* Posts by Ken Hagan

8168 publicly visible posts • joined 14 Jun 2007

WannaCrypt 'may be the work of North Korea' theory floated

Ken Hagan Gold badge
Thumb Up

Re: Excuseotron

Up-voted for the splendid hashtag.

Ken Hagan Gold badge

Re: Dear Leader

I think "Dear Leader" is now "Dead Leader". The current incumbent goes by the moniker "Fatty Kim", at least on Chinese social media.

Ken Hagan Gold badge

Re: Naive Question

"The bigger issue for things like medical equipment is probably the drivers."

Possibly. I don't recall seeing a "Medical" device type in Device Manager. There may be some medical devices that ship with a bespoke "interface card", particularly the really old ones that were built for DOS, but I would hope that the majority of devices written in the last couple of decades communicate with more sane options like RS232 (now carried over USB and supported by every OS on the planet) or an ethernet cable (similarly universal).

It might take time to validate any new configuration, so that you can tick the box labelled "Doesn't kill the patient", but I doubt whether device support is the blocking issue for that XP->whatever roll-out.

Ken Hagan Gold badge

I agree. If your reduced to using the timezone as "evidence" then you scraped your way through the bottom of the barrel a long time ago. A more plausible conspiracy theory is that the NSA have just noticed that most of the world's XP systems are in countries they don't like and later systems can be protected if MS can be persuaded to put out a patch two months before the attack. (If you want a soundbite, they've weaponised Microsoft's update policy.)

But a vastly more plausible theory still is that some normal crook decided to strap a ransomware payload on the back of a new exploit they found on the interwebs. There are *far* more crooks than there are nation states, so the odds are *always* in favour of the mundane explanation.

Ransomware scum have already unleashed kill-switch-free WannaCry‬pt‪ variant

Ken Hagan Gold badge

Re: Inevitable

"Because the likes of the FSB & PLA must be too stupid to have also discovered these types of vulnerabilities."

If they knew about them, they didn't do a very good job of protecting their own gear from them.

For now, GNU GPL is an enforceable contract, says US federal judge

Ken Hagan Gold badge

"That since it did not sign anything when it downloaded Artifex's software there is no contract to be enforced."

That's a very odd argument. Do you think it would work if I downloaded Windows and then tried to argue that I hadn't signed anything?

74 countries hit by NSA-powered WannaCrypt ransomware backdoor: Emergency fixes emitted by Microsoft for WinXP+

Ken Hagan Gold badge

Re: Kill switch

More likely, it didn't occur to them that any of these "tools" had kill-switches. Presumably now that will occur to them and they'll flick the switches for all the other exploits they've lost. It would be gross negligence not to, since part of their mission is to protect US IT systems.

Ken Hagan Gold badge

Re: Rogue One ...

I doubt it. Since this has become a long comment thread, let me re-iterate a point that someone else made further up. If you are the NSA and intending to use this against a particular target, you want a kill switch that you can register once you've hit that target, to stop your weapon becoming any more public than it needs to.

Also, to answer another query from further up ("why include a kill-switch when you can't register it without disclosing your identity"), if you are the NSA and you register a garbage domain name, no-one is going to know why or try to arrest you even if they do.

It is a little odd that someone adapting this software to a very different purpose, requiring as large a target as possible, chose to leave the kill-switch in (and in the clear). Perhaps they didn't understand the code they were using.

Ken Hagan Gold badge

Re: Hunt to blame for NHS attack

"MS does still support, if you pay..."

Not sure about that. The original offer was $200 for the first year and $400 for the second and $800 for the third, per seat. That third year ended a few weeks ago. I've not seen any mention of a fourth year, at any price, to anyone.

Refs:

(2017) https://www.theregister.co.uk/2017/03/17/microsoft_to_kill_windows_vista_april_11/

(2014) https://www.theregister.co.uk/2014/01/14/win_xp_uk_gov_hacker_deadline_miss

Ken Hagan Gold badge

Re: Amazing you can leave the SMB port open

"Also, one questions why file sharing is necessary in these days of web and other fat client based apps."

