come out claiming it's fine because I hid. Because that's not how stuff works.
As for rape, what he allegedly did was just that. You can make up your own meaning of the word but they are e completely irrelevant in this context.
> I can't rape some women and then hide under a rock for 5 years and come out claiming it's fine because I hid
Depending on the situation I think that it would be acceptable to remove some years (less than 5) from your sentence. (You would still have to pay the victim the full amount of money though)
> You can make up your own meaning of the word
This is exactly what you are doing. I do not know of anyone else who considers removing a condom during consensual sex to be rape.
There's no sexual misconduct victim, as charges were dropped.
And since charges were dropped, we should stop even remotely suggesting the subject is guilty.
Enough damage has been done to their image already through what seems to be extremely cheap accusations. Just imagine if this kind of character assassination happened to you, and you saw your life destroyed with no consequence to the perpetrator.
> There's no sexual misconduct victim, as charges were dropped.
One does not imply the other.
> And since charges were dropped, we should stop even remotely suggesting the subject is guilty.
I disagree, the courts are not the only entities that can decide the truth. Plus, the case was closed because he was in the embassy and they did not have access to him.
> extremely cheap accusations
Assange himself has admitted that he did indeed removed the condom.
> Just imagine if this kind of character assassination happened to you, and you saw your life destroyed with no consequence to the perpetrator
Then I would hope that I had people like me who are willing to speak factually to posts like https://news.ycombinator.com/item?id=19641980 which my previous post was replying to. Also, as I said before, I believe that the fact that he stayed in the embassy for 7 years should be enough of a punishment for removing a condom. The only thing that I would add is monetary compensation to the victims.
Few if anyone on Sweden care about this. It's a normal rape case albeit with a celebrity in it. It should go through the normal process. Hardly something Putin would discuss with Löfven.
He's been arrested for jumping bail. He was on bail facing extradition for rape and sexual molestation charges. He sought asylum the moment he knew he would have to face those charges.
So you're correct. Seeking asylum isn't the same as being above the law. It's the same as avoiding being subject to the law. I can't say I see the distinction as being especially material.
> On 18 November 2010, Marianne Ny ordered the detention of Julian Assange on suspicion of rape, three cases of sexual molestation and unlawful coercion.
Are you saying that that's not true? I don't speak Swedish so I can't go back to the actual documentation to check myself.
Sex with a toddler is rape. Sex with a passed-out person you run across is rape. Sex with a blindfolded person who's into bondage but expecting someone else is rape.
If someone says they're only willing to have sex with a condom, and you secretly remove that condom, you're having non-consensual sex, i.e. rape.
Yes, and its super hard now. When I installed the new android version the only way I could get fdroid installed was flashing it as a system app in the recovery.
Last time I did a fresh install of Windows 10 Home I had to go into Apps & features and disable "Allow apps from the Store only" in order to install Chrome. Didn't seem to have to do that on Windows 10 Pro.
Maybe because there are so many incompetent PMs? The PM working I'm working with does not know the product feature set (except for the very basics), does not have any vision or goals, does not have a systematic approach to talking to collecting feedback from customers. What's on our backlog changes dramatically and when project ends we basically start with a new product backlog. When customers have questions on basic stuff he has to defer to engineering.
Any competent hire can be useful, but hiring good PMs is maybe even harder than good engineers. So people bitch.
Yes it is exactly true, the issue right now in the field of product management, is most PM are in fact PO (product owner) they manage the sprint. But these people have the title of product manager.
Product manager is required job in any company that wants to grow and deliver best products. But these people are very hard to find and very expensive, so instead we hire PO and give them the title of PM and ask them to do what the CEO is asking
That's a good point in favor of less hacking things together and more engineering - Facebooks seems to have not embraced strict engineering processes which are the only way to tackle these things. Facebook has to change it's own principles to succeed long term.
Anyone can screenshot or take a photo of any decrypted message. The question is when the email leaves Google's servers and whether you can trust Google with that same document.
Personally, if I had a message where I would consider a tool like this, I would just encrypt it on the client with PGP or something.
Sorry but this type of issue often occur because developers has your mindset. I've had so many auditors and security reviewers ask me "how do you hash your password?" but no one has asked me if I log http request, session tokens, outbound emails or any other thing where sensitive data can be transmitted. Nor have they asked me what the actual process for rotating credentials when employees leave, more than "Do you do it?"
The password is stored in plaintext since they could read it via Kibana but I'm guessing you mean that their identity system which they use to store users store credentials in plain text.
To that I say meh: Could just as well be that they decided to log all Http request to troubleshoot some issue without realizing the security implications. The article even says it was a rolling list of passwords which further indicates loggimg since you probably don't store trace logs forever.