* Posts by tom dial

2187 publicly visible posts • joined 16 Jan 2011

Louisville says yes to Google Fiber. Funny story: AT&T, TWC didn't want that to happen

tom dial Silver badge

Re: Oh FFS...

Even if Google were to leave after a period and TWC resumes monopolistic price gouging, the people of Louisville will be be better off for having paid lower prices and received better service while there we competition. Elsewhere, people who did not benefit, and will not if Google becomes discouraged and abandons the business, will be no worse off. The notion that TWC will be better off for having had competition is pretty much rubbish, since the competition will have reduced their net while it existed, and its end will not enable them to raise prices higher than they could have if it never occurred.

De-anonymising data should be a criminal offence, says MPs report

tom dial Silver badge

The databases containing the data in question are created for various purposes, nearly all perfectly legitimate. The typical scary example is medical condition and treatment data, which researchers want available for, well, research that might be useful in advancing the overall state of medical knowledge and perhaps suggesting new treatments (or invalidating existing ones). The data are anonymised because personal identity is not thought to be meaningful to the questions asked.

Various studies have shown that real anonymisation is quite difficult in many practical cases, especially where it can be associated with other publicly available data. Targeting deanonymisation probably is a better compromise between making data available for legitimate purposes and discouraging its misuse.

Global crypto survey proves govt backdoors completely pointless

tom dial Silver badge

Re: Whazzat?

"... to obtain by warrant or subpoena evidence that may be encrypted."

tom dial Silver badge

Law enforcement back doors are wanted for law enforcement, not surveillance. As others have pointed out, surveillance does not require back doors, and NSA, at least, has not expressed much interest (if any) in backdoored encryption systems since Clipper and Capstone. Intelligence agencies do not require content access for a much of what interests them and have ways they often can use to circumvent encryption without requiring a corrupt algorithm, as they must since they have no control over their adversaries' encryption systems.

Law enforcement back doors are being proposed, at least in the US, to address a perceived need to obtain evidence by warrant or subpoena that may be encrypted. That does not make them a good idea, but at least puts them in the right context. We have survived quite a while with court supervised wiretap procedures and other searches for law enforcement. All of these involve techniques that could be used, and are, by criminals and others for undesired purposes. Widespread use of encryption will hide some information that otherwise would be obtainable through legal processes, and law enforcement officials are concerned, with some justification, that criminals will go free because of it. Cryptographic systems with provision for law enforcement access, if they were feasible, might not be the total disaster usually described, although requiring them remains poor public policy for all the reasons normally given.

Facebook-squishing Indian regulator's next move: Open source code

tom dial Silver badge

Re: "Any technology that is deployed for connectivity...

The market may be poor at pricing externalities because they are not, for the most part, included in individual utility calculations. It is not always obvious that governments do all that well either.

US Congress locks and loads three anti-encryption bullets

tom dial Silver badge

Re: States' rights vs. interstate commerce

The Commerce clause has been used, with some frequency, with the best intentions, of course, in ways that sometimes seem strained, to put it mildly. A rather old example was its use to justify law requiring racial integration at local diners in the South, where diner operator purchase of goods, services, or materials that may have crossed state lines was deemed sufficient to apply federal law. Another, more recent, was a Northeast Ohio case in which an ornery Amish bishop and some of his family assaulted other Amish over religious differences and family disputes. The assaults, in the form of hair and beard cutting, were prosecuted as federal hate crimes (because a religious dispute was involved) with federal jurisdiction based on the fact use of clippers that had crossed state lines. The bishop, aged 67, received a 15 year federal prison sentence; others received shorter sentences.

tom dial Silver badge

Without the text of the bills, only one of which is reported to have been introduced, sensible reaction and comment is not easy. Congressman Lieu's bill would preempt states in the matter of establishing encryption limits and probably is a good thing. It is likely both to be open to enactment and supportable in court under the commerce clause. As for the others, it clearly is too soon to tell.

Contrary statements notwithstanding, it is not clear that any US government spokesperson has genuinely advocated for a functional capability much beyond what presently is in the law (Communications Assistance for Law Enforcement Act (CALEA) of 1994), modified to cover the case of encrypted communication, together with a similar capability to support access to encrypted data at rest, all under warrants or other appropriate court orders.

