* Posts by Michael Wojcik

12348 publicly visible posts • joined 21 Dec 2007

Mega's unbreakable encryption proves to be anything but

Michael Wojcik Silver badge

Re: Weird timing

It's quite likely various groups have examined it and found these or other vulnerabilities, and kept them to themselves. You know there's a whole industry around selling vulnerabilities and exploits that haven't been published, right? There's a good free RAND study on that business.

And researchers research the things that attract their attention. It's not like the IT-security community is rigorously organized. Someone says, hmm, today I'll poke at this thing. Read researcher blogs if you want to see how it generally goes. Some people (e.g. SANS researchers) typically chase attacks that come into their honeypots; some track down malware and analyze it (Marcus Hutchins does a bunch of this, as does someone who posts to Full Disclosure as "malvuln"); some go after particular commercial targets (e.g. Stefan Kanthak and Microsoft, particularly software installers); some follow what's hot in the news (Graham Cluley, say, or Paul Ducklin); some are more interested in people (Brian Krebs) or policy (Bruce Schneier).

So this may just be the first time a prominent research organization has had some of its people publish research on Mega. Or maybe it's happened before and you and I just didn't notice. It's a big industry.

Michael Wojcik Silver badge

Re: Puzzled Old Fool Wonders About Permanently Stored Keys.....

Did I miss something?

An opportunity to learn how Diffie-Hellman (which should really be "Diffie-Hellman-Markle", as Diffie pointed out some years ago, and arguably should be called "Diffie-Hellman-Markle-but-only-because-Ellis-Cocks-Williamson-weren't-allowed-to-publish") key exchange works without UNNECESSARY SHOUTING.

OP's post was wrong. That's the other thing you missed.

Encrypted data requires a key to decrypt it; that's what "encryption" means. Can you replace the actual key data with a procedure to generate it? Sure. Does that gain you anything, from a technical or legal perspective? It does not. By Kerckhoff's Principle, whatever is secret is the key; making the key fancy doesn't mean it stops being a key. And laws are rarely stymied by someone being a clever dick. A judge isn't going to say "oh well done, you've got us there!". He'll just throw you in the pen for contempt.

DARPA study challenges assumptions about distributed ledger (and Bitcoin) security

Michael Wojcik Silver badge

Re: What exactly is new here?

It's also worth noting that the issues mentioned in the article – I haven't read the DARPA report – have all been documented in published research before. There were papers on Bitcoin network partitioning in Colyer's Morning Paper when that was still active, for example.

But reproduction and confirmation of results is useful, even if it isn't new to people who have been following the research.

Graphical desktop system X Window just turned 38

Michael Wojcik Silver badge

Re: Back in the old days

I was writing X11 applications, window managers, libraries, and extensions in the late 1980s / early 1990s, and I didn't need a "wall" of documentation. There was book 0, the protocol (which was also the specification); book 1 for the libx11 API; and book 2 for the major widget sets, if memory serves. It wasn't something you'd slip into your hip pocket but it wasn't SNA, either.

Michael Wojcik Silver badge

Re: What I like about X

Some X11 servers came with the DPS X extension built in. AIX's did, for one. (There aren't any AIX workstations now, I believe, just headless servers; so "AIX X11 server" is a thing of the past.)

I remember doing a bit of DPS stuff under X11 on AIX 3 back in the day.

A miserable work week spent toiling inside 'the metaverse'

Michael Wojcik Silver badge

A virtual what now?

spent in headsets and a virtual "office"

Initially misread that as "a virtual 'orifice'". I suspect that's both a better description of the experience, and a more plausible use case.

Michael Wojcik Silver badge

Re: Usability, frustration, anxiety, visual fatigue, motion sickness

The point of Metaverse is to make money for Meta. Anything else is a secondary consideration.

(As for VR meetings – ugh.)

Michael Wojcik Silver badge

Re: So in conclusion

Of course not. For a bicycle you want a CLI.

Michael Wojcik Silver badge

Re: Eye strain and nausea

I've found New Mexico sunshine and no headset at all works just fine for me.

