* Posts by Adam 1

2545 publicly visible posts • joined 7 May 2012

Electric cars to create new peak hour when they all need a charge

Adam 1

problem is real but pretty easily solvable

Yes, a lot of people will get home at 6pm and plug in their EVs for the night. Yes, if those chargers start pumping as much energy as possible into the EV battery packs during the evening peak, the distribution networks are going to be seriously tested.

But who said that all these future EVs need dumb charging? The chargers themselves could have a 3G connection that negotiated charging times and rates with the grid operator in exchange for a small discounted rate during those times. You could have a website where you could for a nominal fee reserve immediate charging time slots if there was a reason you needed a quick top up at volume 11. Better still, auction off those slots to the highest bidder and earmark all profits t from those auctions to distribution network improvements. Finally, incentivise EV owners to let the grid take back a certain number of KWhr over a particular portions of time for grid stability services. For example, let's use some numbers. Assume a 50KWhr battery pack. If you could be paid by the grid for giving back the top 5KWhr (so your available capacity was guaranteed to be at least 45KWhr). They could for example credit 10KWHr free electricity for those 5 you gave back when the grid was struggling.

'WHAT THE F*CK IS GOING ON?' Linus Torvalds explodes at Intel spinning Spectre fix as a security feature

Adam 1

time to take stock

I'm sorry but when a Torvalds rant comes across as a reasonable response to your baffoonary, it is probably time to take stock, admit there's a problem and start methodically working towards a sensible solution.

Mozilla edict: 'Web-accessible' features need 'secure contexts'

Adam 1

Re: HTTPS can still transport malware

HTTPS isn't magic but it does cut out whole classes of vulnerabilities that can cause malware to be transported to you.

Or another way, with HTTPS, the site has to be compromised or otherwise be untrustworthy (or a combination of compromised DNS and compromised CA has tricked the browser). With HTTP, you only need to connect via a rogue free WiFi access point in order to introduce malware not actually sent by the source website. And before anyone comments on some l337 haxor skills required for such pwnage, Google WiFi pineapple and then watch the YouTube instructions whilst awaiting your kit to be delivered.

F-35 'incomparable' to Harrier jump jet, top test pilot tells El Reg

Adam 1

Re: I think it was well known....

> about BAE experimental aircraft and projects that hadn't got off the ground?

Shirley it is only the ones that they got off the ground that are worth considering?

/Coat please

Causes of software development woes

Adam 1

Agile is fine

The problem is when someone thinks that it equates to "unplanned", or that changing requirements has no consequences.

When you boil it down, the claims it makes are hardly controversial. "Issues discovered early on in a process are cheaper to remedy than those found later", so tasks are supposed to be self contained a and be achievable in half a day. Sprints are equally a week or two so idea to usable feature is much shorter. If it is found to be a dumb feature, it is not likely to be intricately linked to hundreds of other features and therefore ridiculously expensive to change.

Analysis and design is really a Goldilocks artform. Too little, and the inevitable feature request comes in that requires an entirely new implementation even though in the customer's eyes, the request is simple. Too much, and projects get stuck in analysis paralysis, too scared to head down a direction because of unknown unknowns, or worse where the requirements change and developers become unwilling to throw away that code they have so much mentally invested in, even if a clean slate would be a better spot to start.

Of course, it is the unit tests and continuous integration that makes it possible to deeply refactor code without risking breakage, and these are often what companies won't invest in. It is always seen as an overhead, and the future efficiencies it creates are never credited to it.

Adam 1

Re: And that's why...

> That set of emails becomes part of the project documentation.

I would caution about using emails as project documentation. In 5 years time when some intended is being called a bug, the email from <insert old broom from customer who was frog marched out two years ago> to <insert old manager who jumped before they were pushed six months back> is not going to help you if those mailboxes are long dead.

I would suggest using something like confluence to capture the requirements. If you think that the customer (which could be an internal customer) is likely to try something on then by all means attach an email as pdf as a sign off to wave around later, but don't rely on outlook as a knowledge repository. Please.

Adam 1

Now try not to cry when you watch this.