In many cases, equipment or service providers will have a reasonable defense* against orders served on them, in the form of technical inability to execute the court order because they do not have the key data. A law might be proposed to make it unlawful for them to provide such a capability, but is relatively unlikely to be enacted and in any case will not prevent customers from using their own encryption, not under the provider's control. A company providing an encrypted service might be argued to be subject to CALEA even now; that question might have to be settled in court. Apple texting and Google End-to-End seem possibe test cases. The first may well be susceptible to some degree, in that Apple seems involved in handling the keys and may be technically capable of enabling a tap. That also seems likely to have been a problem with Lavabit. Google End-to-end is based on straightforward PGP and is likely immune to effective tapping.

* Although stranger things have happened, a provider probably would not be punished for failing to do something it cannot.

Let Europeans sue America for slurping their data – US Senate

tom dial Silver badge

Read in conjunction with 5 USC 552a, the modifications appear to have very little to do with US or other signals intelligence activities. It appears the changes, whether the House or Senate version, will allow citizens of designated countries to require designated federal agencies to correct records they maintain, and give the citizens cause for civil action against an agency that declines to correct errors. It is not likely that the NSA will be a designated agency. It also is likely that if NSA are maintaining records of personal data on a citizen of a designated country they have shared that data with CIA or FBI (or both) , who very likely will have shared them with security agencies in the targeted citizen's own country as well as possibly others. The FBI or CIA probably will be "designated agencies" for the Act's purposes, and will correct the records as they think appropriate based on information the targeted person brings to them, much as they do (or do not) in the case of US citizens.

Dumping chapter and verse on someone's private life online may be outlawed in Utah

tom dial Silver badge

A quick reading of the bill suggests that it is quite similar to many of the Apple patent, in the sense that it is trying to criminalise "using a computer" to do something that one might reasonably want to be criminal no matter how it is done. And part of Eugene Volokh's point seems to be first, that some of what is proposed in the bill would be questionable irrespective of the method, and second, that making crime or not contingent on intent also is questionable.

France joins India in telling Facebook to just Zuck off

tom dial Silver badge

Re: How would it work?

It is illegal for US persons to reimport drugs purchased at Canadian pharmacies - a matter of US law and regulations A cursory web search suggests strongly that it is quite legal for a Canadian pharmacy to fill a US prescription - a matter of Canadian law. There may be commercial treaties between the two countries that bear on the matter, but only because of their effect on the respective laws.

There is no indication in this case that the US government is acting as if it thinks it has world wide jurisdiction. It claims jurisdiction over US residents in a matter that involves both foreign trade and the general welfare, as defined in legislation and implementing regulations. It claims no authority at all over Canadians or over Canadian businesses that are not operating in the US.

tom dial Silver badge

Re: Can we ban Facebook etc altogether?

Why not simply make it illegal to do silly or stupid things? I see no reason to dictate that others not do things that are not inrinsically harmful (even if sometimes subject to exploitation by others) if they enjoy doing them.

Alcohol prohibition certainly worked out poorly where tried, and had the worst side effects where enforcement was most vigorous. The execrable US War on Drugs, over several decades, has been accompanied by astonishing violence and corruption in the US and other countries, and as well by consistent increase in variety and availability of illegal drugs at consistently decreasing retail prices, not to mention the enormous increase in potency of cannabis. Gambling restriction and regulation, with attendant public corruption, has not been all that much better. Prostitution is worthy of mention in the same context.

All these proscribed or restricted activities were harmful, sometimes disastrously so, to some of those who engaged in them, as well as to their families and, to an extent, their communities. Making them illegal did little to stop them and It is likely that much or most of the harm associated with them resulted from the fact of illegality and the associated enforcement activities. There is no earthly reason to suppose laws enforcing privacy, whether on Facebook, Google, or other present or future undertakings, will be any more successful or beneficial.

Did a hacker really pwn the FBI, US Homeland Security and the DoJ?

tom dial Silver badge

So far (past Noon on 9 February) it appear the information is comparable to what I, as a federal government employee, was told any member of the public could request, and obtain. Agencies were authorized to charge a fee approximating the actual cost of duplicating and providing the data, and the data did not include email address or telephone number, but it did include GS pay level.

