Re: Time for some truly revolutionary GUIs?
Why voice control is not the goal of the next level of PC and tablet UI design I don't know
Because many offices are open-plan.
Vic.
5860 publicly visible posts • joined 7 Dec 2007
You do not have to say anything. If you don't talk, then you can't hand over your decription keys
But if you take that line, then you are committing a specific offence (failure to comply with a S49 notice) in addition to whatever they wanted you for in the first place. Think of it like resisting arrest - i doesn't replace the original charge, it's something else for which you can get thrown in the slammer.
Vic.
S.49 is not a key escrow law. You are not compelled to disclose a key or plaintext if you demonstrably have no ability to do so.
Whilst that is probably how a judge would apply it, it's not how the law is *written*.
S49 makes it an offense to fail to hand over keys or decrypt a file when a notice is issued. An "appropriate person" makes the decision that it is an encrypted file, and it is not an absolute defence in law for the subject not to have the key, nor even for the file not to be anything of the sort.
And that's the problem I have with it: it criminalises someone else's errors.
Vic.
If indeed you do need to be being investigated for terrorism or national security reasons for this law to apply
You don't.
S49(3) says :-
A disclosure requirement in respect of any protected information is necessary on grounds falling within this subsection if it is necessary—(a)in the interests of national security;
(b)for the purpose of preventing or detecting crime; or
(c)in the interests of the economic well-being of the United Kingdom.
...Which is about as broad as it is possible to be :-(
Vic.
from my memory of the law, for the offence to be complete, it has to be shown the defendant was *able* to break the crypto, and that a forgotten password would not lead to jail.
I'm afraid your memory is inaccurate.
The material in question doesn't even need to be encrypted data - just that a "person with the appropriate permission" believes it is, and that the subject of the S49 notice has the key.
The law is extremely poor, and this case shows how easily it can be abused.
Vic.
You're facing the intractable First Contact problem, where Alice and Bob need to prove themselves to each other when they've never met before. The only way to do that is with a third party, Trent. Problem is, any Gene or Mallory can just impersonate or fool Trent.
Your point notwithstanding, the bigger problem IMO is that Alice has already decided to trust Gordon[1] and Mallory to boot. So the root of the web of trust is already compromised before we start.
The solution - as always - is education. But I've no idea how to get end-users to care about this[2], let alone get them to take action in terms of curating their root cert lists...
Vic.
[1] Who, as we all know, is a moron...
[2] Even after they've suffered personal losses, most users just think tha's how life works.
Motor racing is a NON CONTACT SPORT.
You've not seen Anthony Reid drive[1], then?
Already we have drivers who grew up with that heap of crap that is BTCC crashing in to each other because they think its OK
I caught the tail end of a Touring Car race on telly the other day - it appears that the BTCC are clamping down on contact. Which is as it should be - it's supposed to be a demonstration of skill, not a test of armour...
"it was OK in BTCC so I thought it was OK in FFord"
Thankfully, open-wheel contact is usually expensive[2] enough that drivers tend to avoid it long before they get to the super-high speeds where they might consider it profitable
Vic
[1] Particularly when there are flint walls around.
[2] I caught up with an old friend the other day - he rented out his Jedi this year. The bloke that rented it crashed on his first race, taking the car out for the rest of the season while it had a £14K rebuild...
If you sample, such as what happens with D to A conversion, then you always get aliasing taking place
Not so. If your sampling frequency is at least twice the maximum frequency in your input, aliasing cannot take place.
That's not the same as saying that the reproduction will be perfect as long as the Nyquist criterion is achieved - but it isn't aliasing that causes you problems.
Vic.
To recreate a perfect square wave does require an infinite frequency response.
Yes it does. It's an infinite series.
You seem to be adopting the attitude of "It's not a perfect square wave so it's useless".
An imperfect square wave is indeed useful, and does not require infinite frequency response. But look at the line from your post that I quoted above - a perfect square wave does indeed require infinite frequency response.
Vic.
The class D amplifier contains only analogue electronic devices
That's only true inasmuch as all digital devices are made out of analogue devices.
There isn't a logic gate, a flipflop in sight.
Yeah, there is. It's all logic gates up to and including the PA stage. The audio is held as PWM info on a high-frequency carrier, meaning it can be processed in DSP or similar at any stage of the proceedings. The LPF at the tail end strips off the carrier - this is beyond the last active component of the amp.
Vic.