File sharing is a client-server app. The end-user-facing client is a file browser rather than a web browser. Some programs (particularly older ones) are designed to speak http, others are designed to speak to the "local" file system. Re-writing all those programs to fetch their data over http would merely expose them to a different set of holes.

Ken Hagan Gold badge

Re: And we'd sure appreciate it if you could stop clicking on attachments

"stage one of Really Good Security: you have left your ego at the door."

Stage two is to persuade all of your user base to leave their egos at the door, too. In an organisation as large as the NHS, stuffed (er, staffed) with doctors and surgeons for whom self-confidence may actually be a job requirement (who here feels brave enough to knock a person out to within a gnat's breath of death, then stick a knife into them and cut out some of what you find?), I fear that stage two may actually be impossible.

Ken Hagan Gold badge

Re: You are missing the point

"They now are not going to get any money."

Too right. It would be fair to assume that most of the world's major intelligence agencies (particularly the Russian one, which isn't noted for its light touch against Enemies of the State) are now waiting for someone to try to pick up the cash. If there's anyone with balls big enough to march in and claim it, we'd probably be able to feel their gravitational field.

Well this is awkward. As Microsoft was bragging about Office at Build, Office 365 went down

Ken Hagan Gold badge

Re: Numpties.

"Ohhh, so, Microsoft is paying damages to all affected, then ?"

Have a "Whooosh!" on me. You can share it with the other down-voters.

Ken Hagan Gold badge

Re: I'm in Texas

Perhaps they felt that providing a map, with state boundaries and fuzziness in affected areas, made it unnecessary to expend the proverbial thousand words on a more detailed list. (Just as you didn't explicitly say that you were an O365 user.)

Ken Hagan Gold badge

Re: Numpties.

"Remind me again why I should trust a company with centralized control of my data"

You should trust them because the penalty clauses in the contract make it really bad for them if you suffer any kind of outage and so they'll make every conceivable effort to deliver. Just like any other kind of service or product that you buy in from outside, in other words. Businesses have been doing this for years and I really don't see what the fuss is about.

Obviously it would be bonkers if you didn't have any such clauses in the contract ...

UK hospital meltdown after ransomware worm uses NSA vuln to raid IT

Ken Hagan Gold badge

It proves a point that many people here have been making since XP went out of support. *Every* patch from MS that fixes holes in a later version of Windows reveals a weakness that might exist in XP. MS have therefore been publishing exploits against XP for several years now. I believe the NHS's special deal to continue to receive patches expired quite recently. This is an entirely predictable result of NHS management's failure to have any kind of plan for moving off XP.

Microsoft's Windows 10 ARM-twist comes closer with first demonstration

Ken Hagan Gold badge

Re: Isn't Google unifying Android and ChromeOS as well?

"The temptation of a single line is strong, because it means to save on development costs."

You (as well as Google and all the rest) should distinguish between unifying at the API level and unifying the end-user shell or skin.

The former is probably essential if you want to attract developers to a "new" platform. Simply trying it out needs to be no more than a compiler switch. If they see potential in the results, they will be willing to tweak their code for the "extreme device metrics".

The latter is utterly counter-productive, precisely because of the extreme device metrics just alluded to.

Ken Hagan Gold badge

"Instead of the 7-Zip installer, how about a full PC benchmark suite?"

Prediction: Not only will MS not do that, they will write words in the EULA which try to stop anyone else doing that and publishing the results, like they did with .NET. (I don't know if that language is still there, but the first few versions were certainly "If you benchmark the software then you will get MS's permission before publishing the results." type of thing.)

I assume that such clauses are unenforceable, but IANAL, as they say.

Cloudflare goes berserk on next-gen patent troll, vows to utterly destroy it using prior-art bounties

Ken Hagan Gold badge

Re: bow and arrow - good!

