* Posts by Adam 1

2545 publicly visible posts • joined 7 May 2012

Google to crack down on apps that snoop

Adam 1

Re: Opt out

Android 6+ changed the permissions model from an all you can eat buffet to an ask on first use. Basically the same as iOS. That is definitely a good start. Could it be improved? Well a guess you could add a preemptive decline feature (seems to be what you're looking for). I can't see why they can't allow mock virtualized data points. App wants location? Why not let me choose an answer from Google maps to tell that app whenever it asks. App wants contacts? Let me pass it a fake address book. App wants access to file system. Let me pass it a virtualized version safe in their sandbox.

Tbh, the biggest failings with android permissions is the fact that so many phones are still sold with Android 5 and will never see an update.

Dirty COW redux: Linux devs patch botched patch for 2016 mess

Adam 1

Re: Huh?

> The BSDs don't use the Linux kernel and neither do the commerical UNIXes like macOS, AIX, Solaris and HP-UX.

Although it must be conceded that relying on a copy on write bug to get root on MacOS is a tad unnecessary.

Drone collisions with airliners may not be fatal, US study suggests

Adam 1

Re: Chicken cannon/ This:

> If he hadn't discovered gravity then the aircraft would just have floated gently back to earth

Speak for yourself. Down under, the prospect of such a failure means that your aircraft slowly drifts into deep space.

Expert gives Congress solution to vote machine cyber-security fears: Keep a paper backup

Adam 1

Re: Chain of evidence

> This less than a year after my vote in a local election tied one race

I note your local election and raise you a whole state senate election.

Apple iOS 11 security 'downgrade' decried as 'horror show'

Adam 1

Re: I don't get this article at all.

> There is no way to reset that password, because the backup is encrypted with that password

Highly unlikely (and pretty dumb security wise if true). The backup will be created with a randomly generated key. That key will be encrypted with your password. To change a password, it can retrieve the random key with your old password, then re-encrypt it with your new one. It only needs to overwrite a few KB to change a password.

Guilty: NSA bloke who took home exploits at the heart of Kaspersky antivirus slurp row

Adam 1

I have a real beef with pho. Absolutely delicious.

Adam 1

all this focus on pho...

Shirley the bigger concern is that their developers are able to get that off their secure network, apparently without detection. There's got to be some alarm bells there.

User dialled his PC into a permanent state of 'Brown Alert'

Adam 1

Re: Haunted messages...

> Apple Remote Desktop used to have a lovely "play sound" function, as well as the capability of turning the microphone on remotely

Pretty sure they just brought that feature back. Have you tried logging in as root and pressing the OK button twice?

Adam 1

Re: USB mice are fun...

> Wireless dongle on the back of the tower, wireless mouse on another desk in range

Plugging in the receiver to the port inside the case itself is much more fun. So I've heard. Mate of a mate.

What will drive our cars when the combustion engine dies?

Adam 1

Re: fossil fuel - we're addicted.

> For an average 50 litre fuel tank, that's about 400 kWh of stored energy

The vast amount of this stored energy is used to warn the air just behind the vehicle. Of the remaining, a rather substantial proportion is used to warm the brake pads. Only a very small fraction is actually able to be used for propulsion and running ancillary systems (A/C, radio, lights etc) which we would consider as "useful work".

Unless an EV needs to replicate such wastefulness, it doesn't need that sort of energy density. Frankly, a 1 minute fast charge is a pipe dream, but a 1 minute swap and go is not beyond our engineering capabilities today. Creating a non patent encumbered standard that is somewhat future proof and workable for all manufacturers. That's a much tougher nut to crack.

Ad-filtering fiend Eyeo: Morning has broken, like the first morning

Adam 1

Re: Simple rules

I have no problems with your rules, but there is something still missing. Advertisements, by design, are an attempt to distort your perceptions of a brand in order to manipulate the way that you will behave. There are a number of reasons that an advertiser may wish to do this.

Firstly, the obvious case of pointing out the inadequacies of your existence without their good or service reaching new markets.

Secondly, the case of pointing out how their competition is not able to solve your inadequacies brand awareness.

Thirdly, the case of burying bad press reminding the public that we value your privacy/the environment/customer safety/diversity/safe workplaces for women/whatever else we've done to be a headline. You should totally love us.

Even ads that pad all of your rules with flying colours are no doubt trying at least one of the above three things.

Pro tip: You can log into macOS High Sierra as root with no password

Adam 1

I knew there must have been a superfluous GOTO FAIL; in there.

