* Posts by Charles 9

16605 publicly visible posts • joined 10 Jun 2009

UK, French, Belgian blanket spying systems ruled illegal by Europe’s top court

Charles 9

Re: Hear all about it!

""Iron fist" or not, given the sheer numbers of the population, people should be able to (literally) crush any attempt to harm them. Yet they very rarely do..."

Depends on the size of the fist. If you have a fist large enough to tear the whole country or worse apart attached to someone willing to go MAD, people start checking if their situation actually is worse than what's potentially on offer.

Teracube whips out cheap, fixable phone with removable battery and four-year warranty

Charles 9

Re: Eventually we will reach peak phone

"In my limited experience one of the biggest issues with older phones is lack of memory."

Let's be clear. Do you mean lack of memory (as in RAM) or lack of storage (as in flash memory)?

For the former, as apps get upgraded, the baseline for their usability rises with them. It's why I eventually had to stop using my Note 4, as every app I tended to use got put to sleep, sometimes even while I was using them.

When it comes to storage, most apps only keep the most recent version and maybe one backup. The new version simply replaces the old one in storage, much like how you upgrade computer programs. Uninstalling and reinstalling may recover some space, but this is usually cache and other assorted cruft that comes with the use of the app. If the app itself is big (and getting bigger with each update), you're going to use it up no matter what.

Complexity has broken computer security, says academic who helped spot Meltdown and Spectre flaws

Charles 9

Re: So tiresome

"One in a hundred is not unusual. I would call that a bad model for security."

But the point is, evolution tends to take everything into consideration to get the odds right. 1-in-100 odds? Use Strength in Numbers, but you notice that doesn't happen for larger animals like cows. Ruminants tend to have stay on the hoof, thus their young are born live and tend to be able to get up and move quickly afterward, for that reason.

"Take the deer. With excellent hearing, speed, and eyesight, they represent a significant difficulty for predators. Humans work in teams to exhaust them."

Not just humans. There's a reason wolves, coyotes, and related predator species tend to work in packs. Even lions tend to gang up on their prey. Thing is, they don't tend to carry their food around with them, and one maybe two tends to keep them full, so it's not like they herd huge numbers off cliffs; doesn't fit their style.

"Random processes do a lousy job when faced with custom-designed countermeasures. Just don't."

But they have the advantage of time and numbers. As long as they stay ahead of the curve, things tend to work themselves out. Deer aren't that endangered yet, are they?

Charles 9

Re: Complexity

But at the same time, you can't simplify it, either, as a lot of that complexity has become necessary. The biology angle seems appropriate here, as it's a lot like our current virus issue. We can't stop it, and even containing it is proving problematic, and in the meantime people are dropping and livelihoods are getting shredded. Technological security may well have become a dilemma for which there is no satisfactory solution, yet people are too hooked on it to go back barring an utter catastrophe (the "typo kills ten million people" kind of catastrophe).

Charles 9

So what do you do when your job depends on containing Dave? Given how many Swords of Damocles are lying around, it may be reaching a point where tackling Dave may be the only way to keep things not reasonably secure, but simply secure enough to JGSD, especially in a world where spare time for many people is dipping into the negative.

Charles 9

Point is, it may not be possible to simplify things to the degree you desire because something turns out to be there for a damn good reason. Just like how reciprocating engines seem to have beaten out rotary engines in cars (mainly because they're easier to tune to the complexities of the real world: a necessary evil when you're required by law to eke out the last drop of oomph from your fuel tank).

Charles 9

Until you find out that complexity is necessary: possibly because of a need for agility or so on. Simplicity doesn't always work: otherwise, we'd all be driving cars with rotary engines.

Charles 9

Re: Security investment

Probably because RoI is so low in most places. Unless you're in a secure-or-die environment, it's cheaper to just lawyer and BS around any faults.

Charles 9

Re: KISS

No, because then you run into necessary complexity. Performance demand is macroeconomic, as the article notes, and people won't be willing to go back. Even if you flash something like Turing's Halting Problem disproof, they'll just fire back, "Then build a HYPERcomputer!"