The architecture described in the article is an HTTP proxy. Clients connect to the proxy which accesses the actual website behind the scenes and then the proxy delivers possibly modified content back to the client. The client never accesses the actual website. That's the whole point of the proxy.

So would there be any prior art for HTTP proxies around the 2002 timeframe. Well ... I suppose there's always the RFC that describes how HTTP has been carefully designed to make them possible. Would that count?

That's a serious question, by the way. In the sane world where you can't just grab an existing public standard and announce that you own it, of course it counts. In a US court hearing an IP case? Hmm ... much less clear cut. We shall see.

Microsoft touts next Windows 10 Creators Update: It's set for a Fall

Ken Hagan Gold badge

Cycles of re-invention

This Microsoft Graph rubbish sounds like it is intended to create an experience where it doesn't matter which device you used to create something, or which device you are now using to access it, and perhaps both at once. In such a brave new world, one might say "The network is the computer.".

As I recall, *that* failed partly because people didn't much like having all their stuff on someone else's server and partly because the wire between you and that server was a piece of wet string compared to the various high-speed busses in a PC. Neither of those objections seems to have gone away.

Oh, great: There's a new Same Origin Policy exploit for Edge

Ken Hagan Gold badge

This, and the other thousand exploits against JavaScript's security model that have dribbled out at a steady rate over the last 20 years, is why "HTML5 apps" are a bad idea.

Theoretically, there's no intrinsic problem that anyone can point to. In practice, when the world has spent 20 years trying to plug the holes and is still failing several times per month, there comes a moment when rational players ought to conclude that there perhaps is an intrinsic problem and it is simply that we don't know what it is.

It's 2017 and Windows PCs are being owned by EPS files, webpages

Ken Hagan Gold badge

Re: Why does Microsoft still try and integrate applications into core OS

There is no such integration. All the apps you mention are user-space and no more privileged than anything you can buy from third parties (like me). Even Explorer only has the property you mention because it is the user shell. (I'm not sure where you get the idea about IE. It's totally separate. Not that anyone would ever want to run it as a full Administrator, of course.)

Tip: If you *do* want an administrative copy of Explorer, fire up something harmless (like NOTEPAD) with full privileges and use the File Open dialog.

Ken Hagan Gold badge

Modern software philosophy

I'd dispute "modern" and "philosophy". I have been watching people complain on the internet about the low quality of "modern" software for the last 25 years. It both puzzles and amuses me.

It has always been the case that software written for cash has taken the business-like approach of asking "how much will this bug cost to find (let alone fix) and how much will it cost to leave it in". You test until finding new bugs becomes unacceptably costly and you hope that the bugs left in will be relatively low impact as a result.

All commercial anything has used this approach since forever. It's basic economics. Happily, we can use equally basic economics to conclude that if you negotiate penalty clauses for bugs, you can increase the incentive to find and fix them before release. Since most shrink-wrap EULAs go out of their way to say "this software is not fit for anything" I think you can probably guess where the bar lies by default!

America's mystery X-37B space drone lands after two years in orbit

Ken Hagan Gold badge

Re: Astonishing what you can do when you learn from experience.

"kudos to the USAF for rescuing X-37 from the shitcan that NASA threw it in"

You mean kudos to Congress for diverting chunks of NASA's budget to the USAF's "off balance sheet" piggy bank. Er, yeah, kudos of sorts, I suppose.

Ken Hagan Gold badge

Re: Long flight

Except that this shuttle is the payload rather than the vehicle and being able to launch the same payload twice is hardly rocket science.

The launch vehicle is a distinctly non-reusable rocket. There are no re-usable spacecraft and existing propulsion technology provides no means to build any such.

Ken Hagan Gold badge

Re: it is unlikely that it carries any weapons... cough... cough...

"The energy released by whacking something with 15kg at 18km/s collision velocity is roughly equivalent to a kiloton of TNT."