You. Apple. Get in here and explain these iOS slowdowns and batteries – US, French govt reps

Adam 1

Re: Storm in a tea cup

There is no problem with the way the software responds to a failing battery. Slowing things down is certainly preferable to having a phone that reboots continuously. Noone is complaining about that. The complaints all stem from the fact that this throttling is done silently, making your 'old' phone feel slow, and without telling people of the relatively cheap resolution to the speed issues this causes them.

Adam 1

why do I get the feeling

that if cars were invented in the past 5 years, the engine would be completely encased with no way to change the oil.

Adam 1

Re: Bring back removable batteries

Why would a removable battery make it heavier? Larger, well maybe a mm thicker to allow for a clip, but that is really clutching at straws.

Adam 1

Re: Who's next then?

The issue is exactly the phones got an update to slow them down without consent, notification, or any way to opt out.

-TFTFY

Cisco can now sniff out malware inside encrypted traffic

Adam 1

Re: Hopefully vapourware?

You can do broad stroke heuristics. How many connections are attempted, where are they destined, how big is the payload, how long between connects, what ports are used, and the sorts of DNS queries these things make.

Up, up and a-weigh! Boeing flies cargo drone with 225kg payload

Adam 1

> No word on demo bird's range or speed

African or European spec?

Russia claims it repelled home-grown drone swarm in Syria

Adam 1

Re: This is what we need to worry about

If this threat is to teach us anything, clearly we must give encryption a backdoor.

/Logic brought to you by the numpties who run the show.

Smartphones' security enhancements just make them more dangerous

Adam 1

> Since your fingerprint (or face, or (presumably) DNA) is stored as a salted hash in the Secure Enclave of the phone

Disclaimer, it has been a few years since I last looked into facial recognition (wasn't quite up to snuff back then), but I work on systems with deep integration of fingerprint and vein scan as well as regular password authentication.

Hashed authentication for passwords/passcodes works because you can* store Hash(secret + salt) and later test whether Hash(guess + salt) == stored value without storing the secret itself. You don't need that secret, just statistical proof that it is neigh impossible for the guess to not be the actual secret**.

Biometric templates are different because you are not able to get an identical scan for verification. Even two photos taken on the same camera on a tripod in a studio seconds apart will have subtle differences. If you were to perform a substraction operation on the bitmaps, it would not be pure black. Because of this, templates are more like a series of measurements of angles and ratios of various features. It can be thought of as a template in the sense that you can't take those numbers and reconstruct the original scan/photo, but the verification logic needs to have those numbers to determine whether the candidate finger/face is "close enough" to the template. (This is why we can meaningfully talk about false accept rate and false reject rate for biometrics). My point is that you can encrypt the template but you cannot hash it.

*But please don't. Google scrypt or bcrypt and use one of them.

**Aka a collision

Woo-yay, Meltdown CPU fixes are here. Now, Spectre flaws will haunt tech industry for years

Adam 1

Re: Error?

@gnasher, 9 times out of 10 I reckon a 1ms sampling profiler points you at the guilty target but it does depend on the problem domain. One good gotcha if you're doing this on Windows is that by default your clock has a resolution of around 10-20ms unless you use the high resolution counters. This caught me out more recently than I care to admit. Each call to my method was in the order of 0.3ms, which almost always appeared as 0ms. Once I had profiled with the high perform counters, it became easy to recognise where the time was being spent, so I could prioritise both speeding up that method and seeing if there were opportunities to call it less frequently.

Adam 1

Re: My understanding on Android

Estimates vary, but our atoms all appear to be from 6-7 billion BC, so I believe we are all good.

Adam 1

Re: Error?

@macrorodent, correct and probably (almost certainly) what was meant, but it is a quote so they can't change it without chatting to Wagner again.

@julz, a lower resolution timer on its own won't mitigate, true, but in the case of Edge they are also adding jitter

Adam 1

> It's tall, sturdy and everything! It has no holes!" / "True, but I can dig a bit and pass right through under it, isn't it?"

Look, it's not a bug. Our fences are acting exactly as designed. And in any case, we believe that these exploits do not have the potential to corrupt, modify or delete data.

Based on the analysis to date, many types of fences are susceptible to these exploits.