If the Samsung Galaxy S20 Fan Edition doesn't make you a fan, we don't know what will

Charles 9

Re: Proper pimping

"Phones are being marketed for all other features, except the core functions."

When was the last time you asked a car dealership, "Does the car drive?"

It's reached the "taken for granted" point.

Charles 9

Re: Too small

...which can disappear without notice. Plus, that says nothing of the data allowance as it normally uses data when available. As the saying goes, if you want something done right...

Charles 9

Re: Too small

Until you end up in a not-spot...or overuse your data allowance. It helps to have things already on hand, you know.

Future airliners will run on hydrogen, vows Airbus as it teases world-plus-dog with concept designs

Charles 9

Re: Looks good to me- Carbon & hydrogen?

"And I'd wager more hydrogen atoms per molecule in ammonia than kerosene, gasoline, or methane."

And you'd lose the wager. Hydrocarbons are pretty high in H count. Methane is the lightest of them all, and it's CH4 (versus NH3 for ammonia). It only gets heavier from there. Common gasoline is mostly octane (C8H18) and heptane (C7H16). Kerosene is even more complex but tends to have heavier hydrocarbons like undecane (C11H24) and tridecane (C13H28).

As for airliner bodies, don't forget about aerodynamics and drag, especially at speed. There's a reason airliners today use a bullet-like design.

Charles 9

Re: Looks good to me

Does that lifetime include above the cloud line where the water cycle doesn't normally operate?

Charles 9

Re: Bring it back

"I suggest that a large amount of travel would not be done if cars were replaced with horses."

Except you're talking something macroeconomic. One thing about macroeconomics: It's HARD to go back to a simpler time as expectations have risen along with the tech. Now that people are used to being able to cross the country in a few days by car and in hours by plane, it'll be hard for them to go back. Barring a catastrophe (at which point we're probably already dead), people will keep demanding everything yesterday.

Charles 9

Re: Looks good to me

"The more carbon, the more energy required to ignite the fuel, a good example is diesel requiring much higher pressure to combust in a car engine than petrol."

Then what makes anthracite (which has more carbon and less hydrogen) so prized among coals?

Charles 9

Re: “four times more voluminous"

"While barrel of oil is still almost barrel of oil 500km away if you use any sensible method to transport it."

MINUS the fuel you used to transport it, which has a cost of its own, thus the Tsiolkovsky equation. Just saying and so on.

Charles 9

Re: It also shortens the potential ranges of airliners

Not trying to "rain" on anyone's parade, but there are criticisms that state that water vapor's net effect on temperature is moderating as it causes negative feedback (otherwise, we'd have been in Hothouse Earth long ago because of massive oceanic evaporation from the sun). Perhaps someone can elaborate on specifics on how water vapor can be both a worse greenhouse gas and a temperature moderator at the same time.

PS. I DO agree that hydrogen as a fuel is a nonstarter, thus the US Navy is researching into creating synthetic fuel instead using power from the reactors aboard their carriers.

Charles 9

Re: Looks good to me

Actually, coal isn't pure carbon. In fact, the two purest forms of carbon are common graphite and diamond. And last I checked, neither graphite nor diamond burn easily. Coal is typically a solid hydrocarbon (meaning it also contains hydrogen and usually a pinch of other stuff), and the composition can differ depending on the type of coal, ranging from pretty crude lignite, to the hybrid bituminous coal (so named because it also contains bitumen, aka asphalt), to high-grade anthracite which, while having high amounts of carbon, still has hydrogen in it.

Charles 9

Re: Looks good to me

And if used up gets converted back to water vapor...which happens to ITSELF be a greenhouse gas at volume, not to mention it aggravates humidity.

Charles 9

Re: Because the world is running out of hydrocarbons...

Not if we MAKE oil. Look up the US Navy's advances on synthetic hydrocarbons for their aircraft carriers.

Chromium devs want the browser to talk to devices, computers directly via TCP, UDP. Obviously, nothing can go wrong

Charles 9

Re: Yet

Guess you've never been dependent on a government website, then. Luck to you when the B&M alternative is a hundred miles away and requires a minimum overnight campout and all-day wait with no guarantee of success (I speak from firsthand experience).

