* Posts by tom dial

2187 publicly visible posts • joined 16 Jan 2011

Hillary Clinton broke law with private email server – top US govt watchdog

tom dial Silver badge

This has nothing to do with Benghazi. It is, however, the subject of an active FBI investigation with no publicly announced ETA. Guccifer, who claims to have hacked the system, and Brian Pagliano, Secretary Clnton's personal IT advisor (as his full time State Department job) and part time personal SA (his moonlighting job) have been turned and are cooperating in the investigation.

The conservative Congressmen have not, as yet, made much of this; it is the work of the Attorney General, the FBI director, and the State Deparment inspector general, all of whom were appointed by President Obama.

tom dial Silver badge

Re: Bah!

Having a personal email server and using it for official government duties might legal if it is fully compliant with (in this case) Department of State FAM regulations, FIPS requirements, and FISMA (2002). The equipment might have to be owned and operated by the government, although it is possible for a privately owned and maintained system to be fully compliant in technical respects; but there would be serious accountability issues with private ownership and operation, and it would take a CIO or CISO much braver than the one at State to certify one.

Hillary Clinton's personal email server was not certified and accredited for its purpose, and therefor did not (and would not today) comply with State Department and government wide IT regulations, or the law.

tom dial Silver badge

Re: So it begins...

In looking at the text of the IG report I found no statement that laws were not broken. There were many statements, however, that State Department instructions ('rules") were not followed, and in particular, that they were not followed in respect of Secretary Clinton's use of a personally owned email system that was not certified and accredited. That fairly clearly violated the Federal Information Security Management Act (2002) as well as the applicable Federal Information Processing Standards written to implement it, both of which dominate any State Department instructions.

The departmental rules in State Department Foreign Affairs Manual derive from the laws that govern the executive branch in general and the State Department in particular. When the Department or its employees violate such a regulation they very often have violated an underlying law as well. That probably is for the Attorney General to say, rather than the Department IG, and may explain lack of specific statements about violation of laws.

tom dial Silver badge

Re: Rules are for little people

This should not go unchallenged.

First, the report is from the State Department Inspector General, an appointee of the current President, a Democrat. It is not done by the Congress and is not by any stretch a Republican smear.

Second, contrary to the assertion, the FBI started an investigation some time back, based on an earlier referral by the State Department IG and others. That investigation is a work in progress without an announced completion date. Both the FBI Director and his manager, the US Attorney General, were appointed by the current President.

French authorities raid Google's Paris HQ over tax allegations

tom dial Silver badge

Re: SOP

A private person in France who tries to comply with the letter of French law while minimizing tax liability would end up with a big fine and possibly jail time?

And here I thought for years that France was a country of laws, where both government and citizens largely complied.

Catz: Google's Android hurt Oracle's Java business

tom dial Silver badge

Re: Time for Google to pay up...

If only they would. I tried to upvote twice, but it doesn't work and I'm too lazy to create more logins just for that.

EU mulls €3bn fine for Google

tom dial Silver badge

Re: Bonkers

Fining Google any amount of money insufficient to put them out of business will fail to cure the alleged stupidity of those who equate it with the Internet.

In the meantime they are, to a first approximation, an advertising delivery company and use general search to attract people to see the ads they are paid to deliver. They have a clear interest in providing good general search results so their users come back repeatedly. There is no major barrier to entering the online advertising or search provider business, but there is a substantial barrier to succeeding at it, probably because it is difficult (as Bing, Yahoo, DuckDuckGo and others show daily) to provide search results as good as Google does. Google, because of its popularity* with search users, may be able to game users to promote its own services unjustifiably, but probably cannot do it too much or too long if those services are noticeably inferior to the comparable ones of other providers.

