* Posts by Charles 9

16605 publicly visible posts • joined 10 Jun 2009

Sniffing substations will solve 'leccy car charging woes, reckons upstart

Charles 9

But doesn't that raise the risk of things DIScharging faster, as in higher risk of thermal runaways?

Charles 9

Re: The Future is Nuclear

"Basically, we could have flying cars right now if not for the woes of the world."

No, people started thinking harder and realized ubiquitous flying vehicles only make sense in a world with no gravity. Otherwise, you'd be spending too much energy just staying in the air (which is unavoidable, again, due to gravity). Air travel only works in bulk or when time is of the essence and the customer is willing to pay through the nose for it.

Charles 9

Re: The Future is Nuclear

Why stop at alcohol? Why not go whole hog and manufacture synthetic hydrocarbon fuel? The US Navy is researching this for their aircraft carriers which have power to spare with their nuclear reactors, plenty of resources to draw from the sea, and an immediate need for jet fuel. Anything they can cook up can likely be adapted to more general uses.

Charles 9

Re: we don't fuel gas cars at home

Then what happens during rush hour when the "filling stations" get seriously slammed?

Charles 9

Re: Ultra conmuter

Or he could be a roving contractor or some other person who has to extensively drive his own car every day for a living.

Western Dig's MAMR is so phat, it'll store 100TB on a hard drive by 2032

Charles 9

Re: Why not SSD Drives?

Even home and small-business users need backup storage, and tape these days is strictly the realm of larger enterprises able to afford the upfront costs of both device and interconnects. Without a consumer/small-business answer to tape, rust drives will remain the go-to archival choice at the low end for the foreseeable future (note this includes RDX, which is at least within reach of smaller businesses in need of a more regimented backup system).

Charles 9

Re: Why not SSD Drives?

Not for bulk storage. Not yet, at least. If time is not of the essence, then rust is still much cheaper at higher capacities.

Charles 9

All I'll say at this point is this better not be more smoke and mirrors.

Oz military megahack: When crappy defence contractor cybersecurity 'isn't uncommon', surely alarm bells ring?

Charles 9

Re: third party assurance

What if it's an official term of the contract? Wouldn't that count as express consent?

Dear America, best not share that password with your pals. Lots of love, the US Supremes

Charles 9

Re: Oh really.

It isn't illegal in the criminal sense. You breach your mortgage contract, though (Breach of Contract, a civil matter), and the lender can then initiate legally-sanctioned procedures to redress this (foreclosure hearings). Since banks tend to have government backing, they can step in if necessary, but they usually don't have to do this apart from the civil courts. It's like with car payments. Miss too many and they can repossess your car: again, a civil rather than criminal matter.

Charles 9

Re: My Password is

Not necessarily. They could lump all the users of that password into one multi-defendant case. Unless each user then commits a serious crime with that access, the case can get settled in a general district court without need for a jury (depending on the jurisdiction, jury trials for criminal matters are only guaranteed for felonies).

Charles 9

Re: So ...

It's simple. Was the person who "published" the info granted the authority by the site owners to share this information (yes or no)?

Microsoft silently fixes security holes in Windows 10 – dumps Win 7, 8 out in the cold

Charles 9

Re: Windows 10 not private.

No one is bothered about the OS possibly giving away trade secrets? Something very odd going on here if that's the case.

Charles 9

Re: switching to linux

Most would reply that the revenue from them probably doesn't compare to that in the PC sphere, which is why there are still a lot of PC exclusives (and more by voluntary choice, not out of an exclusivity contract or first-party publisher)? Why haven't games like WoW made the jump to consoles that are able to support KB/M controls if necessary?

'There has never been a right to absolute privacy' – US Deputy AG slams 'warrant-proof' crypto

Charles 9

Re: No right to privacy?

Where is the word "state" in the Second Amendment? Militias were and can remain private organizations. After all, the STATES can become corrupt, too. It's meant to ensure government (ANY government within the borders) doesn't try the confiscation approach. Now, there's still the "nuke a town and dare anyone else to try" approach, but that's a different story and still has counterexamples in places like Vietnam and Iraq.