Unless there is a good deal more to this, it really does not amount to much.

Are Indians too stupid to be trusted with free Internet?

tom dial Silver badge

Re: Careful with the allegations of imperialist attitudes

This is an almost perfect expression of the apparent contempt of those who have a lot for those who do not: "it is very unlikely that a first time internet user would have the knowledge to understand the decision being posed to him."

I suspect most of them, if not all, would understand clearly that the decision (denied to them) is whether to have limited internet service that they can afford or no internet service because it is beyond their means.

How much better is it to have a one tier Internet available only to those who are well off than a two tier Internet that is available to some degree to everyone?

Brit spies want rights to wiretap and snoop on US companies' servers

tom dial Silver badge

Re: Quid pro qup

The article (like its Washington Post source) refers to negotiations that would grant UK authorities, represented by the Home Secretary and MI5, the authority to issue and execute wiretap orders against British citizens using US computing and communication facilities, with reciprocity for similar actions by the US. Such negotiations certainly do not concern spying in anything like the normal use of that word; such spying as there is between the US and UK doubtless will continue unabated and unchanged by the outcome.

And it certainly is well within the President's authority to enter into such negotiations and propose treaty arrangements to the Senate that, if approved, would have the effect of law. Whether that would enable UK authorities to task US businesses with lawful wiretaps might have to be settled in the federal court system, and the answer could depend on whether the targeted UK citizen was lawfully in the US - i. e., a US Person, although not a citizen.

tom dial Silver badge

Re: How can they allow them access only for British citizens?

From the article it appears the subject is wiretaps, not spying. In the US, for bot citizens and foreigners legally within the US a warrant is required to (lawfully) conduct a wiretap, and that is a matter that involves both constitutional interpretation and statutory law. To make it more complex, what is reported to be under discussion may authority granted the President under treaties. While not analogous in a real sense, it somewhat resembles the treatment accorded Kim Dotcom in the Megaupload matter.

The US Constitution, laws, and treaties may grant the President authority to determine that UK safeguards are adequate, or they may not. Given that there are many laws and treaties, it may be uncertain. If the agreement is made, it is likely to be contested by an early target and may require possibly lengthy court proceedings to settle definitively.

US taxmen borked in computer cockup riddle

tom dial Silver badge

Clearly humor even without the joke alert.

State Department finds 22 classified emails in Hillary’s server, denies wrongdoing

tom dial Silver badge

Re: We need to know the truth

Correct on all except probably the last sentence but one. Operating a private server certainly is not illegal; quite a few people do that. However, the Federal Information Security Management Act was enacted in 2002 and directed NIST to provide implementing standards and instructions. NIST did that about 2005 or 2006, although many agencies started work to bring their systems and practices into conformity with the act well before that. Government use of non-compliant systems for official business is not and was not legal, and that is true irrespective of system ownership. Nothing obvious in the law forbids using a private system for official government business, including, as far as I know, classified materials, as long as the information assurance requirements are satisfied. It would not be at all surprising if major defense contractors like Lockheed Martin or Boeing operated such systems.

FISMA compliance is not especially easy to attain or maintain, and it is reasonably well documented that the server for clintonemail.com was rather badly non-compliant, so was operated illegally.

tom dial Silver badge

Re: Thursday's lunch menu

I could have stated the point more clearly and succinctly.

It does not matter whether the email messages were marked classified before they arrived on the (almost certainly) illegal server or were recognized and classified during review preliminary to public release. No official records, classified or not, ever should have been on that server, which is known from various sources to have been configured and operated without much regard for security over much of its service life.

The fine print. As others have pointed out, anyone who removed classification markings from material before putting it in any of the emails committed a crime. Anyone who transferred material from a classified network or directed removal of classification markings from material before putting it into an email also committed a crime. Anyone who knowingly put sensitive but not yet classified material into one of the email messages certainly committed a serious error and violation of federal and State Department regulations, and may have committed a crime; if the inclusion was inadvertent or accidental, the only real difference is that the act might not be treated as criminal.

