Previous winners include How to Poo on a Date: The Lovers’ Guide to Toilet Etiquette and Too Naked for the Nazis .
Last year’s winner, The Dirt Hole and its Variations , went to the late Charles L. Dobbins, making him the first posthumous winner of the prize.
The reason Australians don’t fuss about snakes is there’s always something more dangerous.
Wow! (How does it get down? )
That is covered in the next class:
One of the world’s most prominent distributed ledger projects has been pushed back by a year
One of the world’s most prominent planned uses of distributed ledger technology has been pushed back by a year.
That application is a replacement for the Australian Stock Exchange’s (ASX) core application, the Clearing House Electronic Subregister System (CHESS).
The bourse was the first such operation in the world to commit to using distributed ledger technology so won rather a lot of attention from blockheads who liked to point out that if a stock exchange could use the tech it was surely ready for world domination.
The ASX has ironically has spent years since trying to avoid the word “blockchain”, pointing out that its key supplier, Digital Asset, uses the Digital Asset Modelling Language (DAML) that can drive multiple distributed ledger projects.
SpaceX’s Starlink finally reveals its satellite broadband pricing for rural America: At $99 a month, it’s a good deal
SpaceX’s satellite broadband service Starlink has finally revealed its pricing: $99 a month for speeds that vary between 50Mbps and 150Mbps… plus 500 bucks to buy the necessary equipment.
That is not a great deal if you live in a well-connected city where you can typically get those speeds for between $40 and $80 a month. But it is a good deal for many living in rural America, particularly since in many of those areas it simply isn’t possible to get anything above 10Mbps or even dial-up speeds.
Seeing the PlayStation thread and the PS5’s ridiculous design, and contrasting with this:
“ “We don’t think they were stolen to sell openly online, because the weapons are numbered and are so unique and rare that they would immediately be recognised,” Ms Kennis said.
“They probably scouted the museums to see what they needed, made a list and carried it out very professionally.”
Has anyone seen Steve Bannon lately?
So, it’s a good deal in the sense that it’ll be the only deal.
Yes, this is real.
There also was a Hot Wheels version.
ETA:
Design & Punishment!
Oh my God, Vobis isn’t dead yet. Sort of.
Can we stop megacorps from using and abusing our data? That ship has sailed, ex-NSA lawyer argues in new book
Interview Cyber Privacy: Who Has Your Data and Why You Should Care is the title of a new book from April Falcon Doss, formerly associate general counsel for intelligence law at the US National Security Agency. Doss spoke to The Register about her concerns with pervasive data collection and its potential for harm.
These days the author is chair of cybersecurity and privacy at law firm Saul Ewing Arnstein & Lehr in Baltimore, Maryland.
Explaining why she wrote the newly published book, Doss said: “I spent years immersed in [privacy issues] and I was constantly discovering new areas of data collection, new ways in which data is being used, new concerns for individuals, and I thought, you shouldn’t have to be a data expert to understand these things.”
NSA: We’ve learned our lesson after foreign spies used one of our crypto backdoors – but we can’t say how exactly
It’s said the NSA drew up a report on what it learned after a foreign government exploited a weak encryption scheme, championed by the US spying agency, in Juniper firewall software.
However, curiously enough, the NSA has been unable to find a copy of that report.
On Wednesday, Reuters reporter Joseph Menn published an account of US Senator Ron Wyden’s efforts to determine whether the NSA is still in the business of placing backdoors in US technology products.
Brave browser first to nix CNAME deception, the sneaky DNS trick used by marketers to duck privacy controls
The Brave web browser will soon block CNAME cloaking, a technique used by online marketers to defy privacy controls designed to prevent the use of third-party cookies.
The browser security model makes a distinction between first-party domains – those being visited – and third-party domains – from the suppliers of things like image assets or tracking code, to the visited site. Many of the online privacy abuses over the years have come from third-party resources like scripts and cookies, which is why third-party cookies are now blocked by default in Brave, Firefox, Safari, and Tor Browser.