171 posts • joined 12 Jul 2017
Wow, what a lovely early Christmas present for Australians: A crypto-busting super-snoop law passes just in time
Re: I promised I'd keep doing this...
I'm TELLING the autralian govrnment RIGHT NOW ....TO PISS OFF !!!
Gooo EFF THEMSELVES !!!
Arrest them, put them on trial, convict them and put these mofos IN JAIL FOR TREASON against the people of Australia !!!!! RISE UP AUSTRALIANS It's time to wake the hell up and TAKE BACK CONTROL
OF YOUR OWN COUNTRY !!!!!!!
"....Why all this whinging about Australian software? If they can get this designed, coded, tested, and up and running on all the multitude of different systems and have that all in place well before this Christmas, Australian software must be by far the best in the world. No other country could even begin to do anything so complex in that timescale...."
Done and Finished! You can NOW HAVE Quantum Computing resistant communications (Lattice/Invariate/One-time PAD) PLUS CAAST-256 x 3 (768 bits) that is BOTH peer-to-peer AND runs on top of AND outside of Facebook, Google/Gmail, Hotmail, Outlook, Skype and any web browser app to encrypt your communications.
Nothing ANYONE can do about it as it is ALL Open Source and Completely FREE --- Only GNU GPL3 copyrights are imposed.
Re: Just watch...
Anybody in Australia want my encryption software? It works ON TOP OF and OUTSIDE of Facebook, Hotmail, Yahoo, Gmail, Outlook and any other major email instant messaging system that uses a browser or JAVA. With Lattice, One-time-pad and Invariate quantum computing resistant encryption algorithms built-in, and IN ADDITION we have CAAST-256 x 3 = 768 bits. Completely open source under GNU3 Open Source licence and compiled for multiple platforms.
AND FULLY PEER-to-PEER encrypted communications if you need it!
NO SUPPORT LIBRARIES ARE NEEDED - It's FULLY SELF-ENCLOSED CODE
with all functions and functionality completely self-written!
Very easy-to-read code for easy modification, VALIDATION AND VERIFICATION!
They ain't getting ANYTHING!
I'll put it up this next week in various places!
Funnily enough, China fuming, senator cheering after Huawei CFO cuffed by Canadian cops at Uncle Sam's request
Re: Export Control
"....If your company sells any (proscribed) tech, that has passed through American hands at any point in its development, to a customer with links to a country on us.gov's "Banned!" list, then you are going to get a can of Uncle Sam's Legal Whoop-Ass opened up for you...."
I get that too, soooo as a Canadian, I write software and design all sorts of hardware that USES NO U.S. Components at all !!!! While that has more to do with me being Anal Retentive in wanting to do ALL the writing, designing and building MYSELF for personal satisfaction and quality control reasons, I also do that so as to AVOID ANY ISSUE of Non-Canadian sourced components and software.
So I can make my own satellites, spaceplanes, autonomous robots, A.I software, encryption software and open source it FOR EVERYONE, EVERYWHERE .... and there is NOT A DAMN THING THE USA can do about it since It was "ME!" who was the one who ENTIRELY built and designed it, right down to machining my own nuts and bolts on my custom self-built CNC/3D printers and even making custom resistors, capacitors, power supplies, DSP's/CPU's/GPU's fully MADE IN CANADA FROM CANADIAN MATERIALS AND EQUIPMENT ... Even the assemblers, compilers and OS'es and Design Software are made in Canada! I know that's more than just a bit crazy...but that's just my Squeezed Sphincters talking because I HAPPEN TO LIKE doing things all by myself with ALMOST NO HELP from anyone else!
Not many people have that sort of time, talent and resources available to do that, BUT since I do...well...I DO THAT! MOSTLY FOR FUN TOO !!!
Technically, if they sold products FROM THE USA, containing components MADE or COMMISSIONED WITHIN the USA to a restricted party in Iran! Sooooo, on a technical/legal basis the company DID in fact break US law! The KEY ISSUE is she SHE the CFO know about it and INTENTIONALLY SIGNED OFF on those transactions! If she did, then she get 20 years per count!
If she PERSONALLY had no knowledge of the transactions committed by underlings (who may have acted on their own!), then she merely gets a big fine and loses any position held within the US operations.
Re: @Spazturtle - You're trying to tell us
"....the CFO of a US company is liable for breaking Chinese laws and he should be arrested no matter where outside Chinese territory ? Is this what you want to imply ? I'm afraid in this case high ranking executives from Google, Facebook and others should be very afraid when going outside US territory...."
Actually that IS VERY TRUE!!! If a U.S. Company such as Google has it's Chinese operations commit an equivalent Felony in China, then GOOGLE's US executive personnel ARE ABLE TO BE ARRESTED and extradited to China to face Chinese Law for crimes committed IN China! Executive are responsible for the behaviour of their employees and those executives have a FIDUCIARY DUTY to keep and abide by the laws of the countries they operate in!
Ergo, YES I do see Google, GM and OTHER American company executives VERY SOON NOW being ARRESTED and detained/imprisoned for VERY LONG PERIODS of time IN CHINA for "Crimes" allegedly committed on Chinese soil and/or territories!
"....Senior Americans have called for entire nations to be killed. Phrases like 'bomb them back to the stone age' and 'turn their deserts to glass' have upon occasion been bandied around. But perhaps none of that actually matters, since for the most part you can see those selfsame senior Americans in church on a Sunday praising the Prince of Peace and turning the other cheek just as their pastor reminds them to do. Well, except for those pastors who don't...."
Well,,,maybe it's time to give them a taste of their own medicine....if they THREATEN to kill others...then it's time to TAKE THEM SERIOUSLY and threaten them back and when appropriate, if "THEY" are a true danger to others, take them out for real !!! NEVER underestimate a threat! Hit back harder and ALWAYS TAKE THEM OUT before they take YOU out!
".....Ah BOB Stargate, why do you even have separate accounts if you're going to be so easily recognised? ...."
Because I am NOT Bombastic Bob! I am StargateSG7, a user based in Vancouver, Canada. Bombastic Bob, I think is based in Southeast England. We for SOME REASON have the same writing style using that OPPOSING caps style. I also think we probably came from the same pressure-cooker background of 1980'era MiniComputer/Mainframe computing and Large Data Systems management which probably EXPLAINS WHY we are so hyperactive and well.....BOMBASTIC....!!!!
I do machine vision systems and video processing research for various entities of which I have a stake in. Bombastic Bob I believe is a SysOps/DevOps person.
I AM NOT BOMBASTIC BOB !!!! Ya Got The Wrong Guy!
Now back to the main subject at hand!
QAM bandwidth is governed by the number of symbols which are in fact a series of radio waves of a specific amplitude and phase that are SUPPOSED to appear in a Specific Quadrant when those signals are displayed on a Vectorscope (which is a type of Oscilloscope -- i.e. do note the word Quadrature!).
