* Posts by Cynic_999

2855 publicly visible posts • joined 15 Aug 2013

FBI paid renegade developer $180k for backdoored AN0M chat app that brought down drug underworld

Cynic_999

Re: Trusting trust

It may surprise you to learn that it is not only criminals who have a need to use secure communication, and not breaking the law is no protection against being duped with a bogus "secure" application that purports to do just that but in fact does the exact opposite.

Cynic_999

Re: Trusting trust

An OTP just shifts the problem. You must first get a copy of the OTP (or bunch of OTPs) to the other person/people in a secure way prior to sending each message or group of messages. You then have no control over how securely the other person has stored that key. OTP is often cited as being the most secure form of encryption, but if the OTP is intercepted and copied during or after its delivery to the intended receiptient then the encrypted message is 100% compromised. A very big problem when the decryption OTP has to be given to many people in advance, and run the risk of having a copy stolen. Key interception is almost always a far greater risk than the probability that a modern electronic encryption algorithm can be "cracked" (at least in any reasonable length of time).

These were the very problems that PK encryption (e.g. PGP) was designed to overcome - and to this day it does so very well indeed. Every single communication using PGP, including the initial key exchanges may be intercepted with no loss of security whatsoever. What's more, nobody can use any exposed key to spoof a signed PGP message to pretend it came from someone else.

One advantage of using OTP however is that you can make a different bogus OTP that will turn the real message into something of the same length but with completely different content so that any encrypted message can, if demanded, be "decoded" to show something completely different.

No digital equivalent to the impulse aisle found as online grocery shoppers buy fewer sweet treats than in real life

Cynic_999

Of course there are digital equivalents to the supermarket impulse buys. They are just different items to those typically bought in-shop due to the lack of instant gratification when waiting for delivery is involved.

But while supermarkets can only offer a fixed selection of the same impulse-buy items to all customers, digital stores can tailor the selection offered to suit what's already in the customer's basket. Amazon for example brings up its selection of "Often purchased together with this item" and "Other customers also bought" - both of which I am quite sure result in a healthy number of impulse buys.

EE and Three mobe mast surveyors might 'upload some virus' to London Tube control centre, TfL told judge

Cynic_999

Absolutely the same is true in the UK. Also telephone and power companies must pay the owner to string cables over or under their land.

Cynic_999

Re: Open door policy?

But only on the third try.

Fastly 'fesses up to breaking the internet with an 'an undiscovered software bug' triggered by a customer

Cynic_999

Re: Fastly 'fesses up'

The whole infrastructure has reached a level of complexity where it is unreasonable to expect to anticipate and/or test every eventuality. The best we can hope for is for a swift reaction to and fix of unforeseen problems - which I believe was achieved here. Yes, of course all the things you mention are "a thing" - but they do not guarantee 100% reliability by any means. Things are of course a lot more obvious with hindsight.

Cynic_999

Nah. If that were the case I don't see any advantage in making up a story that amounts to a similar (or worse) amount of culpability, but which risks being exposed as a lie. Their explanation sounds perfectly plausible to me, and also nothing that I can fault as involving a large amount of inadequate planning, carelessness, recklessness or stupidity. They also responded promptly and corrected the issue within a perfectly reasonable time. Of course, hindsight always alows us to do things better.

FYI: Today's computer chips are so advanced, they are more 'mercurial' than precise – and here's the proof

Cynic_999

Re: Allow one to disable a core

But that assumes that an error in a particular core has been detected in the first place. Where errors would have serious consequences, I would say the best policy would be to have at least 2 different cores or CPUs running the same code in parallel, and checking that the results match. Using 3 cores/CPUs would be better and allow the errant device to be detected. Best for each to have their own RAM as well.

Stack Overflow acquired for $1.8bn by Prosus (no, me neither)

Cynic_999

Re: Hopefully they learnt from Freenode

The real money to be made here may be going to the people selling Stack Overflow who managed to persuade Prosus that it would be a good investment. Would be interesting to know whether those people and the board of directors of Prosus have any common elements.

Massive tech-for-British-schoolkids cash pot up for grabs as UK education buyers prep £140m agreement

Cynic_999

Cynic?

