* Posts by Charles 9

16605 publicly visible posts • joined 10 Jun 2009

TVs are now tablet computers without a touchscreen

Charles 9

Re: All I want is the screen

"They exist, just look under 'Monitors' rather than 'TVs'."

Not quite. TVs stick to the standard resolutions while monitors tend to cater to users who need resolution more than anything. Beyond say 23 inches you go beyond 1080p resolution which tends to be overkill for most. Depending on the brand, monitors around the 30 inch range are 4K resolution. And I don't think they make monitors in home theater size. And let's not get started on the prices, as these tend to be classed as professional equipment.

Charles 9

Re: The road ends eventually.

"Similarly, when DVD first launched, PCs at the time needed an MPEG-2 add-on card as the required decoding wasn't possible in software-only due to the limits on CPUs grunt at the time."

And they weren't cheap, either. Anyone remember the RealMAGICs and Jazz VGA piggyback cards? I ended up getting one (used) because I learned firsthand that a 300MHz CPU (no cheapie for the late 90's) was a bit on the underpowered side. It took the P3 generation to make it doable in software, just as it took the P1 generation to be able to do MPEG-1 VideoCDs in software.

Charles 9

But the handshake can also BREAK or be REJECTED. Think of the early 4K screens after the HDMI spec was updated for protected 4K content.

Charles 9

My point. You STILL would miss, as most video decoding these days is done on the graphics unit rather than the central unit. Plus by raising your price, you allow the competition to undercut you, so you basically can't win.

Charles 9

Re: 'unused bit of the video signal'

Specifically, NTSC used 3.579545 MHz as the color subcarrier frequency. PAL used 4.433618 MHz. SECAM used a different system altogether that had its own tradeoffs (instead of both channels at once, it goes one at a time, improving horizontal color resolution at the cost of vertical resolution).

None of the systems were perfect, which is why derivise backronyms were made up ("Never Twice the Same Color", "Picture Always Lousy", and "Sans Experience Contre les AMericans"/"System Essentially Contrary to American Method")

Charles 9

Re: All I want is the screen

"So get cracking on modular frames."

You forget about Planned Obsolescence. Unless you can compel them by law, no manufacturer will ever want to support the screens for more than the bare minimum. Captive markets, after all.

Charles 9

Re: Hardware Acceleration Required

It depends on the chip, I think. If the 10-bit bitstream is not that different from an 8-bit one, the decoder can still decode it, then pare down the 10-bit results into 8-bit ones. But this isn't a question with a universal answer.

Charles 9

Until they update the HDMI spec, that is...

Charles 9

Re: Smart

But terrible media centers. You usually have to fiddle with them to find the videos you want, and their codec support can be hit or miss. I speak from experience. It's not like they support something like Kodi where everything's well-organized.

Charles 9

Re: Hardware Acceleration Required

Yes you can. You just can't show the full gamut. It's like trying to watch a 4K video on a 1080p screen. You can do it, just not at its full quality.

Charles 9

Ah, but which VERSION of HDMI? Ask the early 4K TV adopters what they thought when they learned the HDMI spec was updated for 4K HDCP support and their TVs don't support it. Ugh...

Charles 9

Probably not. Need additional oomph in the chips to be able to handle HEVC (that's the tradeoff; tighter encoding results in higher demands at the other end). Basically, if your TV was built before HEVC was formalized, don't count on it to be able to handle it reliably if at all. It's a hard problem of technology: they can only build for what they can see, and trying to future proof is like trying to predict the weather: fair chance of missing.

Charles 9

The road ends eventually.

Before you talk about upgrade paths, consider the previous generation of Smart TVs that had their own OS's and app stores. You would think these would also allow for upgrade paths. The thing is, like most other things, they eventually get abandoned. You can't expect Android to be supported to eternity, and indeed Google seems intent on an eventual path away from it with Andromeda. What happens when the app you need to watch your shows is dead-ended? Even worse, even if the app is updated, will your television carry the brute force needed to handle newer, tighter codecs? Take my TV. It'll never have the oomph to do HEVC. At the time it was made, AVC was state of the art. HEVC wasn't even a concept at the time. As a New Yorker would say, "Fugedaboudit!"