When you divide up a vectorscope into quadrants and place TARGET-points within those qradrants, ANY incoming signal of a specific frequency that has it's amplitude HITTING those target points is considered a signal that signifies the digital signal symbol that represents that target point (i.e. example the binary digit 15 or 1111 in bitwise notation for any RF signal that say....hits the quadrature target at XY-Point X:200, Y:-200 +/- 0.2% of graph size)
Signals that DO NOT hit those target points on the scope are rejected as NOT being part of any symbol set.
Now the problem is that RF signals have multipathing and reflect, diffract, refract and otherwise mis-time themselves. If only one or two waveforms do that, then we can easily have circuitry that REJECTS those signals as NOT being part of a QAM modulation schema.
BUT if MORE THAN ONE set of waveforms has the same general amount of multipath and distortion behaviour, then the circuits MUST ASSUME that it is the SIGNAL ENVIRONMENT itself that is causing the problems and thus attempt to recover those distorted signals by creating a PLUS/MINUS DIFFERENCE-based error correction scheme that ACCOUNTS for those distortions.
So the circuits look for IDEAL SIGNAL ECC/Correction-specific RF Frames or Packets every few seconds or even microseconds that are of a format that are considered IDEAL signals. When the RECEIVED IDEAL signals are compared against the internal-to-phone's or wireless router's IDEAL SIGNAL reference waveform, then we can figure out how much time and phase distortion is occurring and then apply THAT distortion difference calculation to ALL OTHER incoming signals so we can determine if the incoming digital RF signals hit the QAM signal quadrature placement points which indicates they are a VALID QAM symbol!
Today, it's usually QAM-64 (16 points per quadrature) or QAM-256 (64 points per quadrature) that represents up to 64 symbols or 256 symbols per modulation set. NOW as of 2018 QAM-1024 and QAM-4096 are coming out within specialty systems (usually video and mobile voice phone oriented) because a few "dropped" symbols doesn't mean all that much to understanding a voice of video stream. You would hear static or see macro-blocks. That is NOT too big of a deal for the average user/consumer!
BUT with DIGITAL DATA where every bit counts, we still use OLDER QAM because we can more reliably recover digital data from an RF signal. However, the data rate is much LOWER!
Soooooo, with much more precise clocks, we can BETTER place the QAM symbols with the QAM quadratures so they can be recovered more effectively within even a heavily distorted, time-delayed and out-of-phase RF signals environment.
The MORE IDEAL reference signals are sent closer together, the more accurately I can MEASURE time and phase distortions to BETTER recover actual digital data! Ergo, i get MUCH HIGHER bandwidth into the Terabits-per-Second range!
And with QAM-128-Kilo or QAM-ONE-Mega we can have 128 Thousand or One Million symbols per RF digital modulation signal set which means ENORMOUS full-duplex download AND upload bandwidth per user!
which equals Tottenham Football Match Watch-on-the-London-Tube Heaven! (or here in Canada, it means I can watch the Vancouver Canucks hockey team PROBABLY actually make it to the playoffs AND maybe even WIN the Stanley Cup in the 2019 playoffs all the WHILE watching from my tablet whilst seated lazily on my boat anchored in English Bay listening to the Seagulls float by and having two pints at a time!)
Is THAT not a good enough reason to get QAM-ONE-Mega up and running sooner rather than later?
You actually hinted at HOW the actual gain over current atmospheric and multi-path distortions will occur, because by adding in EXTRA signal "ECC frames/packets" that are used as REFERENCES, they could be compared to an saved-internal-to-phone IDEAL ECC frame/packst signal and those HIGHLY accurate time and phase difference between the IDEAL reference signal and the one stored in the phone could tell you how much general distortion and multi-path is taking place within your current signal environment.
That ALLOWS you to figure out how much the QAM "place-points" are distorted from what should be ideal locations. You're STILL going to get an ENORMOUS bandwidth increase because the distortions are compensated for. An RF researcher in the 1970's from Simon Fraser University in Canada PIONEERED the use of PRE-DISTORTION to figure out how irregular signals were actually distorted from an ideal signal and how such signals could be compensated-for at the reception side.
ALL modern mobile devices use his pioneering 1970's era research AND with a better, more accurate clock your digital signal pre-distortion and UNdistortion system is able to more effectively figure out HOW to compensate for time and phase distortions allowing QAM symbols to be spaced closer together and allowing MORE symbols within the QAM schema which give you much greater bandwidth.
AND YES I ran it through with one of our RF engineers and he sat me down to tell me this is "Old News" and that QAM symbology recognition techniques in current development WILL allow for OVER one million symbols per RF digital modulation set with higher resolution clocks. And it seems MUCH RESEARCH has ALREADY been done in this area on using more accurate clocks, which is WHY Wifi 802.99x and 6G will be on the order of TERABITS per second bandwidths!
AND.....in case anyone is wondering what USE this type of technology has for the real world, I can tell that IF these time pieces were put in for GPS (Global Positioning Sytem aka Galileo, GLONASS, Beidou, etc), then our positioning accuracy would go from the current unaugmented 30 metres (96 feet) or 10 metres augmented (30 feet) downto SUB-MILLIMETRE-scale accuracy. That make GPS-based self-driving automobiles, lorries (Semi-Trucks), planes, ships, delivery drones a lot more viable!
The data bandwidth of mobile phones could be increased a hundred-fold by using a super-precise TIME-AND-PHASE-based QAM (Quadrature Amplitude Modulation) so that instead of the current maximum of 64 to 4096 symbols represented per signal-set within the QAM-64 to QAM-4096 communications digital modulation schema, we could have QAM-192K or even QAM-ONE-MEG because we can MORE PRECISELY delineate where a QAM-symbol boundary starts and stops within the QAM digital modulation scheme.
If we were able to move even to a 128K QAM, actual mobile phone data downloads AND uploads would be TRULY symmetrical at about 682 Megabits per second with ECC (Error Correction) and with One-Mega-QAM, we could get 5.4 Gigabits per second upload AND download Full Duplex PER USER!
Sooooooo......from a COMMERCIAL point-of-view, PRECISE clocks make a BIG DIFFERENCE in GPS accuracy AND wireless data bandwidth !!!!!
The Australian legislature are IDIOTS PERIOD !!! I could just BLOW THROUGH THIS BLOCKAGE in three seconds with encrypted peer-to-peer and DISTRIBUTED search engines(of my design of course!)
I can actually REPLACE Google and create a non-single-location search engine that can index EVERY site in the world without restrictions on search results! AND NO government could stop the technology since I can even do it wirelessly at the mobile phone BASEBAND level of communications without ANY filtering from the main Operating System using distributed mesh-based communications!
Re: A variation of the early computer model then...
".....We needed more than analog modem speeds because our content consumption got richer - from text to GIF to MP3 to video, but now that we've got HD/4K video there's no richer sensory input remaining to create demand for the next big jump in connection speed....."
I beg to differ on those case points. For a Proper Meet-Human-Resolution-Limits media experience, we need 16k Video (16384 by 8640 pixels) at 1000 frames per second at 16-bits per channel RGBA pixel depths which means at RAW UNCOMPRESSED data rates, that would be 1 132 462 080 bytes per frame or about 67 947 724 800 000 bytes per second (67.947 Terabytes Per Second or 543.567 Terabits per second) of data bandwidth! At modern interframe video compression ratios of 25:1, we are STILL looking at around 22 Terabits per second which can be done using Dense Wave Multiplexing over glass fibre technologies!
