* Posts by Michael Wojcik

12317 publicly visible posts • joined 21 Dec 2007

Remember the Uber self-driving car that killed a woman crossing the street? The AI had no clue about jaywalkers

Michael Wojcik Silver badge

Re: Surely

If you're a driver be careful of children riding Shetland ponies, they may be closer than you think!

Really, this is good advice even if you're not a driver.

Michael Wojcik Silver badge

Re: Surely

The deer sprang off but the bambi slipped. I had no time to brake so I drove the car into a ditch.

It's a tough choice, assuming you even spot it in time and have the presence of mind to make a conscious decision. Around here, where deer are the second or third most common cause of vehicular accidents (impairment is first; the statistics I've seen were from several years ago, and distraction may now have passed deer), the authorities and insurance companies frequently tell people not to swerve, just brake if possible and stay on the road, on the grounds that swerving is statistically more dangerous to the driver and passengers than hitting a deer.

I've never hit a deer with any of my cars, though I've had close calls, and once was hit by a deer. It jumped out from the woods into the side of the car. I wasn't going sideways, so that puts the deer entirely at fault. (Also I had the right of way. And it wasn't licensed or registered to operate on the public roads. Deer have little respect for the law.)

Michael Wojcik Silver badge

Re: Surely

My wife has seen them on the offramp

I was driving on Interstate 96 near Lansing, MI a couple of years ago. It was around 1 AM and snowing gently - typical mid-Michigan snow, big fluffy flakes spiraling down like something in a movie. Not yet accumulating on the road, so I was doing something close to the posted limit of 70 MPH; I-96 is a limited-access four-lane highway. The road was nearly deserted; I'd passed a semi a mile or two back, and there weren't any other vehicles in sight at the moment.

I'd been driving for about 14 hours, coming from Kansas.

If you've driven in snow showers at night, you know what it looks like - the hypnotic effect of flakes catching the light from the headlights and spinning past, while the segments of the dashed lane-separator line click by on the road. Flakes, dash, flakes, dash, flakes, deer standing in the left lane close enough that I could have slapped it had I stuck my arm out the window, dash, flakes, ...

By the time the headlights lit up the deer, I was maybe a car length away. I was just lucky it stood still. That truck I'd passed a little way back? Who knows. There wasn't any way to warn him about it.

I did swear vigorously for a few minutes, though. That helped.

And that's not the only time I've driven past a deer standing in the road on a highway at night.

Chrome OS: Yo dawg, I heard you like desktops so we put a workspace in your workspace

Michael Wojcik Silver badge

Re: GEM ? 1980s ?

OS/2 only got virtual desktops with Warp in '96.

Never used GEM, but according to Wikipedia GEM/2 was a tiling (no overlapping windows) GUI, with two fixed windows. That's not the same as virtual desktops. (There were a number of tiling GUIs in the '80s, such as the Cambridge Window Manager for X11, part of the Project Athena collection. They never caught on.)

Apparently GEM/XM, from the mid-80s, did let you flip between multiple GEM and DOS applications and change which ones had screen real estate, so that was more or less a virtual-desktop system.

Michael Wojcik Silver badge

Re: Really ?

even poor old Windows finally got them 4 years ago

Long before that, actually. There were virtual-desktop utilities for XP, and you could do it way back in NT 4 (and I believe in NT 3) if you wanted to write the Desktop-switching code yourself.

Michael Wojcik Silver badge

Re: Linux for the win

With X11, there is no "mouse interface native the unix os", assuming by "interface" you mean "consistent way of interpreting input from the mouse". Mouse events are handled and interpreted by the X11 client that currently has pointer focus - that can be the window manager or an application (or potentially the X11 root window, though in practice essentially everyone runs a window manager that intercepts events to the root window).

Mouse behaviors for applications are thus up to the application itself. Where you get consistent behavior, it's because applications are using toolkits (SDKs or frameworks) which implement that behavior, often using hints from the window manager, or in today's overengineered X11 world, some other component.

You could write a window manager that intercepts all mouse events, translates them as you prefer, and then forwards them to the window with pointer focus. That would have seemed an amusing exercise when I was 20; now it doesn't appeal, personally. I'd just suck it up and use the default behaviors.

