Sorry no it doesn't prove my half joking claim it only documents a single case of a high profile terrorist plot from a small group that was led by an FBI informant, containing another 4 informants and agents, and funded by the FBI in which they had trouble convicting several defendants (despite a 95%+ conviction rate normally) for some reason no clue why.
The other two methods of heat transfer apart from radiation are conduction (through “touch”, adjacent molecules, eg from the outside of a chicken on the BBQ to the inside) and convection (through movement, eg cold air or water flowing past).
I don't know specifically, but it's a self-contained single file Go executable. It doesn't need much from a Linux system beyond its kernel. Chances are good that it'll work.
I lean more toward DOJ here. He knew in advance, showed up, and went inside. That’s participation. Not standing outside or peering through the door, but occupying the building. Having a camera doesn’t make that journalism. There’s no freedom of speech to defend here
Note, I'm not using my own judgement. I'm no lawyer. But the judge refused Don's arrest on grounds of no probable cause [1][2].
I agree it seems the protestors may have violated that law by forcibly stopping the service (though I think the judge only found cause for 18 USC section 241: conspiracy against rights), but it seems the judge applied some reasonable discretion to exclude a reporter only there to document it and interview those willing to speak to him. I'd be interested in reading his exact reasoning, but I'm not sure he's shared it.
> than a pastor suspected by the left of being involved with ICE
This is besides the point, but: it's not some secret, it's a fact. He works for ICE, and is a pastor.
> Federal charges are appropriate where federal law is violated, and the Supremacy Clause ensures that federal government has the right to bring them.
And the first amendment ensures (er, well, it should) that charges which violate it are dismissed.
> "Protest" actions like this violate the first amendment rights of the church attendees.
They don't; the first amendment strictly protects against government persecution.
> If it were Tucker Carlson instead of Don Lemon, and a mosque rather than a church, and an imam suspected by the right of being involved with a terrorist cell rather than a pastor suspected by the left of being involved with ICE, would you have the same response?
Is this any better than an ad hominem? What if they would have a different response? Do you mean that we should then conclude something about this event or the other commenter's messages?
> Do you mean that we should then conclude something about this event
The law is specifically written to protect religious gatherings from protest and harassment (in addition to the abortion harassment prohibition in FACE), so it’s an appropriate question to ask to define if your outrage at its application is based on your political agreement with the protesters/disagreement with the religious group or if you are willing to allow a law to be applied without regard to which religion and which concept is being protested.
> it’s an appropriate question to ask to define if your outrage at its application is based on your political agreement with the protesters/disagreement with the religious group or if you are willing to allow a law to be applied without regard to which religion and which concept is being protested
Just to be clear, this is the ad hominem, which is moot. Even if this is true, it has no bearing on the case being discussed and the question is a foolish one for this silly political game you describe: firstly, it can easily be turned around on the asker and, secondly, it has an extremely obvious game theoretic answer of "yes" because that's the only option to get one's interrogator to continue with the actual discussion. (Thanks for proving the point.)
While it has no bearing on the active case itself, within this thread it has bearing on exposing the political prejudice of the commenter influencing their opinion about the case. Would they have a different opinion if the variables were tweaked a bit, but the action and violation of the statute was the same?
It’s always a good exercise to evaluate your opinion this way, it should help keep you honest about legal fairness.
> within this thread it has bearing on exposing the political prejudice of the commenter influencing their opinion about the case
You say that it matters for these silly political "gotcha!" games. I say it therefore does not matter. It is an ad hominem attack which has no basis in the discussion.
I say it matters to illustrate how someone commenting on a topic can be so ingrained on one side that they can’t conceive, comprehend, or concede that sometimes a law can protect all sides.
If you want to shut down discussion because it speaks against your opinion, fine. Others want to open it up. You are not the gatekeeper to the discussion and what paths it might take.
> I say it matters to illustrate how someone commenting on a topic can be so ingrained on one side that they can’t conceive, comprehend, or concede that sometimes a law can protect all sides.
Sure, but to what end? What is the purpose of pointing this out? Even pointing it out to the person behaving in such a manner seems foolish: they're just as likely to change their mind as the person pointing it out.
> If you want to shut down discussion because it speaks against your opinion, fine.
It seems the act of disregarding the points being made by others so one can hint that their bias is clouding their judgement to see it the correct way shuts down discussions far more effectively than simply arguing from a certain perspective. As I said before, such an accusation can easily be turned around on the accuser; if you think through what happens there, the accuser just denies it the same as the accused would because that's the only option that moves on from the point which is only relevant to the political game. The entire game theory can be explained in a single sentence. It's not really an interesting game and the best outcome of it in the context of a greater discussion is for it to end as quickly as possible.
> Others want to open it up.
One might consider (perhaps by not being "so ingrained on one side that they can't conceive, comprehend, or concede") that the point of calling out a rhetorical ad hominem is to open the discussion to more critical thinking.
I realize that there are some people that don’t really want the first amendment to cover speech they don’t like and religions they don’t like, but it does. As it relates to the FACE act that includes interruption of those religious services they don’t like too.