Just like with computers, it's a decision between "wait until something better comes along" and "pick your spot and take the plunge". It pretty much comes with the technology territory and is for the moment unavoidable.

European Court of Justice lays down the law on Kodipocalypse

Charles 9

Re: Do you know what would deter pirates?

"Copyright infringement will always exist, but it can be greatly reduced if the content providers adapt."

You forget. Once their media's cut loose, they lose their repeat business which they need to continue existing. Plus these things cost money and they need to recoup it. Have you considered that your model may not be enough to get it back? Unless you can provide actual hard numbers to support this? And don't use the music industry as a basis since their overheads are much lower being they don't have to cater to eyes.

Charles 9

Re: Question about these pirate Kodi sticks

I think it's mainly the latter. Content management systems are getting hardened enough for the former to not be too feasible these days barring a hole.

Charles 9

Re: mmmmmmmmmm...

"One assumes, further, that it may become illegal to pass any directions as to where you can find the instructions on how to install such software."

Directly, probably, but that kind of information is also easier to pass along INdirectly.

A switch with just 49 ns latency? What strange magic is this?

Charles 9

Re: The future...

"HFT shows that the financial system is broken and working against the needs of Society. If the financial system was an audio amplifier, then HFT would be ultrasonic ringing, and the designer would insert a low-pass filter to improve the amplifier's performance. Instead, the HFT traders throw money at increasing the problem, because it makes them more money."

Your analogy is broken here because the HFT people WANT the ultrasonic ringing, as it gives them a money edge. That's why they're willing to throw money at it, because they get MORE money in return. It goes to basic human behavior, so you likely can't fix something like this without fixing the human being.

Charles 9

Re: The future...

But that was the FIRST thing they did. All the prime real estate's assumed to already be taken, including space WITHIN the exchange if at all possible. Now, due to the crazy demand, prime real estate commands prices too high for RoI to be worth it anymore. Which means time for Plan B: quicker turnaround at junction points because everything else is basically hampered by the speed of light in medium and the speed of electricity.

Don't stop me! Why Microsoft's inevitable browser irrelevance isn't

Charles 9

"I use Chrome because Google has accomplished for the consumer what Microsoft does for the corporate user.

They built a platform that allows you to roam."

At the price of them being able to see what you're doing. Is this kind of ability worth having Big Brother looking over your shoulder most of the time?

Doctor Who-inspired proxy transmogrifies politically sensitive web to avoid gov censorship

Charles 9

Re: Because...

Thing is, what if the state is running an SSL proxy, meaning the ONLY keys the end-user have belong to the state, a la a corporate secure proxy?

Charles 9

How would this work if, for example, the ONLY TLS credentials permitted on a subject's computer belong to the state, and that ALL traffic, encrypted or not, runs through state proxies and routers as a general rule (think corporate proxies, only larger)?

Lyrebird steals your voice to make you say things you didn't – and we hate this future

Charles 9

Re: "Our technology questions the validity of such evidence"

And what's so special about it that no computer can replicate it? Sounds to me like they've found the closest thing yet to the Lens.

systemd-free Devuan Linux hits version 1.0.0

Charles 9

Re: They missed a trick

"The reality is the binary logs are there so they can be journaled, indexed, tamper resistent, searchable and all the rest. Things that administrators want or should want. It doesn't even stop you extracting the journal as text. It does allow you to tell if somebody has deleted lines from your journal. It does allow you to efficiently search between two date ranges on a particular event."

EVERYTHING you describe can be done with an all-text journal.

The kernel log can be timestamp and is frequently already timestamped.

If you really need indexing, you can generate an external file. I know video editors that use this technique for interframe videos.

You don't need a binary format to create a blockchain as they tend to be format-agnostic.

And logs are already searchable. Since most log searches are textual in nature, a simple linear search remains the most practical. A text log is easier to perform a textual linear search.

Now tell me how you extract a text journal from a crashed drive when it was housing your only systemd-based system? As Spike Milligan put it, it's like trying to open a box with the crowbar you will find inside.