* Despite its common use, "dominance" really is not quite the appropriate word because Google has, in fact, no way to control those who search other than user habit and search result quality.

tom dial Silver badge

Google usage for search seems to be quite a bit North of 90% in the most populous parts of Europe, and slightly above 70% in the US. There probably is a reason for that, but it is not that other substantially similar services are unavailable or more costly. My hypothesis, based on fairly unsophisticated sampling and analysis every month or two, is that Google's results are just a bit better than those of Bing,Yahoo, and DuckDuckGo. They are not a lot better, and I gave DuckDuckGo a more extended trial last year as default search engine but switched back to Google after about three weeks; the results were not quite as good as I had hoped.

So Google has a monopoly of search, certainly in Europe and arguably in the US, in a market in which they were not the first competitor and in which consumer choice is as completely free as possible, given that none of the commonly used search portals charges users.

Google makes money in large part by selling advertising and displaying the ads to its users, as do others. Its customers are those who pay it for advertising placement, not those who use it for search, even when they are looking for something to buy. They charge their advertisers a fee, and presumably have fairly specific contractual obligations to their customers, the advertisers. They do not, as far as I know, have a contractual or other obligation to those who use their search facilities, but they do have a moderately strong self interest in providing search results that meet the perceived needs or requirements of those users, since failing to do so will cost them search share and consequently reduce the the rates they can charge advertisers, and their profits.

Why, exactly, should they not place the links for products and services they offer immediately beneath those of their paying customers, and above those for every single other vendor of comparable products or services?

tom dial Silver badge

Re: Bonkers

Yet the original poster stated that his search, on both PC and Android, returned results for Microsoft products ahead of their own. I can't vouch for the correctness of that report, but my experience, using Chromium, a sort of Google product, showed LibreOffice, Apache OpenOffice, and Microsoft Office as the first three non-paid items. Somewhat later came a couple of results for something called WPS Office, and a bit later FreeOffice, another one for WPS Office Free, and finally Google Office, the 11th (non-ad) item on the first page, at the very bottom. On Android (Verizon) I got returns for Microsoft Office, Apache OpenOffice, LibreOffice, and WPS Office 2016 Personal Edition before Google Office. All the sponsored returns in both cases were for various Microsoft Office products.

Here in the Western US, at least, Google seem to (1) honor their commitments to those who pay for their advertising service and (2) not rank their commercial offering in the office software category above their competitors'. This probably is not because they are under pressure not to do so, as they are not under significant pressure here in that respect.

Two reports are not a statistically useful sample, but their consistency suggests that Google, in at least one area where they compete, may be operating honestly.

ZFS comes to Debian, thanks to licensing workaround

tom dial Silver badge

The claim on the GPL side, though, is that the reciprocity requirement provides greater total utility to the population of all software developers and users (as opposed to only those who develop and use the particular software) than other licenses, whether open source or not. It is not implausible.

tom dial Silver badge

Re: Free is Free

"Contributions" if made public "can be used in both great open source projects AND amazing closed source ones." That "if made public" is a significant difference. Apple (for example) might have developed major improvements to the BSD kernel that they do not release publicly, as the BSD licenses allow. Those improvements are unlikely to be used in "great" or, indeed, any open source projects.

tom dial Silver badge

I did not claim that GPL is the only appropriate open source license, or that it is the best for all purposes. I do consider non-GPL open source software to be subject to exploitation in ways that GPL licensed software is not. Indeed, I consider that to be entirely obvious, and it is confirmed from time to time by closed-source advocates, maybe most famously by Steve Ballmer's description of it as a "cancer."

Any author, of course, has the liberty to use any license, or none, for his or her software products. Those who choose a version of the GPL have taken a position that extensions of their work must be licensed in the same way if published at all.

I do not see it as a major problem, and the Debian Project approach seems a reasonable way to handle the issue of GPL vs non-GPL incompatibility, as it was for the proprietary Nvidia, AMD, and WiFi drivers I and many others use. The only evident defect is that it will be difficult to set a system up that is entirely on ZFS; yet /boot hardly needs that, and / certainly needs it less than general storage for application data and user login file systems. I would not be at all surprised, however, to read in the not distant future that the installer had been taught to download and compile ZFS to enable its use for the entire system.