We are committed to product and customer security and are working closely with many other fence manufacturers to develop an industry-wide approach to resolve this issue promptly and constructively. We are making this statement today because of the current inaccurate media reports.

We believe that our fences are the most secure in the world.

Amazon: Intel Meltdown patch will slow down your AWS EC2 server

Adam 1

Re: maybe it's time to re-consider server-side inefficiency

@BB, I think that I understand what you're saying. That you may be able to compensate for double digit performance losses by being a bit more careful with the design.

Believe me when I say that this is exactly the sort of tail chasing that software engineers the world over are trying to do to limit the side effects of these OS level (software based) workarounds. But there is only an incredibly small window of time for that analysis of optimisation opportunities and designing something to fit, get it tested and published for customers (who will want to do their own UAT before going live).

And understand that the typical RDBMS is in the ballpark for a 10%-20% performance hit. If your typical load was 75% capacity, what you would have called well planned capacity last week will suddenly be 90%+ utilisation and in the real danger zone. Remember also that it is an exponential problem. If your transaction takes 12% longer, the lock contention is statistically much more likely to hit another transaction (think the birthday paradox). Then once you start getting a tipping point of deadlocks, even the retries cause problems.

As much as I would like to think optimising gives an answer, for many it is going to be more $$ for bigger AWS or Azure plans or bringing forward capex.

Azure VMs borked following Meltdown patch, er, meltdown

Adam 1

Re: like mnany I suspect.

> if it doesn't run code from the outside and if you don't want the performance hit - then why patch?

In the case of Azure, you are not going to be running on bare metal. You are going to be on a VM guest, so the important question is whether your kernel's data can be read from collocated VMs belonging to other customers. I am personally unclear on whether patching the VM host is sufficient or whether both host and any guest need both be patched.

But yes, if you have a machine which is air gapped with a performance critical workload then you are one of the lucky few.

I am sure we won't be waiting too long for this to be exploited via JavaScript or a PDF/docx/xlsx file with some macro. That is going to suck big time.

Meltdown, Spectre: The password theft bugs at the heart of Intel CPUs

Adam 1

Re: Good stuff!

UPLOAD VIRUS

Big shock: $700 Internet-of-Things door lock not a success

Adam 1

Re: The perfect IoT device!

> If they loved her so much they'd have given her a real key.

Just going out on a limb here, but if they're all sharing a Christmas dinner, one of them could've just got up, and in the spirit goodwill to all mankind, opened the door when she knocked.

Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign

Adam 1

Re: Refunds and Compensation

One of the compilers that I use still has an option for Pentium safe floating point division. A lot of people didn't bother swapping them over I guess because OS and compiler vendors whacked together a quick work around and pulling out a CPU is beyond the technical knowledge of most.

Either way, I'm not looking forward to this patch. No customer is going to call support and say "hey there, because of Intel's screw up we're not getting adequate performance". It's going to be a bunch of your product is a bunch of ... Fix it yesterday.

Adam 1

Re: Novell got it right

Back 15ish years, I had a part time job helping to maintain a Novell network. Mostly clearing jammed print queues, changing backup tapes, keeping Windows and AV signatures up to date and sorting out the big boss with a new monitor every other week. Oh, and every morning resetting the clock on the Novell server that lost near enough to 10 minutes a day. And every time a user signed in their local PC time got synced to the wrong time. By the time I would get back into the office it could be out by 30+ minutes.

We got it fixed eventually. CMOS battery I hear you ask? No, nice try but guess again. Ah, your UPS? No, that was fine too. Come on, what's the obvious cause that you're missing? Oh of course, there must be a bug in the CDROM driver running on the wrong kernel ring and causing the ticks to be slightly slower than they should. Well spotted.

Adam 1

Not sure Apple would be too concerned. There are easier ways to get root.

EEk! Mobe network's customer services down for more than 24 hours

Adam 1

Re: Who cares

"thinking only of themselves" + "doesn't affect me" = humorous irony

But keep calm folks. At least s/he didn't mix up affect/effect.