Michael Wojcik Silver badge

Re: Disembodied business casual

When I were a lad, we had to imagine gnawing our colleagues' limbs off for our dismemberment fantasies. And they hadn't washed, either.

Cloudflare explains how it managed to break the internet

Michael Wojcik Silver badge

Re: CDNs are evil!

Well, yeah. And the web was ruined by Javascript (and arguably by CSS, and even graphical browsers, though those are useful for viewing useful graphic assets like charts and plots). And the web ruined Usenet. And really with a few improvements to Gopher or WAIS we could have dispensed with the web in the first place. And GUIs ruined UIs. And so on.

As Nick said in Metropolitan, I'm not entirely joking.

But, curmudgeonly as I am, even I make use of some online services that wouldn't be feasible without CDNs or some other edge-delivery mechanism. (Someone else mentioned IPFS, but I'm dubious.) Could I live without them? Absolutely. Would I miss them if they vanished? Eh, a bit, but to be honest I'd miss good old fashioned paper books far more if I lost those.

Still, I can't pretend I get no value from CDNs. And I suspect that's true for the vast majority of people who do anything online.

Michael Wojcik Silver badge

Cloudflare is used for things that aren't exclusively web-related, such as DNS. Per comments above.

But, yeah, if you weren't caught out by using Cloudflare-backed DNS, you probably wouldn't have observed too many issues with your SSH connections or whatever.

I missed the outage, thanks to my time zone and working hours, but it probably wouldn't have troubled me too much since I'd still have the corporate network and there's no shortage of things I can be doing.

Michael Wojcik Silver badge

I have mixed feelings about Cloudflare, but they are generally quite good about explaining what went wrong. They also publish a lot of good technical content in general.

Mark Boost, on the other hand, sounds like a spoiled brat. "Everything isn't perfect! My gratification isn't immediate! How dare you!"

I've been using the public Internet since a few years after Flag Day, and I've managed to avoid panicking when I can't "access the online services that are part of the fabric of all our lives". Sometimes there are, y'know, network interruptions. Or power interruptions. Grow the fuck up, Mark.

Investors start betting against Bitcoin with short-trade products

Michael Wojcik Silver badge

Technically, though, OP is correct. That's not "intrinsic value". It's exchange value.

The problems with the cryptocurrency fans is, first, they're hoping the exchange value of the particular horses they've picked in a very crowded race for new, unregulated, volatile exchange media, many of them with various other unfortunate properties, will outperform the established top-down (i.e. government-issued) currencies.1 And sometimes they do, for the short term. But it's a highly risky position to take – and the short term is the only term we've had with cryptocurrency. No one knows what that market will look like in ten years.

And second, cryptocurrency only succeeds as a medium of exchange (and thereby has exchange value) if you can actually exchange it for something with use value. Sometimes you can, apparently; that's what made the Silk Road successful. But I sure wouldn't want to depend on it.

So government currencies have superior exchange value to cryptocurrencies now, and they may always (with the possible exception of government-issued cryptocurrencies, which, ugh, I can't even). But they're not different in the type of value they have, just in the amount and liquidity of that value.

1Of course cryptocurrencies aren't the only example of bottom-up consensus currencies, even in the modern era. There are plenty of groups of people in places like Papua New Guinea using those, and for a while in Somalian markets the merchants were circulating their own notes. But historically bottom-up currencies have only succeeded in fairly small markets where there was a strong in-group identity and widely-observed mores against exploiting them.

Michael Wojcik Silver badge

Re: Bitcoin is still "worth" about £20,000

I wouldn't pay $25 for all the BTC in the world

Really? I would.

I mean, it'd be a great line to drop at parties. "What do I do? Oh, I work in computers. Also I own all the Bitcoin. Yup, bought it all, shut the whole thing down. Just a hobby, really."

Or: "Yeah, I remember when everyone was talking about Bitcoin a few years back. Whatever happened to that?" "Well, funny you should ask..."