I do not know of instances in which publicly available material was classified upward and attempts made to retrieve it but would be extremely surprised if it had not happened; the number of activities and people generating properly classified data over the last 75 years is large enough that some accidental disclosure is almost certain.

The root cause, of course, was the server deployment and operation, along with the disrespect for law, regulations, and good management practice that accompanied it. As another poster noted but stated a bit differently, in intelligence matters it is important to know what your adversary knows, and dumping official correspondence to an insecure and apparently relatively unprotected environment certainly was a gift, whether or not any of them recognized it.

tom dial Silver badge

Re: Thursday's lunch menu

"Were the e-mails in question classified BEFORE or AFTER they ended up on the server?"

It really does not matter. The server was less fit than gmail, yahoo, or the local ISP's POP or IMAP serverfor storing ANY official documents. Moreover, we ought to be able to think government department or agency heads to take the initiative to prevent compromise of organization data rather than encourage or simply allow it to happen.

I also would fault the State Department CIO for inadequate oversight of an IT operation in which this was not found out, reported, taken up with the Secretary, and failing correction, with the Inspector General and Department of Justice.

tom dial Silver badge

Re: Spot the oxymoron

The original statement is correct, and also consistent with possible retroactive classification. The articles report that the email messages contained classified material, but those at the New York Times, Washington Post, and Associated Press feed do not state that it was classified retroactively. The closest to that was the statement quoted in the AP article that the source of the content was being investigated.

In a general sense, all official material is born classified and not to be released publicly without explicit department or agency approval (or made available because of vulnerabilities) . The classification that applies is dependent on the origin and type of data. It probably happens rarely, but there may well be instances in which publicly released material was classified (or had its classification upgraded) after the fact and efforts made to collect and destroy existing copies.

Removal of established classification information and copying information from a higher level to a lower without the associated classification marks certainly violate department or agency policy and instructions, and probably violate the law.

tom dial Silver badge

Re: Thursday's lunch menu

Indeed so. Everything of any significance has at least the status of "For Official Use Only." As I remember, however, nothing with a classification above Confidential may be stored on or accessed using an internet-accessible computer, and I think that includes remote VPN access using computers provided and maintained by the government.

Transferring material classified Secret or higher requires sneakernet use. If that happened in this case, it involved more than forwarding or careful copy-and-paste operations. Moreover, we are justified in expecting those officials who engage in email correspondence with the Secretary of State and her immediate staff to have the wit and will to recognize classification issues and refrain from sending sensitive material into environments where it cannot legally exist even if it is not (yet?) formally classified.

tom dial Silver badge

Whether the information in the withheld emails was classified when sent has not been reported as yet. If it was not, the particulars may only indicate incompetence;. If it was, and copied without the applicable classification marks it becomes a criminal matter implicating whoever prepared the email and possibly others, including the recipient. In the end, it does not matter whether Secretary Clinton sent or received them, since she was responsible for deployment and operation of the probably illegal and certainly insecure server where they were stored. As head of the Department of State she also had the responsibility to ensure that the department and its employees, including herself and her close advisers, complied with the law and with federal and department regulations.

This is not "funny" and never was. While her supporters may claim otherwise, it is perfectly reasonable to consider Secretary Clinton's conduct as Secretary of State in evaluating her fitness for nomination for any other office of public trust, especially including the presidency. OPM director Katherine Archuleta was forced from office, and OPM CIO Donna Seymour is being pressured to resign, for less. As bad as OPM's failures were, the evidence does not suggest that OPM management flouted the law and regulations as appears to be true of the State Department.

tom dial Silver badge

Re: Um... da fuq

As a present beneficiary of OPM paid credit and identity theft watching, I do not see that either of these events should be taken to excuse or downgrade the importance of the other.

tom dial Silver badge

Re: Spot the oxymoron

The emails are reported to contain classified material. That is consistent with the Clinton campaign claim that the messages were not classified, but almost certainly indicates either carelessness or malfeasance within the State Department that reaches the Secretary's office if not the Secretary herself.