Beyond code PEBCAK lies KMACYOYO, PENCIL and PAFO

Adam 1

Re: Moving Things On and Into Higher Levels/Greener Pastures/Darker Depths/Shadowy Systems

One could never be disappointed with any reality that is replaced with bacon. But a far as sharing merriness with our most masculine of commenting martians, I would only advise you factor in your local incarceration durations for possession of such substances.

Adam 1

Re: What the fuck means "F***"?

But definitely don't do that to your obnoxious colleague who has thoughtlessly left their computer unlocked.

Windows Store nixed Google Chrome 'app' hours after it went live

Adam 1

that's backwards

You seem to think it is Google's job to make iOS easier to use. There are plenty of tablets out there which can run chrome/Firefox/opera/Vivaldi/palemoon and would happily run Edge or Safari if the authors of those browsers elected to publish them. I too have some family who .... struggle .... with things technical, but even they learn very quickly after you show them the "internet button". Of all the .... limitations .... in Safari, for me, the icon is way down on the list. In fact, I will admit to liking that icon. If they need to see the Chrome icon, any of those tablets will suffice.

The rendering engine isn't some abstract concept. It is the biggest difference between ie6 and modern Chrome. Poor* rendering engines directly hurt your experience. They may be slow, use more memory, draw incorrectly (or fail to draw), and fail to protect you from threats by ignoring CSP rules. It directly influences whether you think your tablet is too old which costs you real money if you buy a new one.

*and add to that poorly maintained

Adam 1

@Stephen, whilst you are correct to say that the installer won't work on Windows S, I don't think that is really the point. I'm sure the brains at Google could figure out how to build the same code base for multiple platform targets if that was the only barrier.

The real barrier to choice is the requirement to be a wrapper around Edge. This isn't a technical constraint, but a commercial one. Do you want to associate your brand with the capabilities and performance or otherwise of the Edge rendering engine? Whilst it is an OK browser in my view (and certainly the best they have managed to produce to date), there already exists a perfectly acceptable Edge browser for those who want to experience that rendering engine. There is no need for a second one with a different logo.

They made a choice to wrapper Safari on iOS. I believe that was a mistake. They should have written a blog post on why they cannot produce a real Chrome browser on iOS due to Apple policies, express regret, and express hope that they may one day permit the world's best* browser to be enjoyed by those choosing the iOS platforms for tablet and phones. As it stands, they are second class citizens. Even though the same rendering engine is used, performance can never equal Safari because of differences in the threading models between the built in Safari browser and what apps can do. So your page will now render with the safari quirks, not implement a bunch of standards that all the others (including Edge) do, but do so even slower than the one that comes preinstalled. Where do I sign up? I'm guessing they did it to drive Chrome on MacOS. If there's a few more generations of ho hum same same notched fashion accessories and market share drops to the fanboys only, watch Google drop support for it.

*Yeah I know

Firefox 57's been quietly delaying tracking scripts

Adam 1

Re: I wouldn't know, I can't even install it.

> it *refused* to install because it was incompatible with my screen reader

I hope it's not rude to ask, but you visit the comments here a bit, and the question that I'm sure is on all of our lips is what does the screen reader software do when it encounters a post from amanfrommars?

Adam 1

Re: Oh, that's why

> What protection does Firefox give us against that?

It allows you to install uBlock origin/ghostery/noscript plugins.

Danger! High voltage: German customs bods burn half-tonne of weed in power station

Adam 1

Re: Give Us The Facts We Need

Or more usefully, how many Norris x Percentage of maximum velocity of a sheep in a vacuum is that?

Yes, your old iPhone is slowing down: iOS hits brakes on CPUs as batteries wear out

Adam 1

Re: So, instead of warning the user of the issue...

Yes, a notification that said that "due to your battery aging and no longer able to deliver the required voltage, we have slowed processing to avoid system shutdown. Please replace your battery to restore full system performance" would go a long way to avoiding such complaints.

Except I'm guessing that would cause warranty and other consumer protection laws to force them to give you a new battery if it goes into this mode too early after you purchase it. But screw you customer, that would cost us money.