Actually, Google says 1 kiloton is 4TJ, and I think the KE of 15kg at 18000m/s is about a thousandth of that. This makes sense, because it was several hundred tons of chemical energy that put the payload up there in the first place, so it is reasonable that it would have a ton or so equivalent of KE once it is up there.

But you don't need the ion gun. Just let a small lump of payload hang out of the side of your satellite and "encounter" the target on a non-glancing trajectory. The relative velocity will provide plenty of destructive power and you can blame it on space-junk.

Sorry, Dave, I can't code that: AI's prejudice problem

Ken Hagan Gold badge

Re: Can we stop using the term AI please ?

"We don't have AI. Stop using the word."

I sympathise, and have posted similarly in the past, but those two sentences don't actually conflict.

Yes, we don't have AI, but that doesn't necessarily mean people should stop using the word. "AI" and "algorithms" and "machine learning" have (in certain contexts) become pretty accurate markers for "You can stop reading now, unless you are really bored and enjoy a good laugh."

.

Ken Hagan Gold badge

Re: Transparency...

"All I'm asking is why people think that that cannot be logged and output - ie why the AI cannot explain how it arrived at an outcome."

That log would be perfectly easy to generate. However, it would take you weeks (or more) to read it and you would be none the wiser at the end of the experience as to why the computer had said "no".

Put another way, the computer does not have a reason, it merely has a very long calculation. Many moons ago, its designer discovered that the result of the calculation was fairly well-correlated with his or her own prejudices, at least on a test data set, and that designer therefore decided to use it as a substitute for making the decision themselves.

As long as everyone understands that it is a mere corrrelation on a mere test dataset and is being used as a substitute for an equally (but differently) flawed process of human judgement, there isn't a problem.

How to remote hijack computers using Intel's insecure chips: Just use an empty login string

Ken Hagan Gold badge

Re: bloody c language

"That is a problem in the compare routine. If the length of the strings is different it should return a mismatch."

It is not a compare routine. That's the mistake that the programmer made. strcmp() is a compare routine with the semantics you describe.

strncmp() is explicitly a "just compare, at most, the first n characters" routine. To be honest, I can't imagine that this is a common enough requirement to justify inclusion in any kind of standard library, but it's probably a historical accident and we're probably stuck with it now. One could, I suppose, mark it with some compiler extension like __declspec(this_does_NOT_do_what_you_think_it_does) and a stern note in the manual explaining why, but idiots switch off compiler warnings and don't read manuals.

Ken Hagan Gold badge

Re: strcmp

Possibly because some well-meaning-twat in the compiler division wrote a non-standard "deprecated" attribute into the string.h header file and so any attempt to use strcmp() is now rewarded with a compiler warning whereas using a less-safe-but-more-obscure function compiles cleanly.

Actually, strike that. Almost certainly because of the above.

Ken Hagan Gold badge

Re: Probably best to not have IP6 enabled on an server Intel box or have it in DMZ!

"Yet another reason why NAT a firewall is still important and exposing stuff via IP6 any non-firewalled network protocol you care to mention is maybe not so smart!"

FTFY, as they say.

Ken Hagan Gold badge

Other vendors?

I'm unclear on why the vendors are involved. What hoops do you need to jump through to patch the microcode on an Intel processor and why are Intel themselves not able to do this? Have they really got themselves into a situation where the door to their processor is unlocked and they are unable to fix it because they don't have a key?

What if I've bought a system from some random box builder? Who do I go to for a patch?

Hackers emit 9GB of stolen Macron 'emails' two days before French presidential election

Ken Hagan Gold badge

"If I was selfish which I'm not I potentially would be hoping Le Pen wins to weaken the EU in it's negotiations with the UK. I'm sure others have thought of that scenario."

So you're saying that GCHQ did it? That might actually be quite clever because everyone is going to blame the Russians> However, it is less clever since it will probably backfire and damage Le Pen tomorrow. So maybe it is the work of someone who is pro-EU. Ah, the possibilities are endless...

