* Posts by Michael Wojcik

12357 publicly visible posts • joined 21 Dec 2007

Systemd supremo Lennart Poettering leaves Red Hat for Microsoft

Michael Wojcik Silver badge

Re: @werdsmith - Erm....

Frankly, I think Red Hat adopted the Poettering philosophy of "my way or fuck you" long ago, and they have no intention of undoing any of his "innovations", or even changing course a bit.

Michael Wojcik Silver badge

Re: one step forward

But it has USS, which implements the Single UNIX Specification. And that's the technical requirement for certification.

The point of the transfer of the UNIX trademark to TOG was to clean up the mess that originated in the AT&T / BSD split. Both SVR4 and BSD4 had strengths, but they also had different semantics for some system calls and some that were exclusive to one family or the other; and they had numerous differences in the system utilities. Then there were various vendor extensions.

POSIX cleaned up some of that, and added some other needed improvements – the pthreads synchronization mechanisms are a lot better than the SysV "Columbus" ones for most use cases, for example. And the Austin Group meetings cleaned up more. The SUS has done more with each revision to make various UNIX flavors more compatible and sensible. Making the UNIX trademark a branding carrot for complying has made porting among multiple UNIX platforms (and Linux-based ones, even if there's only one Linux-kernel OS on the list) a lot easier.

I've been developing and supporting commercial software on multiple UNIXes since the late 1980s, and I'm glad the UNIX trademark is being used by TOG this way.

Elon Musk had secret twins in 2021 with Neuralink exec

Michael Wojcik Silver badge

Re: Musk for PM

Man, once in a while the Natural-Born Citizen clause actually does something other than annoy immigrants.

COO of failed bio-biz Theranos found guilty on all twelve fraud counts

Michael Wojcik Silver badge

Re: Methinks it's lawyers all the way down on this one...

Two juries, not one. Two trials, with different defense counsel, different prosecutors, different judges, different evidence, different arguments. So they're not directly comparable anyway.

It is certainly possible that one jury found their defendant more sympathetic than the other jury did theirs. It is possible that affected their verdicts. It is possible some or all of age, sex, ethnicity, country of origin, and perceived physical attractiveness played a role, conscious or unconscious, in the calculations of some or all jurors.

It's fine, even probably wise, to be suspicious of these possibilities, human beings being what they are. It's unwise to be certain of them, because there are many confounding factors and because it's generally pretty foolish to indulge in generalizations about people.

Boris Johnson set to step down with tech legacy in tatters

Michael Wojcik Silver badge

Re: Sub-sea nukes

And there are plenty of critical-resource systems which aren't commercially viable.

Heath care isn't commercially viable; the US has been trying to pretend it is for decades, and it's become a horrible mess.

Here in the US Southwest, water isn't commercially viable, and hasn't been since the Bureau of Reclamation started trying to capture all of it. Right now water distribution is heavily subsidized (often in part by flagrantly violating the law) and people are busy ignoring the fact that they're depleting the aquifers and the rivers are over-allocated. When that crashes it's going to be really bad, and everyone will wake up to just how distorted that market is.

I, too, am in favor of government regulation in many spheres, where severe externalities need to be converted into direct costs to prevent disaster. Of course, regulation often fails to do that, for all the usual reasons – regulatory capture, the slow movement of legislatures and regulators, short-sightedness, and plain old corruption – but for now it's all we have.

Michael Wojcik Silver badge

Re: Sub-sea nukes

Do you really need your TV, router, microwave etc to be on standby while you sleep at night? The potential savings are huge!

Er, from standby? No, no they are not.

The router might draw enough electricity to be noticeable, but we have devices updating and doing other work at night anyway, and losing our picocell phone service while we sleep is not ideal if someone needs to contact us.

The television and microwave draw almost nothing on standby. You can tell by the fact that no part of them is discernibly warmer than the ambient air temperature; they're not dissipating enough heat to be perceptible. And what little heat they do disperse is into conditioned space, so in the colder months it's offsetting other kinds of heating. Indeed, since it always gets cold at night here at the Mountain Fastness, there's really no advantage to disabling standby.

The "vampire power" myth is just that – a myth. The energy consumption of devices on standby is dwarfed even by, say, typical household lighting.