Brave takes brave stand against Google's plan to turn websites into ad-blocker-thwarting Web Bundles

Charles 9

Re: Anything is possible if you try hard enough or spend enough money !!!

Can't. Too many times it results in blocking the ACTUAL content, too. More and more often you run into blankouts that wipe the page on detecting an ad blocker or (more frequently) pages that won't show a thing until the ad shows. If I start seeing this on government websites or some other place that can't legally have an alternative, that'll probably be the time to cry out, "Stop the Internet! I wanna get off!"

Charles 9

Re: unlike the worlds freeloaders

Shouldn't have to use a deal bolt, either, but c'est la vie. Pretty soon, I expect there to be a "Stop the Internet! I wanna get off!" campaign when government websites (as in the ONLY way to access things like benefits and so on) become Googleborgs...

Don't pay the ransom, mate. Don't even fix a price, say Australia's cyber security bods

Charles 9

Re: Security Practices

And if the malware pwns the detached PC's firmware (meaning it's nuke-proof) and creates a Sneakernet attack a la Stuxnet and BadUSB? And then hijacks your backup process (which is how I think some of the blackware works undetected)?

Charles 9

Re: I agree with every word

IOW, you'd ruin everyone near and dear to you in the name of principles. You see, you're going into Trolley Problem territory. Better pray no one in your employ is on a financial razor's edge or things could get ugly.

Charles 9

"How to secure their systems so that, even when users open that attachment, the attack will fail."

Too much hoop-jumping. Most people are not of that ilk (they're the kind that just settle for a dead bolt) and spend their days wanting to JGSD.

"What a best-practice back-up system looks like; one that can quickly and easily get the business working again and not itself be compromised."

Can you make it turnkey and on a shoestring budget?

Charles 9

Re: I agree with every word

Fear of retaliation. The best ones tend to be state-sponsored, and the last thing one wants is to make a hit look like an act of war...especially against an adversary less averse to going MAD.

Charles 9

Re: I agree with every word

"Thats why you have copies (known as Backups)."

The sneaky ones wait for a while so as to infiltrate your backups and corrupt them, too. OR they hijack the backup process itself to make it look like it's working when it's in fact corrupting or exfiltrating your secrets.

Charles 9

Re: Unsolicited is the key word

Not really. Edge cases don't stay edge cases, and what was 5% yesterday can easily become 95% tomorrow. Miscreants who have been around for a while tend to be very agile.

Bill Gates debunks 'coronavirus vaccine is my 5G mind control microchip implant' conspiracy theory

Charles 9

Re: Take home point

Too late for that. The Internet is the alcohol of the 21st century: so addictive a vice people will probably quit their country first. Look what happened during the Prohibition Era...

Charles 9

Re: Very good skeptoid podcast recently debunking this stuff

"But if the question is repeated again and again with no malice or implication of stupidity, over time it might have an effect."

Problem is, the effect may run COUNTER to desired. History shows us people can be backed into a corner, at which point all bets are off. Look what happened in Germany in the 1930's and in the US just recently, and in the latter case, they're no longer afraid to flaunt it AND they have stories to support their cases. The structure is very elaborate and, thanks to echo-chamber thinking, pretty much watertight. Any attempt to appeal to their reasoning triggers their survival instinct, which short-circuits reason (amygdala hijack and all that). The more you appeal, the tighter they huddle up, at which point you pretty much have to hope for a catastrophic break.

Meet the ‘DPU’ – accelerated network cards designed to go where CPUs and GPUs are too valuable to waste

Charles 9

Re: It's more than a SmartNIC

Perhaps it's safer to say that what we're seeing are more and more chokepoints developing as data loads increase. As graphics demands grew and grew more diverse, specialized graphical chipsets gave way to slightly-more-generalized GPUs. When GPUs became more useful, they put a strain on bus demand, necessitating the still-evolving PCI Express bus to keep it fed.