Charles 9

Re: Sorry Deputy Attorney General Rod Rosenstein, But Constitution Beats Your Wrong Opinion

Except practically no safe known to man has been able to beat a determined safe cracker. Thus why they're rated by time. Worst case, unless it's a vault, they find a way to dismount the safe and take the whole thing with them.

Electronic communications CAN, however, be permanently scrambled beyond recovery. Indeed, some adversaries SEEK this to break communications chains.

Charles 9

"They have, in short, repeatedly and wantonly committed the very act that the Fourth is intended to protect us from."

It's simple. If you're under perpetual existential threat (and can prove it, too, with things like 9/11) then it's very easy to claim anything is reasonable if your country won't exist tomorrow otherwise.

Charles 9

Not really. The key word in the Amendment is "reasonable". Thing is, what can you call reasonable when you're under perpetual existential threat?

Charles 9

Re: Actually, I think he is right

Do you think any military could survive having the enemy know everything about them? We still haven't figured out a way other than secrecy to deal with sheer overwhelming force.

Charles 9

Re: TL;DR all comments, but in science v. "the law" ...

But then they have to get together to actually get things done. Just make it hard for them and they'll be forced to change methods.

As for the one time pad, continual pressure could force them to keep ditching their pads in a panic, breaking communication chains. Remember, keeping them from communicating can be as effective as intercepting them.

Charles 9

Re: If...

One end may be outside your jurisdiction and you don't know enough about your end to establish probable cause.

Charles 9

How can the police do their work when hostile sovereignty gets in the way? The Internet makes using hostile sovereignty as a shield much easier.

Charles 9

Re: Encryption and the Fifth Amendement

Memory Theater and other mnemonics tend to rely on sequences to establish relations. It doesn't work so well when the recall is more random in nature.

As for extradition, that's up to the country currently housing the suspect. Generally, it has to be a crime in that country first before they'll even consider extradition. Differences in law provide an angle for political refugeeism.

Charles 9

You can still break it by recovering the key, which is normally too complex to commit to memory, meaning there WILL be a trace.

Charles 9

Or they simply state standing law prohibits a right to privacy, satisfying those Amendments' conditions.

Charles 9

Re: when crime is afoot

The Patrician felt the same way, IIRC.

Charles 9

Re: Actually, I think he is right

I've learned from firsthand experience that edge cases don't stay edge cases and that truth is stranger than fiction (see Edward Snowden).

Charles 9

Re: Different entropies

Okay, how about you compress the phone book, THEN apply the one time pad?

That's just one way to no destructively whiten the data. Other systems are designed to whiten incoming data known to be easy to analyze otherwise.

Charles 9

Re: "if the fate of the world depends on breaking an unbreakable message"

"Obligatory xkcd"

Like I said, what if he's 's MASOCHIST (as in, "Yeah! HARDER!" Wrench turns him on)?

Or what about a total wimp who, if you show or even threaten the wrench or anything like it, promptly faints?

Charles 9

Re: "encryption isn't protected by the American Constitution"

Cart-before-horse argument. What if decrypting that message is the KEY to getting or supporting all the other evidence? And supposing the suspect is a masochist to boot?

Charles 9

Re: Actually, I think he is right

What about ongoing black projects which have to be denied they even exist, whose revelation could bombshell major government relations if not start a war?

Charles 9

You Bet Your Life?

And as for the spanner to the kneecap, what if he's a masochist with no famly?

Charles 9

Re: Missing the first basic step

As the saying goes, you're screwed. That's why you can't really have "plausibly deniable" encryption a la TrueCrypt/VeraCrypt. Produce something capable of hiding something and the plods simply assume you're hiding something and lying about it (because if they take your word for it and there's a massacre, it's their heads). Not even staganography is immune to serious content analysis to reveal there's hidden content there combined with pervasive media mangling to reduce its possible flow to a trickle.

Charles 9

I think part of the problem is that current encryption technology is rapidly making the situation black-and-white: all-or-nothing, with consequences. The way things are, either the data is safe or not: there's no middle ground. At the same time, subversive elements are becoming bolder and more brazen, placing governments and even civilization itself under serious threat. Basically, if the fate of the world depends on breaking an unbreakable message (a little extreme but more plausible in this day and age), then civilization itself may not last long, and that's REALLY scary.