The first order evidence from Linux vs the various BSD kernels certainly suggests as a plausible hypothesis that the GPL is the superior license in practice. The claim that the GPL "causes tremendous problems in situations like this" is a major overstatement for which there is little real evidence, if any. The GPL folks had a rather public, but still internal, discussion about it and the starchiest of the major producers settled the issue for themselves in a way that seems fairly reasonable and workable. And the world will move on, an increasing part of it on Linux with ZFS.

tom dial Silver badge

You are entitled to your opinion, as I am to mine.

The problem with non-GPL licensed software seems to me to be that it eliminates the requirement for reciprocity that the GPL licences embody. There are enough of us who, because we make no contributions other than minor ones for our own use, only take. Red Hat's suggests rather emphatically that the GPL, although not the only viable license model, is quite a decent one.

That ZFS is covered by an incompatible open source license should not be a greater impediment than the even more restrictive licensing of Nvidia drivers and a good deal of WiFi chip drivers. I look forward to installing the package that will download and compile it from source.

Google kneecaps payday loan ads

tom dial Silver badge

The alternative for some, perhaps quite a few, legal payday loan business customers is to patronize the local "Juice Man". In the not always good old days in Chicago their customary rate was $6 for $5 per week, a simple interest rate of 1040% that will turn a $100 borrow into a million dollar debt in under a year in the unlikely event the lender will allow rollover. These old fashioned neighborhood lenders had effective, if more than a bit brutal, ways to collect their payments and make examples of those who could not repay on time. We may want to be a bit careful about what we ask for, as there sometimes are unintended and quite undesirable consequences.

On the other hand, most payday lenders operate from neighborhood offices and likely are well enough known to their clientele that they have little need to advertise using Google or any other service. It may be the Google is doing this in an attempt to generate a bit of favorable publicity among the relatively clueless.

Congress calls for change to NSA spying law

tom dial Silver badge

The pertinent part of the fourteenth amendment, only part of which is quoted, reads

"No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws."

It is primarily or exclusively a restriction of action by states, not the federal government.

The legal constraints on "spying" on persons within US jurisdiction apply to those who are citizens (anywhere) or are present legally in the US, whether as immigrants or visitors. It would be interesting to see whether an illegal alien could win a case on a claim of surveillance unconstitutional under the fourteenth amendment, say by arguing successfully that evidence collected could not be used in a trial. The fourth amendment, which also covers "people" without reference to citizenship, probably would be a better choice, although law enforcement officials probably obtain warrants as a standard practice in nearly all cases anyhow.

Signals intelligence is a bit weird, because it is not always possible to ascertain the communicants' citizenship or location, and also because capturing the communications that are wanted will very often necessitate capturing and discarding a much larger volume of communications that are not wanted. That is true for capture of radio transmissions (which still continues) and it is true for capture of internet data communication. It is a matter of opinion to what degree the mechanically necessary capturing and discarding constitutes surveillance, as it also is a matter of opinion whether even maintaining a database of all domestic telephone metadata constitutes surveillance of all. It might actually matter whether it is looked at and if so what legal process stands in the way.

tom dial Silver badge

"This program does not just target terrorists. It targets anyone with foreign intelligence value. It could be a completely innocent businessman or anyone else out of the country who has that information."

Well, of course. The purpose of foreign intelligence agencies is to conduct foreign intelligence activities. The Foreign Intelligence Surveillance Act was passed in 1978, close to forty years ago and more than twenty years before September 11, 2001. The purpose, in part, was to codify the limits to acceptable foreign intelligence activities. The legal limitations enacted in the FISA, and the laterFISA Amendments Act, were aimed primarily at restricting impact of foreign intelligence activities on US citizens and US legal residents while permitting, as the laws of other nations do, much less restraint on activities that target those who are neither citizens nor legal residents. Terrorism as a significant international concern arose considerably later and represents only a part, probably a small part, of the activity of US foreign intelligence agencies; that that probably is true of most other nations' foreign intelligence agencies as well.