Of course that's assuming you're using X11. I have no interest in Wayland and no idea how it works. X11 was good enough for me in the '80s, and it's good enough now.

Michael Wojcik Silver badge

Re: *IX

Yup. I recall adding a virtual-console driver for a prototype graphics card (when running in text mode) to BSD 4.3; that was the late '80s, but as jake says the capability had been in BSD for a while.

IBM's AS/400 had two virtual consoles per physical 5250 device, and I believe that was inherited from the predecessor S/3x systems. I don't know how far back that goes, but the 5250 and its twinax physical cabling (which provided the topology that let IBM do the virtual addressing of those consoles) dates back to the S/34, in 1977.

For GUI multiple virtual desktops, X11 had this capability in principle right from the start (that is, an X11 window manager could have implemented them), but I don't recall when they first became common. I also don't remember if any of the managers shipped in the stock X11R3 distribution, for example, supported multiple virtual desktops. (X11R3 supported multiple physical displays, of course, but that's a different feature.)

To be fair, multiple virtual desktops were available in Windows as far back as XP, using an add-on such as the one in PowerTools. The necessary OS support goes back as far as NT's WinStation and Desktop abstractions; it's just Microsoft couldn't be bothered to give users access to it.

OS/2 had multiple desktops in Warp, circa 1996. Still late to the party, but a lot earlier than Win10.

From Instagram to insta-banned: Facebook wipes NSO Group workers' personal profiles amid WhatsApp hack rap

Michael Wojcik Silver badge

NSO Group were not friends of Facebook before this. They're not anyone's friends.

You'e yping i wong: macOS Catalina stops Twitter desktop app from accepting B, L, M, R, and T in passwords

Michael Wojcik Silver badge

Re: This bug probably doesn't effect everyone....

"Have you tried sex?"

"No. I hear it has a bug that effects everyone."

(I know no one will see this, but I couldn't resist.)

Imagine OLE reinvented for the web and that's 90% of Microsoft's Fluid Framework: We dig into O365 collaborative tech

Michael Wojcik Silver badge

Compound documents, eh?

What do compound documents look like in the internet era?

HTML. Next question?

And, of course, there's already a tremendous body of research, in fields such as digital rhetoric, HCI, and CSCW (Computer-Supported Cooperative Work), on breaking the monolithic-document model and replacing it with robust, stable, versioned, extensible views of common data. I know of a couple of such systems that have been in production use for years. I have to wonder how much attention Microsoft (which has often been plagued by NIH, even among its own divisions) is paying to that existing work.

Heads up from Internet of S*!# land: Best Buy's Insignia 'smart' home gear will become very dumb this Wednesday

Michael Wojcik Silver badge

Re: Is anybody surprised?

We had service bureaus and other forms of utility computing long before someone co-opted the term "cloud". Utility computing obeys the same economic forces as utility power and water. It's not going to go away, and our energies would be better spent fixing it (which will require technical, regulatory, and social corrections) than stamping our feet and thumbing our noses.

Michael Wojcik Silver badge

Re: Contact your credit card company.

I'd never seen "avec" used as a noun in English before (and, yeah, I'm not a fan of it either), but interestingly Wiktionary claims that it's used as a noun in Finnish, apparently as a synonym for "date" (I assume in the sense of "meeting") or "company".

Michael Wojcik Silver badge

Re: Everything under control

Looks like a lot of folks missed the joke icon. Or maybe all 13 fans of 3D TV are Reg readers.

Michael Wojcik Silver badge

Re: Contact your credit card company.

when I install a switch or an outlet on the electrical circuit of my home, I expect it to work for, I don't know, 50 years?

50 years is ambitious with a lot of modern consumer electrical gear, I'm afraid. In the US, GFCI outlets are required in a number of areas of a home, and the electronics in those often die after only a decade or two. I have one in the kitchen that needs replacing which was installed in 2003. I have my doubts about the longevity of AFCI circuit-breakers, too.