Android trojan has miner so aggressive it can bork your battery

Adam 1

Re: can't blame the malware

> trying to squeeze every last cent of build cost out of the thing by using components that are ok for normal use, but are inadequate if the thing needs to run at full power for anything longer than short bursts.

This is an imminently sensible thing to do, and I don't think it is part of the problem. There is nothing wrong with a designing a device that is primarily going to display farcebook, some cat videos, the occasional game of flappy birds and maybe the occasional phone call. It isn't designed as a bitcoin miner and therefore doesn't provision the hardware (particularly with active cooling and dedicated hashing chips rather than general purpose CPUs) in such a way to allow it to run at full throttle doing that indefinitely. That doesn't matter. If presented with such a workload, it should power down some of its CPU or GPU cores and reduce the clock frequency when it detects the temperature rising too close to the threshold. If that still doesn't tame the temperature*, it should shut down to prevent damage.

My car may look like a car you can take on the track**, but it is engineered as an urban commuter vehicle. Yes, in can floor the fast pedal if the situation warrants it, but I'm under no illusion what would happen if handed over to a mildly competent racing driver to race on a closed track. After a few laps, the oil (engine or transmission) would hit a threshold temperature, some dash lights would come on, and the thing will go into limp mode until some service centre numpty tells me about voiding warranties. That is not a cost cutting tightarsery, but an engineering compromise. Sure, they could add 14 radiators but every bit you add increases build costs, has ongoing maintenance costs, decreases reliability and adds weight.

*Clearly means that inadequate passive cooling is available.

**Ok, it looks nothing like such a vehicle

Adam 1

can't blame the malware

> it can run a victim's Android mobe so hard they might suffer physical damage.

As bad as the malware no doubt is, if the components of a phone are capable of overwhelming the passive cooling ability of the battery, that is a failure of engineering of the mobile phone itself if it does not step down the performance to keep the heat in safe operational bands.

Google asks browser rival Vivaldi to post uninstall instructions

Adam 1

Re: Step one

> For all that google are great at remembering everything anyone has ever done they somehow keep forgetting the restricted privacy settings I enter

Upvoted. Partly because I appreciate the irony you point out, but if I'm honest, it is mainly because there's a part of me that hopes that whatever google analytics beacon is tracking my upvote and downvote patterns may hopefully get the hint.

Mozilla's creepy Mr Robot stunt in Firefox flops in touching tribute to TV show's 2nd season

Adam 1

Et tu 2 Moz?

Whilst the lyrical stylings of certain Irish tax dodgers may not be to everyone's taste, the payload was not executable code. I just don't get why they would do this. It isn't as if the browser experience couldn't otherwise be improved by fixing performance bottlenecks and fixing long-standing bugs. Seriously, sort out your priorities.

We need to talk about mathematical backdoors in encryption algorithms

Adam 1

Re: Slightly more complicated as far as AES is concerned

Weaknesses is too strong a word. Noone has (publicly admitted to) found an exploit, but the simplicity of theb fact that all the keys from all the rounds are derived from the single initial key is incredibly trivial and therefore can feel too good to be true.

As an aside, this is one of the more accessible ways to explain AES.

Engineer named Jason told to re-write the calendar

Adam 1

Re: JSON?

If he was really Hungarian, he would have been called personNorbert

Australian central bank says 'speculative mania' and crime fuel Bitcoin

Adam 1

Re: Mining new coins

Ok agree that the inevitable crash will be pretty spectacular. I don't think the cost of production rises because there are less left. It rises because there are more people mining. The rate of discovery is fixed across the whole network, so more miners means you have to invest a lot more to find them.

The real trick is to not pay for those computers and electricity. Think MitM JavaScript injection of miners, or even malware. Can your rig compete with a botnets of 100,000+ exploited "security" cameras?

But anonymity is not just a state thing. It is also corporations tracking every possible data point. Just imagine what "BI" that visa has on you? And how they use it to market to you? And how they could sell that information, either individually or in aggregate. I do not wish to be profiled by companies who profit from figuring out what marketing I may respond to. And that is leaving alone the whole can of worms about the degree to which governments in what we might think of as free countries apply the concept of warrants.

