Yeah it was sort of cool. There were entire software products built on top of Notes and its forms and workflow.
I never had to program any of that, so can't speak to that side of it, but where I worked we used Notes to quickly build a lot of internal forms and workflows, and had some internal discussion forums and documentation in it, it all worked pretty well as I recall.
The one weird thing was we had to run it on OS/2. The only OS/2 machine in the server room.
My only experience with it was in 1999, I took a distance-learning class to learn C++. The teacher would send us mail about assignments, reading that we needed to do, quizzes at the end of a unit, etc. We submitted our projects through that system too.
Maybe I'd have a different opinion now, but I remember it working pretty well for that purpose back then.
I don't understand this comment. All electronics assembling happens in Shenzhen. Be it Apple, Cisco or Microsoft. If anything this is par for the course.
What I personally would have liked to see was an EU based entity overseeing and taking responsibility for the project since neither US nor China really should be trusted with privacy these days.
Are respondents truthful in interviews? I found my wife using a dating application. It was very easy, I just had to widen the geography I was searching.
Same here, I was lucky being a digital nomad, hopping about in western Europe. There also needs to be a willingness to have a long distance relationship though.
Given the current US administration I don't see any respect. America wants a shining beacon on their tech and offerings while my continent Europe and others has to be painted in a worse light.
Presuming this results in a cryptosystem change for Akira, there’s a real number of victims who won’t get their data back as a result of this disclosure.
Whether the number is more than that of victims to date who can recreate this? Who knows
I can’t remember the example (it was a conference talk a few years ago), but I’m pretty sure there’s LE and DFIR companies who also reverse this stuff and assist in recovery, they just don’t publish the actual flaws exploited to recover the data.
It was already disclosed to the bad guys that someone managed to break their encryption, when they didn't get paid and they saw that the customer had somehow managed to recover their data. That probably meant they might go looking for weaknesses, or modify their encryption, even without this note.
Other victims whose data were encrypted by the same malware (before any updates) could benefit from this disclosure to try to recover their data.