Re: Advanced Tactical Laser - ATL
Problem with the "thrown into military compounds" part is you have to point a laser at the aircraft with pretty high accuracy.
5636 publicly visible posts • joined 15 Mar 2007
Lets face it the biggest problem with the text-based 2FA is not someone hacking the phone company's network but that likelihood that a user is relying on their phone for both the web login AND the text message.
So that dual-use phone becomes a single point of security failure, more so given the piss-poor patching and updates for most Android phones (i.e. most phones in total).
So use text-based 2FA if you possibly can, but please don't do both one the one device!
Well its hardly an authoritative analysis, but taking a look at the wikipedia page about him suggests he can't be any worse than Rudd. He seems to be competent in business and educated, and in fact he has in the past opposed some of the more stupid suggestions in the name of anti-terrorism, so a little better than most Torys.
How well his integrity lasts in the data fetishist's tower of the Home Office remains to be seen.
On the other hand whether paid-access-for-others stands up might depend on whether the domain owners opt in?
INAL but I think it should not - after all the right to privacy is not something to be sold without consent. LEA are a different matter, some would say they should get a warrant, others might feel that whois data is not so personal as to need that for a general look-up. Getting other data like IP addresses of those making contact, etc, is another matter.
To be honest, why should the rest of the world comply with a law Europe has developed. Why should the US, Asia anyone else?
Maybe because they want to do business with companies and people in the EU?
Otherwise they are free to do as their local laws demand, but just not to deal with EU customers.
Very true - simply nullifying a vote on the basis that some dodgy dealings allegedly* took place is a very risky idea and sounds a lot like certain tin-pot dictators do when general/presidential elections are held.
However, using such dodgy dealings as a reason for holding a 2nd democratic vote once people have seen more, and making sure that any illegal actions are prevented, that is another matter altogether.
[*] as we have not had a court trial yet, etc.
I suspect it is much less about guiding neuks to terminal global warming and much more about mitigating the major economic costs of the loss of precision navigation and timing. Few folk realise how much we take for granted would go TITSUP in the event of prolonged GPS outage (like mobile phone networks and digital TV, etc, and the services that rely upon them) to other things that do have fall-back options but less efficient/safe (like ship navigation and air traffic control).
For the legion of commentards on El Reg, yes. But then all of the rest of the population they will still buy "oh shiny thing!" and we still suffer from the botnets and friends & family pestering us to sort out the shit storm they have brought upon the digital world.
So really you have to make the manufacturers somehow responsible with enough clout that they act.
Make the supplier / importer responsible for the consequences of bugs that remain unpatched after, say, 1 month and for 5 years after end of sale. I'm sure it would focus minds on security and patching systems beautifully.
As for stifling innovation, at what point is collateral damage sufficient to stop marketing muppets from adding ill-thought out and supported features? Financial pain is probably the only incentive. Or jail time.
The main "punishment" the UK will get is a result of stupid politicians and those who voted from them. You don't need to punish someone who is beating themselves so effectively.
But otherwise you probably are right in terms of future job losses, just not in terms of the real reason.
Another very good reason for VM use is to get round the lack of drivers for ancient OS to match modern hardware. In many cases you can get "immortal" hardware as the VM sees little if any changes to the machine upon which it runs.
Of course one would not want to use an out of date OS, but in the real world you may well have some very expensive / difficult to replace software that works just fine on wk2 for example, but would be way too much cost/trouble to replace and run on a current OS.
OK so lets say you force your users to change passwords every 30 days, and even more assume this does not lead to piss-poor practice in terms of post-it notes, easy-to-guess choices or IT support getting lax in terms of vetting those requesting a reminder/renewal: Now you have an average time from breach to password change of 15 days.
Do you really think that any competent bad guys won't have totally screwed your systems in under 15 days? Not put in shadow accounts and/or key-logging software? Not used network access to compromise all those unpatched* devices you don't/can't have AV on like printers, IoT crap, etc?
So how much more useful is this compared to password changes one per year or only on employee changes or suspected breaches?
[*] when did you last get an update for any of your printers with built-in web servers?
The question being asked as fsck-all to do with why she chose to cross there, or it being night time. The key point is the car totally failed to see her and make any attempt to stop.
Uber execs should be facing jail time for this: they have shown the sort of negligence in design and system testing that lead to a death. Having some low-paid meatbag sit there with the hope of taking over in the event of a fault is something already ridiculed in tech circles such as El Reg, and yet that seems to be their approach to checking the sensor system could detect all reasonable risks.
No, this is still very important because some people actually do different things on facebook compared to the rest of the web they access.
Yes, I know that is a strange idea that there are people who won't spunk their entire life and thoughts on the modern idiot-box replacement, but it is apparently true. By locking out cookie / "like button" tracking they are making a good start.
Next think they should be addressing is browser fingerprinting. Just how much information is really needed to make a usable web site interaction? My guess is very little compared to what is currently offered, so they should stop reporting non-generic stuff like installed fonts, plugins, display size, etc. While some info might be useful, having only a dozen or so browser permutations from Firefox would be a major step forward in terms of privacy and a useful selling point over Google/MS offerings.
"why do you think autonomous vehicles would be any different?"
Because those behind it should be facing jail time for injury or death unless they can show the highest standards for safety-critical code. You know, like the aviation industry does.
What, that will make it too expensive to get rid of human taxi drivers?
Sadly we have reached the point where software suppliers/licensor/whatever need to be held to account for a shitty job. Just now they can fob off all sorts of liability under the EULA, but cars are different - they actually do kill people when it goes wrong as we are sadly now discussing.
It depends on your goals, budget and technical skills.
One advantage of most VPN providers is they in effect run NAT so your traffic shares an IP address with many other users, providing ether (A) plausible deniability, or (B) a noise-like signature for any advert tracking.
As for "no logging" then sure you don't log if you don't want to. But are Amazon are not tracking traffic to your rented instance?