After declaring a "terrorist plot" was foiled, travelers seeking air transport to an from of Australia will be subject to "enhanced" rules restricting the amount of powdered materials allowed in carry on baggage (archived). Travelers will be restricted to transporting 350 grams of inorganic powders. The new rules specifically mention snow globes and table salt as a example items containing now restricted inorganic powders. The alleged plot cited in the creation of these restrictions involved an "improvised device" denied entry at the flight check in desk by airline employees for a trip from Sydney to Abu Dhabi.
Category Archives: Shitware
US Supreme Courts Mentions But Does Not Influence Bitcoin – Covetous Bryer Abuses Language Suggesting Taxman Steal A Bit More
Bitcoin has been mentioned for the first time in the US Supreme court decision 'Wisconsin Central Ltd. v. United States' on the the Railroad Retirement Tax Act of 1937 (archived). In a decision which determined that stock options are not cash compensation, Stephen Breyer dissented and attempted to weasel that stock options are equivalent to cash with:
Does a stock option received by an employee (along with, say, a paycheck) count as a “form”—some form, “any form”—of “money remuneration?” The railroads, as the majority notes, believe they can find the answer to this question by engaging in (and winning) a war of 1930’s dictionaries. I am less sanguine. True, some of those dictionaries say that “money” primarily refers to currency or promissory documents used as “a medium of exchange.” See ante, at 2–3. But even this definition has its ambiguities. A railroad employee cannot use her paycheck as a “medium of exchange.” She cannot hand it over to a cashier at the grocery store; she must first deposit it. The same is true of stock, which must be converted into cash and deposited in the employee’s account before she can enjoy its monetary value. Moreover, what we view as money has changed over time. Cowrie shells once were such a medium but no longer are, see J. Weatherford, The History of Money 24 (1997); our currency originally included gold coins and bullion, but, after 1934, gold could not be used as a medium of exchange, see Gold Reserve Act of 1934, ch. 6, §2, 48 Stat. 337; perhaps one day employees will be paid in Bitcoin or some other type of cryptocurrency, see F. Martin, Money: The Unauthorized Biography— From Coinage to Cryptocurrencies 275–278 (1st Vintage Books ed. 2015). Nothing in the statute suggests the meaning of this provision should be trapped in a monetary time warp, forever limited to those forms of money commonly used in the 1930’s.
The single mention of the word 'Bitcoin' has generated substantial headlines, but the real story here is how far Breyer is willing to go in an effort to help the criminal gang in Washington DC pick a few more pockets.
Texas Struggling To Produce Non-Fouling Bunker Fuel
A supply glut in combination with bottlenecks between fields, refineries, and tankers in the once-independent Republic of Texas, has enticed unknown refineries to blend cheaper (and poorly-characterized) cutter stock into their bunker fuel products to hit viscosity numbers, damaging fuel systems in northwards of thirty vessels in the Gulf region (archived).
No interest has publicly been expressed by oil insiders on the numerous shambling cryptographic provenance solutions in search of prolems and customers; but this has not deterred Team Cockchain ("Smokin' it!" ™®) from announcing eleventeen different projects to disrupt this massive industry from their mothers' basements.
Apple Signing API Used To Bypass Third Party Anti-Malware Tools
Reports are emerging that Apple's code signing API as implemented by third party anti malware tools including Google Santa, Facebook OSquery, Little Snitch, xFence, Yelp’s OSXCollector, and more allowed unsigned code to pass checks by simply being bundled with code already signed by Apple (archived). This is being framed by parties involved as well as the mainstream tech press as a problem in how all of these third parties implemented the API and not Apple's API or Apple's documentation.
AntiFA Terrorist Caught Posing As Alt-Right Sperglord
Eric Radulovic, an Indiana man associated with AntiFA terrorist groups is accused of infiltrating Alt-right forums and threatening to kill attendees at Alt-right free speech events under the sperglord theory that "the movement needs martyrs". Radulovic's sperglord posts included the caveat that:
it's a false flag for sure, but I'll be aiming for the more tanned, dark-haired muddied jeans in the crowd so real whites won't have to worry.
At this point is is safe presume the "anon" personhood fandom forums have all degraded to the point every participant is at least three false flags away from themselves.
Big Botnet Of Small Routers Gets Bigger
The Big Botnet made from small routers is bigger than initially though and comprised of a far wider range of router models than initially disclosed (archived).
Microsoft Acquires Github In All Stock Transaction
Outage After English Leader Sentenced To 13 Months And British Court Orders Media Blackout – Cowardly Mainstream Publications Including Breitbart Withdrew Articles
Outrage over the arrest of English leader Tony Robinson continues after a British court sentenced the Englishman to 13 months in prison for "contempt of court" and further issued an order banning media from reporting on the arrest and sentencing (archived). In the wake of the court order articles covering Robinson's initial arrest began disappearing from publications ranging from British newspaper the Mirror to US based Breitbart media.
The court imposed restrictions on reporting the case were eventually lifted. In its reporting that the court lifted its blackout, Breitbart has failed to apologize or explain why they aided and comforted the terrorist regime in the United Kingdom (archived).
Forkcoin "Bitcoin Gold" Hit By 51% Attack
The worthless Forkcoin known as "Bitcoin Gold" is even more worthless having been hit by double spending and 51% attacks demonstrating that its deviant blockchain lacks sufficient interest and value to attract sufficient mining activity. Much like the Roger Ver-ified "Bitcoin Cash" Forkcoin, "Bitcoin Gold" was split from the Bitcoin Blockchain via hardfork by a marginal crew with odd politics and like "Bitcoin Cash" failed to attract sufficient serious interest to matter.
The hill on which the "Bitcoin Gold" crew chose to die was changing the mining algorithm to a GPU mining friendly memory hard algorithm of recent publication dubbed "equihash" leaving their blockchain's security to the mercy of altcoin miners with GPU farms and no particular loyalty to any of the non-Bitcoin blockchains they mine. The meteorological risk of circumstances aligning to make these attacks the natural, economically rational choice for miners looms over every purported "cryptocurrency" blockchain that fails to attract sufficient value to actually be Bitcoin.
Existence Of Big Botnet Made From Small Routers Announced
A great many types of vulnerability-by-design in consumer routers have been public for a rather long time: Linksys, MikroTik, NETGEAR, TP-Link, and other vendors, have — for the entire history of this product type — been selling boxes that are, essentially, public toilets, free for the remote taking by any reasonably-intelligent teenager.
It appears that this "news" has finally percolated down through the drains and into the dark cellars where USG gendarmerie dwell. As part of their regular work to force the replacement of systems containing old, burned NSA-authored vulnerabilities, with new and fresh ones — USG.FBI have recently turned their attention to consumer routers.
The lively petri dish of self-propagating shitware now commonly known to be dwelling in the NSA victims' home routers, has been officially blamed on Putin's omnipotent DNC-diddling brigade. Respectable, non-terrorist USG subjects will, presumably, be issued new, "clean" routers, in the nearest future.
The burning of these vulnerabilities was handled by having "researchers" affiliated with Cisco unveil the presence of a botnet populated by ~500,000 small routers commandeered by an artful piece of malware which persists across device reboots (archived). Meanwhile, Cisco continues having its own profound and self-inflicted security issues.