Basic SPST mechanical switches often last a long time, but I've seen older ones break at the handle as the material degrades. One time I was living in a rental house and I flipped on the light in the bathroom one morning, and the Bakelite switch shattered into power. Just completely gone, down to the actual sliding contact in the switch body. And the landlord was coming by that day. I had about 45 minutes to run to the hardware store, buy a replacement switch, and install it. My roommate actually had to stall the landlord down on the first floor with some bogus story about an intermittent plumbing issue while I was reattaching the cover plate upstairs.

Michael Wojcik Silver badge

Re: We shouldn't have skipped the time when it was the Intranet of Things

For most people, that's a license plate: too complicated

Sure. We all have limited fields of expertise. But there's nothing stopping one of these firms making and selling IoT crap from producing commercial equivalents of DCFusor's gadgets, without extraneous cloud-connection and phone-home crap tacked on. A DMZ port in the home router can be manually configured by those who know how, or opened using UPnP for those who don't (and who will therefore likely have UPnP enabled).

I get the impression from comments above that some home-automation vendors do offer products more or less along these lines. (It's not an area of technology I'm interested in, so I don't pay close attention to what's available.) In any case, it's possible for vendors to offer turnkey remotely-accessible home-automation systems that don't depend on some server outside the homeowner's control (aside from the actual networking infrastructure, of course).

Michael Wojcik Silver badge

Re: We shouldn't have skipped the time when it was the Intranet of Things

You might have video cameras. You might want to look at them from across town. You might need to be able to turn the lights on to see anything.

Why doesn't the camera have its own integrated LED lighting? Cheap and trivial, and it would save me from having to control two devices, with the associated additional complexity and points of failure.

Not that I have ever desired such a thing, even with owning houses in two states (indeed, two time zones). That's what I have neighbors for.

Socket to the energy bill: 5-bed home with stupid number of power outlets leaves us asking... why?

Michael Wojcik Silver badge

Re: priorities

Of course this whole subthread, from Hans down, was a series of jokes, which I suspect is why you were downvoted; but it's true that the earlier posts were unsupported prescriptivism. Using "amount" for discrete (countable) entities is well-established usage and perfectly comprehensible to English speakers. (It's also a question of diction, not grammar.)

OneCoin lawyer trial kicks off in NY as cryptocurrency founder remains on the lam

Michael Wojcik Silver badge

Re: Earned A Precarious Living By Taking In Each Others Laundry

Except it's not a simple as that.

Right. In frauds like these, typically many of the victims are people who are not financially literate, and who have very few opportunities to leverage a small amount of capital. They may have only one opportunity in their lifetime to invest in the hope of moving from an existence of chronic or constant financial peril to one of minor comforts and a degree of financial security. That's not "greed"; it's survival.

But of course snap judgements are a staple of the omniscient Reg commentariat.

Michael Wojcik Silver badge

Re: Incorrect Reporting

Pyramid scheme, Ponzi theme [sic], Multi level marketing.

They are all the same.... Or am I wrong?

You're wrong. Ponzi schemes are not pyramid schemes. Ponzi schemes are flat, not hierarchical; the controllers pay investors leaving the pool using receipts from new investors. There's no pyramid.

MLM schemes are indeed pyramid schemes, with the addition of actual exchange (of goods, as with Amway / Alticor or Herbalife, or of real property, or of financial instruments, etc) between network members and a wider market. I'm not aware of any MLM schemes where the exchange economic activity hasn't been dwarfed by the membership economic activity, i.e. the transfers of wealth up the pyramid. I wouldn't touch them myself - at the very best they're hugely inefficient at their ostensible non-pyramid activity, and the property being marketed is often rubbish - but they're not pure pyramid schemes.

Also, all capitalist economic organizations require an influx of new participants to grow. Some are content to grow "organically" by selling something of (perceived) value to a market; some are even not particularly obsessed with growth and are comfortable more or less maintaining a consistent stream of income. But it's not the need for new participants that distinguishes pyramid schemes (including MLMs) and Ponzi schemes from non-fraudulent businesses - it's the excessive reliance on them.