Now, trundling around in enormous vehicles, sure. I'll agree with that. And vehicles these days are also mostly over-powered. In the 80's people got along fine with vehicles that had much lower power-to-mass ratios. More-efficient engines were used as an excuse to increase power, not improve efficiency.

Michael Wojcik Silver badge

Re: Sub-sea nukes

Even for water-moderated reactors, there are better designs than the classic Westinghouse, such as CANDU. According to Wikipedia's list there are still around three dozen CANDU or CANDU-derived commercial reactors in use.

Then there are other designs such as pebble-bed – apparently China has a commercial one in use. And TerraPower and CNNC were working on a commercial traveling-wave reactor until Trump's tech-transfer rules put a stop to it.

The main problems with fission are not waste or failing safe; they're politics, primarily, and economics (financing development).

Competition regulators probe Amazon's Marketplace and Microsoft's buy of Activision Blizzard

Michael Wojcik Silver badge

Re: Amazon "Buy Box"

Yes, why ask that articles contain relevant information when some AC will just post the "Just Google it, bro!" response in the comments? Hell, why visit the Reg at all when we can just Google the answers to all of our questions? Who needs analysis?

Apple's latest security feature could literally save lives

Michael Wojcik Silver badge

Re: This should be...

Yes. Things like previewing MMS attachments is just asking for grief.

Michael Wojcik Silver badge

Re: There’s a $10m bounty…

Indemnify users from what, exactly? Being imprisoned on bogus criminal charges, or under reprehensible laws? Being murdered by government thugs? That'd be a tough one, even for Apple.

Bug bounties have a mixed record, but they can be useful, and it's appropriate for Apple to offer one for this feature.

Michael Wojcik Silver badge

Re: WebKit, anyone?

People are bad at OPSEC, full stop. It entails a lot of cognitive load, vigilance, correction of habits, and just plain irritation and inconvenience. And people are bad at correctly judging non-immediate risks. So even those in plausible danger of the sorts of attacks this is meant to help prevent are unlikely to be terribly good at reducing their exposure.

After all, many of the NSO Group victims had reason to guess they'd be targets of that sort of thing, and could have chosen to use feature-phones rather than smartphones. Many had the resources to use locked-down phone models. They didn't because maintaining those security practices is exhausting.

Apple providing a "reduce my attack surface" button is really not a bad move, because it addresses that human issue.

Michael Wojcik Silver badge

nothing needs to be capitalized, if you don't mind looking a bit pretentious. -- e. e. cummings

Michael Wojcik Silver badge

Re: Images...

Yes, there have been various exploitable vulnerabilities in various image decoders over the years.

But this is probably an unavoidable compromise. People are so accustomed to viewing images in messages that if Apple blocked images, most of the Lockdown Mode users would turn lockdown off every time they received a message with an image, so 1) it wouldn't help, and 2) they'd be exposed to other exploits.

Krstić is a smart guy and an experienced security researcher, so I expect Apple applied a pretty sophisticated threat model here that included likely behavior by users.

Incidentally, the NSO Group iMessage exploit used a PDF mislabeled as a GIF which Apple's ImageIO library then content-sniffed and passed to the CoreGraphics PDF processor, which contained the vulnerability that let them construct and run their own interpreter. So it wasn't technically an "image file" at all; it was a PDF masquerading as one, which the overly-ambitious ImageIO then passed to the vulnerable PDF renderer. (Apple has since fixed this.)

But, as I said, there have been many other image-parser vulnerabilities. Like, say, these.

Wash your mouth out with shape-shifting metal

Michael Wojcik Silver badge

Re: While the prospect of toothpaste that DOESN'T taste like mint is appealing

Google 'boiron homeodent toothpaste anise' if you would like something else.

Or, y'know, just search for "non mint toothpaste", which is a bit easier to remember and type.

Michael Wojcik Silver badge

Re: While the prospect of toothpaste that DOESN'T taste like mint is appealing

It's a floor wax and a dessert topping!

Michael Wojcik Silver badge

Re: Gummed up

Or they drive out the tiny beneficial fairies that live between your teeth, while we're inventing problems with no evidence.

Also, they're not spheres. Read the article.

Michael Wojcik Silver badge

Re: I wonder how many people

How many of those people practice dental hygiene at all?