The 'new' Microsoft? I still wouldn't touch them with a barge pole

tom dial Silver badge

Re: The lock in Question

My recollection is that with both HP and Sun (later Oracle) we had unlimited support, paid for on an annual subscription for both hardware and software. We cheaped out and bought only 0800-1700 local time, though, and there was a per-incident charge for after hours and weekends. I think the 24x7 support rates were about double, and over about 15 years the question came up only once, so we won on the deal. Calling them off hours would have violated the Anti-Deficiency Act, and we thought things through carefully and fixed the problem ourselves, the alternative being to wait until morning and take a hit for customer down time.

Stop resetting your passwords, says UK govt's spy network

tom dial Silver badge

Why do sysadmins know that the users are using weak passwords?

They run straightforward brute force attacks or use rainbow tables on the hashed databases and examine the others. Either way they find a great many weak ones.

And yes, some system developers (not mainly the admins, who don't control it) have thought for some reason that hashing or encrypting the passwords is unnecessary or too much work.

Auto erotic: Self-driving cars will let occupants bonk on the go

tom dial Silver badge

I thought we in the US had a near monopoly of this kind of nonsense, and that Canada was a more relaxed and sensible place than this article suggests.

People have been having sex in automobiles for over a century, sometimes while the auto was in motion. It can hardly be worse if an emotionless robot is in charge of the vehicle while the warm-blooded are otherwise occupied.

E-cigarettes help save lives, says Royal College of Physicians

tom dial Silver badge

If I am happy in my addiction, and it does you no significant harm, my opinion, not yours, should be the controlling one.

Full disclosure: I quit smoking (cigarettes) for about the fifteenth time 32 years, 11 months, and 26 days ago, and do not vape.

tom dial Silver badge

The point of e-cigs should not be taken as inducing tobacco smokers to stop, but as a much safer and less offensive way to deliver small amounts of nicotine to the many people who find it pleasurable. With some restrictions we allow people to consume alcohol and to smoke tobacco and in some places marijuana, and we (for some value of "we") promote extensive use of dangerous opioid pain medications. We certainly can live with e-cigs.

Zuck's $16m security bill

tom dial Silver badge

Zuckerberg's and Sandberg's compensation plans should be quite generous enough that they could afford to provide for their own security from them. The article does not say whether they pay income taxes on that in-kind compensation, but a quick reading of the Form 1040 instructions would suggest that if they do not, they should expect a large bill from the IRS, with interest and possibly also penalties, in addition to the semipublic shaming they can expect here.

Nearly two billion in the bank and yet this VC is slowly losing his beach-blocking battle

tom dial Silver badge

Eminent domain

While eminent domain has been extensively abused in this country, the case at hand is an excellent example in which such a taking appears fully justified. The beach, up to some point, already is public. Taking a strip for an access path and a reasonable sized block for public parking clearly would serve a public purpose that justifies use of eminent domain far better than the common use of taking land and buildings and turning them over to private developers "for economic benefits to the community."

A Kickstarter campaign might well be able to raise the necessary funds, and not only from surfers. I live nearly 800 miles away on the other side of the Salt Lake valley, but probably would throw in a few dollars for a just cause.

FBI ends second iPhone fight after someone, um, 'remembers' the PIN

tom dial Silver badge

Re: "Un guaranteed strong encryption"?

There has not been, as yet, a US law or court order, to disable encryption or to require key escrow. That was tried and defeated quite decisively a couple of decades ago.

Apple was asked to defeat certain device features that prevent pass code recovery a number of times, each applicable to a single iPhone. That is quite different from their being asked once for a solution that would defeat those device features on every iPhone. It differs even more from being asked to retain keys to allow decryption of iPhone data, and more yet from weakening the underlying encryption, as some others have claimed.

Apple's code signing either is, or is not, secure. If it is, what they were asked to do would not have decreased by a consequential amount the security of iPhones in general. If it is not secure, iPhone users have a lot more to worry about than the rather limited software the court orders demanded.

tom dial Silver badge

Re: Q: How is the government ever going to convict bad guys without access to encryption?

Based only on the claims made there is nothing that would bring you to the attention of any police agency, whether local or federal. Absent anything else, you almost surely are safe from more surveillance than the general population, which despite the hubbub really is not very much.