Yes, I agree, and these statements do not refute anything I've written in this thread. Besides, what do they even have to do with the ad hominem point we've been discussing? Anyway, we can just move on from that, I guess.
> the first amendment
In this case, the first amendment, as a matter of law, isn't relevant in the context of those who had their religious service interrupted: the service in question was not interrupted by the government. The first amendment concern in this case is whether or not Don Lemon's right to journalistic freedom is being infringed since he's the one who's actually facing criminal prosecution for actions which seem a lot like journalism.
> the FACE act
It appears that Don Lemon did nothing which violates this Act. I guess if you disagree with the judge who found there was no probable cause of such a violation for an arrest warrant, you're more than welcome to explain why. (I mean, surely it's not simply because you disagree with Don Lemon's politics, that would be embarrassing.)
I am sure how from my comments you could have any idea what my opinion about Don Lemon in this situation would be…
But if you must know, I think it’s a long shot that he will be convicted, but he damn sure didn’t make it easy on himself. He should have followed his own advice on his livestream when he was in the car and said “I don’t think I should go in…”
It's a privacy consideration. If you desire to juggle multiple private profiles on a single device extreme care needs to be taken to ensure that at most one profile (the one tied to your real identity) has access to either attestation or DRM. Or better yet, have both permanently disabled.
Hardware fingerprinting in general is a difficult thing to protect from - and in an active probing scenario where two apps try to determine if they are on the same device it's all but impossible. But having a tattletale chip in your CPU an API call away doesn't make the problem easier. Especially when it squawks manufacturer traceable serials.
Remote attestation requires collusion with an intermediary at least, DRM such as Widevine has no intermediaries. You expose your HWID (Widevine public key & cert) directly to the license server of which there are many and under the control of various entities (Google does need to authorize them with certificates). And this is done via API, so any app in collusion with any license server can start acquiring traceable smartphone serials.
Using Widevine for this purpose breaks Google's ToS but you would need to catch an app doing it (and also intercept the license server's certificate) and then prove it which may be all but impossible as an app doing it could just have a remote code execution "vulnerability" and request Widevine license requests in a targeted or infrequent fashion. Note that any RCE exploit in any app would also allow this with no privilege escalation.
For most individuals it usually doesn’t matter. It might matter if you have an adversary, e.g. you are a journalist crossing borders, a researcher in a sanctioned country, or an organization trying to avoid cross‑tenant linkage
Remote attestation shifts trust from user-controlled software to manufacturer‑controlled hardware identity.
It's a gun with a serial number. The Fast and Furious scandal of the Obama years was traced and proven with this kind of thing
The scandal you cited was that guns controlled by the federal government don't have any obvious reasonable path to being owned by criminals; there isn't an obvious reason for the guns to have left the possession of the government in the first place.
There's not really an equivalent here for a computer owned by an individual because it's totally normal for someone to sell or dispose of a computer, and no one expects someone to be responsible for who else might get their hands on it at that point. If you prove a criminal owns a computer that I owned before, then what? Prosecution for failing to protect my computer from thieves, or for reselling it, or gifting it to a neighbor or family friend? Shifting the trust doesn't matter if what gets exposed isn't actually damaging on any way, and that's what the parent comment is asking about.
The first two examples you give seem to be about an unscrupulous government punishing someone for owning a computer that they consider tainted, but it honestly doesn't seem that believable that a government who would do that would require a burden of proof so high as to require cryptographic attestation to decide on something like that. I don't have a rebuttal for "an organization trying to avoid cross-tenant linkage" though because I'm not sure I even understand what it means: an example would probably be helpful.
I assume the use case here is mostly for backend infrastructure rather than consumer devices. You want to verify that a machine has booted a specific signed image before you release secrets like database keys to it. If you can't attest to the boot state remotely, you don't really know if the node is safe to process sensitive data.
I'm confused. People talking about remote attestation which I thought was used for stuff like SGX. A system in an otherwise untrusted state loads a blob of software into an enclave and attests to that fact.
Whereas the state of the system as a whole immediately after it boots can be attested with secure boot and a TPM sealed secret. No manufacturer keys involved (at least AFAIK).
I'm not actually clear which this is. Are they doing something special for runtime integrity? How are you even supposed to confirm that a system hasn't been compromised? I thought the only realistic way to have any confidence was to reboot it.
It’s one of those types you have to be the person that likes that style. It’s my friends favorite rotator but I think it’s a decent try-it-once beer, that is only around for a little while at a time.
The brewery itself though is one of my favorites to this day with, in my opinion, the best food I've ever encountered at something that identifies itself first as a "brewery." I don't visit the area without making a stop there.
> It’s one of those types you have to be the person that likes that style
Yes.
I live in a community that has a very high population of home brewers (beer and spirits mostly). Many of them are needy and use strict techniques (their breweries remind me of the Winnebago meth lab in Breaking Bad) making very good beer and gin.
When we have our local competition of brewers the winner is always some thing like "Belgian Sour". To me a beer that is foul. But to the experienced brewers it is the best.
In the case of software RCA, but if a crime is committed then many times there is a victim. There could be some root cause, but ignoring the crime creates a new problem for the victim (justice)
Both can be pursued without immediately jumping to defending a crime
reply