Michael Wojcik Silver badge

If you have ferrous fillings that's something to be concerned about regardless of your oral-hygiene regimen.

Even old-fashioned amalgam fillings (an alloy of mercury, silver, tin, and copper) won't be significantly affected by the small magnetic flux required to herd these little beasties around. Ditto for gold crowns and the like.

And if you have amalgam fillings you might want to consider having them replaced with resin anyway, since having a bunch of mercury in your mouth is not ideal, even if there's some disagreement on just how bad it is. (The FDA says "little to no data" on long-term effects, particularly for fetuses where the mother has amalgam fillings and other possibly more sensitive cases.)

Michael Wojcik Silver badge

Magnetic tooth cleaning is always 85 years away.

Actual quantum computers don't exist yet. The cryptography to defeat them may already be here

Michael Wojcik Silver badge

Re: So, quantum is basically the new fusion

I thought this stuff was supposed to be almost instantaneous.

Well, you thought wrong.

There are plenty of accessible introductions to QC available online, and many accessible discussions of it from people like Scott Aaronson. Why not actually learn something about it rather than complaining you don't understand it?

For problems where you need an exact solution rather than an approximation, if you're going to use general quantum computation to search for that solution, you'll need error correction. Error correction is the big stumbling block here (along with scaling up to a suitable number of qubits; Shor's algorithm requires on the order of (lg N)2 qubits, where N is the size in bits of the input, so it's logarithmic in space but not directly).

Even then, Shor's runs in polynomial time on the length of the input, so it's not "instantaneous". And like all algorithms in BQP, testing the result is polynomial; in the case of factoring that's still very fast for a single candidate solution, but if your error correction is weak, you might be testing a lot of them.

Also, ignore the bit from the article about 5000 qubits. Adiabatic QC is utterly irrelevant for cryptography.

Michael Wojcik Silver badge

adiabatic QC != general QC

The JSC/D-Wave machine relies on a quantum annealing processor and is adept at solving optimization problems. IBM's machine is gate-based, which is better suited for running Shor's algorithm to break cryptography.

The final clause should be "which is suited for running Short's algorithm to break non-quantum-resistant asymmetric cryptography".

Adiabatic (annealing) QC is completely irrelevant to cryptography. General QC isn't "better suited" for Shor's; it's suited, full stop. The D-Wave machines are no more suited to running Shor's (or Grover's) than a toaster is. And the techniques for building adiabatic QC systems aren't relevant to building general QC systems. The D-Wave machines do not matter for the purposes of this article.

Michael Wojcik Silver badge

Re: True one time pad encryption

OTPs are completely useless for mass encryption, which is what actually matters to the overwhelming majority of use cases. OTPs have no solution for key distribution (in fact they're maximally bad for it). They're symmetric, so they have no applicability to digital signatures. They don't scale.

Michael Wojcik Silver badge

Re: Obsessed With Mathematics, Randomisation, N-bit Keys......

Sure. Now explain how to use a random-substitution code in a TLS cipher suite, say, or full-disk encryption.

Random-substitution codes aren't mechanical ciphers. They don't scale. No one cares if your secret message to your best pal remains undecoded forever. What people care about is mass encryption, and that requires machines and algorithms that scale.

Michael Wojcik Silver badge

Re: Who needs QC?

Not everything is encrypted with a password some user came up with.

We need a Library of Congress – but for the digital world

Michael Wojcik Silver badge

Re: The Library of Congress already has this in hand

Well, sort of. Normally the lawsuit has to wait until registration is granted.

In 2019's Fourth Estate Public Benefit Corp. v. Wall-Street.com SCOTUS resolved a circuit dispute over whether copyright was actionable when registration had been applied for, or only when it was granted. They came to the conclusion that 17 U.S.C. §411(a)'s language only makes sense if the intent of Congress was that a civil action could be pursued only if registration had been granted or refused. (Note that latter exception – you can sue for infringement if the LoC refuses to grant your registration, provided you inform the LoC, though winning such a suit would presumably be an uphill battle.)

So in the US, copyright attaches as soon as the work is completed (the Copyright Office has used the phrase "when the pen leaves the paper"), but civil action requires registration, which can be applied for at any time, but may take a while to complete (one way or the other).

Michael Wojcik Silver badge

Re: What is this Library of Congress thing?