This will surely be as successful as our home-spun world-beating test & trace system. "Success" being based upon the actual goal rather than the stated goal. Which is to make loadsamoney for a few selected people with powerful friends (who will no doubt get their secret cut).

UK Special Forces soldiers' personal data was floating around WhatsApp in a leaked Army spreadsheet

Cynic_999

No, the most important details of the invasion were not known to many people until very close to the time - at which point the majority who knew were being held incommunicado until D-day. In addition, there was a lot of deliberate false information "leaked" so that should the real plans be leaked the enemy would hopefully not know what information to take seriously.

It's one thing to know that a large invasion will take place some time in the next 3 months, but quite another to know the exact time & place where it will happen.

Unfixable Apple M1 chip bug enables cross-process chatter, breaking OS security model

Cynic_999

Re: Easy to protect against

It would only take 2 or 3 instruction cycles to flip the bits. With a CPU running at 100's of MHz clock speeds, you could flip them at the rate of 10000 times per second with negligible performance degradation.

Cynic_999

Easy to protect against

All that is required is to install a separate background application that is always running and changes the relevant bits of that register reasonably often. This will alter the register in between the times the two communicating applications use it, so destroying their pseudo-clock and resulting in corrupt data. Such an application would be very small (just a few bytes of code), easy to write and have insignificant impact on system performance.

Facial recog firm Clearview hit with complaints in France, Austria, Italy, Greece and the UK

Cynic_999

Re: Copyright as well as data protection

The person who took the photograph generally has and retains copyright of that image unless they have explicitly given it away. However, many web sites require you to agree to T&Cs that revoke your copyright before you upload any image to the site.

Computer Misuse Act: Tell the Home Office infosec needs a public interest defence in law, says CyberUp campaign

Cynic_999

Re: Additionally

You could prove that a person had the requisite knowledge by proving that they were notified of the situation. This is no different to proving that (for example) a council had knowledge of a dangerous pothole or a building contractor had knowledge of damaged scaffolding etc.

Cynic_999

Re: Additionally

If it were a plausible notification, then I most certainly would check whether the notification were true, and remove the computer if it was.

Cynic_999

Additionally

While I am usually very much against new laws, I do believe there is a case to be made to make it illegal to knowingly allow an infected computer to have Internet access. So that if, for example, a person is informed that there is a computer on a network they control that is running "zombie" software or delivering a virus, they can be prosecuted if that computer is not shut down within a certain period of time after notification has been given.

USB-C levels up and powers up to deliver 240W in upgraded power delivery spec

Cynic_999

Re: Dissipation?

Except it doesn't need to carry anything close to 48 Amps. If both device and PSU signal that they are capable of operating at the higher power levels, they switch to a higher voltage in order to deliver the high power with a lower current. At 48 volts, 240 watts will require the cable & connector to pass 5A of current.

Cynic_999

Re: I predict excitement

No different to the complaints that a USB device is not connecting to a PC - because a charging cable that does not haver the data lines connected was used.

Tesla owners win legal fight after software update crippled older Model S batteries

Cynic_999

Re: Carbon neutral

Not true for a re-start after a short period of being shut down.

Cynic_999

Re: Carbon neutral

"

You do know that starting an engine is where the bulk of the wear occurs, right?

"

Only if the engine has been stopped long enough for significant oil to drain away from the lubricated surfaces. Starting after a short shut-down does not cause extra wear, and so the wear that is caused while running for (say) 5 minutes is more than the wear caused during the subsequent re-start.

Unless you are talking about a turbine (jet) engine, in which case every start incurs a significant mechanical penalty due to the heat cycle, no matter how brief the shut down.

Cynic_999

Re: Carbon neutral

Huh? We are talking about the case where the car is coasting downhill in neutral with the engine switched off. No part of the engine is turning in that situation.

Cynic_999

Re: Carbon neutral

Horses run on renewable bio-fuel, and are equipped with sophisticated sensors that constanly monitor the environment to allow its in-built inelligence to carry out collision avoidance, auto-braking, lane holding and it will reliably follow a familiar route with no driver input. Getting its highly inebriated owner safely home from the pub was a routine and commonplace occurance. It is also self-repairing and self-replicating.

