Why not just use Amazon or Google music and download everything ? Google Music is especially good because it lets you download a .zip with complete album compared to Amazon that only lets you download one song at a time.
I used to buy and rip CDs but it takes time and space and feels really backward.
I have a wall bookshelf which has a corner-to-corner shelf in it for CDs, and another for DVDs. That makes the bookshelf more interesting and gives an otherwise really cold-looking room warmth, without taking up space. As mentioned, Amazon makes it frustrating to buy digital content from another region (although it does work). Google is not an option because I'm one of those people that avoids anything Google, no matter how convenient their products may be.
All of this is very subjective. Your points are well made, nonetheless.
He doesn't reference it but he understands exponentiation and the birthday problem [1] that is used to find collisions when you control both files [2].
No that is not a solution.
If they swapped the public key they can read the message being sent back (it is encrypted with their public key), then encrypt it again with the real public key.
The only solution is to use another channel to authenticate the other's key, be it GPG's web of trust, or any other imperfect way (phone call, physically meeting, ...)
First, Agree on a reply latency -- say, 1 day.
Then, instead of simply replying to a message, you have an irritating four-step process:
1. Wait until one day after you received the message.
2. Send a digest of the message and your public key.
3. Wait another day.
4. Send the message itself.
All that sending would be using PGP.
The receiver must make sure that the delays for receiving the digest and the reply body are what the expect. This method requires a MITM to either anticipate what the message is or introduce an extra day of latency, which the receiving would notice.
You don't ask for your message back, you ask for the message Snowden sent again. The MITM-party can't have that, assuming that Snowden started with your correct public key.
The most difficult part in your setup is to make untraceable the VPN you run after going through Tor.
The problem is: if you believe this VPN is safe / untraceable enough, why do you even use Tor in the first place ?
The problem is that you, at some point, pay the VPN, and that is very likely to be linked to your real identity somehow.
Paying for the VPN anonymously is possible with Bitcoin.
The reason you tunnel it all through tor is because you can't trust the VPN not to fold if the government subpoenas them. So if the data center hosting the VPN is subpoena all they can hand over are logs of tor exit nodes. If you didn't use tor, they would get your home IP and the jig is up.
Nice project. Are the source available ? It would be nice to use but I'd rather host/use it locally.
Besides I don't know which font (Symbola?) you use in the .pdf but it appears ugly (part of the 'o' is missing and it is overall not too easy to read) on my laptop running Ubuntu 14.10.
I would add that you need not to have ADHD, drug problems or gotten pregnant as a disadvantage: you might just come from a social/family background that encourages you to take a job as soon as you finish high school and you get stuck at you minimum wage job.
Then when your life becomes what sheltgor described, you don't have any perspective in your job, you can't afford moving or holidays. At that point you are used to not having much but you still want to spend it as you wish. Anyway what is the point of giving much into savings if you can't enjoy your life ? That's when the spending might get irrational (paying more for less, smoking, etc.).
Thanks for pointing that out; I didn't mean to imply that only people with serious advantages get left behind
"you might just come from a social/family background that encourages you to take a job as soon as you finish high school and you get stuck at you minimum wage job."
Not only that, but before finishing high school as well. A lot of people forget that 15% or so of adults (25 or older, I believe) don't have a high school diploma or GED.
Here is an article [1] trying to estimate that kind of numbers (wage, number of active workers, etc.) from various sources and questionning the ethics of using MTurk for science purposes.
The bottom line is: one third of tasks are achieved by people relying on MTurk (as primary or secondary money input) having working conditions that would not be considered acceptable in any first-world country (hourly wages around $2, working long hours with, obviously, no kind of worker advantage or protection).
They might have changed the page since your comment but this is on the page :
"Android 5.0 Lollipop, which comes on Nexus 6, Nexus 9 and Nexus Player, will also be available on Nexus 4, 5, 7, 10 and Google Play edition devices in the coming weeks."
> Sync has always meant merging semantic changes in state between two or more devices.
That is a definition of file synchronization [1]. Usually the aim of "syncing" is to input two directories and the outcome is that the contents of both directories are the same.
What you are describing below point 1. is an algorithm to achieve this goal.
The algorithm you describe needs a source and destination folder and this may be Apple's algorithm and implementation (I have no idea) but this is by no means the only way to do so (see two-way file synchronization [1]).
In that case, there are two strategies for synchronizing file systems -- either:
1. The operator tells the program what to do.
-- or --
2. The program gets it wrong at least some of the time.
In the case of contact list synchronization, like Google Contacts, the system assumes that the device the operator is editing at the moment is the source, and acts accordingly. Notice that a positive determination is made as to what the source and destination are, based on the operator's activity and its timing.
In all other cases where two directory trees are synchronized, are made to have the same content, and in which files may be deleted as well as added, the operator has to tell the program which is the source and which is the destination. End, full stop.
I agree that you need some user input or the program will get it wrong in some cases.
But the distinction between source and destination is relevant with some algorithms (one-way sync) and irrelevant in others.
Let say you have two directories A and B to sync and both contain a file f but the one in B is more recent than the one i A. A consistent strategy would be to always favor the most recent file and end up with A and B containing the same f file that was the one being in B at the beginning of the syncing. At no point I asked the user to define a source nor a destination but still the two directories are synced.
Note that it is your choice to continue or not the discussion as much as it was mine (not yours, shockingly) to answer your post.
So please keep your "End, full stop" and "Think before answering" to yourself, they are quiet annoying.
> But the distinction between source and destination is relevant with some algorithms (one-way sync) and irrelevant in others.
True, but the decisions made by the operator are critical to any desirable outcome, in all cases, without exception. Your example proves the point:
> Let say you have two directories A and B to sync and both contain a file f but the one in B is more recent than the one i A. A consistent strategy would be to always favor the most recent file and end up with A and B containing the same f file that was the one being in B at the beginning of the syncing.
Yes, unless that's not what the operator wants. Suppose the operator has edited a file as part of a programming project, but introduces a bug and simply wants to restore the system's original state with a minimum number of file operations. In that case, the operator wants older dated files to be copied over newer ones.
How shall the algorithm proceed? The operator tells it what to do.
> So please keep your "End, full stop" and "Think before answering" to yourself, they are quiet annoying.
If people understood the meaning of file synchronization, I wouldn't have to. All the replies suffer from naive assumptions contradicted by real-life experience, such as the OP losing his music collection as just one example, or the example I just gave -- things that happen to real people in the real world.
I used to buy and rip CDs but it takes time and space and feels really backward.