Watch Waymo's totally driverless self-driving car cruise around, how the US military wants to use AI ethically, etc

Michael Wojcik Silver badge

"childlike tone"?

Tone, as a term of art in rhetoric and poetics, refers to the attitude toward the subject material implied by the work. In what way is the attitude implied by the article "childlike"?

Boffins don bad 1980s fashion to avoid being detected by object-recognizing AI cameras

Michael Wojcik Silver badge

Re: Great

The obvious solution for the AI-car-mongers, is to encourage worse human driving

All the auto manufacturers already working on that, such as by putting fucking touchscreens in front of the driver.

DoHn't believe the hype! You are being lied to by data-hungry ISPs, Mozilla warns lawmakers

Michael Wojcik Silver badge

BLOCK CAPITALS MAKE EVERYTHING TRUER.

Revealed: The new icon you'll click to download an alternative browser, and more from Microsoft

Michael Wojcik Silver badge

To be fair, I can't say I've ever been particularly impressed by an icon. It's not one of our culture's great art forms.

Antarctic researchers send an SOS to the world: Who wrote this message in a bottle?

Michael Wojcik Silver badge

"Don't open that bottle. It's probably full of malware."

Aw, bad day at your air-conditioned, somewhat clean desk? Try shifting a 40-tonne fatberg

Michael Wojcik Silver badge

Re: Other places...

Many sources, such as this one, describe fatbergs in countries other than the UK.

Besides the flushing of fats and non-disintegrating wipes, some major contributing factors appear to be the percentage of sewer capacity in use, roughness of sewer lines, and amount of calcium in the water (due to source hardness, calcium leaching from concrete, etc). The calcium reacts with saponified fats to form soap scale, just as it does in the shower, for example.

Running on Intel? If you want security, disable hyper-threading, says Linux kernel maintainer

Michael Wojcik Silver badge

Thanks. I'd forgotten the Register broke the story. (I'd only learned of it myself a week or so earlier, in an embargoed announcement by CERT. Sometimes there are benefits to being on a PSRT.)

Michael Wojcik Silver badge

Re: Quick question

This "probably" means it is exploitable via JavaScript, so, basically, you're 0wned by a web page.

If you read the original SPECTRE paper, you'll see that one of their demonstrations was indeed implemented in Javascript. Before the paper (and associated CVEs) went public, major browser manufacturers implemented mitigations for that particular attack. Subsequently other MDS issues in browser Javascript engines were pointed out, and then mitigated, over a number of iterations.

These days, it's likely difficult to mount a successful MDS attack in Javascript under a recent release of a major browser, particularly when hardware / firmware / OS mitigations against the most useful side channels are also enabled. I wouldn't rule it out, though.

Michael Wojcik Silver badge

Re: Quick question

But even if you can read someone else's bytes, actually knowing what that data represents (in someone else's application) is impossible.

The many successful MDS demonstrations, going back to the original SPECTRE paper, show that you are utterly incorrect.

So do many other untargeted-exfiltration exploits, such as Heartbleed. In fact it's often very easy to determine how to correctly interpret exfiltrated data.

When the Morris Worm came out, there was much public sentiment that Morris was some sort of wunderkind and overflowing the fingerd stack was a stroke of genius, unlikely to be reproduced any time soon. Then Levy published "Smashing the Stack for Fun and Profit" in phrack, demonstrating that it was actually quite easy to develop a stack-smashing exploit, and suddenly everyone and their basement-dwelling cousin was doing it.

Michael Wojcik Silver badge

Re: Quick question

The original Javascript SPECTRE attack might well have been a big deal had fixes not been pushed out before publication, because it would have been easy to deploy against normal users. It's a good example of responsible disclosure working as intended.

Is HONK nothing sacred HONK? It's 2019 and an evil save file can pwn much-loved HONK Untitled Goose Game

Michael Wojcik Silver badge

Re: How it might work

Well, in terms of vulnerability risk assessment, as we do for CVSS scoring, you have to look at the threat model. A couple of mitigations:

* UGG is not a common application in the same sense as, say, Microsoft Word. The target population is not enormous.