Now in the network stack, we're kind of seeing the reverse. As throughputs continue to increase, latency becomes an issue because electrons can only move so fast, thus cutting down on trip times becomes a factor. Hearing about DPUs sounds natural to me: a way to take more and more of the I/O local in an effort to cut latency.

I'll be interested in seeing where the next chokepoint emerges. RAM and storage tech are still evolving at a decent clip, so it's touch to predict which one chokes first.

India shows off new home-grown CPU – but at 100MHz, 32-bit and 180nm, it’s a bit of a clunker

Charles 9

Re: Lemmings

I'm curious to know why you think such about the Ataris (I'm assuming the ST line which competed with Amigas and were comparable specced). I recall the Amiga had a large number of custom chips to drive better graphics and sound support compared to the ST. Please elaborate.

Anti-5G-vaxx pressure group sues Zuckerberg, Facebook, fact checkers for daring to suggest it might be wrong

Charles 9

Re: @Jamesit ... @Mark 85 Tossing their toys about

"If the law says that, the law is a ass. People should not be allowed to post dangerous lies in the guise of "free speech"."

What you need to do, then, is use another law or criminal offense against that speech. The First Amendment, terse as it is, is not absolute due to inevitable rights clash. This was the basis for the US v. Schenck decision (aka the "Fire in a Crowded Theater" decision).

Thunderbird implements PGP crypto feature requested 21 years ago

Charles 9

Re: Couple of points.....

Maybe Eve, but not Gene, who will have ways of getting to your cipher: either directly or through you.

Charles 9

Re: identity and encryption

"Who's YOU? Even face to face you have to take somebody's word for who they say they are. If somebody tells you they're fred@example.com how are you to know that that's who they really are? A better way would be to have example.com's mail server tell you that fred@example.com's public key is. You still don't know whether fred@example.com is Fred Bloggs, Fred Flinstone, Frederick the Great or my late uncle Fred of course."

And what if example.com has been pwned? Or is under Big Brother's thumb? Frankly, this all boils down to the intractable thing I call the First Contact Problem:

How do Alice and Bob prove who each is to the other if they've never met before and have nothing in common?

Short answer: You can't to any significant degree of certainty. Ultimately, because of the lack of anything in common, ANY attempt to establish the link can be subverted by an adversary (Mallory or Gene) by the simple process of impersonating one of the parties; the other party has no way to tell the difference. Even a Trent can be doubled in this case.

Elecrow CrowPi2: Neat way to get your boffins-to-be hooked on Linux from an early age and tinkering in no time

Charles 9

"The only thing you miss out on is GPIO and lower level hardware and things like that."

Not really. Once the kid gets older and is more interested in the nuts and bolts, then perhaps it's time to pull the Pi out and introduce him/her to what's really going on.

Zuck says Facebook made an 'operational mistake' in not taking down US militia page mid-protests. TBH the whole social network is a mistake

Charles 9

Re: Interesting note from the field.

Interesting. I had to study the story for a bit (Hakuin was a Zen Bhuddist monk, FTR), but perhaps a few corollaries are in order. One of them is that what one speaks and what the other hears may not be the same thing; perceptions can differ (just look in the US), and one man's dare may be another's mortal insult.

Anyone else noticed that the top countries for broadband speeds are well-known tax havens? No? Just us then?

Charles 9

Re: Regaining Network leadership ?

As noted, Taiwan's just a little speck of land, and size matter when you're talking infrastructure. And anyone who complains about the US having shoddy broadband never comments on the infrastructure it would take to wire up say New York to Los Angeles without any weak links. It's not like any countries of comparable size (Canada, China, etc.) fare much better in that department.

I won't be ignored: Google to banish caller roulette with Verified Calls

Charles 9

Re: I'm trying to think how many unsolicited calls I've actually wanted

"My suggestions would require them to do this and remove any possibility that they'd conveniently fail to identify the source."

No, they'll just spoof like they're doing now. Some have the assistance of hostile exchanges, too, such as SIPs, so can spoof even the "hidden" billing ID. I know phone companies are increasingly writing off certain percentages of bills because they can't be pursued beyond the border.