Also, by definition "all the BTC" would be an NFT, and $25 is pretty cheap for one of those. "Sure, I dabbled in the NFT fad, just for a lark. Only spent a few dollars on it. Got all the Bitcoins."

It's the sort of thing Hat from XKCD might do.

Google, EFF back Cloudflare in row over pirate streams

Michael Wojcik Silver badge

Someone's being a lawyer on the Internet!

Info on 1.5m people stolen from US bank in cyberattack

Michael Wojcik Silver badge

Re: "it was compromised between December and April 2021"

It was actually some time between December 1970 and April 2021. Maybe multiple times. Maybe after April too.

Michael Wojcik Silver badge

Re: Identity theft protection services

Also, anyone who hasn't put a credit freeze with each of the big three credit reporting agencies (Equifax, Experian, TransUnion) should.

Anyone in the US, anyway. By law, freezing at the big three is now free. Just do it. Do it for your underage children, too; if they have SSNs, they're vulnerable.

And then freeze at as many of the smaller agencies as you can. There are dozens of them, so good luck. Innovis and Chex are a good place to start. Here's one article which lists some of them. I've only skimmed it so I can't vouch for its quality.

Michael Wojcik Silver badge

We've received free "identity theft protection" dozens of times, thanks to the regular parade of breaches. It's never notified us of anything. On the other hand, we've never discovered evidence of successful identity theft – just the occasional compromised debit or credit card details (which has been a widespread problem in the US thanks to foot-dragging on adopting EMV).

Usually what it means is we can expect a flurry of offers to start paying for the "service" in a few months.

A great day for non-robots: iOS 16 will bypass CAPTCHAs

Michael Wojcik Silver badge

In what context have you seen CAPTCHAs used as a security mechanism to prevent malware from impersonating you?

Every use I've ever seen of the damn things is an attempt to block bots from 1) creating accounts or 2) posting fake UGC.

CAPTCHAs were a bad idea when they were invented and have gotten steadily worse, because of course they degrade into problems which are easier for machines than they are for people. Anything that helps get rid of them is fine with me. (I am not an Apple user. Haven't liked anything they've done since the //e, and don't care for the corporate attitude.)

Michael Wojcik Silver badge

I just tell 'em to go back to Vega.

Michael Wojcik Silver badge

Many of my friends are Apple users, and only a few are lumberjacks.

For a few days earlier this year, rogue GitHub apps could have hijacked countless repos

Michael Wojcik Silver badge

Re: Am I glad that I'm not in this circus

It doesn't entirely "get rid of the problem".

Using a private code repository that's not shared with people and organizations outside yours reduces the attack surface and risk quite a bit, yes.

Using an in-house code repository that's not accessible on the public Internet reduces it further. But as we know, the "egg model" (hard network perimeter, soft inside) fails all over the place, because some attackers do get in, and then they pivot and elevate. So security is improved but there are still serious vulnerabilities.

Using a code repository that is just a code repository and not some glorified all-in-one mess of repository and CI/CD system and code-review tool and problem-ticketing tool and probably there's a flight simulator in there somewhere, like GitHub Enterprise, considerably reduces the attack surface and further improves security.

Using a code repository where some developer hasn't broken the permissions mechanism with a random change that wasn't caught until an external security researcher looked at it improves security.

You can never get to absolutely secure – there's no such thing. But, yeah, not using public fucking GitHub certainly improves the situation.

Seventy-three million developers can be wrong.

Unbelievably clever: Redbean 2 – a single-file web server that runs on six OSes

Michael Wojcik Silver badge

Re: Portable Executable Format

the APE format leverages that by embedding a binary structure that can alternately be interpreted as a script loader or as an executable container

Yes, plus some other goodies.

Basically, PEs are recognized on Windows by the magic number in the first two bytes, which happens to be "MZ" (for good historical reasons) in ASCII. There are similar magic numbers for various binary executable formats used by many other OSes. (Claiming "any x86 OS" is clearly a little broad, because who knows how many people have implemented their own experimental OSes with crazy formats and conventions.)

Bourne shell scripts have to contain legal Bourne shell commands, but don't have to start with anything in particular, because when they were introduced the interpreter ("hash-bang") line concept hadn't been introduced.

