* Posts by Adam 1

2545 publicly visible posts • joined 7 May 2012

Mum fails to nuke killer spider nest from orbit

Adam 1

Re: She could always have taken the offending banana and throne it in the freezer....

I, for one, welcome our new eight legged banana munching overlords.

Microsoft U-turns on 'free' Windows 10 upgrade promise for ALL previewers

Adam 1

Re: What about plain English?

At least you will know when you have your finished.

Stealing secret crypto-keys from PCs using leaked radio emissions

Adam 1

Re: My workaround is as follows...

and I never sign into my bank accounts when there is nearby pita bread. That is just asking for trouble.

'No evidence' Snowden was working for foreign power says ex-NSA boss

Adam 1

Re: Remind me again...

Someone else's.

Adam 1

Re: Blackmail?

I did not suggest that they would be exposed through their own form. Your privacy can be impacted by someone else's selfie uploaded to youchattwit. I don't understand why you would therefore suddenly believe that you can't be indirectly identified by a big data approach to this information.

Also, let us assume it is merely a cultural attaché. I would not be so quick to assume a big gap between business interests and government interests. Particularly in a one party state with largely nationalised industry. (Although for balance, the US has its own share of trying to sneak business protection rackets into various FTAs so to criticise that lack of separation is very much pots and kettles.)

Adam 1

Re: Refreshingly candid

It was. I see it as a gentle reminder to China that the US has the same info on them. Mutually assured destruction and all that, so play nice.

Adam 1

Re: Blackmail?

>useless for blackmail since Uncle Sam already knew

How does that argument even work. Say China identifies a US spy from this information.

They can now bring them in for a chat, show a picture of their daughter hopping out the school bus the previous day, then suggest the sort of information they want the said spy to report back to uncle Sam or, you know, sometimes horrible things happen.

Apple CORED: Boffins reveal password-killer 0-days for iOS and OS X

Adam 1

Re: Worrying @Boltar and @AC

>don't know how risky it is being logged into the register often

As long as your credentials are sent over https, it should be fine. Oh wait..

Adam 1

Re: What are all these papers good for ?

There is a relationship between code clarity and security. Case in point, Google GOTO fail bug, the one which borked SSL on osx or ios. Had the code been formatted correctly, it would have been very hard to miss that accidental GOTO fail line.

Why is that idiot Osbo continuing with austerity when we know it doesn't work?

Adam 1

Re: Cheques vs cash

>But weird that Oz seemed to avoid worst of the GFC.

Only in the sense that we didn't have a recession and the economy actually grew during the quarter with the GFC.

The current government is right though. If only Rudd had spent less on stimulus and more on new NBN logos....

Adam 1

Re: Another Example

>At one time I worked out that it took $1m of stimulus to create each job.

Accepting your calculations at face value, I think there is an underlying assumption in your conclusion that you may want to consider.

How many billions was it worth to avoid a total collapse in jobs? Have you subtracted this from the cost of stimulus?

Vauxhall VXR8: You know when you've been tangoed

Adam 1

Re: James Bond would be proud...

There is plenty of things you could hold up about the commodore as reasons for preferring something else. Understeer isn't one of them.

How much info did hackers steal on US spies? Try all of it

Adam 1

On an aside, the (allegedly) sentient beings setting fire to the joint here have passed laws to require ISPs to store all metadata for two years. Every website you visit, every email you send.

But don't worry, I'm sure that data will be perfectly safe from hackers.

Using leather in 'leccy cars is 'unTesla', rages vegan shareholder

Adam 1

Re: and the electricity?

The physics say that brown coal is about 3x more emissions intensive than black coal, and 25% of their power comes from a station that was ranked worst in the industrialised world (1.74 short ton/MWHr).

Transmission, charging and operating efficiencies of electric cars leave ICE efficiency for dead though.

Adam 1

Re: and the electricity?

I didn't down vote, but I will point out that coal != coal. And coal power generator != coal power generator. There are huge differences between black and brown coal and newer plants are much cleaner than older designs.

For example, your Nissan leaf plugged into a wall in Victoria (Australia) emits more than a Land Cruiser.

That is not to argue against progress as the balance can easily change once a few plants are decommissioned.

Belgium trolls France with bonkers new commemorative coin

Adam 1

Commemorating a French military defeat? Hardly hens teeth.

Israeli firm gets legal on Indian techie over ISP ad injection spat

Adam 1

Re: Flash Networks and Bharti Airtel?

I think we can agree with one voice that he is guilty. What kind of fool posts this sort of thing? My man, tell him that it had to be you and that you knew that they would send in the clowns. If not here then somewhere I guess. Sadly for him, the interwebs has memory.

/I shall now grab my coat as if we never said goodbye.