Charles 9

The point is, the key has to be at least as long as your message and able to be hidden from nigh anything, plus its nature makes it difficult to keep in your head. They'll just go after the hidden key. And if there's more than one, they'll take ALL of them to make sure they have the right one (and so as to discredit any placebos).

They've only gone and made a chemical-threat-detecting ring

Charles 9

Re: "after three hours in open air [..] the agarose gel dried"

Not a pendant. Could get caught on something. Just make it a little bigger and fit it on a wristband.

Hackers nick $60m from Taiwanese bank in tailored SWIFT attack

Charles 9

Put it this way. As a comedian once said, "You can't fix Stupid."

Charles 9

Re: SWIFT nasty software malware cyber-heist ..

It could well be that the banks pushed back too hard to resist. A standard isn't any good if no one uses it.

Video games used to be an escape. Now not even they are safe from ads

Charles 9

Re: 407000 words? A transparent farce

Which will never happen because such a ruling would likely then be twisted to say snapping a page with a camera is not copying, either, getting the print industry up in arms. Pandora's Box.

Charles 9

Re: 407000 words? A transparent farce

But won't that result in complaints, hoop-jumping, and click fatigue. They just want to get things done, not have obstacles put in their way. And remember that a lot of legalese is meant to avoid loopholing by way of misinterpretation.

Charles 9

Re: It's not about the obvious...

How about the opposite? If you DON'T pay attention to an ad, IT HITS YOU? Confirmed to have been going on in video games since at least the late 80's, as noted in the documentary series, "Buy Me That!"

Charles 9

But now you have to trust the ad network you hired, and there's a risk of a booby-trapped ad being associated with your game.

Charles 9

Re: Is the problem 'game developers' or scammers?

I do, but it's not the main TV being used right now, plus it's rather dated.

That virtually impossible classic compsci P vs NP problem is virtually impossible, say boffins

Charles 9

Re: I can resolve n queens problem

How many queens do you start out with? For example, with N = 1000, do you use 10 queens? 100? 500? As you increase the number of preset queens, you raise the possibility of blocking out positions for the remaining queens, resulting in the board being a "no solution". Do you check for this?

Charles 9

Re: They have failed...

But by knocking down the size of the board, you eliminate possibilities that may be necessary to complete the board. How can you be sure the reductions you make don't eliminate necessary positions? For example, in trying to solve a 5x6, you may lock yourself into a position that makes solving 6x6 impossible. How do you prevent this?

GNOME Foundation backs 'freedom-oriented' smartphone

Charles 9

"They should focus on creating a software foundation that is hardware-agnostic that others can build on."

But given how cutthroat the SoC market is, how things are constantly shuffled to keep from Giving Information To The Enemy, you pretty much can't produce a hardware-agnostic system without their cooperation, and they're not in a position to cooperate. Either one of them has to gain true dominance to dictate terms, or they have to finally get tired of the war and start negotiating.

Russia to block access to cryptocurrency exchanges' websites – report

Charles 9

I'm just wondering how they're gonna handle things like proxies, a la The Pirate Bay.

Leaky-by-design location services show outsourced security won't ever work

Charles 9

Re: since they have nothing to lose

No, just a simple realization they won't be getting out alive unless they win. That's how desperate the rangers are at this point. The poachers have already demonstrated a no-holds-barred attitude to their activities. I wouldn't put it past them to fake a surrender only to slip a suicide bomber amongst the rangers.

Charles 9

So basically you're saying we need a complete reset of IT altogether, back to the Stone Age, if you will, only it will likely end up more of the same since it's hard to do big things without a benefactor, and once you have a benefactor, he can lay claim to anything you do or make.

Did ROPEMAKER just unravel email security? Nah, it's likely a feature

Charles 9

Re: There is a solution for this

I wouldn't mind that, really. Plain text means things that can't be conveyed in words, like pictures (worth a thousand words, remember?), get lost, and you can't rely on links since they can be booby-trapped (watering-hole or drive-by attack). Everything should be inline, and you can allow things beyond text; just limit it to things that would be used for formatting purposes like the basic B, I, UL tags, and so on. I mean, since when can you be pwned by a B tag? Might as well say you can be pwned by a plain-text e-mail, in which case it's probably time to abandon the Internet altogether.