But InTether's most intriguing features are those intended to rebuff
hackers. To begin with, Friedman says, the system incorporates 11 layers of
security defenses. “All have to be successfully navigated” in order to hack
the system. “But one piece does nothing but check continually the integrity
of the other pieces,” he says. “If you could disable a certain piece,
within milliseconds our system would know.”
Via my dog wants to be on the
radio, Copy This!
Can `Military' Technology Beat Digital Piracy?'
Nice and all, but what if the operating system in question (and in this
case it's Microsoft Windows obviously) is running on a virtual machine? Like
under, say, VMWare?
You have my permission to link freely to any entry here. Go
ahead, I won't bite. I promise.
The dates are the permanent links to that day's entries (or
entry, if there is only one entry). The titles are the permanent
links to that entry only. The format for the links are
simple: Start with the base link for this site: https://boston.conman.org/, then add the date you are
interested in, say 2000/08/01,
so that would make the final URL:
https://boston.conman.org/2000/08/01
You can also specify the entire month by leaving off the day
portion. You can even select an arbitrary portion of time.
You may also note subtle shading of the links and that's
intentional: the “closer” the link is (relative to the
page) the “brighter” it appears. It's an experiment in
using color shading to denote the distance a link is from here. If
you don't notice it, don't worry; it's not all that
important.
It is assumed that every brand name, slogan, corporate name,
symbol, design element, et cetera mentioned in these pages is a
protected and/or trademarked entity, the sole property of its
owner(s), and acknowledgement of this status is implied.