Charles 9

Re: They missed a trick

Anything that involves a translation means things can get LOST in translation, especially if a system is heavily used. START with an ASCII log, THEN work from there on an AUXILIARY basis. Until you can prove yourself able to dig through a mangled journal on a crashed drive using a raw sector editor (because the system you're using for the post-mortem may not even be a Linux machine, so forget about one that groks a binary log to say nothing of an extended filesystem), don't even get started.

Why MUST the log be binary for forward-secure sealing? Why not encode a TEXT log and append the Hex-encoded hash to the log? You get your signature AND maintain an ASCII log that can still be read in the event of a disaster. It's nothing more than a blockchain, and you don't need to use binary formats to create a blockchain.

As for enclosing those utilities, remember the old Microsoft mantra? The three E's? Embrace, Extend, and Extinguish. This seems like a blatant attempt to usurp baseline utilities and take over their control so that no one else can keep up? Look at what happened to udev, which was working pretty well all by itself. Between it and the existing init systems, you'd be well on your way to solving most of the existing problems with dynamic hardware, containerization, and so on while still keeping things distinct.

And what about Bug #5644? In any other circles, this would be a Drop Everything because it breaks a cardinal rule of Linux (Don't allow easy tampering of the root). Here it's a WONTFIX. And not because it's a non-issue, because no real reason is given for ignoring the issue. Where I come from, we call that "taking the ball out of spite" and consider this a sign the project is Not Ready for Prime Time and the head to be blackballed.

Frankly, if they could demonstrate one clear and present need that systemd AND ONLY systemd solves by its particular methodology, we'd probably pay at least some attention to it. But until then...

Charles 9

Re: Why not switch to FreeBSD?

Hardware support stinks, especially for end users.

Charles 9

Re: They missed a trick

Really? Then perhaps you can list and rebut all the objections to it, including boring things like ntp and udev best kept separate, not using an ASCII log that can be read easily even if you're forced to read a crashed drive by raw sectors, and especially the attitude coming from up top of "my way or the highway," and no, Linus is better than Pottering in this regard. Linus objects to stupid stuff. Pottering objects to stuff that isn't his.

Charles 9

Re: geez, the ignorance about systemd here is astounding

"Please make the effort to do so, if they are indeed misunderstandings. There are some angry comments here about systemd, but I'd be very interested in your rebuttal of the more rational comments from those of us who have what we believe are sound technical objections to systemd's design."

I think what they're saying is that you can't fix Stupid. And you can't stop people ignoring things they WANT to ignore.

Charles 9

Re: They missed a trick

You forget. The Amish are technophobes. They're very much against using electricity; computers are essentially taboo to them.

What you probably intend to coin is perhaps "Luddix" on the belief that technology isn't the answer to everything.

PS. Back to the discussion. If we do have to go back to square one, how DO we better handle dynamic hardware configurations where even basic things like displays can come and go on a moment's notice?

Charles 9

Re: Cat among the pigions but...

Not really. A desktop has to work with much more varied hardware configurations including consumer-designed graphics cards with GPUs and 3D demands as well as things like hot-plugging USB hardware of all shapes and sizes from media devices to display adapters (and a good chunk of which are black-boxed, too), in mobile settings where people may be switching from access point to access point, maybe even using LTE modems and so on.

As they say, the devil is in the details. There's a world of difference between making a fixed-hardware interface-light server work and making a desktop that could have any number of things attached to it work.

Charles 9

The problem comes when you don't have access to journalctl. Say you're booting from an external device because the original drive no longer boots (or worse, you transplanted the drive to another system). Odds are, the journal's mangled and the recovery system you're using doesn't grok the binary log. It's somewhat easier to make at least some sense of a mangled ASCII file; it's one time where INefficiency is a boon (more room for error). As for filtering, as long as the log's well-formatted, you can simply run an ASCII log through the usual trove of text-selector utilities like grep to winnow things down. You'll have to demonstrate (very useful) things that simply cannot be done any way OTHER than a binary log.

Charles 9

Re: More honest questions

Probably because it wasn't intended to be an actual fork but rather a demonstration on just how tightly integrated the systemd components are. Sort of a, "Oh, you say it's so simple?" response to claims that you can separate the components.

As I've mentioned, the desire to have this kind of integration appears to come from up top, meaning any attempt to divorce the init part of systemd from the rest is unlikely and it would make more sense to start from scratch. Trouble is, something as serious as an init replacement, especially for modern environments, will likely need some backing, and most commercial interests that back Linux projects are backing systemd.

