This article fails my smell test. The adolescent vocabulary doesn't correlate with the otherwise polished writing style and the technical merits fall far short of the proposed remediations. It is therefore likely to have been funded or otherwise inspired by the NSA in an attempt to smear PGP, still the most effective cryptography available to the average person.
It looks to me like the OP is making more of a beef about Verizon's advertised speeds being significantly different from their actual speeds. That Verizon is continuing to advertise speeds that it intentionally is not delivering, IMO, constitutes fraudulent advertising. This can and should be the basis of, and resolved by, a class action suit.
It's no different really than an ISP that advertises 100Mbps, has ethernet to the home, but only a T3 to the Internet.
I'm sure their customer contract has clauses which specify that "actual speeds may vary". This does not, however, make their advertised speeds any less knowingly false.
Of course, their actual advertisements include disclaimers so they're not actually making claims about their upstream connections - legally, they would be able to get away with a T3. The problem is that there's no economic reason for a competitor to lay their own last-mile lines to the vast majority of consumers and compete on upstream features, since not enough people care enough to switch for them to recoup the capital investment. It's truly a first-mover-takes-all scenario.
This is a story about what can happen when a governmental agency has: A) too little oversight, B) way too much (taxpayer) money, and C) way, way too little transparency.
What can you do about it? A) join the ACLU and donate a little every month, B) actively support open government ordinances and proposals at every level of government, C) support investigative journalism and avoid agenda-driven media outlets and D) vote against surveillance-state supporting politicians (esp Feinstein and Boxer in CA) at every opportunity.
A writeable open VCS would also make heartbleed-like vulnerabilities more likely. As such the OP's comments should be evaluated as potential astroturf. Were the NSA looking to introduce new and effective backdoors, and we know they are, this would be one way to pressure IBM/Weitse for access.
It's more than "coders who don't know how to code", it's also managers who don't know how to read code or review diffs. Sadly, there are lots of experienced coders whose planning horizon stops as soon as the code works i.e., they don't maintain code or think in those terms as long as it's working. This is often why shops use these overreaching frameworks.
Systems administration is no different, which is why so many servers are now either straight-jacketed in OS packages + chef/puppet/ansible or such a mess they're the equivalent of spaghetti code.
IMO this is fundamentally a failure of higher education (EE/CS, IS ...).
Not sure about "vague comment"s but anyone who has run an email server, used an rbl/rhsbl, and followed the logs <http://www.postconf.com/docs/spamrep/> would say the same. Having done so for years and run reports on dozens of servers daily it is clear that blacklists are the most effective form of spam blocking, by at least an order of magnitude.
I can't tell whether you agree with the OP or with my comment. Your first sentence argues that OP is right - "IP blacklists are a waste of everyone's time". Your second sentence though is "it is clear that blacklists are the most effective form of spam blocking, by at least an order of magnitude." Maybe a typo in your reply?
I got that part, I'm talking about your first sentence.
... anyone who has run an email server... would say the same.
This reads as though you agree that "IP blacklists are a waste of everyone's time" as OP said. And maybe you do (and that's fine) - I'm just unclear given your second sentence.
That is alluded to in the 5th from last paragraph: "Facebook's terms of service forbid third-party verification of its clicks". What reason, other than fraud, would they have for such a clause?
This is one of the reasons I only purchase AMD-based systems. Well that and the fact that AMD's CPU/GMU combo has better graphics performance.
It's either that or support a company whose market advantage is based on anti-competitive practices and who will spend a significant portion of their profits on reducing consumer's choice of CPU (up to the point they no longer have to of course).
It is unfortunate that FreeBSD chose those names to attract people to the pre-release versions. What's needed is a section of the website clarifying:
CURRENT = alpha, dev
STABLE = beta, rc
RELEASE = passed all tests and released
That's not to say that things never break in releases. I've seen gjournalled disks (on a gmirror) require fsck (in 8 and 9 -REL) and carp fail (in 7 -REL). Other than those FreeBSD has been the most reliable, secure and up-to-date of any Unix or Linux distribution I've used. My only request would be a policy discouraging ports with perl build-deps, most of which seem to be one-liners that could easily use awk, sed and/or grep instead of forcing a perl build on every upgrade (most not even bothering to remove the build-deps when done).
There are downside to AWS other than reliability (a la Netflix). One of those is privacy. If you host with AWS Amazon has access to all of your user data, and with Amazon likely the NSA. If you want to maintain a free and open forum for people to express support for people like Snowden and Assange and question the NSA or military / industrial complex' percent of the federal budget (>50) then you have to run your own servers in a skilled, ethical, small to mid-sized ISP's facility.
This doesn't explain the penny-wise (IMO) allocation of hardware or dev/sysadmin resources of course.