The catalog and digital collections provided by the Library of Congress are very useful to many researchers, and the Librarian of Congress is the only bulwark we have against further abuse of the DMCA (since the Librarian periodically approves exemptions to that particular piece of legislative crap).

And people can, in fact, visit the LoC and read actual physical books from their collections.

People who regularly talk to AI chatbots often start to believe they're sentient, says CEO

Michael Wojcik Silver badge

Alternative headline

"People who don't know the difference between 'sentient' and 'sapient' are often easily confused."

UK signs deal to share police biometric database with US border guards

Michael Wojcik Silver badge

I do wonder why the USA is so concerned about border security.

Two reasons.

One, it's a dog-whistle to the howling nitwits. "Border security" gets you Republican votes.

Two, it's one of the DHS's fiefdoms, and they'll seek to acquire more power in it regardless of any justification. DHS is a bureaucracy and it contains multiple police forces, and both of those types of institutions will try to increase their power just for the sake of power.

That's why ICE now has one of the biggest domestic-surveillance operations in the US. That's why CBP has jurisdiction over most of the US and eagerly exercises its powers of warrantless search. These are organizations that exist primarily to exercise power.

Michael Wojcik Silver badge

Regarding the second amendment - it's not really "an implicit right" since it is, after all, an amendment to the original. Clearly therefore, it could be amended further or even removed entirely. So constitutionally, it would seem to be a straightforward process to change.

It's not "an implicit right" at all. It's an explicit one. The question is what that right actually constitutes, not whether it's there. (JFTR, I'm sympathetic to interpretations that emphasize the "well-organized militia" party myself; but given the extensive arguments by constitutional scholars and legal experts, I don't think any interpretation is prima facie correct.)

Amendments to the US Constitution have exactly the same status as the original text. Both can be changed by amendment – that's what "amendment" means. The fact that the Second Amendment is an amendment has no bearing on how it would be changed.

The process (processes, actually; there are two, though they differ in how amendments are proposed to the states, not in how they're ratified) of amending the US Constitution is not "straightforward". And for a hot-button political issue like guns, the chance of getting three-fourths of the state legislatures to ratify any change is vanishingly small.

Microsoft gives its partners power to change AD privileges on customer systems – without permission

Michael Wojcik Silver badge

Re: Partners with existing delegated admin privileges (DAP) relationships

Agreed. I don't see how this changes the threat model. Existing administrators get to create accounts with fewer privileges for themselves.

As for the comment in the article about attackers: if those attackers already have control of a DAP account, you're hosed. This move by Microsoft appears to change nothing in that regard. It's simply to ease the transition to more narrowly scoped privileges, which is a Good Thing.

I may be missing something, but if so it's certainly not clear from the article or the whinging in comments below.

W3C overrules objections by Google, Mozilla to decentralized identifier spec

Michael Wojcik Silver badge

Re: Since google pretty much control the browser market

Yes, but most authentication these days happens in interactive HTTP user agents – browsers. Browsers refusing to support DID will likely slow adoption. In practice, there will be a thousand DID Javascript libraries in npm by the end of the year, only 998 of which will be either horribly insecure or actively malicious, so we'll be seeing DID support in lots of web apps; but browser resistance will still be a drag on adoption.

I haven't looked at DID closely yet, but it seems fairly stupid on casual inspection. And, of course, we already have technologies deployed for identities that aren't tied to a single vendor and can be decentralized. Those (OpenPGP keys, X.509 in non-hierarchical PKIX arrangements) are also terrible, but they're the terrible we know.

Identity is a hard problem, and "mumble mumble something plus half-assed baby Merkle graphs!" is not likely to be a good solution.

2050 carbon emission goals need nuclear to succeed, says International Energy Agency

Michael Wojcik Silver badge

Re: Stating the obvious

In the US, there are plenty of people who voted for Trump even while acknowledging he was a dangerous idiot, because they wanted the Republicans in charge and they wanted conservative judges on the Supreme Court. That kind of realpolitik presumably happens in significant numbers in the UK as well.

In other words, many people are willing to support (in some sense) an embarrassing leader if they perceive the benefits to outweigh the costs. Perhaps things are different in Finland, but in the US, and I suspect the UK, voters are not, in the main, nearly so fastidious.

