Re: Awww...
Wow. That old horse must have been massive.
2545 publicly visible posts • joined 7 May 2012
The author doesn't seem to recognise that low price and landfill are not necessarily synonymous. The landfill expression refers to phones where critical engineering compromises were made in order to hit a particular price point. We saw this especially with touch screens and insufficient internal storage and RAM.
Look at it this way. A galaxy s2 was in its day arguably the best smartphone. Today, a phone of equivalent specifications would easily be in the landfill price point yet as a phone it would work fine and would not blink at running words with friends or angry birds.
To paraphrase a famous quote. Phones should be as cheap as possible; but no cheaper.
I could believe that a pre infected PC with dormant malware could receive instructions from the C&C using such a technique.
I could accept even that a specific BIOS had some sort of buffer overrun that allowed such a vulnerability, although that seems a very long bow. But to have an exploit of a nature that would work like this across multiple BIOSs sounds too big to fit in the available ROM so I think this is unlikely.
What I am willing to accept is some similar technique in the mobile space. E.g an overrun in Siri or Samsung's equivalent in Android. Such an exploit could spread to others on your bus or train.
Don't see any problem.
It is not like the said board members ever failed to notice untoward behaviour when they were foreign minister. Certainly no hundred million dollar kickbacks to Saddam for wheat contracts....
I am sure that makes them right on top of what China does in closed source modules in key infrastructure.
About the first sensible thing the new government has done re NBN
> 10.5GB, woo, yeah that's a lot in 2013. </sarcasm>
Way to miss the point there.
On a reasonably performing ADSL2 connection, that is 4 hours. Surely it would have been more efficient to torrent the whole ISO, even if all updates had to download a small app first to check some md5 hashes.
I am afraid that the field of copyright math is extraordinarily complicated. We really do need to leave it to the experts. A single iPod full of pirated music has been shown to cause northwards of 8 billion dollars damage to the economy.
So please don't come along with and use your primary school times tables to conclude you have made no damage.
I actually like mandatory polling booth attendance, which minimises the risk of cronies threatening people from attending polling booths, but there are two glaring ways in which the system is manipulated right now.
Firstly, with 110 candidates, how should I know where specifically to preference the bee keepers for higher buildings party. It is a surprisingly difficult and meaningless task to rank them. Above the line voting simplified it but parties figured out how to game the system by creating preference deals amongst themselves. In my view, scrap above the line, and allow the citizen to fill from 1 to 6 (for half senate) or 1 to 12 (for full senate).
Secondly, there is too much advantage of being first column on the page. A bunch of gun nutters won a huge portion of NSW because their name vaguely sounded like one of the main parties and they happened to draw first on the page. This is somewhere electronic voting could help (they could display the candidates in random order). Even with paper based voting it could be minimised by having different candidate orders (not at the same polling booths for practicality during counting, but it could be done for different booths to average out the donkey).
Java is a VM which is quite a different approach. I haven't used Firemonkey (guess they have to call that FM these days) in any serious capacity (beyond some proof of concept work a few years back), but it is vector based and offloads to hardware acceleration so I don't see any big issue there. The IDE still supports platform specific functions (Win API being the most obvious), but you obviously can't target other platforms if you want to do that.
The problems this faces are no different to the problems you face writing any cross platform "application", be that Java or HTML5, c++ or whatever. UI conventions are different on different platforms. Do you attach your menus to the window or go for the OS X model? Do you have a single MDI window model or a bazillion independently draggable windows? Do you swipe to delete iOS style or touch and hold Android style? Where do you put your "back" button?
From what I understand, UK has laws that give you a choice between jail and handing over the password. All of these fancy measures of not carrying the private key or sending the key and data with different reporters doesn't get around this.
The reporters may well not understand security, or maybe the revealed password was just the decoy volume of a hidden truecrypt operating system (see http://www.truecrypt.org/docs/hidden-volume). The mule need not even have known about this; one or two believable files in the outer volume that would explain the need for its encryption.
... and this way they get to post about the day their office got trashed.
Mine's the one with the mobile phone that definitely doesn't have a micro SD card inside it where these files could have been hidden had they not wanted this trouble.
A far more useful and practical usage of this sort of technology would be to allow the device to recognise the specific digit you are using to touch whichever region of the screen. That would open up all sorts of UI "multi-touch" options, like touching with thumb means one thing but index finger another.