If, on the other hand, you had been seen to be generating explosions not associated with appropriate and lawful activities like stump removal, or to have appeared to conduct transactions with others under suspicion of criminal activity, it might well elicit law enforcement interest. If their cursory, and then more careful, observation indicated there might be a problem, they might seek, and be granted a search warrant; that warrant might include the contents of your computers and cell phones and perhaps lead to a court order for help in accessing it. Even with that, though, you would be entitled to the formal presumption of innocence, a presumption that would continue even if you were to be charged with a crime, and tried, right up until there was a finding of guilt by a jury or, at your option, a judge.

On the other hand, if you happened to leave a few thousand dollars in cash in plain sight, law enforcement officials might bring in a talented dog to signal the traces of illegal drugs inevitably present on US cash. The money then might be charged with participation in a crime and seized, leaving you to prove, at considerable effort and expense, that you held it legitimately. The risk of that type of action probably equals or exceeds that of phone seizure and access.

More questions than answers, literally, from America's privacy rules

tom dial Silver badge

There is nothing in the least democratic about any government executive agency, whether federal, state, or local. The fact that "at least the FCC is asking for help" is effectively meaningless; executive agencies often do this, after which they select the answers they like, adopt them by a majority vote if that is their practice, and press on to the next task of agency (and agency poobah) aggrandizement. Anyone ever involved with this type of decision making knows this quite well.

That is not to say executive agencies do no good, as some of them, at least do so in quite necessary and useful ways. The US FDA provides numerous examples. Still, the rulemaking is not democratic. The FCC did far better at technical engineering rulemaking than it seems to be doing in its newly grabbed role.

tom dial Silver badge

Incorrect. The article describes agency empire building. While also ubiquitous, that is not regulatory capture.

FBI's Tor pedo torpedoes torpedoed by United States judge

tom dial Silver badge

Re: Bah!

Federal judges, as in this case, are appointed by the President with the advice and consent of the Senate. Many state and local judges are elected, most subject to a requirement that they completed law school and passed the applicable bar examination. Neither process guarantees that a judge is well qualified or that a well qualified and experienced judge will not make a mistake.

tom dial Silver badge

Re: Dear Ferals

"aren't those federal officials who violate the Constitution be guilty of treason?"

No, they are not. Treason is clearly defined in the Constitution, and what the judge did, however incorrect, does not meet that definition. See Article III, Section III.

Official: EU goes after Google, alleges it uses Android to kill competition

tom dial Silver badge

Re: meh

Are you saying Facebook, Uber, and "etc etc" are somehow required to write their applications so they won't run on anything but Google middleware? I don't say that's not true, but given the size and capability of the two named companies (especially the first), it seems a bit implausible or maybe simply an effect of laziness in view of the fact the apparently discontinued Fire Phone has a market share of approximately zero. Either way it seems a matter to take up with Facebook, Uber, and the like, to whom the apps belong, rather than Google.

tom dial Silver badge

Re: Ubuntu Phone

If you can't go to a phone store on the high street and buy a non-Android, non-Apple, non-Microsoft smart phone, why is that Google's fault or Apple's? Could Canonical not do something similar to those three and offer a phone with integrated app store, etc. to the public and see what uptake they get? Or did they and got told, effectively, to pound salt?

As Microsoft and RIM apparently found, there is a strong first mover effect in many areas that may take years or decades to overcome. Google probably could eliminate those provisions the EU Competition Commissar finds most onerous with very little change in outcome.

tom dial Silver badge

Re: It's funny...

Darn that pesky old 1791 first amendment, only a couple of years younger than the All Writs Act, so clearly of dubious applicability now we are in the Internet Age and so much smarter than those of the late eighteenth century who wrote and passed it.

tom dial Silver badge

The notion that Apple would not want everyone to choose an iPhone is absurd. They don't care about the "cachet," they care about the money.

tom dial Silver badge

Re: Alternate operating systems

Is this not a wish to express to your phone supplier? It seems to have little to do with Google other than as the hypothetical provider of the underlying OS in most of the examples. Whether any phone provider or manufacturer cares to develop, test, and provide their customers with such choices is something for them to decide.