Ergo, we STILL have a ways to go until we hit maximum human physical limits for resolution and required bandwidth to match! So there is ALWAYS ROOM to expand bandwidth at prices to match until PetaBYTES per Second Quantum Entanglement communications becomes common place and outsize 128k by 68k video at 10000 fps real-as-real-can-be imagery becomes common for broadcasting!
Re: Well it seems that fiber optics companies are going to make a killing in offshore revenue
"....so they will be able to upgrade their networks so everyone in the country can access super fast 20Mb interwebs, ...."
20 Megabits per second? WOW !!! That is SLOOOOWWWWW.....My home connection is already 300 megabits per second with Telus (Vancouver, Canada) and the work connections have had 10-Gigabit Direct to Telco Ethernet for a while now at a reasonable price rather than the incredibly expensive leased OT-768 lines of old. We're actually looking at Terabit Ethernet-over-Fibre and it's STILL RELATIVELY CHEAP! If you live in Downtown Vancouver in one of the highrise Apartments, you've had Gigabit Ethernet for more than TEN YEARS NOW!
I feel sorry for the USA with their super-slow internet! My only telecom gripe with Telus is that we only get 10 Gigabytes a month data plans at 22 megabits download on our mobile phones and even THAT costs $80 Canadian per month (about 55 Euros).
Re: "nice prosumer Canon camera."
".....Which happens to be an EOS, not a IOS - AFAIK Apple didn't buy Canon yet.... anyway, they didn't look to spend much on cameras despite the millions stolen <G>...."
Actually, the INTERNAL APPLE rumour mill has the Apple Board and CEO Tim Cook looking at BUYING BOTH Canon (for their MASSIVE chip-making and optics patent portfolio) and TI (Texas Instruments) for their massive ARM CHIP production capacity and DSP (Digital Signal Processor) patent portfolio.
From my VERY GOOD SECRET SOURCES, Apple's offer for Canon MAY be on the order of nearly $60 Billion US and TI shareholders will be offered $25 Billion which are pretty hefty stock premiums....BUT.... I personally think because of BOTH companies' patent portfolios AND their internal chip-making capacities, this would make sense for Apple to do. Apple can afford to buy BOTH companies AND still have tons of cash left over.
I do know from some of the HIGHEST LEVEL SOURCES, that Apple is AGGRESSIVELY buying out entire patent portfolios for CPU, GPU and IMAGE SENSOR chip-making patents, quantum dot and chip-LED displays, 5G and newly-extended 6G wireless technologies, Sapphire-on-Polycarbonate screen coverings and A.I. systems software.
Don't be surprised to see Canon and/or Texas Instruments in Apple's hands by the of next year or by 2020!
Canon and TI are GREAT targets to go after!
If Australians want Encrypted Text Chat, Encrypted Videophone, Encrypted Email and Encrypted File Transfer then I already have a solution and WILL GIVE IT AWAY UTTERLY FOR FREE for you to download workable on ANY Tablet, Smartphone and Desktop that has HTML-5 enabled browser OR a Java-enabled scripting system. I use Shor's Algorithm Resistant encryption (i.e. Lattice-based anti-quantum computing encryption) AND TRIPLE AES-256 (768 bits) so you can keep your data files, media and personal communications completely ENCRYPTED using either or both PEER-to-PEER and Client/Server connections! We are in final product testing mode, so within 45 days you can keep your privacy intact from prying eyes. (aka The Five Eyes aka Echelon System).
We were going to introduce this technology anyways at the 45 day time window, but this announcement from Australia simply ticked us off to no end, so we added some further teaks to INCREASE privacy AND it works as a second invisible layer ON TOP of you using your normal Web-based email and messaging systems (Outlook, GMail, Skype, Hotmail, Yahoo, Facebook, etc) so EVEN IF the idiots have server and network-based tools and court orders to access data at the service provider, your data and communications are STILL ENCRYPTED at the local machine and peer level BYPASSING EVERYTHING they do at the back end! And me doing OPEN SOURCE FREE software means they can do dip diddley all!
The Australian guy is A TECHNOLOGICAL KNOW-NOTHING AND A SIMPLE IDIOT ....AND...I just bypassed his ENTIRE LEGISLATIVE BILL by me being CANADIAN and making ENCRYPTED COMMUNICATIONS SOFTWARE available for you Australians (And anyone else for that matter!) that can be downloaded for UTTERLY FREE !!!
TalkTalk hackhack duoduo thrownthrown in the coolercooler: 'Talented' pair sentenced for ransacking ISP
Re: "individuals of extraordinary talent."
"......"script kiddie" is, using things written by others like any miscreant would, in essence having NO real knowledge of computers, or networks, or security, but having those "toolz" so he can look like a 1337 h4x0r to his script-kiddie buddies and online "friends"....."
TRUE...A Real Hacker knows how to bypass the OS and go right to the modifying the BIOS of the Drive Controller firmware, can inject a cutom JMP/RET/RETN/RETF assembler instruction set into the memory allocation handler, the USB Stick's onboard micro-OS, the BASEBAND OS of the cell phone communications chip (Modem), the graphics card BIOS/firmware and the network card BIOS so we can slurp IP address and DNS requests at the firmware level and BEFORE the AES-256 packet encryption, slurp and save the data into pre-reserved sectors of storage media and into unused portions of IP4/IP6 packet headers and Ethernet/ATM/SONET Frames. We can screenshot the desktop and/or use IRQ's to record the keyboard scan-codes and touchscreen and/or mouse coordinates to get a direct recording of what you did during your online or offline session!
OH YEAH! A .....REAL....HACKER......would put in a pressurized tap into a gas-enveloped fibre optic cables and put in a pure optical switch to slurp and inject NEW photon pulses at just the right frequencies at the right times for ALL channels so the spooks CANNOT use reflectivity/reflectometry to figure out where line delays occur in their fibre optic lines!
KABOOM !!!! A real hacker can secretly put in a micro thermal emissions and surface wave acoustic sensor ONTO the CPU/GPU chip itself so I can directly record what memory cells, circuit paths and pins are being activated at ANY given time and record them as a virtualized/emulated CPU/GPU instruction set which I can playback and slow down to my heart's delight on a hardware emulator!
AAAAAAAHHHHH !!!! A REAL HACKER takes your fingerprints from an acoustic scan of your ENTIRE finger prints along with thermal, pressure and olfactory data so I can make a 3D printed silicon glove version of your hand that will have the right temperature, pressure gradients, proper sweat chemicals and proper physical texture to fool even the NEWEST smartphones and high-security-banking fingerprint scanning systems. That 10 Million Euro SWIFT bank transfer is NOW MINE !!!!
HOT DAMN!!! AM I EVER GOOD !!!!!! I know this scheisse INSIDE and Out from the EARLIEST days of global networking! How many people even KNOW what Interrupt 0x13 and 0x21 are? I DO !!! DO YOU?