Ken Hagan Gold badge

Re: So, just another day in the office...?

"We now reap what we sow and we are utterly unprepared for it"

Speak for yourself. We have sown "openness" and most of the population is so prepared for it that they'd almost given up hope that it might eventually happen.

These leaks all have the effect that politicians can't do one thing in private and another in public. Worse, for the politicians, the fact that some of the leaked material later turns out to be false doesn't nullify the damage because people just get into the habit of using the leaks as a list of leads that have to be followed until they are independently confirmed or denied.

That, incidentally, is why you should ignore anything that is "leaked" just before an election (like this). A leaker who is trying to push a lie will leak some lies in amongst a lot of truth and do it at the last minute so that no-one has time to check.

Fake news is fake news, says Google-backed research

Ken Hagan Gold badge

"You're not a Yankee doodle dandy are ya?"

Regardless of which side of the pond you swim on, you can't have "grey" and "license" (as a noun) in the same sentence unless you use quotes like what I did.

Don't waste your energy on Docker, it says here – wait, that can't be right...

Ken Hagan Gold badge

Simply running dockerd idle induces a 2 watt difference in average power

From the paper, that's 64kJ over 10 minutes rather than 63kJ.

Windows 10 S forces Bing, Edge on your kids. If you don't like it, get Win10 Pro – Microsoft

Ken Hagan Gold badge

Re: Windows 7

"When everything is turned off in Windows 10, it doesn't leak any more information back to Microsoft than Windows 7 does."

Only because they've back-ported all the telemetry.

Red alert! Intel patches remote execution hole that's been hidden in chips since 2010

Ken Hagan Gold badge

"With AMT you can remotely change BIOS settings, install an operating system etc."

These days, you can do most of that by running a hypervisor on the bare metal and a single OS guest on top. Intel's VT-x features ought to make that reasonably performant. Perhaps AMT is an idea whose time has now past.

Ken Hagan Gold badge

Re: Removing the driver doesn't affect the vulnerability

@DougS: Properly configured, Intel don't leave back-doors in their CPUs. Clearly we don't live in a properly configured world.

324 typo-squat domains found impersonating Natwest, HSBC and co

Ken Hagan Gold badge

Re: Noninet are shite too

You'd probably be better off telling the bank. They probably don't have any clout with Nominet either, but they have deep pockets and legal attack dogs to send after whoever registered the names. (Because let's face it, there just isn't any legitimate reason to register any of those names, unless you are the bank in question.)

Ken Hagan Gold badge

Re: Organisation - Barclay's

The bank is named after James Barclay, so your snark is mis-placed.

Windows 10 S: Good, bad, and how this could get ugly for PC makers

Ken Hagan Gold badge

Re: The other secret source for the OS is...

The OED merely documents usage. It doesn't usually point out where that usage is an abomination to native speakers.

Loadsamoney: UK mulls fining Facebook, Twitter, Google for not washing away filth, terror vids

Ken Hagan Gold badge

"and with VPN (appropriately hosted) usage, a geoblock is essentially useless."

You're focussing on the technical and looking for a perfect solution.

Use of a VPN to cross between separate legal jurisdictions is the information equivalent of importing or exporting goods. We've had the latter for centuries and dealt with it fairly effectively under the law for just as long, even when long land boundaries make enforcement practically impossible. It wouldn't be *that* hard to pass a law saying that anyone running a VPN end-point in jurisdiction X is liable under the laws of X for whatever comes through. They can offset that liability by policing who is able to use the end-point and by offering reasonable investigative assistance if a customer is naughty.

And no, it *wouldn't* be a shocking infringement your rights, anymore than existing laws against smuggling are an infringement of your god-given right to avoid paying duty on imports.

Ken Hagan Gold badge

Re: Facebook doesn't have to provide free speech

The whole question of responsibility probably needs to be addressed.