Arguably, it is for Google to decide whether they will develop and test GMS on operating systems that they do not develop, and ultimately provide operability assurances to those who offer it on their phones. If they did not do that it would be on the phone manufacturer and provider to do the work, in addition to porting NonAndroid to the hardware and assuring its operation with their network, to insure correct operation of either Google GSM or other services they might want to substitute. It is not entirely obvious that they would wish do do that, or why.

So you’d sod off to China to escape the EU, Google? Really?

tom dial Silver badge

Re: EU Backward?

Well, he actually said "... China, and Asia-Pacific and Silicon Valley ..." That includes a lot in Asia that is not "China," and given the lack of internal trade barriers, includes the entire USA and, for practical purposes probably Canada and Mexico.

Google's 'fair use' mass slurping of books can continue – US Supremes snub writers' pleas

tom dial Silver badge

This might or might not be true of technical books as a group, but probably is untrue of textbooks, a great many of which are derivative, redundant with other textbooks, and sold mainly to the authors' students or at least students in the schools where the authors teach. I'm not claiming that's wrong, as I have accumulated several such textbooks that I thought at the time were pretty good, one of which I used in galley proof and helped correct. For most of them, though, the main royalty issue for the authors would have been former students selling them on as used books, something I understand some authors handle by issuing revisions every few years and requiring the current revision.

Surprise! Tech giants dominate global tax-dodging list of shame

tom dial Silver badge

The article evidently is about federal taxes on income, so references to state and local income, property, or sales taxes are misleading.

With that in mind, the average federal income tax rate for individuals appears to be slightly over 10% of total income at present, with an additional Social Security + Medicare payroll tax a bit under 8%, for a total slightly below 18%, a lot less than the 31.5% stated in the article.

States with income taxes (seven have none, and two more tax only dividend and interest) probably have average rates in the neighborhood of the 5% I pay in Utah. Adding that to the federal average of 18% (and the article is about federal taxes) still gives only about 23%, and adding local income taxes (where they exist) would likely raise the average rate by no more than 2 or 3 per cent., giving an average of, say, 26%, still quite a lot lower than the 31.5% the article claims. New York, especially New York City, and California appear to squeeze a lot harder than most, but certainly are not typical.

Other taxes do add significantly to the individual tax burden, and depending on circumstances there probably are quite a few people who pay more than half of their income in some form of tax, but that would not be federal taxes, for the most part, and it would not be income based.

Line by line, how the US anti-encryption bill will kill our privacy, security

tom dial Silver badge

Re: Unwanted consequences

The proposed act, like the court order in the Farook iPhone case, does not require that the government have any keys at all, or even be able to use whatever a vendor devises to comply with the act. It requires that the vendor decrypt or assist the government to do so.

tom dial Silver badge

Re: I don't see how this would be a problem for Apple

There are a few other countries where law enforcement officials would be happy to be able to access data stored on smartphones (France, Belgium, and the UK come to mind rather quickly). It seems possible that these companies find few large markets in which to sell equipment that is immune to government authorized search.

Upvoted anyhow for clarity of analysis, although the bill, if enacted, is certain to differ from what we see now in draft.

tom dial Silver badge

Re: I don't see how this would be a problem for Apple

The prohibition of ex post facto laws probably would be effective exactly until they (for whatever value of "they") offer a new model or an update to the software or firmware of an existing model.

tom dial Silver badge

Re: I don't see how this would be a problem for Apple

The question might well be whether Apple would be able to sell such equipment in the US. The draft law appears to require that they bypass, or help the government to bypass, security that they provide or have provided on their behalf by another party, given a constitutionally valid warrant or other court order, and maybe a lawful court order for assistance under the proposed act, to do so. One obvious solution to the "cannot bypass" claim would be a "cannot sell" injunction applicable to such equipment in the US.