Don't shame idiots about their idiotically weak passwords

Adam 1

Re: "Gameify" it

> You need another 47 points to unlock 12 character passwords *and* two new login images!

Cyber Monday special: Unlock 12 character passwords *and* two new login images for only $3.99

Offer may not be used in conjunction with any other offer. Individual images may differ from store to store. While stocks last. Any similarities with offers in EA games are purely coincidental.

Adam 1

Re: "If your password is brute-forceable, you shouldn't be using it."

> Any password can be brute forced given the time and effort required. This is a completely incorrect way of thinking

Only if you ignore the heat death of the universe. A 15 character random password made up of randomly chosen upper and lower case English characters, if brute forced at a leisurely 60 billion guesses per second will be brute forced in on average 14.5 billion years.

Adam 1

> So unless they get your password on day 89 of your 90 day rotation period, it doesn't actually offer that much protection.

I disagree. How many breaches have there been which surface literally years after the data had been compromised. Imgur the other day. Yahoo a few years back. And probably no less than half a dozen other publicly known breaches in the past few months that I can't be arsed googling for right now. How many have been stored inappropriately using unsalted hashes? Understanding your risk landscape is crucial. How many of your live passwords are sitting there on that not yet fully decommissioned server which hasn't been patched properly because it is running 2003 server or something. Or on that external HDD that the last IT guy cloned the server to during the last migration. Is that going to be diligently wiped? Or how many .bak files are sitting there on a misconfigured web server just waiting for shodan to index them.

None of that eliminates the need for IDS or monitoring those 3am logins from Eastern Europe, but the best security approach we know of is a layered approach. One of those layers is to limit the ttl for a password itself. Every month is pretty stupid, but twice a year gets the security/convenience trade-off to a more reasonable point.

Oh, and for the love of all things... Don't mandate special characters and numbers and the like. It's the size that counts. Not what you do with it.

.GIF garage Imgur plugs 1.7 million-subscriber creds breach

Adam 1

Unless it is published somewhere or someone tries to blackmail them, or a suspicious enumeration pattern is detected, then why is it such a surprise that the vendor wouldn't know? If whatever IDS they use (or don't as the car may be) didn't detect the leak, then you don't know what you don't know. In a good deal of cases, the breached data might be circling but no-one knows the origin site. By all means, rouse on them for losing data that should have been private, but that turnaround time is impressive.

'Treat infosec fails like plane crashes' – but hopefully with less death and twisted metal

Adam 1

Re: Economics of software security?

> "To the extent not prohibited by law". i.e those words are a waste of space as they have no legal standing at all but are just intended to persuade someone not to attempt to exercise their rights.

Disclaimer: IANAL

Whilst that may be a convenient side effect, I believe that this phrase is legally significant in its own right.

Where that clause or equivalent is missing and the wording of the disclaimer is illegal (ie. Denies protected rights, very common with warranty and fitness for purpose disclaimers), the whole clause can be struck out by a court if challenged. That can leave the company horribly exposed. This clause gives them an out in many cases because their defense is that because they explicitly exclude your lawful protections from the restriction* they cannot be accused of trying to usurp them.

*Which Jo Average often does not realise even exist.

Pro tip: when trying to claim under warrant and the retailer and/or manufacturer are not playing ball and a reasonable impartial person** would agree that you have a case, using the right key phrases as expressed in your consumer protection laws goes a long way to getting your issue resolved.

** That requires some humble pie and not your BFF on twitface.

Forget Sesame Street, scientists pretty much watched Big Bird evolve on Galápagos island

Adam 1

Re: I was taught...

> have you ever tried jamming a USB cable into a Firewire port?

No, but by my reckoning we should see a new species of cat5/USB anytime now.

Ads watchdog to BT: We say your itsy bitsy, teeny weeny Ts&Cs too small for screeny

Adam 1

it's also the guarantees

Our local express post service guarantees next day delivery with the usual asterisks talking about metro areas only. So what is the remedy if they fail to deliver? Why sir, you are entitled to a free replacement express post envelope to equal or lesser value.

It is also amazing what bits of your car are not considered by the manufacturer as covered if you need to claim on warranty. Furthermore, they don't have the balls to publish the number of years/kms that they claim is an acceptable life of a component. There is no way that you would buy a car from a manufacturer that publicly stated that their gearboxes were only good for 60,000K in a pre sales environment.

Adam 1

Nothing wrong with 'up to'.