Deciding to use a far less reliable form of transport was sheer folly.

Cynic_999

Re: Carbon neutral

"

Assuming you could get it, the insurance for keeping your car in your garage might be very expensive unless you've made significant mods to cope with hydrogen leakage from your car.

"

That's not too logical. Fuel spillage from a petrol car results in explosive vapour at ground level, where it can pool and build up even if the car is outdoors on a windless day. The same is true of a car powered by bottled gas (butane, propane etc).

Escaping hydrogen OTOH will rise very fast, where it will usually be able to escape & disperse PDQ even if the leak happened inside a garage. If there is no hydrogen escape route in your garage so hydrogen could possibly get trapped under the ceiling, the modification to provide one should be pretty trivial (a few vents in the roof).

Cynic_999

Re: Carbon neutral

"

In fact my latest car will even turn off the engine when coasting

"

Really? Presumably it does not have power steering or power brakes that rely on the engine running. My car will re-start the engine if it is auto-stopped and I allow it to run downhill even very slowly while leaving it in neutral (often happens in very slow moving traffic). If it did not, then the loss of power braking and steering could possibly contribute to an accident that might see the manufacturer getting sued.

Cynic_999

Re: Carbon neutral

In my car (which has an auto-engine stop feature), I have found that having the engine turned off for the duration I am typically stopped at lights or a junction is nowhere near long enough for the heater to cool appreciably or mist to build up on the windows. At a longer stop (e.g. railway barriers) if either were to become an issue, I could simply press the clutch to cause the engine to re-start.

Cynic_999

Re: Carbon neutral

My petrol car, like many made in the past few years, automatically cuts the engine as soon as it is stationary in neutral with the clutch not depressed. Pressing the clutch or if the car starts rolling (e.g. down hill) causes the engine to start instantly, and I've not found any significant downside to that feature when driving normally, though it can be disabled with a button-push if necessary (e.g. to keep the heater or aircon working while stationary for a prolonged time). The feature only becomes operational after the engine is up to temperature and the ambient temperature is not too cold, and the engine will also automatically re-start if you are stopped so long that the engine cools below a certain temperature.

Snowden was right, rules human rights court as it declares UK spy laws broke ECHR

Cynic_999

Solution

I don't believe that there is any way that anyone can prevent the state from conducting mass surveillance of normal communication networks. What we *can* all do is to make that surveillance useless by routinely employing encryption for all our communications - even the most mundane (in fact *especially* the most mundane).

Whenever possible use communications applications that employ end-to-end encryption, and encourage friends & family to do the same. Encourage 3rd party auditing of such applications to ensure they do what they state they do. Let's all push to get the popular email clients having an option to encrypt as standard.

If almost all communications are encrypted, then encryption will not be seen as a suspicious activity and mass interception will not be feasible. So long as the encryption is completely transparent to the end user, there will be no disincentive to using it - just like the use of SSL for accessing web sites has become normal and standard for the majority of web sites, not only those passing sensitive or personal information.

If there was a big enough demand for self-encrypting phones, the manufacturers would start including it as standard and offering firmware updates for existing mobile phones so that all calls to & from a compatible handset are automatically and transparently end-to-end encrypted.

Cynic_999

"

I suspect the clerks in MI5 have been replaced by an AI that looks for key words and phrases now

"

A lot more sophisticated than merely looking for key words and phrases. It's capable of correllating thousands of communications looking for connections and reactions. Reactions to statements and contrived events can be analysed in real time, allowing instant adjustments to the propaganda etc. to cause a desired outcome.

Cynic_999

Re: Always listening to our customers

Mooseman, nobody actually needs to read through it all, any more than anyone has to read through all the information available on the Internet to find out what they want to know. You program a computer to do the searching and filtering.

And while terrorists and criminals will often encrypt, obfuscate and/or disguise their communications, businessmen and politicians usually don't, allowing the interceptor to gather lucrative insider information about big companies, and all sorts of useful information that can be used to influence/blackmail politicians and political decisions.

