Last month, Congress voted to repeal FCC rules that would prevent internet service providers from selling your personal web browsing and app usage data. It was a decision that's unpopular across the country, regardless of party affiliation. If the politicians that voted in favor of the reversal thought no one would notice, there are some big ass signs in their districts that say otherwise.
The internet activists at the non-profit Fight for the Future have crowdfunded four billboards, so far, that shame the members of congress that voted for the repeal. The lawmakers that have the honor of being called out will now have to see their face along the highway when they return home. Those lucky few are Marsha Blackburn (R-TN), Dean Heller (R-NV), John Rutherford (R-FL) and Jeff Flake (R-AZ). These four lawmakers accepted a combined $196,905 in campaign contributions from the telecom industry in the last election cycle. Blackburn, in particular, has been a longtime enemy of net neutrality. Just last year, she brought up SOPA and tried to frame it as an initiative that would have increased cybersecurity.
(Score: 2) by kaszz on Monday May 08 2017, @12:21AM
Actually lack of USB support can almost be seen as a security benefit ;-) but quite unpractical.
Driver support tend to come with many developers using the system and commercial entities using it.
The interesting concepts that can be developed into a "killer" OS for the feature can be:
* Using a microkernel can get rid of a lot of system instabilities, provide security compartmentalization, make development easier etc.
* By having interprocess handling, services, drivers and filesystem running as user mode processes both security and development becomes easier. Having a filesystem crash right now usually crashes the kernel too.
* When the CPU is abstracted as a service, other processors that are physically elsewhere may be integrated with less special case handling. So that it looks like the local processor have many more cores than it actually has.
* The microkernel decreases the attack surface in comparison with monolithic kernel.
The microkernel may possible be equipped with system monitors that thwart unauthorized system operations from other security "rings" (hint -2). Moving processes between distant CPUs may perhaps also be implemented. And hypervisor alike functionality without the need for the CPU to support it.
All software projects are a pile of crap until it's developed into something better.