Because these objects are moving fast, you would need to look a long way out. Long range radar is hard because the inverse square law applies in both directions, so you need 16x the power to double the range.
Maybe a solar powered array on the dark side of the Moon, to restrict any interference from Earth systems, and you get a nice sweep of the ecliptic for free.
I know that residential ISPs block outgoing port 25 because of the spam issue. Is it common for them to block it incoming as well? You don't really need outgoing port 25 to run your own mail server.
Directly, yes, but not via a smart host, which is how most SOHO mailservers (where used) are configured.
It's not quite a full-fledged, full-privilege system, but it continues to provide major benefits over Webmail or client-based (POPS, IMAPS) configurations.
Classified information, threats, bomb making instructions (borderline), categories of pornography, pirated media, libelous statements, trade secrets. Like I said, we may all agree that those things shouldn't be published--almost the entire world would--but some of them may be legal in some jurisdictions and not others, and there's a whole lot of grey area around the edges.
In general you can legally publish pretty much anything in the USA besides child porn or copyright infringement, everywhere else has stricter laws though.
There are numerous examples that have been given and I think all of them are disingenuous. Every single one of the examples harms people directly in some way. Burying a countries history intentionally is far different than censoring information that can harm people. Even under the 1st amendment we can actually get some of those examples. For example the media can publish classified but leaked material. The act of obtaining it without permission and releasing it to the public is illegal, but journalist are protected when reporting whistle blowing.
America is far from perfect, case in point the Red Scare, Japanese interment, civil rights atrocities. But that's not the issue. The issue is the tech companies specifically are forces that span the globe and those decisions and the ethical stances WILL and DO spill over into all societies they are apart of. Just look at oil companies, our desire for cheap oil and their desire for our money has driven wars, exploitation, corruption, etc.
It's easy for first world countries to ignore that because it happened else where, with tech companies though, those decisions leak into every country. Those policies are applied across the world. Apple's and other tech giants' stances on following the law regardless of morals and rights is applied everywhere. If that same law was here, they'd do it here.
That's the issue, not whether or not someone is putting medical information or classified information up for sale.
About 9% of Lebanon's parliament is the political party Hezbollah. They have a satellite TV station, Al-Manar. Americans hooking up satellite dishes to be able to watch it have been jailed, like Javed Iqbal.
As far as what the specific question is - what has Apple tried to publish that the US tried to publish, the answer is the same with regards to any of the PRC's giant domestic corporations vis a vis China. None of them tried to publish things blocked by their governments.
It's an odd thing to say amidst Assange's extradition, to bipartisan celebration. Of course they will get him for some technicality, as opposed to the attack on WikiLeaks - China is just less hypocritical about such things.
Trade secrets of other companies. HIPAA protected medical information. Classified information. Information related to the location of a person in the Witness Protection Program.
Does knowing that you're running or contributing to Open Source code count? The AWS Open Source blog posted elsewhere in this topic implies that Elastic is making it hard to tell.
> all commits in the github repositories are made by AWS staff.
Given that it was just made public this morning, it would be surprising if it were otherwise. The real question is what the contribution model looks like going forward. The blog post says "Contributions are welcome, as are bug reports and feature requests"[1], but of course the devil is in the details.
Making credential stuffing harder is the main reason to do this. Credential stuffing works because users reuse credentials across sites. If someone attempts to use a password from the HIBP database, the two most likely cases are that it's extremely common or the same person is reusing it. Extremely common passwords are bad for all sorts of reasons and the same person reusing a breached password makes the account vulnerable to credential stuffing.