11 Matching Annotations
  1. Aug 2022
    1. John Bye [@_johnbye]. (2021, October 6). The new covid sceptic All Party Parliamentary Group on Pandemic Response and Recovery is backed by Gupta and Heneghan’s Collateral Global to the tune of over £30,000. £5,000 in financial benefits plus £25,501—£27,000 benefits in kind (CG is acting as their secretariat). Https://t.co/qll20Sg9aA [Tweet]. Twitter. https://twitter.com/_johnbye/status/1445867760819396608

    1. (e.g., the ability to quickly onboard new collateral types and change risk and auction parameters).

      This calls for a dynamic gov process relative to the market conditions. Gov-->clear and open in stable markets Gov-->versatile and swift in fast-paced changes

  2. Feb 2021
  3. Aug 2020
  4. Jun 2020
    1. If easy-to-use software like Signal somehow became inaccessible, the security of millions of Americans (including elected officials and members of the armed forces) would be negatively affected.
  5. May 2020
  6. Apr 2020
    1. The key change here is the removal of an intent to defraud and replacing it with willfully; it will be illegal to share this information as long as you have any reason to know someone else might use it for unauthorized computer access.It is troublesome to consider the unintended consequences resulting from this small change.
    2. The problem is that it is that the laws themselves change the very definition of a criminal and put many innocent professionals at risk.
    3. As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
    1. Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
    1. The term has also been borrowed by the computing community to refer to the refusal of service to legitimate users when administrators take blanket preventative measures against some individuals who are abusing systems. For example, Realtime Blackhole Lists used to combat email spam generally block ranges of Internet Protocol (IP) addresses rather than individual IPs associated with spam, which can deny legitimate users within those ranges the ability to send email to some domains.