* User interaction is required, and typically some social engineering. Users don't habitually open game-save files from untrusted sources. Again that limits targets, and complicates automated or bulk exploitation.

* Users should be running with normal privileges. Of course we know that users often run with excessive privileges, but in this case the vulnerable application doesn't have any good reason to do so, unlike with some targets.

* The target doesn't have direct access to sensitive data, so an exploit has to be chained with, or followed by, at least a pivot maneuver to get anything of value. That's not an obstruction for a determined attacker but it increases the attacker's work factor to do anything useful, and so discourages casual exploitation.

I still don't know that I'd rate this as "amusing", but it probably pushes it from Critical down to High or even Medium importance, depending on the user aspects of your threat model. (In my case, since I don't have to worry about any UGG users, it doesn't matter at all.)

Michael Wojcik Silver badge

Re: How it might work

Yes. Or using an eval operation on anything else that provides it.

Michael Wojcik Silver badge

Re: How it might work

The classic presentation on the subject is "Marshalling [sic] Pickles from AppSecCali 2015. It's a good one; anyone interested in further detail on how this sort of thing is exploited in various languages and contexts might want to watch the video or at least browse the slides.

In the MITRE CWE scheme, it's CWE-502.

Michael Wojcik Silver badge

Re: Honk if you want to go faster

That's a fine sentiment, but it's pretty clear from context that Jon Postel intended the Interoperability Principle as a recommendation for the liberal interpretation of malformed data. That has frequently created security issues, as with, for example, permitting non-canonical UTF-8 sequences, which may bypass special-character blacklists but then be interpreted by parsers.

The Interoperability Principle was invaluable in promoting the spread of the Internet, TCP/IP, and many application protocols and languages (perhaps most notably HTTP and HTML). Over the past couple of decades it's increasingly become a liability.

WhatsApp slaps app hacker chaps on the rack for booby-trapped chat: NSO Group accused of illegal hacking by Facebook

Michael Wojcik Silver badge

Re: "This technology is rooted in the protection of human rights"

It was a typo for "rooting out".

Michael Wojcik Silver badge

Re: "... a misuse, which is contractually prohibited."

No discount for that customer on the next sale. And we mean it.

Sticks and stones may break your bones but robot taunts will hurt you – in games at least

Michael Wojcik Silver badge

Easy?

It would be very easy to create systems that would annoy users

"Very easy", he says, as if the bulk of IT R&D weren't devoted to this very cause.

Are you coming to the party dressed as an IMP? ARPANET @ 50

Michael Wojcik Silver badge

Re: faster than 300bps

Those Switched-56 lines were popular for a long time. I had one for a remote office in Ohio in the mid-1990s. I don't remember if the local telco didn't offer ISDN at that location, or if Switched-56 was cheaper.

I'm not Boeing anywhere near that: Coder whizz heads off jumbo-sized maintenance snafu

Michael Wojcik Silver badge

Re: Modern

While we're being pedantic, the official IBM abbreviation is "RS/6000", with a slash.

Also, some of them were pretty big UNIX machines. Even in 1990 there was the Model 930.

Michael Wojcik Silver badge

Re: Modern

Sure, but aside from computation, storage, networking, graphics, size, and power consumption, what do these new machines have that our '90s UNIX workstations didn't?

Eh, I miss those '80s and '90s boxes too. It was an exciting time.

Michael Wojcik Silver badge

Re: Modern

Mainframes, on the other hand, can support a stoutly built, average dimension house.

Was the XT/370 not a mainframe? It ran mainframe software.

What about the P/390? The Multiprise 3000?

Michael Wojcik Silver badge

Re: Reminds me of a compiler bug I encountered

This isn't the only issue I know of in the AIX 3 XL C implementation. I was working for IBM myself at the time, and spent a while tracking down an obscure bug: sometimes the GL openwin() call would fail for no good reason. First I narrowed this down to openwin failing after using the libnsf library to read NSF-format data files. Then I narrowed it down further to openwin failing after a certain free() in libnsf.