Good thing I don't have to worry about VPN's since I can appear to be from ANY country I want since our company has Carrier Class Routing and Edge-Server capabilities AND I can use the 10 megabit satellite connection ANYWHERE in the world with the Satcom modem on my laptop. This means I can be in Egypt but look like I'm in New Zealand!
Thank You to my filthy rich, utterly techo-tastic "employer" who has either IN-HOUSE DESIGNED/BUILT or BOUGHT every major computing system and communications gadget known to human kind!
P.S. Sorry for blittering your $35,000 lens into the Blarney Stone...I promise I will TRY to not wreck the next lens until at least 2020!
Trump in Spaaaaaaace: Washington DC battles over who gets to decide the rules of trillion-dollar new industry
Re: Is it the battle of the bots?
OMG !!! You and the AmFm guy are two peas in a pod!
There are NO ET shenanigans! They are mostly utterly indifferent to us and those that have ANY interest here are beyond normal technology, basically of celestial/angelic origin. Bloody hell !!!....Go pull up your knickers and see that the stupid humans here HAVE NO CLUE at all! -- Technically, neither do you...but then again, you don't have a BFF from Tau Ceti IV I've known for a few decades to give me the low-down on who's naughty and who's nice in this part of the galaxy!
ANYWAYS, again the USA has NO jurisdiction on WHO can goto space! They can't even manage to catch a bunch of flying propane tanks much less keep some Canadians from busting their space-chops!
Re: Re Commanding Space Controllers
"....Are you saying that is THE GOOD OLE USA and it is worth defending and supporting?..."
OK Mr. Parkov,
As a supremely Canadian Mr. Top Hat , I have been supporting my dumb-as-a-brick but gargantuan brother down south for DECADES now! He's an overgrown gorilla with the brains of a worm, but he's still my lovable brother. That said I still don't TRUST him either, sooooo I've built my own secret Vibranium and Adamantium Man system which means I'm the biggest, baddest brick-smasher on the block now. Bro has no clue what I am and can do now AND he can no longer take a swing at me anymore because NOW, I have the actual size and strength, to break his arms and legs in two as I see fit if he gets pissy with me!
I grew up to a much larger size and greater power level now. He just doesn't see or know it yet!
Bro is Spiderman....BUT.... I'm The Hulk, Dr. Strange, Thor AND Iron Man all in One! I win!
Re: The FCC - who controls space?
"....The power to control "space" goes no further than a bureaucrat's keyboard. ..."
NO...The power to control space goes to a country that has a SEVEN HUNDRED BILLION DOLLAR defence budget, a 60 BILLION DOLLAR BLACK BUDGET for Super-Secret Research and Development, owns 10 of one-hundred-thousand-tonne aircraft carriers, has 3000 active-duty MIRV'ed nuclear missiles with warheads that go between 275 Kilotons to 5 Megatons with another 12,000 nuclear missiles HELD IN RESERVE, ....AND.....having 13,000 aircraft, 3200 battle tanks, secret aircraft that include ten two-stage-to-orbit spaceplanes, 18 hypersonic 135,000 feet flight level reconn aricraft, 22 active-duty stealth bombers, 160 still-secret tactical stealth bombers AND TO a country where SDI (Strategic Defence Initiative aka Star Wars) NEVER actually went away but all that money eventually resulted in us helping deliver hypersonic kinetic energy and directed energy anti-ICBM and anti-cruise missile systems to a working and DEPLOYED state!
To put it MILDLY, the ONLY COUNTRY that matters is THE GOOD OLE USA (hoooo yaaaaa !!!!) and the Freedom Fries we so eloquently DEFEND upon your cushy tush'es behalf!
AND YES I AM ...STILL... CANADIAN !!!!
Re: How could you POSSIBLY accuse me of being recalcitrant towards our mother tongue?
Tsk Tsk...while I only PARTIALLY understand the use of it's (it is) and its (possessive) form, I do must say you might enchant yourself in keeping your bobbles in your knickers and sending your contractions to the knackers whilst figuring out how many crumbs of crumpet fit elegantly upon the head of a pin!
Do comment more on how Trump and the FCC desire to dump their legal lumps upon the world's spatial rump!
Re: @StargateSg7 -- StargateSg7?
"....I'd suggest more likely related to amanfromMars1, given your issues with English syntax. ..."
--- Whaaaaat? Bloody Hell! I do speak The Queen's English with more than a modicum of efficacy! How could you POSSIBLY accuse me of being recalcitrant towards the dignity of the Crown and it's use of our mother tongue?
And, please do enlighten me upon the machinations of "amanfromMars1" whom I have so little knowledge of. What manner of linguistic or work-related transgressions has this poor man been accused of?
AND NO! I am NOT BombasticBob ..... A hex upon ye who mistake ME for HIM or HER!
I AM CANADIAN !!!
"....."I'll have some of what that guy is smokin'!"
From the look of it, he's probably smokin' motherboards......"
Actually, I've indeed smoked A LOT OF MOTHERBOARDS! And since I am from the VAX-780 era, I have smoked more than a few of those too at $75,000 CAN a pop during the day! I am well experienced in otherwise destroying, discombobulating and sending MOBO's to Never-Never-Land!
Add in my OTHER destructive tendencies and that makes me an expensive proposition.
In fact, a few hours ago I just accidentally blittered a $35,000 lens into the Blarney Stone itself. Oh Well...another year's wages for the intern gone down the tubes....!!!! My only saving grace is that I am PROBABLY one of the BEST synthetic vision system, vector-based object recognition and audio/video CODEC programmers out there!
Which is WHY a tiny little spacecraft gets to go into low and high orbits, deploy their cargo AND safely return to Earth all by themselves WITHOUT human intervention! Which is ALSO WHY my CORPORATE CEO and OWNER friend is giving me enormous amounts of stock/equity which will EVENTUALLY vest so I can add to the Bell 429 collection! This time I will go for a Mi-28 Hind or an Sukhoi SU-29 as my daily driver.
Re: "Trump in Spaaaaaaaace"
"...Does Trump have Any Greater Assets than are Melania and Ivanka and Tiffany?...."
Actually THOSE ARE HIS BEST ASSETS....and in terms of Ivanka...that SMOKIN' HOTTIE is good enough in my books! You should have seen her mother (Ivana) at her age...they are nearly identical!
Not to be too insulting, but I'm not sure Tiffany has Ivanka's business brains and education level. Tiff should keep out of the limelight and let big sister handle the heavy stuff, since Ivanka at least inherited her dad's balls and gall...Ivanka can actually play the big boys' games!!!
Now for Melania....when I first heard of her I did a double take...since she looks almost identical to Stana Katic, the former star who played "Detective Kate Beckett" in the hit TV show "Castle". I was thinking this was all a big joke of a publicity stunt with Stana Katic PLAYING a part in a "Reality Show". Holy Smoke was I surprised it was someone else (aka Melania) and Trump really WAS going for the presidency!