Apple to tailor Swift into fully open-source language – for Linux, too

Adam 1

A directive by definition cannot be a runtime decision in a compiled language

/pedant

FBI: Apple and Google are helping ISIS by offering strong crypto

Adam 1

Re: Apple/Google supporting ISIS? No.

>does this mean the world's population should line up to have their limbs amputated

Don't give them any ideas please.

Ed Snowden should be pardoned, thunders Amnesty Int'l

Adam 1

Re: What he did.

>Stealing is permanently depriving someone of something.

Maybe they could really throw the book at him and label it copyright infringement?

What's broken in this week's build of Windows 10? Installing it, for one

Adam 1

>And people ask me why I won't use Windows anymore........

Because their beta testers in the bleeding edge stream of the unreleased version of their os had to download a full iso image rather than use windows update?

Spaniard sues eBay over right to sell the Sun

Adam 1

Re: Well, at least in the US...

The price seems reasonable to me but the shipping cost is out of this world.

We stand on the brink of global cyber war, warns encryption guru

Adam 1

The math looks right to me. Clearly this damage is the same as someone pirating 660 songs.

Science teacher jammed his school kids' phones, gets week suspension

Adam 1

Re: In the 1970's

... And when caught the offending note would be read aloud for the convenience of the author and recipient.

Facebook flings PGP-encrypted email at world+dog. Don't lose your private key

Adam 1

>Do you understand that Facebook are in the pockets of NSA and GCHQ?

Let us take without any protest your assertion, and assume that they immediately give this public key to your favourite 3 letter acronym. Actually, let's make it worse, they put it on their homepage for world and sundry.

That does NOT help one iota in decrypting your message. That is the whole point of asynchronous encryption.

If you want your bank's website public key, double click the padlock. That key does two things.

1. Lets them create a message that you can verify wasn't forged by a man in the middle, and

2. Let's you encrypt a message that only their private key can decrypt.

Insurer tells hospitals: You let hackers in, we're not bailing you out

Adam 1

Re: Good

"Adequate" is inadequate (excuse the pun). It is a weasel word that makes it very easy for the customer to think that they have one policy but learn a hard lesson when they try to claim.

In principle, I agree with the insurer. Failure to take "adequate" precautions makes you a higher risk, and if that is not recognised against your policy cost then everyone else's must increase to socialise the loss caused by your lack of foresight.

But adequate must have provable definitions if you are going to deny claims based on it. If my car insurer stated that my car must be adequately maintained, a current certificate of registration proves that my car passed the required certifications. If they have other additional expectations, like 6 monthly services etc then they need to stipulate that explicitly.

Back to the case in point. If adequate means that patches should be applied within 30 days, what do they mean by that? Windows update? Sure. What about that old version of jre that is still needed to run that legacy system? What about that system that has been powered down for 6 months with its user on some type of extended leave? Is your policy torn up because they switched their computer back on and it was not updated for a few days? Is your router patched?

Most people don't want to accidentally leave their networks open to pwnage. For many, it is a case of being naive rather than reckless. Providing easy to digest guidelines for your customers had the double advantage of protecting them, making your offering more valuable in their eyes and by extension more profitable for you.

Skype hauled into court after refusing to hand call records to cops

Adam 1

1. Suspected criminals; if they had been found guilty by a competent court then these logs would hardly be necessary.

2. Yes. Privacy of citizens should be the default position.

3. Microsoft Ireland is subject to EU laws. If Belgium fills out the right forms through established EU processes, they will get the data.

4. Even if held by an entity outside Europe, Interpol processes are available to them.

World loses John Nash, the 'Beautiful Mind'

Adam 1

Re: It should also be pointed out

Why (should it be pointed out)?

Hacker launches ransomware rescue kit

Adam 1

Re: Detection better than cure?

How does one detect that a file is encrypted? It is just a sequence of 1's and 0's until an application decides how to process it. Detection online just moves the problem further down the stack. Take an xlsx file as an example. It is just a zip file holding a set of XML documents and other artifacts. What makes it valid? A valid to an online scanner? Is a valid zip file header enough? If so you can expect the encrypted xml document to be added to a valid zip file. It is a seriously hard problem to solve. Regular test restores to clean VMs are the best we have at the minute.

Mozilla flings teddy out of pram over France's 'Patriot Act'

Adam 1

Re: the problem is ...

No you're not.

That DRM support in Firefox you never asked for? It's here

Adam 1

Re: Netflix ?

>What is Netflix ?

An ISP comparison website, kinda like speedtest.net

Adam 1

Re: CDM is better than plugins

+1 Stuart

(From one of the 150 million people whose security Adobe compromised a few years back)

@Mozilla, keep their crap off my box.

SHOCK! Robot cars do CRASH. Because other cars have human drivers

Adam 1

Re: caused by human error and inattention

Driving is more than yaw computations. Sorry, was that a packet of crisps that can be safely run over or a rock that must be avoided by an aggressive manoeuvre. No time to get a response from Watson in this crappy 4G zone.