Charles 9

Re: More honest questions

"Second, and please don't blow my head off, it's just an idea, is it practicable to fork SystemD and castrate its excesses to create a genuinely clean init subsystem?"

I think for many your last suggestion is the nail in systemd's coffin. The group centered around the development of systemd appears insular and opinionated. If it weren't for the "my way or the highway" attitude existing there (and since it's coming mostly from up top, there's no real way to control it), we might see support for paring things down.

Because there ARE things that could use addressing, like better support for dynamic hardware configurations and especially hot-plugging (not prevalent in servers, yes, but essential for end-user stuff).

There's also debate about the very core of the UNIX philosophy because "doing one thing" doesn't guarantee they'll do it RIGHT or CONSISTENTLY, and you need both in order to ensure the stable interrelationship that is essential to make a process chain work. Interdependency chains create "weak link" problems that aren't always obvious. Nothing fouls up a maintainers day like one of those "one things" going WRONG, messing up the process chain, and then mangling the logs and backtraces to make backtracking difficult. It doesn't help that there's no real manual of style for scripting or configuration files, so each one does things differently leading to more inconsistency. From my perspective, the whole problem is something that's neither here or there: in other words, it's complicated, and there's no real ability to debate over the best way to approach this due to the spate of extremists in the discussion (see the systemd problem above).

Script kiddies pwn 1000s of Windows boxes using leaked NSA hack tools

Charles 9

"You can be versatile without a truckload of tools. It's knowing what to use and how to use it properly that matters, NOT how many different spanners of the same size you can call on."

And having a truckload of tools can make you MORE versatile. Assortment for assortment's sake may not mean much, but an assortment you ACTUALLY USE regularly is a whole other thing. You can't employ something you don't have, and it's hard to reach down to a 6-inch recessed nut without an extension rod, for which there are few acceptable substitutes. Similarly with things like Torx-head screws. Plenty of things in the world where one size can't fit all.

Charles 9

"I doubt some magical spell patent would bother me."

But you'd also running the significant risk of being found out and having another excuse for the plods to come after you.

Charles 9

Nope, you forget scenario three. Mine's the large AND well-worn toolbox, because my dad found himself having to fix A LOT of different things of varying shapes and sizes. Anything from a 6mm socket using a 1/4" ratchet to the four-inch pipe wrench. In another box he held a soldering iron and assorted accoutrements. Two multimeters, multiple saws, and a vice. And ALL of them have been used, multiple times. I've been forced to do the same thing. It's called versatility. Sometimes, you DO need the jack of all trades because although he may not be a master of any one, he can still be good enough to be preferable to the alternatives.

"You have to bribe the manufacturers to do so - and for them it's a matter of once it's known they let the NSA or whoever doctor their stuff that's it, game over."

Or blackmail. It's not above the Chinese, isn't it? As for "game over," that depends on whether or not an alternative is available. If they're a monopoly (say because they hold an essential patent), then they've basically got you up Crap Creek because there's no alternative other than to go without (which depending on the case is not an option for staying in operation).

And there's always going AROUND the manufacturers and replacing chips or other things en route, or simply finding ways to tamper with firmware and do it in irreversible ways (like the MacOS exploit that then replaced the encryption keys to prevent a reversal).

Charles 9

Easy enough. Encrypted packets bound for a white listed address or mixed into an existing encrypted session. The plods intercept the data upstream. Plus they really could be pwning the network chips. What then? You can't roll your own because of hardware patents.

Charles 9

Re: Move Windows XP to VM

You can't VM custom hardware because it won't know how to virtualize it, like that custom ISA lathe controller card (can't be used after XP because Vista dropped the ISA bus).

Charles 9

"The thing is, you want tools that work "everywhere", not every target runs the same hw, most, if not all, have slurp boxen, though."

No, you want the most effective tools, and you keep as many tools as you need to be as effective as you can in as many things as you can. That's why a good garage keeps a lot of tools. That's why State-level malware writer ALSO write Linux and MacOS malware.