> Never heard of a digital amplifier. Amps have to be analogue.
They don't. Class D Amplifiers are becoming more popular these days, as it allows you to be digital all the way through to the output, where your LPF strips the modulation away from the carrier and makes it analogue again.
HTH
Vic.
Tinnitus is (or at least some forms of it are) caused by some of these sensor cells getting activated for no reason
I wouldn't say "for no reason"...
The cochlea is a wet environment. The oscillators[1] within it will therefore have a low Q.
To overcome this, there is a positive feedback system.
When this misfires, you get spontaneous oscillation - that's tinnitus.
Vic.
[1] Stereocilia, apparently.
Apple's understanding of the device being "off" / in stand-by is to just turn off the video output. The processor still runs at full speed and the hard drive still spins at normal speed
Sky decoders used to be the same - putting the device into "standby" meant turning off the A/V outputs and turning the front-panel LED red.
These boxes need to be tuned to a stream, need to have their demux running, and need to have the CPU decoding some of the table information in the stream. This is how the Conditional Access stuff works, so I imagine it is still the case with current builds.
Does anyone know what the energy impact of DAB would be if anyone used it?
Vic.
Pfft, unless (as I do) I keep my phone switched off until I need to use it. My battery has lasted 19 days so far.
I keep the phone switched on, but BT/WiFi/Data switched off unless I'm using it.
I get about 8 or 9 days out of my Galaxy S2 :-)
Vic.
However, I bet if I setup a linux distro, you'd be in, out, and shaking it all about before I could say "hokey cokey".
Actually, no.
The defaults for *most*[1] distros is to set up for secure operation, and let the admin punch holes in it as he sees fit. As long as you don't take stupid advice from idiots on fora[2], it remains pretty secure.
Windows, although perfectly securable these days, comes with many of the defaults set to "insecure" to make sure that users don't get confronted with any sort of "access denied" errors. That's a shame.
Vic.
[1] Not all. There have been moves to make Linux "friendlier". This invariably makes it a steaming pile of security nightmare in return for a very minor increase in (temporary) user satisfaction.
[2] The most common one is to chmod everything in sight to 777. This makes it writable by everyone - so the immediate errors go away. And it makes your server *trivial* to take over. I've had customers pay me big money to secure their boxes, then *insist* that I 777 everything because they read it from a starnger on a website. I need written instruction to do that...
> Right - I'm contacting my MP and MEP
I spent Wednesday evening in a pub sat next to my (likely) next MP. She kinda impressed me with her superpowers of "listening" and "comprehension".
Then I looked her up on the web and found that she's been caught out telling porkies on her website on a number of occasions. Plus ca change... :-(
Vic.
It doesn't have to be a root user especially, just a directory in which one has sufficient rights to create a file AND (rather more importantly) some dumb person (with sufficient rights) who is likely not to notice a a file called '-rf *' or whatever before doing some wildcard rm anyway.
But that's not an exploit.
Even if the "-rf *" is interpreted as a file before wildcard expansion (as it is on my shell[1]), all it does is prevent the command from working properly; it doesn't give the file's creator any additional privilege unless it is being executed by some sort of command processor - i.e. the root user needs to type "python *" or something eequally idiotic.
In short, this can only catch out users with elevated privilege and not the slightest clue what they are doing. And there are easier ways to pwn them than this...
Vic.
[1] As follows :-
[vic@perridge wc_test]$ ls -l
total 4
-rw-rw-r--. 1 vic vic 0 Jul 4 11:05 foo
-rw-rw-r--. 1 vic vic 4 Jul 4 11:05 -rf *
[vic@perridge wc_test]$ rm -rf *
rm: invalid option -- ' '
Try `rm ./'-rf *'' to remove the file `-rf *'.
Try `rm --help' for more information.
The simple truth is, anyone with high-privilege access essentially owns the system at worst, the entire network at more worst. Hence, the story is nonsense fluff that warns about excessive privilege granting.
Exactly what I was thinking. Requiring root privilege to create a root escalation is a null problem - if you've already got the power, you don't need to nick it.
If you did want to exploit a temporary grant of root privilege, it would be a lot easier to copy /bin/bash to your home directory & then setuid it...
Vic.
Little can bring a system to its needs quicker (ha) than multiple competing applications all running their own update check process every time the system starts
Microsoft could trivially - and perfectly legally - port yum or similar to Windows and get it adopted as the way to do software updates.
