I also noticed that in my tests, thus I stressed this point in the FAQ.
If you try LZMA, you'll see that it sometimes is actually worse than bzip2, even though the latter is regarded to be quite aged compared to the former.
If you are implementing a REST service, then I agree with you 100%. WebRPC is simply a different interpretation. In WebRPC, GET means "get the result of executing this method". POST basically means the same thing, but the arguments are passed in the message body (just like an HTML form).
The client libraries all use POST internally - GET is primarily useful for testing and debugging (so you can easily execute a method in the browser).
From my experience most of the time companies/teams didn't even try to implement Scrum. Like having multiple product owners, skipping meetings, inventing new meetings, product owners not attending sprint planing or developers not caring about the process at all. The product owner is a single point of failure. If he does not work well it is hard for a team to deliver. In most teams I worked so far team members haven't even read the Scrum Guide nor gotten any training and didn't care.
But another point often forgotten is that the main goal is to deliver a working increment. Even if not the whole sprint gets delivered for some reason.
This is obviously a publicity stunt. Or perhaps the thieves erased all of the data and set up a new user account... But then HiddenApp wouldn't be on the computer anymore.
Or maybe the original user was too dumb.
Or, most likely:
This is staged, and a publicity stunt. No other explanation.
Someone else mentioned that the app in question suggests opening up a guest account for this purpose on their site (i.e. your personal files are protected, but the thief can still use the computer).
Because if it was password protected the thief would just reformat the laptop and there's no chance of recovery. Allowing them to use the PC allows the software to phone home.
The "similar service" is really only the Find My Mac thing. These apps usually include taking screenshots, taking webcam pictures, simulating error screens, keyloggers, etc..
They most likely do, both password and FileVault. The idea is to intentionally leave a barely-functional Guest account available to anyone who opens the laptop. Those in possession of the laptop start using it and the tracking software phones home with location, photos, etc. This is even a best-practice suggested by Apple; its quite effective.
280K trump.ff.bz2
516K trump.ff.gz
304K trump.ff.xz
360K trump.png
32K trump.jpg
Using a more complex langscape image:
175M coast-hdr.ff
42M coast-hdr.ff.bz2
83M coast-hdr.ff.gz
39M coast-hdr.ff.xz
6.5M coast-hdr.jpg
52M coast-hdr.png
Does not look that bad to me compared to PNG.