"the best webmail tool around"
Damning with faint praise.
33111 publicly visible posts • joined 16 Jun 2014
Any good email client does this based on the Message-ID and In-Reply-To lines of the header. Email service providers are apt to break that.
One correspondent's emails have recently had the Message-IDs appear with a comment after them to say that it was added by BT Internet. This confuses the client which wasn't expecting it. Someone hasn't read the RFCs, assuming they didn't know they existed. The contents of the line should be ID and nothing else:
The "Message-ID:" field contains a single unique message identifier.
and although there seems to be some debate about this it's generally accepted that if the client hasn't provided a Message-ID it's a good idea to add one so they shouldn't need to draw attention to the fact that they have done:
The following changes to a message being processed MAY be applied when necessary by an originating SMTP server, or one used as the target of SMTP as an initial posting (message submission) protocol:
o Addition of a message-id field when none appears
Also the Hotmail/Live/Outlook/${Whatever Microsoft brands it as this week} will replace a client-provided Message-ID with their own. The above RFC continues:
The less information the server has about the client, the less likely these changes are to be correct and the more caution and conservatism should be applied when considering whether or not to perform fixes and how.
To be fair to Microsoft (a phrase for which I don't find frequent use) they are in something of a cleft stick here as they may find it difficult to trust the client to generate a unique ID but there's no way for the client to know what the server munged the original into. It certainly breaks threading. Perhaps the best solution would be for a client to BCC a copy to itself and use that, when received, in place of its own copy.
"Actually I think there were machines which would sort punchcards based on columns 72-80."
They would sort them into 10 bins depending on the content of a single column. Repeated runs, changing the column would get them back into order eventually. That's the word - eventually.
Oops. That should have been "emailer seems to send only the HTML".
That correspondent is a member of my local history group. I have an email address which is the end-point for our web site's Contact page and often forward the emails to the rest of the group. Recently I've had problems with members not being able to see the forwarded emails when they're ,eml attachments. Mail for Windows strikes again?
An email where the entire content was an image of text. What made this even worse is that it came from some branch of the Co-op with all its supposed ethical values. I replied to point out that this discriminated against those whose poor eyesight required them to use a text to speech screen reader.
""sorry, your email was blank, can you send it again?""
I suffer the reverse problem.
IME most emailers sending HTML send it multi-part with a plain text version. Seamonkey (and probably TBird as well) allows Original HTML, Simple HTML and Plain Text as view modes and this switches the part which is displayed annd, if relevant, sanitises the HTML. I have one correspondent whose emailer seems to send HTML and another who sometimes sends emails with images embedded in the HTML version instead of as attachments. In the firs case the message is blank and in the other the "attached" images are invisible when set to plain text.
"Humanity, as a whole, has a tendancy of not caring if it doesn't seem to matter. The only problem with that attitude, is that we often cannot see how it matters before it is too late, or at least much more expensive to correct."
It applies to more than rubbish. It's called "the tragedy of the commons".
Everyone looking after data needs to realise one thing: the entire worth of a business will reside in its data. If it's lost the business will be extremely lucky to get back on its feet again. If it's gone it's gone.
Anyone entrusted with the task - and that includes everyone from tape jockeys to CEOs making strategic decisions and beancounters controlling the budgets, businesses looking after their own data to businesses looking after other peoples' data - should be paranoid about it.
"now understand the backup you don't directly control and can test, and do test, is no backup at all."
Understand also that if it's not physically protected and maintained read-only until such time as it's been superseded by another backup it's also not a backup. That includes being kept read-only even while and after being restored. If it isn't read-only it's a copy but it isn't a backup.
A backup is a copy that's held off-line and transferred off-site or to some physically protected storage ASAP. It's there as a last resort to protect against as many possible failures as possible, If it remains online it's a copy but it isn't a backup. Once taken it should be write-protected so that even if connected to a compromised system it won't itself get compromised.
Let's take some of that apart:
"There are problems with criminal behaviour on the internet which are obvious to ordinary people even if the computer nerds deny that."
Yes indeed. The general public needs protection. That protection includes ensuring that they can use the interest securely.
"Law enforcement needs powers that ordinary folk don't have."
This is where it gets tricky. If such powers are created how can they be confined to the hands of the good guys? What the computer nerds know and you clearly don't is that they can't be so confined.
If you take a route of weakening encryption so the good guys have a back door that weaker encryption will sooner or later get cracked unless accident or corruption causes access to leak out first.
If you take the approach of encrypting the data strongly but send a copy with equally strong encryption but using a different key to a monitoring service that service will become a major target. There are numerous reports of wrongful access to the PNC. The only way this will be different is its greater value.