This would give Windows much of the update ease we G/L types crow about. It would also give users a single interface to find out what software is on their machines, what is out of date, and a method to update it.
It amazes me that they haven't done so...
Vic.
That's the kind of "appreciation" I (and the DNS servers I run) could do without.
I run a recursive nameserver on the quiet - it makes customer-site diagnostics a lot easier when I've got a spare nameserver to hand.
Last year I found what initially appeared to be a DDOS against my server. It turned out to be a *huge* number of DNS queries from a Dutch netblock.
It appears that certain less-scrupulous ISPs hand out other people's DNS services from time to time. So they got firewalled. I expect they got a lot of complaints form that...
Vic.
> I am stating that most terrorists are fucking idiots.
It's a common mistake to underestimate one's enemy.
They clearly have a repugnant set of ethics, but if they are truly "fucking idiots", then why aren't we catching them and prosecuting them properly?
Terrorists might[1] be total cunts, but there's a strong chance that many of them are at least as intelligent as the rest of us...
Vic.
[1] It has to be a "might" because many of the people in history that we look up to were technically terrorists at the time...
There is no way they would have also implemented the backend infrastructure required to allow the noip DDNS client to "phone home" and update their A records.
They didn't actually *need* to do that to effect what they wanted to do.
All they needed to do is to return an authoritative NXDOMAIN for the malware-related subdomains, and pass through everything else to NO-IP's DNS servers. This is trivial stuff.
That they failed to do so speaks volumes :-(
Vic.
Convictions for literally almost any crime would have to be removed due tot he rehab of offenders act
Not so.
From the Rehabilitation of Offenders Act 1974 :-
5 Rehabilitation periods for particular sentences.(1)The sentences excluded from rehabilitation under this Act are—
...
(b)a sentence of imprisonment or corrective training for a term exceeding thirty months;
So if you get 2.5 years for a crime, you are ineligible for rehabliitation under the Act. You always have to declare it.
This is why I thought it was a bit rough a while back when some kid got 4 years for trying (and failing) to arrange a riot on Facebook/Twitter/WhateverItWas. Although the law allowed for that punishment, it meant that it would be an indelible mark on his record.
Vic.
The capacity of the engine isn't important; to reduce friction, use fewer cylinders.
Or use some exotic materials...
My old Chemistry teacher had great tales to tell about his previous life as an industrial chemist. He'd worked on a ceramic with a negative coefficient of expansion such that it could be combined with the alloy used in an engine to create zero-expansion parts. The resulttant engine was far more stable with temperature, and so could be run very much hotter (with the corresponding gain in efficiency).
Cheap it was not, though :-)
Vic.
I'd be very worried about travelling in an enclosed two wheeler. It takes too little to go wrong to have a fall over in traffic incident.
That's why it has two additional wheels that come down at the sides.
Even if you forget to put the wheels down, it will land on one of the additional wheels, and you can get going from that position.
Vic.
"Blitz" when used in German in that context is not a synonym for "lightning" either.
The only context in which "Blitz" is used in English is to describe the wartime bombings. That's why saying that English has the word "lightning" is such a non-sequitur - "Blitz" is never used in English to mean anything to do with lightning.
Vic.
You don't do the layout yourself. The tools do that. You just provide the timing constraints and it is the job of the tool to do the floor planning.
If you read the rest of my post, you'll see I talk about the tools.
But floorplanning - you tend to do that yourself for non-trivial designs, as it makes a huge difference both to the execution time of the tool and to the probability of any run actually meeting timing constraints.
SmartXPlorer and DSE still take a shitload of time to run...
Vic.
Haven't we been here before, 30 years ago?
I'm glad I'm not the only one saw the Transputer link in that slide :-)
Anyone remember Occam?
The trouble with Occam is that many people really couldn't get their heads around it. Although it helps with implementing parallel designs, it doesn't do all the work for you - and some of the Occam floating around the world is, shall we say, "less than optimal".
I don't have exact figures, but it was generally accepted within ST that more Transputers were sold after the name was dropped and 3 of the links were cut off - at that point, it became the ST20, and that forms the core of a significant number of STB designs throughout the world. You've probably got one in your living room.
One of the big thongs that affected T4/ST20 popularity was the existence of the C compiler. People were much happier programming in C. If you run "strings" against the binary, you'll see that it's a C-to-Occam translator lying on top of the Occam compiler :-)
Vic.