So, when a POSIX OS is asked to execute a file, it sees if it starts with the magic number of any of the executable formats it knows how to run. If not, it has to try to run it as a Bourne shell script. (It can't really apply any heuristics except that if the first byte is binary 0, it can't be a valid Bourne shell script. Otherwise, in POSIX land, even a 2-byte file could be a valid script, because you can use any character other than NUL or / in a filename, and the script might just execute another file. But I digress.)

So, I can start a Bourne shell script with "MZ" and it looks like a PE to Windows. If I write that script carefully, I can actually make it both a valid Bourne script and a valid PE, because they're both pretty forgiving. In the case of APE, the script starts off by turning that MZ into the beginning of a variable name, as you can see if you follow the link in the article.

Then, if it's running as a PE, great; you just stick in the various PE sections after redirecting around the script stuff. If it's running as a script, it can do various things to get itself re-executed as the proper sort of file.

And then there's the web-app zip trick, which is one of the first tricks you learn when writing polyglots, and one that was used by Phil Karn's original PKZip (in the pksfx utility). A zip file has its metadata at the end, and the directory in the metadata contains offsets to the compressed contents. So anything can come before the zip data; decompressors will start at the end of the file and then jump into the middle of it. So you just take your executable and append the zip data to it, and you have both an executable and a zip archive.

I do this occasionally with a PNG image and a zip archive. The PNG image is of text that reads "This is a zip file. Rename it with a zip extension and open it again." It's handy for sending zips to people whose email clients block them, for example.

Michael Wojcik Silver badge

Re: Scary

Nah. Polyglots already existed before this. Small hosted execution environments existed before this. Unless you're a fairly feeble exploit developer, this is not new.

As I wrote above, it's good work. It's not breaking new ground, particularly not in the world of advanced malware (APTs and such).

Michael Wojcik Silver badge

It's a fine technical accomplishment. I'm not sure it rises to "remarkable" if you follow this sort of work. Like, say, PoC||GTFO 14, which is a PDF (of the issue's contents, of course), a zip archive with the samples from the articles, and a Nintendo ROM with a playable game, all in one file.

And the text of the PDF includes the PDF's own MD5 sum, so they had to calculate an MD5 collision on top of their three-way polyglot. (Because, of course, if you take the MD5 hash of a PDF and then add it to the text, you'll change the hash.)

So, yes, congratulations to Justine for some fine hackery in the best sense, attending to how things work at the low level and bumming bytes. Good stuff. Not astonishing, though.

Michael Wojcik Silver badge

Re: Justine

All respect to Justine, but creating polyglots is not "computer science" under any useful definition of the term. It's good old-fashioned hacking, of the sort that could get you a nice article in 2600 or PoC||GTFO.

Indeed, if you read the PoC||GTFO collections you'll find plenty of examples of similar work.

Plot to defeat crypto meltdown: Solend votes to seize, liquidate whale account

Michael Wojcik Silver badge

Re: DeFi

Hell, some of the DeFi platforms and other cryptocurrency outgrowths (cryptocurrency exchanges and funds, DeFi insurers, NFTs, ...) make CDOs look almost sensible. I mean, at least with CDOs you could roughly gauge your exposure by what tranche you were in and what sort of diversity might be in the underlying securities. And even doomed mortgages have some real estate backing them, even if it's overvalued.

Many of the cryptocurrency enthusiasts seem to be not so different from the Sovereign Citizen true believers, in that they live in a fantasy world where recording things has magical power, and nothing more is necessary to win any argument. But I suppose that's not surprising – that's hardly the only point of resemblance.

Michael Wojcik Silver badge

Re: One coin one vote

Oh yeah. Just search for "flash loan" on web3isgoinggreat if you want some representative examples. (Not all the flash-loan attacks involve increasing stake for a voting takeover, but some do.)

Those suffering a schadenfreude deficit may want to head over to web3isgoinggreat occasionally for more like this story, by the way. It's generally pretty horrortaining.