After doing some research into BOTH of their backgrounds (Stana AND Melania), I found out they just might possibly and actually BE GENETICALLY RELATED since their parents are from and/or have relatives coming from that same general area in Eastern Europe.
I do must commend Melania though on being her stoic and behind-the-scenes self. She's at least NOT drawing too much negative attention and is acting more behind-the-scenes and out-of-the-public eye where she can probably do more good with subtlety rather than becoming an overt brash camera-hog.
In my opinion, all Melania has to do is keep doing what she is doing now and just keep "Turning the shoulders attached to the head so they point in the correct direction". If you get that colloquialism then you are smart!
Anyways though, Trump's best asset IS actually Ivanka and it really does HELP when your best asset has both beauty AND brains!
I would NOT be surprised if Bombastic Bob and I were in fact related....OR....maybe we have the same psycho-social DSM-V described UPPERCASE/lowercase keyboarding disorders arising from our dysfunctional youth.The KEY difference being that i work for (cough cough technically I consult for) a MULTI-BILLION DOLLAR+ corporate entity that actually DOES HAVE both the financial AND the human resources capability to actually DO the above said described work!
To put it mildly, this entity is ON PAR WITH Lockheed Martin, Boeing, Northrup, EADS, BAE, etc in terms of technical capability AND resources! So if they SAY they're going to do it. THEN THEY ACTUALLY ARE DOING IT !!!!!!!!!!
It also kinda helps that the OWNER/CEO is a personal friend from since teenager--hood. The cruel irony is that I'm NOT actually being PAID right now to perform said computer science/video system work but there IS SOME MILD PROMISE of a rather large (i.e. make that gargantuan!) stock/equity-based compensation eventually to come!
With Great Risk comes Great Reward!
And yes it was half-a-Register-oriented-com-science-blabber-fest AND a commercial!
Coming soon in 2021!
AND YES! 2.5 to 10 megabits doesn't sound like much BUT that's the limit due to various ground-to-Earth technical reasons. and HELL NO !!!!.... the FCC has dip-doodley-ZERO-jurisdiction in OUR FULLY CANADIAN aerospace activities!
The FCC has NO FORCE AT ALL in outer space! It can control and specify directions ONLY to it's OWN CITIZENS and to companies that operate WITHIN the United States! It has absolutely NO DIRECTION towards or legal force against Canadians, Brits, Germans, French, Russians, etc. who act WITHIN their own borders or within international areas!
For example, for the last eight years, one of our related corporate divisions has been designing and building FULLY ITAR-FREE satellite systems (i.e. NOT subject to ANY U.S. Export Law!) that go not only into low-Earth orbit but also into Geosynchronous AND into what is called outer-Earth-orbit trajectories.
Every CPU/GPU microchip, CAD/CAM/Circuit design hardware and software, all operations software, all development platforms, assemblers and compilers, every nut, bolt, glue and construction material, AND all in-house and external personnel and even the ENTIRE launch platforms are fully Canadian-sourced systems and materials from fully Canadian-owned entities built so the USA can do dip-doodley-all !!!
So when we get to launch our 512 satellite swarm that handles multi-spectral SDR (Software-Defined Radio) communications from 5 MHZ up to 60 GHz on an open-platform basis from a sea-launch platform within international waters, then there IS NOTHING the USA can do about it at all !!!!
EACH satellite has full-duplex transceiver and MESH network capabilities WITH MULTIPLE on-board DCI 4k (4096x2160) IR, UV and Optical cameras on-board for panoramic and telephoto still photo groups taken every few seconds.
The extendable and flexible antennae sub-systems were specially designed for WIDE BANDWIDTH multi-band SDR (Software Defined radio) operations! The POWER source and power conditioning circuits were all RAD-hardened and are being TESTED NOW for actual 10 year operations. (we'll know in 2 more years how the circuits did under ultra harsh space test temperature, vacuum and RF/Multi-EM/XRAY/GAMMA radiation conditions!)
Since RAD-hardening was THE KEY issue, it has already taken eight years and will take another two more to fully finish the systems and then launch into space. These 50 cm by 50 cm by 50 cm cube micro-satellites pack a lot of CPU processing horsepower and image store-and-forward space within a very small package. Each satellite can last, based upon our radiation-studies and past solar flare activity charts, up to 10 years with an orbit boost required every 2.5 years (i.e. 4 boosts in 10 years to keep them in stable lower and upper orbits)
Satellite internet feeds Uploads/downloads will be COMPLETELY AUTO-MANAGED ONBOARD the satellites themselves requiring NO ground operator intervention, and bandwidth will be on the order of 2.5 to 10 megabits per second (or more!) with SOME of the communications channels being FULLY FREE AND OPEN SOURCE USE to non-commercial and commercial users!
Eight megapixel+ single photos, 400 megapixel swaths and one to 5 minute 30 fps videos will be downloaded every few minutes fully unencrypted for ANYONE to use as they see fit under GNU GPL-3 licencing terms! There IS a global TEXT MESSAGE-based and STILL IMAGE-based EMERGENCY broadcast and weather forecast system and master time-clock system BUILT-IN with minute-by-minute updates! And since we have a re-useable two-stage-to-orbit micro-launch system that we built ourselves, we can launch TWO satellites PER DAY in one ship at a space launch cost of only $500 000 CAN (335 000 Euros!) per launch. The satellites are extremely small and very lightweight so our launch costs are very minimal compared to Ariane-space or NASA or ESA or Boeing, etc. 256 launches in two years to get the system fully up and running has ALREADY BEEN FULLY FUNDED and is ready to go!
First launch window is set for June 2021.
P.S. As per this disclosure by me (i.e. permission was given!), the parent company is NOT WORRIED by about proprietary business issues since the final purpose for some of the communications channels and photo/video downloads allows much money to be made on a commercial basis.
The other free and open source UPLOAD/DOWNLOAD and MESH NETWORK channels will left full open for use by anyone up to an assigned data limit per user per day. The downloaded still photos are left fully unencrypted using run-length and token-based compression with ECC/CRC data correction at RGB 48-bits per pixel and Greyscale 16-bits per pixel in our open-source imaging formats, and the videos are YCbCr HDR 30 fps 4:4:4 colour sampling at 10 bits per channel (30 bits per pixel)
Re: The Chinese Century
Bloody Hell !!! (All in a Cockney accent!) He's startin' ta sound like me!
ALL BOMBASTIC with too many UPPERCASE and lowercase SENTENCES !!!!
Anyways, China is what China is and WILL DO what it feels like doing WHEN it feels like doing so!
Unless YOUR COUNTRY also has 1.5 billion people graduating 250,000 ENGINEERS PER YEAR then you're going to hafta take it up-da-wazoo since your country is HIGHLY LIKELY to be very dependent upon technology and systems developed in China and IMPORTED into your country!
The BASIC fact of the matter is....that the MAJORITY of your own country's people are TOO LAZY and TOO STOOOOOPID to even HOPE to match the intellectual, financial and manufacturing capability of Chinese industry! To put it mildly BUT TRUTHFULLY, YOU and your fellow countrymen and countrywomen DO NOT HAVE what it takes to be technological powerhouses. You don't have the educated and compliant workforces! You DO NOT HAVE the sheer financial and marketing capital NOR do you have the technological SKILLS to even HOPE TO COMPETE on the world's stage of high technology!
