Password managers aren't implicated in the compromise of the OS X keychain or your browser... this is FUD.
Your browser's native store is probably unencrypted [1], and the OS X keychain password can be snatched with a clone of the native password prompt. Neither is true for any respected password manager. They keep you safe.
The OS X keychain is a password manager, right? Just as your browser. Your browsers native store is probably encrypted, see your own source.
How would a respected password manager guard against an infected machine?
Take keepass as an example, they state: The actual problem here is running specialized spyware (as the same user and with the same rights, like KeeFarce assumes). If you are doing this, everything is over. An application cannot protect itself in such a case; all modern PC operating systems (Windows, Linux, ...)http://keepass.info/help/kb/sec_issues.html#keefarce
Also, at the bottom of the page: Neither KeePass nor any other password manager can magically run securely in a spyware-infected, insecure environment. Users still are responsible for the security of their PC.
I've run 1Password in wine on Arch for years. Both the app and the browser plugin are styled like Win95 applications (even after changing the winecfg settings), but otherwise run flawlessly.
I have wondered if running 1Password through wine would introduce some not-considered attack vector, but I've yet to hear it.
The ACLU specifically was on the opposing end of plenty of Bush-era legislation and got labeled as such. My childhood memories are pocketed with soundbites of Bill O'Reilly denouncing the ACLU as a bastion of American liberalism.
> The ACLU specifically was on the opposing end of plenty of Bush-era legislation and got labeled as such. My childhood memories are pocketed with soundbites of Bill O'Reilly denouncing the ACLU as a bastion of American liberalism.
They've been labeled as such for much longer than that. My point is, the label doesn't make sense. Bill O'Reilly doesn't like them because they are a threat to some of his political causes, like civil rights for people he doesn't like (prisoners, alleged terrorists, illegal immigrants, etc.). The ACLU opposes the much of what every President does - that's the main threat to civil liberties - including Obama's surveillance programs, for example.
I took this survey in 2011. Teachers were not allowed to be present while we took it. There was no moral pressure to be honest beyond "answer to the best of your abilities" so as not to alienate the group. The entire room openly read the questions and people answered with varying degrees of absurdity. Whatever the results of that room were, they were not representative of the group's risk taking behavior.
Take this anecdote as you will, but it will take me a lifetime to be convinced that a faceless government form can poll the group of cards closest to a teen's chest with any aggregate accuracy.
Well, it may be that the numbers are under / overreported, but the test could still be valid, in the sense that shifts in reported behavior are correlated with shifts in actual behavior. In other words, if you assume today's kids are no more likely to lie on a survey than in the past, you can get a sense of the direction of trends, if not the absolute values.
Are there any client libraries for LogDNA or does it just stream /var/log/* and other logs to LogDNA? Also, you provide APTs and RPMs, but no sources. Is there any way I can build LogDNA and run it on Arch Linux?
Client libraries are coming soon! We decided on an agent mainly for ease of installation and so we can self-update the agent, so you don't have to manage it (especially for auto-scaling environments).
We will be open sourcing our agent soon, we literally launched this week...some things we couldn't get to for launch.
And yes, it currently streams /var/log/* by default and any other paths your specify to the agent.
Ahh yes documentation...we're also working on that as we speak. Sorry about that...we had to pick and choose what we could have for launch. But the instructions on logdna.com should be enough to get you started.
These have been in New York City for years, but are labeled as EPA devices here. You can always find them on the block of a police precinct (sometimes right next to the front door) and in other major tourists spots (I've noticed them in Times Square and Grand Central).
Wouldn't it be more reasonable for browsers to not cache them at all and universally reject missing intermediate certificates? (IIRC correctly, Chrome doesn't mind but Firefox will give you the train conductor)
If they made it hackable or released an SDK with a published spec at launch (instead of waiting for the community to reverse engineer it), I would be way more interested and I think a lot of others would too. Prefab digitally addressable flipboards aren't something I've seen.
Will find a friend when I'm finished, as well.
https://www.ebay.com/itm/304333942417