No matter how hard you try, you won't find anything better than a 25% discount.

No matter what ungodly hour you wait up until and how close you are standing to our phone mast, we promise that your 4G connection will never give you a better speed than 50Mbps.

That's how I read such sentences anyway.

Adam 1

Re: I see what you did there

> Please don't encourage them, it will only get worse!

You pessimist. Do you believe if we threw it all away things can only get better?

SagePay's monster wobble... On the third day of sale week, UK retailers start to weep

Adam 1

And for the record, this is how a grown up service should apologise.

Arm Inside: Is Apple ready for the next big switch?

Adam 1

Apparently the other mob are going for better performance and less waiting around.

As Google clamps down, 'Droid developer warns 'breaking day' is coming

Adam 1

Re: So, No Other Google News Today, Then?

> It's like me farting in south wales and somebody detecting a whiff of that fart in scotland levels of sensitive.

Ah, so it was YOU!

More than half of GitHub is duplicate code, researchers find

Adam 1

padleft

If I one day hate myself enough to get back into JavaScript, I'd probably want a local copy of any NPM in case some function went missing...

Seriously though, I'd like to know a lot more about their methodology before getting my pants in a twist. I have seen dup checkers complain about nunit test cases being too similar. And yes, you probably could have extracted 2 lines of the arrange into a private method so the three test cases with those lines could share it, but then to describe those two trivial lines of code you would need to spend a month of Sundays trying to come up with a sensible name, and this is somewhat missing the point of refactoring.

OnePlus 5T is like the little sister you always feared was the favourite

Adam 1

Re: Fingerprint sensor on the rear

@MrBanana,

I find the old school switches/buttons and knobs far better than the same option through the touch screen. Whilst I *can* change radio stations or audio source via the touch screen, I only do that if safely stopped because a touch screen requires you to divert your eyes from the road and physical buttons do not. When I'm driving, I have a job to do and a responsibility to others to do that job competently. That requires full attention and correct body positioning to take evasive action if the need arises. Using a touch device, no matter how well it is otherwise designed, is incongruent with this responsibility. You (general you, not MrBanana specifically) are not so important that your right to fiddle with devices or check messages usurps someone else's right to safety. If you just must check that beep or send that message, then pull over and then knock yourself out.

DNS resolver 9.9.9.9 will check requests against IBM threat database

Adam 1

https://www.ebay.com/new-or-unused/bridges

Resolved: 104.83.251.239

Works perfectly.

Car tax evasion has soared since paper discs scrapped

Adam 1

> Abolish road tax and put it on fuel instead.

Not the smartest idea. It is both unsustainable and regressive. It is unsustainable because a significant percentage of vehicles in the next decade will be PHEVs or EVs. We can agree to disagree on the rate of growth of these categories, but price is coming down, choices are increasing, range is increasing and a shed load of money is going into R&D, so it will increase over time. That also drives the regressiveness. It is the wealthy who can afford such cars, so they are the ones getting the tax break. The poorer folk fighting to keep some old rust bucket alive are the ones who get hit with this tax worst (that is true even today) but because of the reduction in tax take, the rate gets increased to retain the total revenue.

We saw something similar here (down under) with our power grid and the growth of home air conditioning. Back 30+ years, it was somewhere near 1 in 4 houses that had it. Today, every new house/unit has it almost without exception. Every renovation adds it. The extra draw on the grid means that* the distribution gets expensive upgrades to cope with the <50 hours a year where all those units are simultaneously on. Furthermore, old, unreliable, and inefficient powerplants at retirement age get billions pumped into them to keep them on life support for another 5 years. It's hard to complain** if you are sitting their in your A/C, being part of the primary cause of the demand side of things that requires. It is quite another (perverse) thing when you are not wealthy enough for A/C yet your pet bill has doubled in the last decade (and then some). The wealthy will respond to this by buying solar panels and battery storage, meaning all that investment capital gets recouped by those who can't afford to go solar/battery. It's a death spiral. So back on point, by all means have a sales tax on inefficient vehicles in the first place, or incentives to buyback old inefficient vehicles, or per Km billing, but don't put it on the fuel itself.

* not the only reason, also some gold plating going on.

** actually, it doesn't seem that hard at all

Dick move: Navy flyboy flings firmament phallus for flabbergasted folk

Adam 1

Re: Dammit.

Well maybe it's ok by all you guys, but I, for one, find this a real dick move by the pilot.