Unless you're Germany, USA, Japan, France, Switzerland or CHINA, your country IS ABSOLUTELY DEPENDENT UPON the world's POWERHOUSES for high technology of ANY SORT !!!!!!!!!!!!
Re: At least is isnt oracle or M$
Damnit BB --- You're STEALING MY lowercase and UPPERCASE musings! How can ANYONE distinguish my writings form yours now??? To illustrate that I not-so-humbly DISAGREE that Microsoft is crappola, I must add in a defence of Microsoft by saying that Active Directory system is the BEST network shag-fest-supportting administration system out there --- BAR NONE !!!!
Being able to EASILY MAKE AND PUSH a single or multiple Group Policies from a SINGLE central server (or from my super-DUPER remote client station acting as the Enterprise Domain Admin) out to EVERY sub-server and client on a global basis, HAS NO EQUAL in Red Hat, SuSE or ANY OTHER FLAVOUR of Linux!!!! Yes! I'm biased because as a geek-head located but two hours drive from MS headquarters, I do prefer dealing with a more local company...BUT... I do see this acquisition of Red Hat by IBM as a tidal wave of destruction coming soon to the smaller shops who use RH for their internal systems, dev-ops and cloud-like servers.
IBM will KILL Red Hat in less than five years if they so much interfere with ANY employee functions and coder happiness...THEY WILL ALL LEAVE and there goes all of Red Hat's value and goodwill! IBM has killed so many companies in the 20 years (Lotus, PWC, etc) that I don't see anything good for current RH employees UNLESS you have stock which you can vest as soon as the deal goes through! I say to them RETIRE RICH WHILE YOU CAN !!!!
The question now, is WHAT COMES AFTER RED HAT?? --- Maybe this is the best news for Microsoft future growth since their own introduction of Active Directory and Azure! It ain't cheap to run an MS server system, but IT SURE IS EASY TO DO SO from an admin's perspective!
The ONLY THING GOOD about IBM's stock play for RH, is that IBM's Power-9 and Power-10 CPU architectures will FINALLY be having a good look over from the DEV-OPS community. Those CPU's ARE MUCH SUPERIOR to INTEL/AMD. If ONLY MS would put Windows 2016/1019 on those CPU's!!!
BINGO! After doing research on MANY CPU systems at the hardware level, that IBM Power-9 and the upcoming Power-10 are in fact MUCH MUCH BETTER than Intel XEON or AMD EPYC. IBM has royally screwed up the marketing of the power architecture which has MORE THREADS, MORE SPEED PER CORE (ideal for single thread linear tasks) and MORE access to larger block of memory!
All-in-all, Power-9 is a SUPERIOR CPU that is hobbled by some of the WORST MARKETING I have ever seen! A dual CPU Power-9 system if it had a HAL (Hardware Abstraction Layer) for Windows Server 2016/2019 would blow away any Intel/AMD system at the same price point. There would be NO CONTEST in terms of I/O's per second, TCP/IP V4/V6 communications latency, storage size ability and maximum local storage memory size for VM's.
The engineers to made the Power chips are SUPERB...but the marketing guys were dweebs! Just sign off the ENTIRE POWER architecture over to Dell which would the ONE DECENT COMPANY that could actually BE ABLE to market pro-level desktops, servers, laptops and tablets using such Power CPU's!!!
WHY the heck would I get this when Samsung and others are offering 60 Terabyte SSD Drives (YES! SIXTY TERABYTES!) on ultra fast way-beyond-spinning-disk transfer speeds. Next year the 100 TB SSD drives are coming out AND even today there are companies that offer hard-soldered PCB boards with TWO PETABYTE-levels of SSD flash chips that can be racked 20 high for 40 PETABYTES in a single 1.8 metre high (72 inch) rack!
Yeah! The drives is currently more than a few quid, but the 60TB or teh 40 Petabyte systems is a nice space to have!
".....Amazon’s security team conducted its own investigation into AWS’s Beijing facilities and found altered motherboards there as well, including more sophisticated designs than they’d previously encountered. In one case, the malicious chips were thin enough that they’d been embedded between the layers of fiberglass onto which the other components were attached, according to one person who saw pictures of the chips. That generation of chips was smaller than a sharpened pencil tip, the person says. ..."
This quote is Bloomberg quoted record of data from a semi-secretive source I am VERY WELL FAMILIAR WITH and who has access to high end hardware security toolsets.
Like I said earlier modern CPU's anc antennae can be made SO THIN I can even embed them into the in-between layers of a blank PCB !!!! AND I can have them draw power parasitically from almost ANY circuit line I desire at ultra low-voltages and system current draws!
The USA has done thus much longer than China or Russia....BUT....I am inclined to say TODAY that the two most SOPHISTICATED countries for being able to manufacture and place ultra-small embedded circuits into common compute systems for spying purposes is China and Israel.
The USA lost it's edge on the small ceramic capacitor-sized circuits about 5 years ago and is UNLIKELY to catch up to China or Israel without spending a few tens of billions on a catch-up innovation wave. I.e. extra DARPA funding!
On a technical basis, I can even make an ENTIRE LED/OLED display mask into a hidden circuit which has HUGE surface area for acting as a long-range antennae. The actual diodes themselves can be repurposed as switches and/or logic gates working IN-BETWEEN the refresh cycles of the display for form a slow but giant-size parallel processing system.
Re: The invisible hardware advantage
You are one of the FEW on here who actually RECOGNIZE just how far an intelligence agency (and criminal organizations!) will go to compromise data processing system and IT infrastructure. Becuase of modern nano-scale engineering almost ANY device, peripheral and plug can be compromised.
USB cables, RJ-45 plugs, Wifi Antennae, keyboard, drives, memory chips, displays...ANYTHING that is big enough to have a circuit hidden in it and have parasitic power drawn from an external source is embeddable and can intercept, store, re-direct and exfiltrate actionable data and intelligence!
and there is LITERALLY NOTHING anyone can do about it!
Anyways...What's Happening? -- Uhhmmm I'm gonna have to ask you to move your desk again and I'm gonna get that red stapler off you....
Actually, YOU CAN put chips willy nilly on a motherboard IF you de-solder them from their original locations and put a compromised version of them on the target / interception gear. I absolutely KNOW from multiple insider sources that the US (mostly the USA rather than Russia and China!) have had for MANY YEARS (since the Intel 8086/8088/80286 days of the 1980's) CUSTOM versions of common Northbridge/Southbridge chips (in those days it was separate DMA and Peripheral controllers), and now CPU chips, GPU chips, NIC chips, drive controllers (i.e. Promise, Mediatek) and various DSP and PIC's with extra circuit layers and circuit blocks they make at their own facilities (in Maryland mostly) that can in fact intercept, store, and re-direct data to external destinations without affecting system timings or causing extra signal jitter, etc.