Of course none of it would have been much of an issue if she had not, violating both law and regulation, deployed a private (not to say quite insecurely configured) server to conduct government business. Instead, she would have done email on State Department systems either in the office or remotely using a government provided VPN and examined classified information either in hard copy or using systems attached only to a secure network that did not interface with the public internet (and secret and above possibly in a physically secured and electromagnetically isolated interior room).

Every article I have seen, including this one, treats this much more lightly than it warrants, as do a large fraction of comments, both here and elsewhere.

Cops hate encryption but the NSA loves it when you use PGP

tom dial Silver badge

Re: Ok with me

OpenPGP (RFC 4880) is such a standard and is not known to have a back door, although the source code has been available for anyone interested to analyze for over 20 years. The chance of universal adoption (so far) is zero, since Microsoft does not support it in Outlook. On the other hand, there are multiple implementations for gmail, and applications for Android, Windows, and Linux; and web search will easily find implementations Mac OSX, iOS, FreeBSD, and OpenBSD. Whether these all have been scrutinized equally thoroughly is uncertain.

Given how easy it is to get gmail (or other) email addresses, removal of message address information probably is less a problem than a minor inconvenience.

tom dial Silver badge

Re: Ok with me

PGP and other well analyzed protocols should do that quite well if implemented correctly, and if any other parties to the communication are trustworthy.

tom dial Silver badge

Re: Privacy

For what it is worth, there are public repositories for PGP public keys - pgp.mit.edu is one - and others can be found by installing Enigmail. The model in which keys are obtained from a public key server is slightly discordant with the usual PGP model in which trust is assigned based on the signature of the key by others and the trust one has in the keys used for the signature. Used reasonably it can provide reasonable security, probably as good as a Comodo signed certificate. When you can meet a correspondent, generate and sign keys off network and exchange them in person, the trustworthiness of those keys is very good.

The point about unusual use of encryption is interesting and merits an upvote or two.

tom dial Silver badge

Re: The more, the merrier?

"... dilute the value of that metadata." It will not do that to a degree that makes much difference. It will slow queries somewhat and increase the storage requirement, but both effects are likely to be overcome by technological progress along with routine equipment replacement and upgrading.

tom dial Silver badge

Re: The more, the merrier?

It would be no more than a minor to moderate inconvenience if everyone so inclined to switched to consistent use of PGP or equivalent. The inconvenience would be limited to modest floor space and storage increases. SigInt agencies already are quite good at building, maintaining, and using very large databases. They would simply provide for the greater volume and go about their business largely unaffected. Facebook started sending PGP encrypted notifications a while back. They may be captured, but are unlikely to have been much noticed, although they have fairly obvious intelligence potential and likely enough are not being excluded from any program for collecting encrypted email.

The plain fact is, however, that most people (I think nearly all) simply do not care enough if their traffic is sent in the clear to make the minimal effort required to switch to use of PGP or the like.

US police contracts and private forum posts dumped online

tom dial Silver badge

Re: Interesting

However much some executive branch officials (in the US that applies to both federal and state/local officials, who operate with considerable independence), the constraints operate with considerable effectiveness for several reasons. In the first place, the relevant executive branch official largely share the underlying belief system and accept their legitimacy. Secondly, they know that when they do not, the results are quite likely to be challenged in and rejected by a court where they are offered as possible evidence, along with any other facts they can be seen to have led to. In short, executive branch officials (i. e., police officers and prosecutors) have to live with them; it does not matter whether they like that.

My original point, though, was that it is unseemly, perhaps even hypocritical, to celebrate privacy breaches committed against those one dislikes and condemn it when done against those one favors or innocent bystanders.

tom dial Silver badge

Re: Interesting

In the US, both organisations and individuals are protected by the Constitution, specifically by the Fourth Amendment, A government agency would not be permitted to access the information released (as described int the article) without a warrant. It is not clear why a non-government organization, although not constrained by the Fourth Amendment, should be given a pass when it does so. That is not, of course, entirely applicable to someone who receives and releases the information without actually committing CFAA violations.

These constitutional and legal protections apply to all, including criminals and criminal organizations, and even those who might be seen as "leading the crusade against constitutional rights ." The presumption that some individuals and organizations are entitled to less consideration than other under the Constitution and laws has no place in the US, and I suspect that, with allowance for constitutional differences, it also has no place in the UK.

tom dial Silver badge

Interesting

After reading the first dozen and a half comments I find it interesting that the interest in protecting privacy seems to extend only to favored individuals and groups, much the same way that freedom of speech often is approached.