Michael Wojcik Silver badge

Re: "we've been unable to get the whale to reduce their risk, or even get in contact with them"

It's not impossible, but it's really hard to tell (even with the advances that have been made in de-anonymization of cryptocurrencies and related tech). Thanks to the 2021 bubble, even many individual investors ended up with notional hundreds of millions of dollars' worth of cryptocurrencies. So this could be J. Random Dude.

Michael Wojcik Silver badge

Re: Grrr!

And by casinos for customers who drop a lot of cash, and so on.

AI's most convincing conversations are not what they seem

Michael Wojcik Silver badge

Re: The whole article

Indeed, "Turing-complete" and "Turing test" (i.e. the Imitation Game) are utterly unrelated.1 But I suppose that's why the comment you're replying to was posted anonymously.

As for the original comment that started this thread: Goodwins' gloss of the Imitation Game and of the primary thesis of "Computing Machinery and Intelligence" is pretty accurate. As I've noted elsewhere, Turing was advancing an epistemological2 stance, not proposing a decision procedure which ought to be used in practice. Specifically he was arguing for a pragmatist approach to addressing the question of mechanical thought: thought can be discerned only by its external effects.

A final point. In the paper Turing remarks, "Instead of arguing continually over [phenomenological solipsism] it is usual to have the polite convention that everyone thinks". Sometimes it might seem difficult to maintain that convention, but perhaps it helps to try not to overestimate the value of thinking. Some of it is quite successful; in other cases, rather less so.

1Well, Turing does devote an entire section of "Computing Machinery and Intelligence" to the question of machine universality, so you could argue that he drew a connection between the two concepts. But not at all in the sense the GP did here.

2Or for you Cornell West fans, arguably an anti-epistemological stance.

Michael Wojcik Silver badge

Re: Boats

Dijkstra was a world-class curmudgeon and master of the soundbite, but like many of his pronouncements, this is pithy but not profound. It dismisses the question while resolving nothing.

Dijkstra had a fine intellect which he applied vigorously to questions that interested him, but he was often outright anti-intellectual for those that did not.

Michael Wojcik Silver badge

More precisely, it was meant to avoid epistemological questions about machine intelligence. That's pretty much what all of pragmatism (the philosophical school) is for – getting out of what Barbara Herrnstein Smith (much later) called the "epistemological scandal" by admitting that regardless of whether there's a metaphysical essence, we don't have any access to it; all we can know about are the testable attributes of a thing.

It doesn't completely foreclose questions of machine intelligence. Turing does state, in section 6, "The original question, ‘Can machines think!’ I believe to be too meaningless to deserve discussion". (I suspect the exclamation point is a typo, but that's how it appears in Mind 59.) But that's because he's replaced it with a pragmatist formulation. Questions of cognition (human-like or not) in machines remain relevant for philosophy as they seek to expand on our concept of mind; they're relevant for engineering as they push us to explore new technologies adjacent to them; and they're already relevant in society and law as we see conflicts over, for example, the assignment of patents to machines.

Michael Wojcik Silver badge

Conducting the Turing Test was always missing the point

Turing does discuss, in passing, the possibility of actually carrying out the Imitation Game in "Computing Machinery and Intelligence". But that was never a particularly interesting result of the paper. It misses all the more important consequences of his argument, which are at least 1) the pragmatist approach to the problem of artificial cognition for the theory of mind, and 2) his series of arguments against possible objections to it.

I think few serious researchers or philosophers take the idea of conducting Imitation Game sessions seriously, at least as a decision procedure for machine intelligence. (Some may find them interesting to see just how various human judges react to chatbots and the like.) Certainly a number of them have dismissed the idea. French had a piece against treating the Turing Test as a decision procedure in CACM years ago. It's really not a hot take, in the academic realm, though it certainly doesn't hurt to make it in the industry and mainstream press because, as Goodwins points out, the latter at least are certainly happy to whip themselves into a frenzy over it.

Michael Wojcik Silver badge

Re: YES!