Apple's guy in charge of stopping insider trading guilty of … insider trading

Michael Wojcik Silver badge

Re: The paradox of greed

Very true. My wife and I are comfortably upper-middle-class, in fact in the top 1% for household income of the states we've lived in (though not near it for the US as a whole) – which means we're quite wealthy indeed by global standards – and we follow the rules.

I have a good friend who's quite wealthy thanks to a lot of hard work by himself and by his father before him; he's in commercial real estate and he (and his father before him) has a longstanding practice of working with distressed clients to keep them afloat until they can start making rent payments again. It's all worked out quite well.

Another acquaintance who is bona fide rich (as in "owns several homes, some of which he's only been to once or twice, works by famous artists, etc") has not, to the best of my knowledge, broken any laws or been particularly nasty or underhanded. He just started with some family money, innate intelligence, and an excellent education, and then pursued becoming rich with considerable vigor. Yes, the family money is an important starting point, but it's not necessary to be vile in order to be rich. That's just a rationalization used by people who want an excuse to behave badly.

Intel ships crypto-mining ASIC at the worst possible time

Michael Wojcik Silver badge

Probably not. Most users choose passwords that are too easy to crack, so even for salted cryptographic hashes the pre-image can be found for relatively small numbers of accounts quickly enough that it's not worth using specialized hardware. Just hashcat running on a vanilla PC is often plenty fast.

Good password verifiers use Argon2 (probably the best choice, when used with appropriate parameters), bcrypt, scrypt, or PBKDF2. An ASIC designed for Bitcoin-blockchain-hashing won't support any of those, and Argon2 in particular is memory-hard and so not amenable to compute-based hardware acceleration.

So the password-cracking use cases where a generic SHA1 or SHA2 hardware engine is useful are limited.

Michael Wojcik Silver badge

Re: Crypto is toast?

crypto is not the same thing as "digital currency"

For one thing, most of cryptography has nothing to do with money.

But if we're talking specifically about cryptocurrency – then, yes, you can have purely virtual currencies that don't use any of the distinguishing features of cryptocurrencies, such as (half-assed versions of) Merkle-graph ledgers or proof-of-X consensus mechanisms. Indeed, we pretty much already have those, except for the relatively small amount of exchange still conducted with cash.

I sure could be wrong about CBCDs. Maybe they're the greatest thing since sliced bread.

They're easier to trace than cash is. That makes them pretty great for surveillance. I don't believe I've seen any other argument supporting them.

Michael Wojcik Silver badge

Re: The sooner, the better

True. Crony capitalism is likely roughly contemporaneous with the invention of the second capitalist.

On the other hand, much of the crony capitalism of yore now looks rather cheap and cheerful. Remember when Teapot Dome led to a US cabinet member going to prison? You don't get that sort of backlash these days.

Firefox kills another tracking cookie workaround

Michael Wojcik Silver badge

It breaks more than "some hacks". The query string is part of the HTTP specification, and stripping it will break some conforming sites. For some people that may be an acceptable trade-off. It isn't for me, not least because I have software I've written which makes use of query strings, and I'm not inclined to rewrite it to accommodate a user agent deliberately violating the specification.

But I haven't used Firefox since they broke my extensions, so I don't particularly care one way or the other. And since this is optional and off by default, I don't much care if Firebox gives it to the users and lets them make their own decision.

OpenSea phishing threat after rogue insider leaks customer email addresses

Michael Wojcik Silver badge

If only

Skepticism is healthy, here.

Yes, well, good luck with that. We're talking about a group of users self-selected for a lack of it.

Open source body quits GitHub, urges you to do the same

Michael Wojcik Silver badge

Re: Alternatively

It doesn't even need to be git. That's designed for a project on the scale of the Linux kernel, which relatively few of us are working at.

And more importantly, it's designed for a truly distributed use case. Most of the projects using GitHub are using it as a single central server, which is not where git has any significant advantages.

It'd make more sense to be using SourceForge and Subversion for that use case. Subversion's model is easier to understand (the vast majority of git users seem to have no idea of what its internal representation actually is) and better suited to the central-repository use case.

Most projects seem to be using git because most projects are using git.

Old-school editor Vim hits version 9 with faster scripting language

Michael Wojcik Silver badge

Re: Others preferred

vim is my editor for all text-based files on all the platforms I work on that support it. (IBM mysteriously have not yet added vim to ISPF yet.)