Cynic_999

Re: Always listening to our customers

If you have access to masses of private communications & other data, and the means to run it through complex algorithms, there is also a huge temptation to search for things that will make you money or give you power rather than merely things that are a threat to the country. And if the whole process is secret, there is little risk of being caught doing so, and so the probability of it *not* being used for those things is practically zero.

Data is power. Power corrupts.

Man found dead inside model dinosaur after climbing in to retrieve phone

Cynic_999

My guess

My guess as to the cause is positional asphyxiation.

Oops, says Manchester City Council after thousands of number plates exposed in parking ticket spreadsheet

Cynic_999

As small GA aircraft do not have to file a flightplan or give any notice whatsoever as to their whereabouts, what you say cannot be true. While most light aircaft these days do carry a transponder, it is not mandatory to either fit or use a transponder unless the aircraft is flying IFR (instrument flight rules), and transponder codes are not unique to any aircraft anyway.

Cynic_999

It's likely that you will also have to give *your* ID so that should anything happen the police can find out who had been tracing the vehicle owner.

Cynic_999

Good idea! Then if you annoy me by driving too slow for my liking, I can trivially find where you live and chuck a brick through your window. I will also be able to follow a pretty girl to her car and find out where she lives. Same for finding out where a celebrity or ex lives by looking at their car reg on a social media photo ...

Yes, it will enable all sorts of useful things to be done a lot more easily ...

For the marketeer that has everything – except a CPU fan

Cynic_999

If it were run on a Pi, you really don't need many people who know the Pi. Just one or two people (either in-house or contracted) to customise the SD firmware, and if it borks, just swap out the Pi - no need for any technical knowledge other than the ability to check cables & connections.

Tor users, beware: 'Scheme flooding' technique may be used to deanonymize you

Cynic_999

The tor site makes it extremely clear that tor is not of itself sufficient to ensure anonymity. However you are completely incorrect to say that it is likely to get your real IP address banned - the destination site is highly unlikely to know what your IP address is. It might get an online *account* banned. It may well also get you flagged with law enforcement as a "person of interest" if your ISP monitors and logs all connections made via a tor entry node, though the more people who use tor at least occasionaly the less this will be the case. There was a time when anyone sending any encrypted data over the Internet would be flagged as a potential ne'er-do-well. But these days almost all web sites use SSL so encrypted traffic is the norm rather than the exception.

Cynic_999

Re: web links like "skype://" or "slack://"

But the protocol should be implemented in the browser (as ftp protocol is), not passed off to a completely different application. IMO this should include "mailto://" - either the browser should bring up a "not available" message or should implement an outgoing mail client in the browser itself (or browser add-on) rather than opening the OS default mail client.

India’s vaccination-booking API criticised for excluding millions, containing bugs, and overflowing with elitism

Cynic_999

Not as big a problem as it is made out to be

In my experience of visits to India, most Indians under the age of 20 or so will have at least part-time access to the Internet, be sufficiently tech-savvy to install and use a phone application, and understand English sufficiently to use the app. The people with severe problems will be the older generation - but those people are very used to asking a younger relative to assist with anything internet or computer related, and the youngsters are more than willing to help. The last time I visited a family in India I watched a 12 year old effortlessly set up chromecast for his grandparents and explain to them how to use it.

Incidentally, that particular modest rented house had unlimited 75Mbps Internet supplied via FTTP, which cost the equivalent of £80 per *year* and had been installed & running within 24 hours after it was requested. Greater than 100Mbps is only slightly more expensive. Wish I had the same service where I live in the UK! OTOH a huge proportion of Indians would not be able to afford anything like that much money.

Japan to start stamping out rubber stamps and tearing up faxes as new digital agency given Sept. 1 start date

Cynic_999

Just visit your bank and ask the teller.

Man paralyzed from neck down uses AI brain implants to write out text messages

Cynic_999

Why no delete?

Surely it would have been trivial to have trained the system to detect an additional unique symbol that is interpreted as a backspace or delete character?

Blessed are the cryptographers, labelling them criminal enablers is just foolish

Cynic_999

Re: [serious and organised crime]?