That's a rather weird, and I suspect ultimately insupportable, definition of "being". But it's hard to tell what exactly you're pointing to.

Michael Wojcik Silver badge

I haven't seen a convincing warrant for "only running while answering a query" as a necessary condition for sapience, and in fact you can easily argue that human beings would remain sapient even if they were "paused" and "resumed". Indeed, everyone who believes in the possibility that our (visible) universe is a simulation, or who believes in cryonic preservation, implicitly believes that.

A better objection to the possible sapience of any transformer model, I think, is that we have many fields of research showing extra-linguistic and sub-linguistic components to human cognition. If language doesn't suffice for human cognition, then that shifts considerable probability against building human-like machine cognition solely out of language.

So, for example, in neurology you have things like the work of Antonio and Hannah Damasio's team on the effects of somatic inputs on cognition. In psychology you have the vast array of well-documented cognitive fallacies humans are prey to. Narratology has contributed some rather extensive theorizing on how humans construct narratives from sensations, ideation, and reflection to condense a stream of thought into meaning. (Incidentally, you'd find some ammunition for your "sense of the passing of time" argument there.) Phenomenology has documented the peripatetic and chaotic nature of human consciousness. Much work has been done examining the vexed workings of human memory. When a model includes non-linguistic mechanisms comparable to those, and others, we might see something that's a bit more difficult to distinguish from sapience.

Or we might build a model which does something that we think might be sapient, but in an entirely different way. But then it wouldn't be human-like.

Michael Wojcik Silver badge

Re: Sentience? Meh...

Add a laser pointer to the apparatus.

Michael Wojcik Silver badge

Re: Sentience? Meh...

Yes. There are situations where machine sentience is an interesting question, but this is not one of them. Sapience is the matter at hand. Lemoine and many commentators got that wrong.

(JFTR, I think it exceedingly unlikely that any human-built artificial system to date is sapient under any useful definition of the term. Sentience is in some ways a harder problem, because sentience among organisms is still very much under debate. There's an argument for calling any cybernetic system – that is, any system with a feedback-based control mechanism – sentient, on the grounds that it modifies its behavior in response to stimuli.)

Michael Wojcik Silver badge

Re: The real issue

Pascal was a Christian

Sure, but "I think therefore I am" (cogito ergo sum) was Descartes.

Michael Wojcik Silver badge

Re: Chinese Room

It defies any purely physical description of any mental process.

I'm afraid you've fundamentally misunderstood it. See my other post in this thread.

Michael Wojcik Silver badge

Re: Chinese Room

The thought experiment itself, but not Searle's entire argument. It's important to read the actual Chinese Room piece ("Minds, Brains, and Programs"), and at least skim some of the initial responses to it from the "symbolic manipulation" school of AI practitioners, and then Searle's response to those responses.

The Chinese Room can be seen as an exercise in ordinary-language philosophy, specifically of phenomenology. Searle describes the experiment, then says "I'm not sure what I think thinking is, but I'm pretty sure I don't think it's that". But in his response to the initial challenges he notes explicitly that he thinks mechanical thought is possible, because he believes the human CNS is mechanical. In other words, he took a monist position on the theory of mind: that mind is an effect of the body, and the body is a physical mechanism. There's no magical spiritual or metaphysical component that makes human cognition something that could never be achieved by artificial means.

So the Chinese Room argument is that artificial cognition may be possible (in fact Searle believes it is), but it's not a matter of manipulating a set of symbols which have no further mental depth.

Inverse Finance stung for $1.2 million via flash loan attack

Michael Wojcik Silver badge

Re: Programming for smart contract execution... What could go wrong?

Each machine has a separately coded implementation

That's not how "smart contracts" work. They're small programs appended to a blockchain which are executed by anyone who wants to be "paid" for executing them (modulo various conditions). One implementation, which is no longer under your control once it's in the wild.

Michael Wojcik Silver badge

Re: Programming for smart contract execution... What could go wrong?

If your software isn't sitting in an append-only register, you can, y'know, fix it.

As it is, there's a large body of methodologically-sound research showing that the smart-contract domain is rife with terribly buggy programs. If anything, it seems to be worse than the (appalling) state of software in general.