If I make an abusive telephone call, the phone company is not liable but (I think) they are obliged to help the police figure out who I am if the recipient makes a complaint. (Even if they aren't obliged, they'd probably reckon it was lousy PR not to, since the connection records are there.) However, a phone line is one-to-one and the scope for abuse of such "user generated content" is limited.

Likewise, I could post abuse through snail mail (and people *have* posted anthrax and explosives). Again, however, it is hard to make a habit of this without the police eventually catching up with you.

As a social pariah, I would be better off abusing the internet, where one good troll can reach millions with almost complete anonymity. Here also, the intermediary is (apparently) not liable, but also (apparently) needn't have any measures in place to help track down the culprit. (Yeah, you can close the account, but I can open another one the next day and carry on.)

I'd argue that this has seriously upset the historic balance between the rights of individuals to say stuff and the rights of other individuals to ignore it. The current situation appears to allow internet companies to make money out of anti-social behaviour. That can't last.

If the last 20 years of political threats are anything to go by, internet companies should not presume that their business models are protected by natural law. We will continue to have politicians suggesting solutions that they have dreamt up until we (in the technically literate community) come up EITHER with technical solutions of our own OR with sufficiently detailed audit trails that the existing legal deterrents are once again effective.

40,000 Tinder pics scraped into big data service

Ken Hagan Gold badge

Re: Aggregating data?

It might depend on the T&Cs of the site you scraped it from. That, in turn, would lead us into the murky issues around jurisdiction and whether the site could enforce those T&Cs either legally or practically. If you just keep quiet about it, I rather suspect you'd get away with it. If you re-publish the dataset, you might be breaching copyright (somewhere).

Given the variable names in the script you are almost certainly inviting a libel suit in London (sigh) but you probably aren't British (we spell it differently) so you probably don't care.

Secure Boot booted from Debian 9 'Stretch'

Ken Hagan Gold badge

Re: UEFI blows chunks

I'm not sure that UEFI is the same as Secure Boot. At least in some contexts, the latter simply refers to whether the kernel (Debian's in this case) is digitally signed by Microsoft (I think). It is that signing requirement that people object to, not the idea of an extensible firmware.

If you follow the link (in the article) to the mailing list then the very next post is someone saying that UEFI will be supported in live CDs. Since live CDs usually have an "install me to your hard drive" option, it would be slightly odd if Stretch supported UEFI on the CD but not on the HD.

NSA pulls plug on some email spying before Congress slaps it down

Ken Hagan Gold badge

Re: What someone says

A record? Their job is to be dishonest!

Phew! Chrome to warn when you watch insecure smut

Ken Hagan Gold badge

Re: Faking user agent (Was: Well, don't use Chrome then)

Well actually, in a perfect world, testing only on Chrome would be fine. Chrome would correctly support all HTML5 constructs and your page would contain only HTML5 constructs. Job done.

The trouble is at least as much caused by idiot web page authors as it is with browser programmers. As one example, I have recently removed the "armv7l" string from my UA string because I have realised that quite a few websites (big ones, like Amazon and my bank, both of whom can surely afford better) use this to indicate "small screen size" and punt me over to their mobile site. In Amazon's case, this is a recent change (so the twat who wrote it was probably at primary school when CSS media queries were invented) and there wasn't even a back-link to the desktop site.

How idiotic do you have to be to think that the CPU is a better guide to layout than the screen size?

Facebook and Google gobble '99 per cent of new digital ad cash'

Ken Hagan Gold badge

Re: Winning is simple

"But most of the time, even if "relevant" in some way, they are just usually intrusive. "

Isn't that the weirdest thing? Having identified that you, LDS, are the kind of person who is likely to buy their kind of product now or in the future, they target you, LDS, with intrusive and annoying ads in your day to day life.

"OK, Google ... give me a list of potential customers. I want to poke them all in the eye with a sharp stick. A branded sharp stick, mind you, so that they associate me with eye-wash and stabbing pains."