Tesla launches electric truck it guarantees won't break for a million miles

Adam 1

Re: Sport truck! 0-60 in 5 seconds

> Ever heard of regenerative breaking?

No. I have only seen working ones, but it should still be under warranty.

Does UK high street banks' crappy crypto actually matter?

Adam 1

I'm actually with Scott on this. I thought (and still do think) he is wrong on uBlock/reporturi but HSTS is amongst the simplest steps you could implement because legacy browsers will just ignore it. Imagine you're a technical news website with a cloudflare cache frontend; your "changes" are to tick the box on the cloudflare control panel.

Banking websites are often necessary to check while travelling. If you connect to a free cafe/hotel WiFi and visit the http landing page they could easily deliver a fake version and use social engineering tricks to get you to submit over clear text. They might even be generous enough to include a padlock png with some fake browser chrome to make it look half legitimate. If the site used HSTS then they can't redirect it in the first place.

Inside Internet Archive: 10PB+ of storage in a church... oh, and a little fight to preserve truth

Adam 1

Re: distributed knowledge?

I'm happy to be downvoted but at least make a point about why my post is wrong or stupid or RTFA or something.

@phuzz, thanks for the link. It's good to see they are at least making the right noises. I think it's a bit generous to call it an "all you do" set of instructions. Most commentards here could do it but it is hardly folding@home or seti@home level accessible. There is a lot of focus on the great backup but potential distributed restore plans don't seem as developed. Bad actors are mentioned in passing but not strategies to figure out which is truth when for example a TLA pretends to be multiple actors and restores a different truth.

This would be an interesting application of blockchains or even with as a cryptocurrency. Imagine mining by proving that you have the hash of hundreds of random files from random places in the archive.

Adam 1

distributed knowledge?

A few months back we read about a whole bunch of early hp documents that were lost to a natural disasters (fire from memory). It strikes me as quite all eggs in one basket to have such important historical data in one location. How do they backup their data? I know many folk here have a few 10s of GB HDD space. It would be a really interesting project to ask people to donate a few GB storage and a small amount of download/upload bandwidth to truly securing that data. If sharded the right way, you could reasonably have confidence that all information is held in multiple regions, detect where backup nodes are MIA and replicate the at risk data to new nodes.

DJI bug bounty NDA is 'not signable', say irate infosec researchers

Adam 1

> That would be in breach of the NDNDAA

And we would share the NDNDAA but that would fall foul of the NDNDNDAAA. Again, I can't share the NDNDNDAAA specifics, but I can confirm that it talks a lot about turtles.

Drone maker DJI left its private SSL, firmware keys open to world+dog on GitHub FOR YEARS

Adam 1

Servercredentials.txt? Really!? You are just asking to be hacked. What you should do is to call the file something more obscure like app.config, except further obscure the details by encoding them in XML.

Something like this is all you need.

<configuration>

<connectionStrings>

<add name="ProdDB" connectionString="Server=MyServer; Database=Prod; User Id=sa; password= re@Lly5Af3" providerName="System.Data.SqlClient" />

</connectionStrings

</configuration>

Windows on ARM: It's nearly here (again)

Adam 1

Re: About as fast as an Atom

> However the Intel blog posts is essentially threatening the OEMs with a lawsuit if this is enabled

The difference here is that Microsoft definitely want this to happen. They want to compete with tablets and Chromebooks but RT lacks traction and Intel can't hit that day spot on price/speed/power.

Microsoft have a big enough stick to force them to negotiate a license with OEMs to use those instructions.

Thousand-dollar iPhone X's Face ID wrecked by '$150 3D-printed mask'

Adam 1

so what you're saying is ...

... that Guy Fawkes should stick to a passcode.

Shiver me timbers! 67cm Playmobil pirate ship sets sail for Caribbean

Adam 1

Re: Hopefully it won't sink...

Icy; what you did there.

Silverlight extinguished while Angular wins fans among developers

Adam 1

entranced??

> but they've been entranced by Android Studio, the Swift programming language, and Angular, a JavaScript framework.

I'm not sure entranced is the right verb. These things are (almost) unavoidable if you want to deliver to an Android or A☐Thing or if you need a responsive web UI just to make js nearly tolerable. It's kind of like saying that car makers are entranced with creating both LHD and RHD versions of their cars. It'd save them a fair whack of coin if they didn't, but they have to do it to sell in different markets for both regulation and customer preference reasons.