Michael Wojcik Silver badge

Re: The final stage of the crypto collapse

Since the cost of these attacks is extremely low, it really doesn't matter. If the attacker extracts 1% of the nominal value as hard currency and/or goods and services, they've made a decent day's payout.

Also, as we saw in a number of cases, a number of the True Believers have cash reserves they're still willing to pour in to try to prop up their houses of cards. (Ugh, that metaphor is so mixed it looks like I got it from Tornado. Anyway.) So there's still room for the artful types to extract real value before the whole thing goes cold iron.

Michael Wojcik Silver badge

Re: this oracle implementation was reviewed by a competent third-party team as well

I don't think anyone's found a problem with the oracle implementation. The oracle design was broken.

US senators seek ban on sale of health location data

Michael Wojcik Silver badge

Re: The

Holding aside for the moment all questions of moral and legal issues around abortion, I have to point out that while the Republican Party has traditionally made revoking reproductive rights a plank of their platform, in this particular circumstance it is several justices of the US Supreme Court who are looking to revoke the Constitutional protection of it.1 Justices of the Supreme Court are not elected, so they can't be doing this so conservative voters will "vote for them".

Now if you claimed, say, that Trump's handlers had him appoint justices who would favor reversing Roe in order to encourage the Republican base to turn out at election time ... well, that's at least possible. Though historically outrage has been more successful than satisfaction at getting people to the polls. I think it's more likely that said handlers got Neil, Brett, and Amy their robes because they seemed likely to favor other policies nearer and dearer to what passes for said handlers' hearts. Abortion they likely don't give a damn about one way or the other.

The people who have a hand in SCOTUS appointments mostly aren't ideologues, or if they are, they're Randists or the like. They're elites. They're not like the sort of mid-level rabble who fill the House of Reps.

1Before some idiot complains that "the Constitution doesn't mention abortion" or the like: Roe v. Wade construed a right to abortion in the Fourteenth Amendment. The Fourteenth is a part of the Constitution, and the decision made that right as a part of Constitutional law. That's how SCOTUS decisions work.

Interpol anti-fraud operation busts call centers behind business email scams

Michael Wojcik Silver badge

Some of the fakes are getting very good.

Particularly true for spearphishing and other cases where extra resources are justified for the scammers.

There was a nice twist making the rounds of the infosec lists and bloggers not long ago; I have a vague idea that Troy Hunt might have posted it originally. Victim got a call from a scammer pretending to be from a bank he uses, reporting possible fraud detection. Victim put the caller on hold and called the bank on another line, got through to Customer Service, and asked if they already had an open call with him. Customer Service says, yes, we show you're already on the phone with us. Victim resumes the call with the scammer, thinking he's verified that they're from the bank.

Turns out that as Scammer A was calling the victim, Scammer B was calling the bank pretending to be the victim. Perhaps to defeat this check; perhaps to MITM interactions with the bank.

Michael Wojcik Silver badge

Re: no computer criminals get sentenced hard enough to discourage them or others

Yep. Organized crime typically operates like an MLM, insulating the organizers from most consequences. And why wouldn't it? Criminals can see how businesses work, and since they're committing crimes anyway, there's no regulatory framework or other mechanisms to discourage them from exploiting their employees.

Michael Wojcik Silver badge

Re: How much longer is it going to take ?

There's a wide array of psychological traps that make people fall for various cons. Some studies suggest those who are most confident they can detect scams before falling prey to them are actually more easily fooled by certain approaches.

That includes 419 scams. One 419 victim in Michigan was the treasurer of a good-sized firm and embezzled a large sum in order to feed the scam. That's someone with financial training and experience, and sufficient focus to rise to a high-level corporate position. Often desperation overrides rational calculation.

And, alas, there have been some financial schemes which sounded too good to be true but nonetheless were (often because some government body didn't think things through). The Economist had a retrospective several years ago on audacious (but legal) financial deals which included a few of those. So there's always that sliver of possibility to tempt people.