Those custom chips are ordered in batches and when a particular computer system or part is intercepted, the new version is soldered in. Again, low bandwidth antennae can be embedded into the chips themselves which can export data using various near-field and medium-field communications links and storage mediums that are embedded into security-sensitive environments via common social engineering means. (i.e. usually by compromising either or both multiple knowing and unwitting personnel employed at any given security-sensitive site)
During President Ronald Reagan's era (1980 to 1988) chip-compromised Gravis soundcards and keyboards were embedded into various Soviet Union ministries that had illegally purchased western computer gear from grey and black market resellers. Acoustic sensors recorded short audio clips and keyboard input which were temporarily stored within hidden internal memory systems and picked up later by unwittingly compromised janitorial staff who had passive networked recording devices embedded into cleaning machines, gear and personal clothing.
External agents picked up the recorded data as employees went home after a shift. At the time, the GRU and KGB headquarters, various agricultural ministries, various cosmodromes and aircraft/spacecraft/ship/submarine production facilities were targeted. While the retrieved keyboard data and acoustic data was on the order of a mere few hundreds of kilobytes (or in some cases a 2 to 5 megabytes), the resulting ACTIONABLE intelligence gathered made the effort VERY worthwhile!
Defence Secretary Caspar Wienberger started this hardware modification program and they also modified common industrial control software that was ensured to be "stolen" by Soviet agents and installed in their own systems, which in 1987 caused one of the largest natural gas line explosions EVER when modified control software made a Soviet gas distribution control system to become overly pressurized!
AND for the kicker...I think I even still have a film-based PHOTO of Caspar looking rather pleased with himself on the DAY AFTER the explosion strutting down the White House hallway to brief Ronnie on what happened! (the CIA/NRO detected an explosive event and "spy photos" were taken very shortly after -- Don't ask how I know that BUT I think I may still have those photos too!)
Let's just say that while I may have been very young at the time AND a foreign-ally citizen, I had lots of "insider technical skill, knowledge and MANY insider contacts" ........
Re: Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...
AND FOR THE KICKER.....Modern Spyworks have gotten sooooo SOPHISTICATED that I can embed a whole signals intercept, storage and communications chip within those fake shiny red woman's fingernails that many women get for cosmetic looks!
Modern chips can be parasitically powered from local EMF, from the human body itself and they can be made so small I can put one on or under a woman's (or man's) finger nails or toenails and cover it up with nail polish. No one will be the wiser and almost NO security guard will have the ability or skill to find such hidden devices. I could compromise the local nail esthetician to implant or paint-on the device off-site at the local nail parlour which the targeted wearer would be UNAWARE OF !!!
THIS SHOWS YOU JUST HOW FAR the USA, RUSSIA, CHINA, UK, ISRAEL, FRANCE, GERMANY, etc DO GO in their daily spyworks activities!
Re: Glomar Explorer; Gulf of Tonkin; UFOs and SR71 & F117 test flights; ...
You don't even have to modify the CPU or GPU chip itself!
I could put an entire chip in the ceramic or metal cap that COVERS any given CPU/GPU which can be powered parasitically via induction, direct connect to leads, etc. This chip-under-the-cap can even include a Fractal Antennae design or a very narrow band antennae to send data over low-bandwidth but long-range/penetrating wavelengths. The emitted signals would likely be seen as extraneous noise but modern DSP (Digital Signal Processing) could recover actual compressed/encrypted data over long periods of time. Even a Faraday cage won't necessarily help because any TEMPEST (look it up!) signals screening would be specific to certain wavelengths usually in the 1.5 to 6 GHz bands that cell phones and wifi use. Goto Terahertz or lower than 1.5 GHz or even acoustic communications bands and then even the typical mesh-screen or punched metal Faraday cage will be compromised. Only a FULLY ENCASED SOLID SHEET Tungsten, Copper And Polymer Faraday Cage will block those signals!
In some cases the signal may need to travel only a few inches/cm or a few feet/metres since the destination storage medium may be embedded into clothing, jackets, buttons, shoes, or disguised as common personal gear, etc. A person who works in a sensitive location MAY NOT even be aware they are the external data transmission medium since THEIR personal clothing/goods may be intercepted and modified by external spy agencies. Once the targeted employee walks out at the end of the day, an external system can intercept and download the latest data using non-physical extraction (i.e. wireless comms)
The typical front door security/user entry system and even a physical body search would NOT detect these PASSIVE data storage devices which can be as thin as a postage stamp or as small as a pencil head! (or they might actually BE embedded into pens/pencils/erasers/sheets of blank paper!) Even teh X-ray system wouldn't detect the passive device since the typical security guard would NOT know what they are looking at on-screen and just "Let It Go Through!"
95% of the time it will be a Network Interface Chip (NIC) or a Drive Controller which is re-soldered and changed over. AND it's sole task will be to intercept targeted text strings (i.e. text with certain keywords) or packets having specified source or destination IP addresses and then compress/encrypt that data into LEGITIMATE data streams such as image files, OS data files, web-based temp files, etc. which tend to be served to outside locations within network data packets which can be intercepted at the local or regional telecom level.
Unfortunately, the more insidious intercepts are re-flashed GPU and NIC BIOS'es that have interactive user text-input, screenshot output and mouse-HID-event re-directs to privileged memory locations and/or previously compromised kernel mode drivers which will re-package/compress/encrypt that intercepted data into legitimate traffic for outside intercept. It's basically impossible to change a BIOS that can PREVENT user-flashes and/or show FAKE update credentials to an operating system (i.e. the "Fake" bios prevents a legitimate update and mere changes its version numbers and presents a fake digital signature to low-level services) which will never know incoming data is being intercepted.
I would have to douse the whole chipset in liquid helium so I can examine under specialty lab conditions using chip layer-by-layer examination the values of local data and cpu registers and other flash memory locations for evidence of "fake" BIOS code.
Indeed you are correct, China is probably THIRD on the list of nations able to intercept CPU/GPU/NIC lithographs and insert new circuits! I am more inclined to believe that it is actually the USA that put the extra circuit layers or circuit blocks into common designs and or specially-modified versions of common chips into SuperMicro motherboards.
Modern Chip design systems that are mostly from Mentor Graphics (look at up) or those from various French and German companies were originally US products and from what my "sources" have said in the past, there are means to NOT FLAG intentional modifications upon tape-out so that the IR/UV/EBM layer technician doesn't actually notice the changes. There's only about 5 to 10 people in a typical FAB who actually interact with each mask AND of those only two who actually are tasked with true Quality Assurance at the mask level. Those employees could easily be bribed and/or coerced into cooperating. The testing regimes will pan out because the modified chip designs WILL pan out to design specifications in terms of specified performance and computational results.
The high resolution QA cameras which examine each chip upon each doping procedure and mask layering etch use common image recognition algorithms and specialty communications and drivers from the QA vendor which ARE fairly easy to be changed/compromised from a spy-works point of view.
Even a basic visual inspection from human QA personnel will miss the extra blocks because their comparison masks will differ from what was originally designed at the original chip design bureau.