Most of the world still dependent on cash

tom dial Silver badge

Re: Anonymous

Indeed so. If I were to use a debit card it at least would be one issued by a foreign bank, although I suspect that actually would not throw a lot of sand in the gears. That said, due to better protection against fraudulent use (and the interest free short term loan), I use credit cards for almost all "normal" expenditures and would use cash for any dodgy ones (if, of course, there were any).

Scandal-smashed OPM will no longer do govt's background checks – for obvious reasons

tom dial Silver badge

Re: New OPM

Sanity check:

For fiscal year 2015 while military + (discretionary) veteran benefits were just under 60% of the discretionary budget, military + (total) veteran benefits were barely 20% of the total budget, considerably less than either Medicare and Health spending ( 27%) or Social Security (33%).

The need for new software is not clear, since entry to the OPM network apparently was based on compromised credentials in a contractor's system.

GCHQ spies quashed this phone encryption because it was too good against snoopers

tom dial Silver badge

Re: Lavabit, Truecrypt...

Of course, there was no technical requirement that Lavabit have a key to decode the stored communications in its possession. If it had not, it would have little reason to resist delivering what was asked, and it is possible, perhaps likely, that it would not have been requested, or that something different would have been requested and found to have been encrypted by the originator.

And Lavabit could have remained open and serving the purpose for which it was intended.

tom dial Silver badge

Re: So GCHQ wants to help the terrorists and Russians?

It is not entirely clear that encryption with vulnerabilities is worse than what most of us have, and have had, which is no encryption. Indeed, that is fairly obviously not true.

AMX backdoors US govt's comms system with Batman-inspired surveillance mode

tom dial Silver badge

Re: So who had access?

What is described clearly is extremely bad practice, and SSH capability clearly enables remote access for some value of remote. That said, the vulnerability can be mitigated by firewalls or air gaps while enabling access for debugging by local staff. As always, the services have to be manageable and usable as well as secure against the expected threats. Managers never will like to sign off on risk acceptance, but those not hopelessly dense know there is risk, and accept the fact.

Microsoft legal eagle explains why the Irish Warrant Fight covers your back

tom dial Silver badge

Re: Wait a minute...

The part of the law in question (18 USC 2703 (b)) seems to have nothing to do with business records and everything to do with the communications of the users of computing services. In short, it is about the data. A different section (c) addresses metadata.

It also has nothing to do with interception of data in transit, but with data at rest in commercial facilities.

For fsck's SAKKE: GCHQ-built phone voice encryption has massive backdoor – researcher

tom dial Silver badge

Re: They all have the same flaw...

" ... no reason why intermediate points should even know ... "

In the US, federal law requires that telephone communications be tappable by law enforcement agencies under warrant. I suspect there is a similar law in the UK and most other countries and that partly explains the characteristics of MIKEY-SAKKE. That means, of course, that telephone communications also are tappable without a warrant; to do so merely violates the law.

That was the reason for the Clipper chip and its key escrow arrangement. We pushed back against that twenty or so years ago, and it died from that as well as implementation flaws, leading to 20+ years in which the privacy and security of telephone calls was lower, and unlawful wiretapping, including by law enforcement authorities, was much easier.

I occasionally have wondered what happened to PGPhone.

IRS 'inadvertently' wiped hard drive Microsoft demanded in audit row

tom dial Silver badge

One might suppose that after the unfortunate episode with Lois Lerner's workstation IRS would have instituted regular backups. Of course if enough time passes those backups will expire, as might have happened here.

Inside Intel's CPU-level multi-factor auth (and why we've got deja vu)

tom dial Silver badge

I'm still waiting for an Intel to explain why it is more secure than the Common Access Card or Personal Identity Verification cards (each with PIN) the US government uses.

For some reason this, and the underlying Management Engine, reminded me of the Intel iAPX 432, which was not exactly a commercial success.