Adam 1

Q. How can you tell the difference between an introverted statistician and an extraverted one?

A. The extravert will be the one starting at the other's shoes.

Judge bins sueball lobbed at Malwarebytes by rival antivirus maker for torpedoing its tool

Adam 1

Re: Norton != Symantec

Just sayin'

Adam 1

> Some users have also reported that it is difficult to remove once installed.

Well if that is going to preclude an application from being considered a security suite, then ....

hang on, Norton just wants me to reboot, brb

Boffins: We can identify you by your typing, and we're gonna sell the tech to biz, govt – yay!

Adam 1

Re: Gliding away

I assume that the canine boss is referring to the option in google keyboard by that name. I think that Swype did it first.

Sent from my glide typing keyboard.

Evil pixels: Researcher demos data-theft over screen-share protocols

Adam 1

Re: Yes, you can leak data via the screen

Real haxors would send files down one byte at a time by toggling the caps lock, scroll lock and num lock modifiers

Adam 1

back in the day

Clipboard transfers are usually enabled even if file redirection is blocked. I remember using a tool once that base64'd the file and chunked it to the client using the clipboard, effectively doing the ctrl+c, ctrl+v for you, then reconstructing it to a file on the client.

Self-driving bus in crash just 2 hours after entering public service

Adam 1

Re: German Efficiency

> I guess that rules out "Open Source" for these things... dammit...

Ability to view the source code isn't the same thing as ability to flash a new version to a vehicle that you intend to use on a public space. You could regulate to demand that the source is available. That and:

(1) a mandated critical security bug bounty from the manufacturer; and

(2) full legal immunity for the researcher if responsibly disclosed to the regulator

Today security researchers have to use disassemblers (eg diesel gate) or otherwise MitM some radio transmission (eg Subaru keyfobs). They manage, somehow. (With some of the code I have had to look at, I glaze over with what the author was attempting to achieve, and that is with code.) But it would be better to remove that hurdle.

Parity calamity! Wallet code bug destroys $280m in Ethereum

Adam 1

That is not the same scenario because even though you point out (correctly) the lack of savings, you are also implicitly allowing for the fact that the average person continues to receive payment for their labour in that currency.

If Anthony rather asked what would happen if everyone spent what ethereum they got as they got it and accepted more of it every other week as compensation for their labour and/or goods they had to sell, I think we would all agree that it is functioning as any currency should. His picture was about what would happen if everyone tried to totally rid themselves of the currency at the same time. He then went on to imply that this is a reason it should be considered a fake currency. My simple argument is that all currencies fail at that test. A dollar bill or a euro note has almost no intrinsic value. Maybe you could use wads of it to insulate your ceiling or walls, but we don't accept payments in such currencies because of its ability to keep our houses warm.

No, we like to accumulate these because we believe that others will value it in the future and at that time we can get some desired good or service by offering some of this decorated paper or polymer. Part of the reason for that belief is, yes, regulations that seek to limit the rate that new decorated paper/polymer gets created. This means that it is less valuable for me to hoard decorative paper/polymer as its buying power decreases over time. This drives people with surplus decorative paper/polymer to invest it in enterprises that pay a dividend.

There are of course risks associated with crypto currencies. You can lose your whole portfolio to a hacker, software bug or hardware failure. It is vulnerable to regulators who may restrict it in certain markets (leading to a combination of fewer buyers and a glut of sellers cashing out). But it isn't vulnerable to the Robert Mugabe style hyperinflation either. Nor can it be manipulated by governments to suit their trade agendas. I'm not saying you should throw your lot on this or that crypto currency. It isn't a binary proposition (er, pun not intended).

Adam 1

> if everyone decided to sell their bitcoins or etherea, what would they be worth then?

If everyone decided to sell their USD or Euros, what would they be worth then?

Adam 1

Re: And that's why cryptocurrency is not and won't become a replacement for money

> Imagine this happening in a real bank with real money

You are absolutely correct. There is no way that a bank would stuff up big time and effectively vapourise some eye watering sum of money. And if they did, they'd hardly go cap in hand to Mr add Mrs Tax-Payer for a bailout I guess.

Pixel-style display woes on your shiny new X? Perfectly normal, says Apple

Adam 1

Re: 'image persistence' or 'burn-in'

> ...a foot operated button on the floor to dip the head lights.

> I actually thought that was a brilliant idea, and I'd love to see it "reinvented"...

Sadly we are going the other direction. My car goes all nanny state on you if your high beams are on and it thinks some street light in the distance could be another car.