I confirmed that free was valid (a pointer returned by malloc or realloc, and not already freed), so I suspected heap corruption. So I interpolated all the heap functions with versions that dumped their parameters to a text file, then wrote an awk script which matched them up. They were all OK. I added canary pads before and after all areas to check for under- and overflow: nothing.

So I hacked my script to simply perform all the heap operations from the output file, touching a few bytes of each area, and then try openwin. And openwin failed.

Some binary searching later, and I had a precise reproduction: Allocate at least 11 areas of at least 64 bytes, and touch at least the first 8 bytes of each area, then free all 11, and then openwin fails. I fired that off to the XL C team.

Turned out to be a bug in the implementation of free().

Michael Wojcik Silver badge

Re: Good to know

"I see you are offering a beet salad today. Is that ISO 9001 certified?"

Or alternatively:

"I'll have what he's having." "I do apologize, sir, but I'm afraid our processes are not repeatable."

Remember that competition for non-hoodie hacker pics? Here's their best entries

Michael Wojcik Silver badge

Re: re: As he found out they are a pain in the fucking arse.

Aren't you the party pooper?

See, again, that role is usually filled by the offspring.

(Though personally I am quite fond of mine, now unto the second generation.)

FBI extends voting security push, LA court hacker goes down, and more D-Link failures

Michael Wojcik Silver badge

Re: Comcast ... using their lobbying might to push back against DNS-over-HTTPS (DoH)

Again, what's stopping you rolling your own?

Hard-coded DoH server addresses in the browsers?

I haven't looked at Google's or Mozilla's DoH implementation, because I already use DoH-free browsers for most purposes. But I can certainly foresee a day when it will be necessary to use a non-mainstream fork to avoid the Google+Cloudflare DoH duopoly. That may not come to pass, but it would be trivial for Google to implement it in Chrome.

Engineer grumbles and user gripes do little to slow down Nadella's trillion-dollar Microsoft

Michael Wojcik Silver badge

Re: You say 'boring' like it's a bad thing

I see your point, but I'm not sure I agree, at least in the case of Windows.

I found moving from MS-DOS to BSD with a decent shell (I was using tcsh at the time, later ksh and bash) pretty damn exciting. Command line use and scripting became much less of an exercise in working around the rather pathetic limitations and awkward misfeatures of the tools, and much more a matter of doing things in convenient, sensible, consistent ways.

I believe there's plenty of room for that sort of exciting change in Windows. Like, oh, not spontaneously deciding to install a bunch of updates and reboot, for example.1 That in itself would be an exciting change.

1The "metered interface" trick alas doesn't work for me, as my IT Overlords have disabled it via Group Policy.

Now the US DoJ has charged Apple's insider trading lawyer with, er... well, it's embarrassing

Michael Wojcik Silver badge

I think most US prison sentences are excessive. Legislatures like to increase them in order to look "tough on crime", and prosecutors like to use them as leverage for plea deals, one of several major sources of injustice in US criminal prosecution today.

That said, there was a major shift in US Federal prosecutions after 9/11 away from white-collar crime like this toward "terrorism", which was then broadly defined to "whatever the kleptocracy thinks it can make the most money from". I'd rather see the DoJ chasing white-collar criminals than imaginary ones.

Michael Wojcik Silver badge

I hold on to mine until I have a good reason to sell it, because it pays dividends. But I always treat it as a high-risk investment that could disappear at any time; I don't depend on it for anything. I certainly don't consider it part of my retirement savings.

And, of course, in the US, it's advantageous to hold stock for at least a year if its value is increasing, in order to pay the smaller long-term capital gains tax.

Uncle Sam demands summary judgment on Snowden memoir: We're not saying it's true, but no one should read it

Michael Wojcik Silver badge

Re: Snowden's memoirs

Some of both, I daresay, and also something of a face-saving exercise for the government.

Michael Wojcik Silver badge

And, of course, there have been many, many people who suffered under repressive governments with no sign of a rebellion, much less a revolution. Counting on a popular uprising to reform government is a mighty long shot.

Michael Wojcik Silver badge

Re: And it works!

I figured I'd wait to see if the US government manages to seize some or all of the profits. If not, I'll buy the book; if they do, I'll refrain, and just get it from the library or something.