If you take the approach of an on device scanner you will have two problems. One will be false positives and the concomitant miscarriages of justice. The other will be a supply chain attack; a process with the access that would need would like a monitoring service, be a hugely valuable target.
Whatever option you choose you vastly increase the attack surface of every citizen's innocent and lawful use of the internet.
If you think a foolproof system exists - which seems to be HMG's view, then the computer nerds, from long experience, know what you should do to back that up: produce a proof of concept that will withstand proper scrutiny, the sort of scrutiny which will seek out its weak points and conceptual errors and produce a counter proof of concept to break it.
This idea has been flying about for years. Where's that proof of concept? Nobody's produced one. Maybe that should tell you something - that when the computer nerds deny it can be done, they're right.
And by the way, I've spent my years in the law enforcement trenches and the one thing I can tell you about this is that I don't want it because I know it will make matters worse, not better.
"anecdotally, there is a strong suggestion that this is due to the environment in the Home Office shaping the Home Secretary, rather than the other way around."
Sajid Javid's article in the Times after being appointed Home Sec. demonstrated this. He gave an account of being brain-washed so thoroughly he didn't realise what was happening to him.
I've said this before here and it looks as if I'll have to say it again:
If people are setting out to do something which breaks the law they are not put off by being given more laws to break.
No, I'm not on the side of criminals. Far from it. I spent a third of my working life investigating crime and terrorism. In this case they'll either encrypt stuff before sending it via a channel that's open to inspection or they'll use some illegal app. In the meantime the law-abiding will be stitched up with 2nd rate insecure apps for their web access.
Let's just remember a very important British principle: the presumption of innocence. Let's realise that the vast proportion of online use is for legitimate purposes and the users deserve secure services.
"The idea that anyone can use a computer to do / read / create just about anything is totally at odds with the politician's desire to control behaviour and conceal information."
I don't think they've reconciled themselves to the private car being able to take people anywhere yet. Anything as newfangled as a PC stands no chance.
Just about everyone online has something to hide. Something they're contractually required to hide.
Look at the Ts&Cs of online banking, online shopping, online everything else. You are obliged to keep you access credentials secure. How does that get done when you enter them via a device that has been made inherently insecure?
"Should have equipment on board them which signals to autonomous vehicles that they are to, not exactly shut down (because there is nothing worse than an ambulance being impeded by a stationary vehicle with no means to get past), but to behave in 'clearly defined and signalled ways' to enable the emergency vehicle to be aware of its presence and be certain of its safe navigation past it."
They do. They have flashing lights and sirens. If the AV doesn't respond properly the blame's on the AV, not the EV.
Experience says they can't. Cruise & the rest claim to have millions of miles of experience so far and yet they have the ability of an 18-year old who's had a few hours of instruction, passed a test and racked up maybe two or three hundred miles dirving experience. ITM that they don't have millions of miles of driving experience, they have a few miles a million times.
They might, of course counter that vehicles are developed in different ways to human drivers. Fair enough - develop them with the same rules as aircraft (not Boeing, obviously). When an accident occurs due to the operation of the vehicle suspend the entire fleet until the problem is identified, corrected and the correction tested.
My experience with a clean install was that I downloaded the install ISO image (the RC version a few weeks ago), dd'ed it onto a plain USB dirve (actually an SD card in a USB adapter) but none of your fancy mulit-boot stuff. It just booted with no faff.
It did complain about having no wifi drivers but found the SSID with no problems - the previous version did this too and so di Debian back in the days when it really didn't have the drivers and had to be connected by wire. Is this a bit of ritual hard coded in the Debian installer for old times sake?
What does annoy me is that for some reason it won't install to LVM2 logical volumes. Is memory playing me false in thinking it (collective "it" forDebian & Devuan) used ti? Or is it playing me false in overlooking something?
"Most other distros (including Debian) don't have that type of LTS releases."
According to https://www.debian.org/releases/ Debian 10 & 11 are both classed as old stable with 10 under LTS whilst 8 & 9 are under extended (commercially provided) LTS. You could have started using 8 when it still the testing release and still have it under extended LTS more than 10 years later.
You could try installing Linux directly in a dual boot setup.. Windows used to bully its way into taking over the entire drive IIRC and maybe still does so you may not realise that a Linux install can coexist if you have free space - you just have to install it after Windows. There may have to be some tidying up to be able to reduce your Windows partition but you should end up with an option to boot directly into either OS. I haven't tried it but I believe that the existing W10 can then be set up to run as a VM under Linux.
I think if I'd been in that one I'd have given the BCs a written warning including something on the lines of "I am warning you that not providing the backup is likely to result in loss of human life. When this happens I will personally attend any Coroner's Court and give evidence of this warning and will name you in that evidence."