The Day Netflix Blocked My VPN is the world's new most-hated show

tom dial Silver badge

I tend to agree with those who noted that Netflix probably is being pressured by those whose wares they sell on. If that is so, it probably is not relevant to ask after the magnitude of the problem. Copyright owners have shown repeatedly that "larger than zero" is enough to send them into a frenzy of lobbying and litigation that goes beyond all reason.

Kentucky spies stricken: Ban on web snaps of horror accidents mulled

tom dial Silver badge

Re: That's not really what's happening

It is true that neither major party is noticeably short of an occasional urge to stupid behaviour, but it also is true that the average office holder is smarter than the median voter, smart enough to recognize that fact, and smart enough to take popular positions to get (re)elected.

That is why we need the Bill of Rights hard wired into the Constitution to keep them somewhat under control.

Posting gory pictures of accident scenes is horribly bad taste, but allowing the government to constrain "speech" in its most general forms is a generally worse alternative.

Fortinet tries to explain weird SSH 'backdoor' discovered in firewalls

tom dial Silver badge

Re: in, out, in, out, shake it all about.

I would have thought they would (assuming a fairly standard SSH setup) configure SSH with interactive login disabled, and their (Fortinet's) public key in the authorized key database along with a specific permitted FQDN and IP address associated with the user in the hosts file, and documentation describing how the purchaser could create and add their own keys and remove Fortinet's.

Anything less adequate is an indication of negligence or something worse.

tom dial Silver badge

Re: Trust?

Stipulating that equipment shipped from the US might be subject to interception and modification, the same certainly is true of similar equipment shipped from non-US addresses. The variable is who does the interception and modification, so the operational decision might be about your choice of third party intervenor. On the other hand, interception and modification by a government agency in the receiving country also would be a possibility, one not under the control of either sender or receiver, and that is not one about which either has a choice.

There also is a strong case for open source hardware, and for great care about things like cables, as some of Snowden's stolen documents show. It is reasonable to assume that the Chinese and Russian governments, among others, have roughly equivalent capabilities and motivations.

American cable giants go bananas after FCC slams broadband rollout

tom dial Silver badge

Re: The report MUST be wrong!

"Broadband in the US is stymied by local monopolies."

Yes, indeed. Most of them were granted for cable television distribution long before internet service became an issue, usually to the company that made the the best deployment offer to the local government, where "offer" was some combination of fees paid to the local government, restrictions on cable charges to the customers, and possible gray area side payments.

It was noticed only later that cables can transmit data in two directions so that the TV cable could be repurposed as a general purpose communication channel and connected to the internet.

Contrary to another post, these monopolies did not happen because the winner outcompeted others but because the monopoly was regarded as "natural" in the circumstances due to the large upfront costs. Similar costs apply now to any potential competitor who would have to deploy additional physical infrastructure to deliver service.

tom dial Silver badge

Re: Back Story

It is a not a conflict of interest at all. It is purely agency action to enhance its prestige and power, along with that of its commissioners. I would like to see an example of any government agency, in any country, that did not engage in such activity regularly to the maximum of its legal authority and capability.

tom dial Silver badge

Re: Thanks FCC

The geographic monopolies are not a matter of national policy, but rather local franchises granted by pliant city councils, augmented by laws in a few states that disallow municipal communications services.

State and local governments are far easier than the federal government to lobby successfully.

Hacked OPM won't cough up documents on mega-breach – claim

tom dial Silver badge

Re: Speedy?

OPM is not the only agency that seems to drag its feet in answering information requests. I have a federal FOIA request pending since March, 2015 for documents which (if actually exist) should be possible to unfile and copy in under a week. I expect there are quite a few here and there that are older.

I was advised in late December that the target date is some time in June, 2016.

tom dial Silver badge

Re: @Mark 85

The base data certainly was self-submitted and the subject of the investigation will know what it was. I know what I put in my SF86. A good deal of additional information will be there too, such things as credit status and in some instances medical or psychological information, and criminal history. Subjects will know, or could, most of that as well. The SF86 is submitted along with signed releases to collect quite a lot of data.

What I, and other subjects do not know is what additional information was added based on interviews with references and others identified during the review process. An incumbent politician might very well have an interest in knowing that, or background investigation information about others who are or might become their adversaries or opponents.