Deleted Comment
What we desperately need is a real, useful micro-payments model where you can pay per-article. I'd be happy to pay you a few cents, or a dollar, or whatever, for each of the 3 or 4 articles I read on your site per month. But I'm not buying a subscription just to read 3 or 4 articles. The economics just don't work.
The other side of the coin is that if you're a news organisation, "the economics just don't work" with micro payments. You can't fund a month long investigative report based on micropayments, even if it produces a prize-winning piece, if you don't have guaranteed income to support it. What happens if you spend the month investigating and don't find anything?
Micro-payment per-article will only encourage "safe" journalism - articles that you know will resonate with your readers, rather than controversial pieces or in-depth, resource intensive research.
How does anyone knows there's something to bid on or do they only tell IBM? In that case it's hardly IBM's fault is it.
They were literally doing this! Then they got slammed for 'censorship', so they got rid of the moderators. Now they're in the position they are now.
Can you explicitly vote for nobody?
Our compulsory voting is really "compulsory voting". It's "compulsory turn up to a polling station and get your name marked off". You can drop an empty ballot in the box, draw penises on it, or even just turn and walk out of the polling place.
Also, the OP underestimates the impact of the minor parties. While there are two major parties, one of them is a coalition between two parties (Liberals and the Nationals), and there's a significant block of smaller parties and independents that are big enough that when they vote together they can have a deciding vote on legislation.
Edit: I didn't mean changing the port is a bad thing. You can and should do it, and it will help a bit - just that it shouldn't be the only thing to rely on for your SSH security.
Security is about layers. Nothing is foolproof. It's about implementing layers of controls to reduce your attack surface to an acceptable level, with the trade-off that many controls increase the complexity of your setup or compromises the convenience for your users.
For example, for SSH, this probably includes
* changing the default port
* enforcing SSH key authentication
* enforcing passwords on SSH keys
* implementing fail2ban
* installing jump hosts for internal machines
* implementing a VPN rather than external facing hosts (and with that comes all the additional layers for the VPN)
* etc...
Deleted Comment