I am not arguing that this would be good policy, or would not cause great uproar and discontent. However, it is not obviously inconsistent with anything in the Constitution. Moreover, if implemented subject to the same controls that Apple applies to iOS, it would not, in fact, pose any threat that does not now exist to users against whom the government does not obtain authority to breach privacy.

The draft act has numerous problems, but "cannot bypass my built in security" may not be the most serious of them.

tom dial Silver badge

Re: In the Land of the Free..

You are allowed now to keep whatever secrets you wish by default. The government (either federal or state) can get authorization from a judge to access those secrets by obtaining a warrant based on "probable cause, supported by Oath or affirmation." That is included in the Constitution's fourth amendment. The proposed law may be unworkable and it may be bad policy, but nothing in it affects legal rights of citizens or of non-citizens legally present in the US.

tom dial Silver badge

Re: I don't see how this would be a problem for Apple

On its face, the draft law requires in Section 3a that a company that provides a device or encryption system "shall" perform certain actions under specified circumstances. How they provide for that (Section 3b) is up to them; the government cannot require a specific implementation (similar to the fact that they did not require a specific implementation in the recent California case). The imperative "shall" does not, on its face, allow for a "covered entity" such as Apple, for example, to evade this by implementing a security system in their product that they cannot, in fact, circumvent; the law, if enacted, will impose a requirement

The draft does not provide any information about the consequences for a "covered entity" that either will not or cannot comply. I can imagine a fine, possibly quite large, for covered entities that refuse and possibly injunctions shutting down sales of non-compliant products which the covered entity has designed so that it cannot bypass the product security. That would be a sad outcome indeed.

The proposed law still is pretty rough, and does not cover things, such as fraud, money laundering, and other financial crimes that seem fairly obvious. There seems no very good reason, for example, to single out any particular type of crime for this treatment; it ought to be enough for a US or District Attorney to be able to convince a judge to issue a search warrant based on probable cause. (I expect that other types of court order, if included in an enacted version, would be thrown out on the basis of Riley v California, which found a warrant necessary for search of a cell phone, even incident to an arrest).

Half of people plug in USB drives they find in the parking lot

tom dial Silver badge

Nobody ever went broke underestimating the intelligence of the American public.

H. L. Mencken

Probably includes university students as a special, and maybe more gullible, case.

FBI Director defends iPhone 5C unlock tool that's obviously going to leak into wrong hands

tom dial Silver badge

Americans do indeed have a right of privacy from undue police inquiry. That right can be modified by issue of a search warrant, however, as was done in the cases for which they obtained orders for Apple to assist them. The search warrant specifies the modifications in terms of what can be searched and what, if found, can be used in a prosecution.

tom dial Silver badge

Re: Who cares if it leaks?

The "second request" mentioned appears likely, in fact, to be an earlier one, where the judge suggested Apple oppose it and sent them back a couple of times to get them to revise their brief so he could deny the order, which he did. That one was in various states of play from October, 2015 on.

All these cases (by now several hundred) have to do with executing legally obtained search warrant for a phone the police have in their possession.

Panama Papers hack: Unpatched WordPress, Drupal bugs to blame?

tom dial Silver badge

Re: It is as I suggested

I do not think this distinction is valid, unless the legal difference between "whistleblower" and "hacker" is that the first is on the company payroll and the second is not. In fact, what was done probably was illegal irrespective of who did it.

Megabreach: 55 MILLION voters' details leaked in Philippines

tom dial Silver badge

Re: 30 million here, 50 million there

The downside, of course, is that everybody's existing accounts already are identified by the national ID number.

Microsoft announces Azure Functions, encrypted cloud storage

tom dial Silver badge

The keys

If the encryption is done using a key that I alone have, I might be interested. If not, it is nothing but empty and useless marketingspeak.

Critics hit out at 'black box' UN internet body

tom dial Silver badge

Yes. What authority does it have and, more importantly, what power? Who can ignore it, and who must follow its orders? What actions can it take and make stick?

Its web page at http://www.intgovforum.org/cms/aboutigf suggests it is little more than another yammering society.