

No it doesn’t. He’s innocent until proven guilty.
The evidence presented by the prosecution has to stand up to scrutiny, and it won’t.
No it doesn’t. He’s innocent until proven guilty.
The evidence presented by the prosecution has to stand up to scrutiny, and it won’t.
I think it’s more likely that the jury will vote to acquit just based on lack of evidence combined with police misconduct (and incompetence).
The evidence they’ve publicly talked about is both itself fishy and has chain of custody issues.
Normally they’d be able to get away with that because most defendants can’t afford good legal representation and most cases don’t get much scrutiny.
In this case, however, I think those issues completely sink the prosecution’s case and he’ll be acquitted just because the jury won’t believe he’s guilty beyond a reasonable doubt.
It’s just a matter of preference, not quality.
It wasn’t being marketed and sold as a meme product. It was being marketed and sold as critical safety equipment.
On top of that, it was being sold during a pandemic when such equipment was being used continuously by large segments of the population.
It shouldn’t be surprising that large numbers of people bought it; the company selling it lied to those people to trick them into buying it.
The perfect material for Tesla’s new cyberboat
Yes and No.
Yes, everything increases in difficulty but the increases in difficulty are asymmetrical.
The difficulty of reversing a computation (e.g. reversing a hash or decrypting an encrypted message) grows much faster than just performing the computation (e.g. hashing a message or encrypting one).
That’s the basis for encryption to begin with.
It’s also why increasing the size of the problem (e.g. the size of the hash or the size of a private key) makes it harder to crack.
The threat posed by quantum computing is that it might be feasible to reverse much larger computations than it previously was. The caveat on that, however is that they have a hard limit of what problems they can solve based on the number of qbits they have.
So for example, let’s say you use RSA for encryption and someone builds a 1024 qbit quantum computer. All you have to do is increase your key size so that it would require 1025 qbits to crack, and then that quantum computer wouldn’t provide an attacker any benefit at all.
(Of course, they’d still be able to read your old messages, but that’s also a fundamental principle of cryptography; it only protects you for a period of time)