Charles 9

Are we SURE this is State-level stuff? If I were running a State-level outfit, I'd accept nothing less than nuke-proof malware that can pwn machines at the HARDWARE level, beyond any hope of recovery. And we KNOW that's possible due to such things already being seen in the wild.

Mastercard launches card that replaces PIN with fingerprint sensor

Charles 9

But it's A LOT easier to just look at a finger than it is to compare signatures. Plus most people don't sign consistently anyway. I know my scrawl varies between iterations. How are you going to conceal a fake fingerprint in plain sight without some kind of tell?

Charles 9

Re: Targetting the wrong method?

The untrusted medium basically means there's no real way to deal with CNP fraud before the fact, as most thieves simply get enough information to properly impersonate the original holder. There's no real way to stop a Perfect Impostor at that point.

Charles 9

Re: Won't matter because it seems the Americans don't use C&P now

"But the real issue is US merchants who can't, or won't use C&P and only accept on 30YO mag strip technology."

Because they don't care. Most of the time, they don't foot the bill, and the little that does stick they eat to keep customers from defecting. Customers don't care as they just wanna get out the door (one of the most embarrassing things you can see is a customer swiping and leaving only for the clerk to call back, "But your card was declined!"). And as noted earlier, VISA don't want to lose customers so they tend to resolve fraud issues quickly in their favor. In such an environment, why shoulder additional PITAs when they don't have to?

Charles 9

Re: Maybe I'm not as smart as these card tech guys...

"Well typically it's not a hash, because that won't allow fuzzy matching that takes into account small changes between different presentations of the same finger. MasterCard say that they convert the fingerprint to a template and store it in an encrypted form on the card. Of course the encryption key needs to be stored on the card too, but hopefully it is not easy to extract both it and the encrypted template."

In such a situation the crypto module is black-boxed, unique to the card, and highly tamper-resistant with suicide circuits and so on (IOW, try to mess with it and it wipes).

Web celeb product whores told to put on the red light – or else

Charles 9

Re: What they meant to say was

More like a Matrix if you ask me. The Wild West exists outside, with junk calls, junk mail, billboards, ad flyers, and all that business in reality.

Charles 9

"Red-Tag Items 50% Off Next Friday" seems pretty cut-and-dry to me. "Now $1.19" as well.

If those are a lie, then cake is a lie, too. And if that's a lie, EVERYTHING is a lie and we're back to square one.

How else can you get the word out that you exist, especially if you're new to the scene and no one knows about you yet? Chicken-and-egg problem otherwise.

Look, advertise on your merits, but be ready to back them up. If your product is so good, then it should be good in the general case, not just the atypical case. If you don't have enough difference to make your ad worthwhile, GOOD!

The way I see, I consider ads a testimony before the public. Subject them to the same requirements as a court witness: the truth, the WHOLE truth, and NOTHING BUT the truth, so help you $DEITY.

Charles 9

No, that doesn't always work because young people can be both impressionable and rebellious. They'll follow their idol and hide that from their overbearing parents.

Given that, the only solution is a law demanding absolute truth in advertising with all claims made in the conservative. If a celebrity endorses it, they must ACTIALLY USE it and describe it's actual effects truthfully.

Nuh-uh, Google, you WILL hand over emails stored on foreign servers, says US judge

Charles 9

Re: Terms of service

"These days the Swiss banks will often refuse to open accounts for Americans or even shut accounts down because of this."

And if the person happens to be a Swiss/American dual citizen by birth?

Charles 9

Re: Terms of service

"To comply with local laws the Swiss subsidiaries pulled access from their parent firm (not to do so would land them in jail) however the US courts still found the US parent firm to be guilty of contempt of court for not providing the the information and fined them daily."

So what happens when a multinational company (local to MORE THAN ONE country) gets caught between conflicting sovereign laws such that, no matter what, the company WILL be in violation of AT LEAST ONE, with severe consequences either way?

(You can't) buy one now! The flying car makes its perennial return

Charles 9

Re: I do wish he'd leave my knob alone

The door doesn't have a knob, either!

FYI – There's a legal storm brewing in Cali that threatens to destroy online free speech

Charles 9

Re: Thanks California...

"...except that even back in the days of Ronald Reagan republican California there were still legally-retarded laws being passed."

Two words: California Emissions.