It stands to reason that a mesh of autonomous cars can process more information and not do the stupid things is humanoids do from time to time. But! What would happen if you were overtaking this car at the moment it decided that the abovementioned crisp packet was to be aggressively avoided? This could easily create accident scenarios that are not so today.

Ding-dong, the cloud calling: The Ring Video Doorbell

Adam 1

Re: HD video?

No problems recording an HD stream for its security purposes, but as a doorbell I would much prefer a 1 second notification in poor WiFi range if it just meant a lower quality broadcast to my phone.

Geneva boffins make light work of random numbers

Adam 1

problem though

Once you perform the test the steam ceases to be random.

App makers, you're STILL doing security wrong

Adam 1

Bloody autocarrot

Adam 1

I would argue that your GPS coordinates can be easily spoofed by anyone who can type "fake GPS" into the play store search window and as such its effectiveness as a fraud detection is rather limited.

You have to look at the perspective troy would be coming from. When you witness large multinational companies accidentally letting 150 million accounts be breached, you have to recognise that step 0 for security is to not collect the private information that isn't necessary to fulfill the transaction. Or to put it another way, how much do you think the home addresses of papal customers would be worth to identity fraudsters?

Welcome, stranger: Inside Microsoft's command line shell

Adam 1

Re: Piping and conditional logic

Many ps applications basically generate the appropriate cmdlet that achieves what you clicked. This lets you do it through the ui, then grab the script and do it in bulk.

Adam 1

Re: Obscure knowledge got me a job ....

>Only time that happens in a batch file is if I try to get really fancy with a FOR command.

Or any other processing involving the system date; stuff like rename that zip file with the prefix 20150428 is a right PITA with batch files.

Looking for laxatives, miss? Shoppers stalked via smartphone Wi-Fi

Adam 1

Re: Am I the only person in the world

>Am I the only person in the world

who has both WiFi and Mobile Data turned *off* unless and until I want to use it?

Yep. It's how we know it's you wandering around.

SUPERVOLCANIC MAGMA reservoir BUBBLING under Yellowstone Park

Adam 1

Re: I can't quite get my head around that measurement.

I believe the correct unit of measure would be Olympic swimming pools.

Windows 10 Device Guard: Microsoft's effort to keep malware off PCs

Adam 1

Re: Identity badges don't guarantee good behaviour

Minimal access levels is a good idea because the attack surface is reduced and the bad things the malware can achieve is more limited. But I will point out that encrypting all the xlsx files under "My Documents" doesn't require any privileges beyond what such a user would have.

Japan showcases really, really fast … whoa, WTF was that?!

Adam 1

Re: ten centimeters

>I haven't heard ten centimeters referred to as "excessive" before, but I digress

From my understanding the force required follows an inverse cubed relationship. So it is 8 times less energy to pick 5cm or 64 times more energy than an inch.

I am sure that there is a good reason to elevate it so high, just curious.

Adam 1

If the goal is to reduce friction, 10cm seems a tad excessive. Surely it just needs to be not in physical contact with the track? Anyone know the reason?

Lawyer: Cops dropped robbery case rather than detail FBI's StingRay phone snoop gizmo

Adam 1

I suspect nothing is wrong with such a tool per se. They would've got a warrant first, right guys?

Google broke own security with April fool gag

Adam 1

Fixed within 90 days. What's the problem?

Default admin password, weak Wi-Fi, open USB ports ... no wonder these electronic voting boxes are now BANNED

Adam 1

Re: That design is a travesty

Identification and voting should not go through the same system. Also, you ideally need to share between identification systems whether a given voter has already cast a vote to prevent someone voting multiple times.

Also, ss numbers alone are probably insufficient for authentication because they are guessable.

Want to go green like Apple, but don't have billions in the bank?

Adam 1

Re: Go one better

Some back of the envelope calculations...

148 x 100W fluorescent lights would draw 14800.

Switching to LED would realistically drop them to 85W but let's pretend that the laboratory achieved lumens per watt could get us to 70W.

This would save 4440W.

If we assume an average draw of 850W per server, that is about the same power reduction as switching off 5.5 servers. In the scheme of things, that won't be a measurable blip on the building power usage.

The only way I can see the savings becoming significant is that LEDs are dimmer friendly, so you could far more easily control the lighting to follow you as you walk around the building and be at very minimal levels elsewhere.

It's 2015 and a RICH TEXT FILE or a HTTP request can own your Windows machine

Adam 1

Re: Flash Player - or a Prayer?

Also, you may want to rethink your choice of PDF viewer now they bundle open candy malware.

Bloke hits armadillo AND mother-in-law with single 9mm round

Adam 1

This kids is why we need the interwebs. How else would I learn important tidbits like that?