I've been a professional software developer since '88, and had to use a lot of editors and IDEs before and since. I'm not saying I'd recommend anything in the vi family to anyone, but I've used vi, then vim (and gvim on Windows, due to some sort of occasional issue with running Windows vim under Cygwin bash that I can't be bothered to sort out) for too long to be inclined to switch to anything else.

Also, I hate every IDE I've ever used; none of them come close to the power of shell + my editor of choice + my debugger of choice + POSIX text tools + a decent build system and so forth. I really do not see the appeal of having a lot of not-really-very-good tools baked into the build system, when much better ones are available right there on the command line, and are trivially scriptable.

NSO claims 'more than 5' EU states use Pegasus spyware

Michael Wojcik Silver badge

Re: Sell strike aircraft not spyware

Tu quoque fallacy. One bad act does not excuse another.

Michael Wojcik Silver badge

Certainly no one who's paying any attention believe NSO Group are the only smartphone-APT vendors. Others such as Cytrox and Candiru have been exposed; some of them operate in the open. NSO have just become the most notorious thanks to a series of (unfortunate, for them) high-profile cases and the Pegasus Project exposé.

They're bad actors, and I'm happy to see them squirm; I'd be happier yet if they were shut down. But they're far from the only ones.

Michael Wojcik Silver badge

I'm curious to know what the score is for the USA in 2022.

Michael Wojcik Silver badge

Re: I don't understand

Different exploits for different use cases.

The NSA exploits leaked by Shadow Brokers were very useful to many people, and remain useful in many cases because lots of folks never update their systems. But they don't include zero-click APTs for current Android and iOS devices.

Pegasus really is very well-done malware, and then there are all the services provided by NSO Group once it's installed – you don't need your own penetration team to make use of it. You can buy similar capabilities from other top-shelf malware vendors, but there's nothing equivalent available for free.

Michael Wojcik Silver badge

The vulnerabilities exploited by Pegasus are more than adequately explained by normal programming errors. Given the state of software development, there's no need to go to the expense and risk of planting agents within the organizations doing the development. Those resources can be put to better use elsewhere.

Michael Wojcik Silver badge

Re: Hackers of the World Unite

Yes, there are a number of commentators here who seem to believe Pegasus is a static malware package that uses a single exploit each for Android and iOS. It's not. It's an evolving software product, just like other ISVs produce, and it makes use of multiple exploits that change over time.

As with all software security, this is a game of whack-a-mole.

Totaled Tesla goes up in flames three weeks after crash

Michael Wojcik Silver badge

Re: "after two Walmart stores equipped with the panels caught fire"

Didn't the whistleblower's report say the installers were covering non-functioning cells with black electrical tape, leading to overheating? I know, I should look this up before posting, but, you know, Internet.

Michael Wojcik Silver badge

Re: So when one of these things is junked ...

OK, OK, so an EV murdered your parents in front of you when you were a child and you've dedicated your life and your considerable froth-posting skills to unending vengeance. We get it.

Michael Wojcik Silver badge

Re: Deja vu again

I'm not a fan of EVs myself, but, yeah, it's not like ICE vehicles aren't full of combustible and flammable materials, hazardous waste, etc. Complex machines that have to perform a number of functions generally will be.

The spontaneous-fire issue with EV batteries is newsworthy mostly because it's novel. I have a friend who had a towing service and car lot on one of his commercial properties for several years, and while there was never a major fire there, that was at least partly luck. You get gasoline spills and whatnot at a wrecking yard. And water isn't great for putting out gasoline fires, either.

Hell, remember magnesium-block engines?

ZTE intros 'cloud laptop' that draws just five watts of power

Michael Wojcik Silver badge

Re: Yay, we have finally reinvented the terminal

Yeah. And X11 was used properly in the days of X terminals, with mostly protocol messages flowing between the client and server, and let the ddx layer render. Very little of this QT-style "I'll do my own rendering into a bitmap and shove it over to the server" crap.

So you didn't need nearly as much network bandwidth. And since the primitives could compress a lot of information and rendering was slow compared to today's hardware, latency was less noticeable, too. If an xterm sent 800 characters in a single XDrawString to a server, it would have a little while before the next message needed to get there.

Oh, well.