Charles 9

Re: I'm trying to think how many unsolicited calls I've actually wanted

Test results aren't left in a message for privacy reasons. They'll tell you to call back. And most hospitals just leave their "front desk" number as Caller ID. Furthermore, things like you describe tend to be handled discretely, say under the guise of a gynecologist.

Charles 9

Re: "if a user sees the business's name then they are more likely to actually take the call"

"In in US the hospital gets into privacy problems if they undertake to call you about a relative you do not have Power of Attorney in healthcare matters for."

But they're also legally obligated to notify Next of Kin, especially in a morbid or mortality situation. Most hospitals I know leave a caller ID, but it's usually just the "front desk" number, not any specific ward or clinic, to at least inform the caller it's a hospital.

Charles 9

Re: That's what voice mail is for...

Might not be such a good idea. Those tend to be the more-cussed spam callers. I just block my whole home exchange on general principles since no one I know shares that number (even if they did, I'd just whitelist that number).

Charles 9

Re: Who's thick?

"They often aren't allowed to hang up unless you swear at them..."

I've found they'll hang up pretty quickly for one of two reasons: (1) Wrong Number, or (2) Prank Answerer.

Me? I don't bother. The moment I recognize a pre-recorded message, I either just hang up or leave an appropriate "You don't apply to me" response THEN hang up. Anyway, most calls don't go through my call blocker because it hangs up on any strange numbers (and spam callers tend to use random numbers to get around blocklists so fall right into my trap--anyone I know has called before so will get through, and anyone determined enough--like a hospital--will call twice anyway). Any patterns of bad callers get blacklisted on top of it, and it's able to block whole exchanges or even area codes if necessary.

Apple to Epic: Sue me? No, sue you, pal!

Charles 9

Re: Happy?

I thought they've made it a little easier and trustworthy, based on my F-Droid experience.

Charles 9

Re: Are Apple sure about this?

"As an alternative, the parents could get one of those refillable debit cards and link that to their kids' phone and tell them "when it is out of money, you have to refill it yourself so be careful about what you spend""

Make it a high school project: preferably senior year, assign them an allotment for them to obtain various things but tell them they need X to buy their graduation gown, and if they don't get the gown, they don't get to graduate. It's one thing I'd love to see added to a mandatory cirriculum.

Hidden Linux kernel security fixes spotted before release – by using developer chatter as a side channel

Charles 9

Re: Linux kernel doesn't do too badly with this intractable problem

"The kernel is only one area where this problem exists and is probably not the best option for exploitation."

Thing is, the kernel is among the lowest level of software available out there. Below that and you're going firmware or even hardware (and it should be noted even they're being targeted and exploited too, which may render this whole exercise moot). Pwn a kernel, pwn a system, essentially, so it's a high-value target.

Charles 9

Re: @AC

That's not necessarily true. First, you can't be sure someone's actually working on bugs in any FOSS project unless there's some kind of assignment system in use. Remember, critical faults had been laying in common FOSS software for years sometimes. Second, you can never be sure the black hats came upon the fault first, already exploited it, and are just keeping their mouths shut to maximize the impact.

Having said that, this appears to be something of an intractable problem in that a necessary condition for fixing a fault is to make the fault known, which has the potential of making the problem (at least temporarily) worse. It's sort of like surgery: yes, it's often necessary, but opening someone up is never without risks. Heck, I don't even think formal verification can save us here since you can still have outside-context faults (I call them gestfaults) that combine quirks of multiple programs, each outside the others' scope.

Nintendo revives Game & Watch portable proto-console, adds color to 2.36-inch screen

Charles 9

I had that one, actually. That was my second G&W after Donkey Kong, Jr. At a point I also had Octopus and the dual-screen Donkey Kong and Donkey Kong II as well as a similar device (Pop Game) made by (I think) Seiko, under the Moriaka Tokei label (called Lasso; it's been exported to other countries under names like Rodeo and Cowboy). FTR, I lived in Guam at the time so had ready access to Japanese imports including Nintendo Game & Watches. I would be interested to see those emulated in MAME in future.