Adam 1

it isn't so black and white

Some of the analysis is spot on but others is, er, clouded by the remit that the RBA has to keep inflation in its target band. They do this by raising or lowering the cash rate (that banks can borrow overnight), which has a flow on effect on the retail rates that we pay for things like home loans. If inflation is too high, the cash rate goes up, banks use it as a cover* to raise retail rates by the same. Paying more on your mortgage means you have to not spend as much on other things. The converse is equally true.

They might have a hammer but it is a sledgehammer. Since the GFC and subsequent mining boom collapse, the economy has been in a bit of the doldrums, particularly in the mining states. They predictably responded by dropping the cash rate. Us mugs predictably responded by taking out ever increasing mortgages for the same housing stock because we see house prices doubling over the last half dozen years. This drives speculative investment (particularly those trying to get their money out of China buying units off the plan and then just leaving them empty, a strategy that has been paying 10%pa+.)

Governments of both sides have abrogated their responsibility here (although at least the current opposition is calling out the elephant for negative gearing and capital gains tax discounts that act as a perverse incentive to speculate on property, even if it is just political expediency). That leaves us with the RBA and their sledgehammer in the meantime. But forgive me for calling out the self interest of the RBA here. The concept of not being able to manipulate the cash rate and have an effect on the economy no doubt keeps them up at night. So they criticise cryptocurrency as some illegal activity enabler and suggest that honest folk should be rather using some product that hasn't even yet launched? Didn't really think that through did they?

But they also interchange the terms bitcoin and cryptocurrency. He should know better. Bitcoin is too slow for many use cases, wastes a tear jerking amount of electricity and can't scale enough to work as a replacement for other systems, but these are due to the design of the Bitcoin algorithm itself not due to cryptocurrency as a general concept.

*These days, most of the funding comes from international markets so whilst a 0.25% cash rate increase does raise costs for the bank, it isn't the whole 0.25% that it appears.

New battery boffinry could 'triple range' of electric vehicles

Adam 1

Re: How many battery "breakthroughs" is that this year?

> If you try even triple energy density of Li-Ion battery (0.875MJ/kg x 3) you're right next to gunpowder which has energy density of 3 MJ/kg. If you want increase it 5 times you're now in TNT territory (4.6 MJ/kg).

> Would you prefer car that can do half the range or the one that goes further but literally has 500Kg of TNT under your ass ?

I heard that there are some nut jobs out there that attempt to drive vehicles with 43.1MJ/Kg. Won't catch me near a diesel though. That must be, by the arguments above, 10x more dangerous than TNT.

Adam 1

Re: Still haven't graduated from lithium

Well given that their engineering and/or manufacturing processes struggle to make sure their small SUVs don't turn themselves into BBQs, I am kind of glad that this didn't pan out.

Adam 1

Re: Phone Batteries

> I wonder if this development can be used with phone batteries too?

No. Phone batteries are designed in such a way that any potential capacity improvement is converted into "let's put a smaller battery in so we can make it thinner".

Shingled out: 14TB helium-filled Toshiba drive floats to market

Adam 1

> it's a gas

You temperaturist.

VW's US environment boss gets seven years for Dieselgate scam

Adam 1

crazy world

Just the *additional* fatalities caused by the NOx emissions beyond their certified limit already exceeds on an annual basis the number of direct fatalities from the 911 attacks, yet the jailable offence here is telling a porkie pie and wire fraud. You could not make this stuff up.

Google to crack down on apps that snoop

Adam 1

Re: Opt out

We possibly have a disagreement about what correct behaviour is. If the app developer of a map application says it wants GPS, that is so the find me function works. If I configure **my** device to return nonsensical data, then I will expect the find me function to do weird things. If I give it real data, it will work as per the app developer's intention. If I reject the permission, it will probably crash. Not necessarily because they believe their application is pointless without it, but because most languages have really clunky handling of monads and it never occurred to the developer to check what happens if an exception is thrown or check the error code that got returned. In other cases, the app developer just can't be arsed to structure their code in a way that would minimise the required permissions. In other cases, the permission model itself is not fine grained enough (particularly around file and media access). The developer may want a very small subset of the permissions mentioned on the token, but you need to grant or reject the lot.