Organised crime refers to crimes committed by a group of people who cooperate with each other in order to perpetrate various crimes. Serious crime refers to crimes that are considered to be of a serious nature (Not sure of the exact definition, but ISTR is any crime that has a maximum sentence of 5 years or longer).

A group of people who organise the fly-tipping of building waste would be an organised criminal gang, but this would probably not be considered to be *serious* organised crime. A person who murders his next door neigbour over a fence dispute would have commited a serious crime but it would not be an *organised* crime.

Robberies and murders etc carried out by a group of people acting in a common interest would be considered serious organised crime.

HTH

Cynic_999

Re: Really ????

Even that statement would almost certainly be incorrect. I would expect serious organised criminals to use an encrypted Tor-based method.

Cynic_999

Banning encryption because it is possible to use it for criminal purposes makes as much sense as banning any other useful tool that could be used by a criminal. Knives, cars, bolt-cutters, hydraulic jacks etc. etc. are all used pretty regularly for criminal purposes.

The statement by the Aussies that WhatsApp, Telegram and Signal are mainly used by criminals is of course completely absurd, and can only be a deliberate lie designed to influence policy by fearmongering.

Cynic_999

The point is that they will likely not break into the car in the first place if it does not appear to contain anything worth taking. They will instead go for the car parked next to it, which contains a more expensive radio or has a lot of loose change visible in the cup holder.

If you want to prevent the bonnet ornament of your Mercedes being vandalised, park next to a Rolls Royce!

Preliminary report on Texas Tesla crash finds Autosteer was 'not available' along road where both passengers died

Cynic_999

Re: Best just make a full size scalextric

"

Just stop for a coffee and a loo break, and let the supercharger recharge your car while you're doing that.

"

Even if there was a battery that was capable of being recharged in a few minutes, just do the arithmetic to see how much power each charging point would have to supply while recharging. And multiply by the number of cars you would want to charge at the same time at any recharging site to see what sort of power each site would need to be supplied with. First I'll assume a car consumes 250Wh per mile (real-world values vary between 200Wh and 500Wh per mile). Next, assume the vehicle is recharged every 100 miles on a journey, and we want the recharge to take no longer than 15 minutes. All very conservative estimates (few people stop for 15 minutes every 100 miles on a long journey)

Total charge needed each 100 miles = 25kWh

Therefore power supply needed to charge in 15 minutes = 100kW

Assume each service station can accomodate 10 cars, then power needed to supply each service station will be 1000kW or 1MW, which is equivalent to a 4000 amp 250V domestic supply. And for many hours during a bank holiday weekend, it is likely that almost every motorway service station would have every charging bay used and so actually be taking the full 1MW of power. It would thus entail making a very significant upgrade to the national grid in order to supply every motorway service station with a 1MW supply.

And if you want to do more miles between charges, or charge in less than 15 minutes, the amount of power needed would increase proportionately.

The first and last days of a typical August bank holiday sees 16.5 million cars in the UK making an average 200 mile journey each. Total power used per car will be at least 50kWh, so total power needed in each of those days will be an *additional* 825 GWh. This is almost the same as the present daily Summertime electricity consumption of the UK, and so would need the national grid to be able to deliver twice as much electricity if all cars become electric.

Cynic_999

Re: Best just make a full size scalextric

An electric motor does not need variable gears, so not sure why you would want to equip an electric drive chain vehicle with a gearbox.

Cynic_999

Re: Best just make a full size scalextric

"BTW what happens if two driverless cars meet each other on a single track road?"

Probably a similar protocol will be used as in aircraft TCAS systems.

Cynic_999

Re: Ban it

Any increase in the amount of data collected and sent to others amounts to a worse invasion of privacy. I would argue that it is far less practical to avoid using a car than to avoid using a mobile phone (at least for selected periods of time where we do not want our location to be known), or to avoid sending private data to social media. Right now we can of course avoid using a car that collects such data and sends it to HQ, but it is likely that more and more cars will be doing so until we will soon not have such a choice.

Cynic_999

Re: Ban it

The storage of one system (infotainment) was destroyed, but not the storage of the log (in effect the car's "black box") In addition, apparently the autopilot would have been disabled and so could not have been engaged on that particular road (because it had no lane markings).