AND not every chip will be compromised. It will be specific manufacturing runs containing specific part numbers which will be changed, tracked and forwarded to specific companies via outside influence. Probably on the order of a few hundred or few thousand chips will changed and redirected to specific manufacturers for inclusion into their products.
In fact, at the NSA (Ft. Meade) there is a small room about the size of a typical bedroom that has three technicians that specifically de-solder chips from intercepted motherboards and put the modified chips in and resend them out to specified destinations. Typically the motherboards are done in advance and if that MOBO is ordered by a specific department in a specific foreign entity, the "fixed" motherboard has it's FEDEX, UPS, DHL, POSTAL delivery intercepted and changed over to the new one.
It used to be done on the fly where mobos were actually intercepted, fixed up, and re-inserted into the supply chain on a 1-day or 2-day basis but now it's typical for whole classes of common server and workstation components from Dell, Lenovo, HP, IBM, Sun/Oracle, SuperMicro, TYAN, etc to be bought up, have their chips changed over and only inserted into the supply chain when needed or when a target client orders one. That order is intercepted to make sure the right "changed" board or chip is in stock. The courier company and client never know of the switch which is typically done just before shipping from the local customs warehouse or just before final delivery. Very rarely is it intercepted during actual transit except for postal-service shipped goods!
Re: How can I put this?
NOW the for the REST of you...I would be VERY VERY AFRAID..ALL of the U.S., Russian and Chinese intelligence services HAVE PUT extra mask layers in common controller chips and network chips during the lithographic/manufacturing process which CAN re-process incoming signals and use data-oriented steganography to hide extra data in normal UDP and TCP/IP V4 and V6 packets in their headers or in KNOWN data content types such as JPEG, BMP, TIFF, GIF, TEXT, XLS, WORD, XML/HTML etc which are searched and re-assembled outside of YOUR networks.
Once a microchip lithographic process is compromised via an extra layer or three, only about 2 or 3 people in the chip manufacturing company would be actually in-the-know (and who are probably bribed, threatened OR are actual foreign agents!).
The ONLY WAY to know is to SHAVE LAYER BY LAYER common NIC (Network Interface Chips), SSD and Hard Disk Controller Chips, GPU's, CPU's, Memory IC's, Northbridge/Southbridge, ARM and Baseband Modem chips and other common chips to see if an EXTR LAYER or an EXTRA transistor BLOCK has been added to the final chip design for desktop's servers, smartphones, Xbox/PS, and IoT appliances, Televisions, Computer Monitor and more.
It's so bad in terms of modern spyworks, that EVEN a normal chip design can be compromised by merely adding in temperature-sensitive transistor blocks within a materials and CMOS doping specification that is intercepted and substituted by a spy agency during transit from a design firm to the chip factory which will eventually short out to NEW intentionally designed/hidden CPU pathway when certain instructions are executed to overheat a chip in specific places, which then deteriorate and then eventually short out to NEW circuit paths which can then execute NEW system-compromising instructions !!!
YES! IT CAN BE DONE and HAS.....BEEN DONE !!!!
Re: @StargateSg7 ... @AC ... The cat is pretty well out of the bag already
Have you EVER BEEN to a US gun show?
I see AR-15's Semi-auto in 7.62 NATO all the time. And YES! I know the differences between 3-shot select fire, full-auto and semi-auto as I used to use the M16 and M4 a lot in my day!
AND YES i know the pressure differences between .223 and the 5.56 rounds. I've also seen AR-15 look-alikes in .50 CAL AND EVEN in customized .60 CAL sizes. In places like Colorado and many southern states there are MANY ATF certified small arms manufacturers that do custom systems for wealthy shooters and for both police tactical and military units.
Every state and even COUNTY is different for gun type, possession, transport and usage so whenever you go out of state or county with your arms you need to check the laws of the in-between and destination state so if you get pulled over during transport you don't run afoul of local laws.
The worst states are New York, New Jersey and California for draconian transport and possession laws. The best are Colorado, the Midwest and southern states. And again for Castle Doctrine laws, YES you can shoot first and ask questions later if someone encroaches illegally upon or into your house/property and you feel your life or the lives of family/friends is in danger!
They can't as we here in Canada or the USA can TELL THEM TO GO POUND SAND !!!
GDPR LAWS DO NOT APPLY IN USA OR CANADA !!!!!! END OF STATEMENT -- PERIOD !!!!!
if you are a user of CANADIAN or USA located, owned and operated systems you follow US or Canada laws NOT ANYONE ELSES !!!!!
Only if the equipment and/or the company personnel are located or operate out of the EU or Britain does GDPR law apply. ONLY THEN !!!! Any US judge (or canadian one!) would DENY any extradition request and/or application of a fine in that jursidiction!
I think we called that a Client/Server Model of Computing like BACK IN THE DAY of 1980's era IBM AS-400 or even the 1960's/1970's era VAX-780 and IBM 360 mainframe. DevOps is basically Top-Down development and VERY BASIC 1950's era Systems Analysis.
a) Define the business problem you're trying to solve.
b) Define the FUNCTIONALITY of current or new components needed to solve a part of the overall business problem. (i.e. Do we need hardcopy printing, email, calendar functions, streaming videophones, SMS/instant messaging, calendar input, etc)
c) Define the TYPES of processing modules NEEDED to solve each require functionality as defined above. (i.e. print PDF reports, Enter data via touch screen or keyboard, send email to clients on POP server, use RTSP for video, etc)
d) Define the functionality of sub-components needed within each large-scale component
(buy RTSP DLL from Datastead for video streaming, use Thunderbird components for email,
code custom data entry screen in-house, use PDF generator component in compiler, etc)
e) Code, Link and Combine components into test runtime folder
f) test on SEPARATE MACHINE with SEPARATE TEST DATA ONLY!!!!!!!
DO NOT USE LIVE DATABASE !!!
g) test 1000 times with local admin department heads and team of each component and data entry and processing module over 3 months.
h) Do bug report log and send back for recode and retesting of 'E" and "F" and "G" over another 60 days.
i) Get Go-ahead for One-Branch-Office-at-a-Time deployment with initial two weeks allocated for in-house training and another two weeks of real-time use per office for real-world feedback and fixes.
If no major issues, then go ahead and use same two-week training and two week real world test schedule for next three months at another three branch offices.
j) If no major problems at the four branch offices, then roll out to ABOTHER four branch offices at the same time again with two week training and two weeks in-office testing until all offices update to new version of application. Update ONLY four branch offices at a time and train/test for 30 days!
h) Shut down last database from old system ONLY AFTER ALL OFFICES are converted but still keep on online version of the old software on ONE machine in every branch office connected to a separate head office server for at least one year as backups just in case something BAD happens to new system!
i) do a 3 month, 6-month and 1 year review of each office interviewing certain users personally on fixes or updates required for next app update version. Send responses back to coders and management for review and add-in and THEN DO ANOTHER office-by-office rollout but with an accelerated one week of in-house training and two weeks of testing for NEW bugs.
THAT is how you do a PROPER Roll-out of a new app using Top-Down Modeling and Deployment!
In the USA, actually you kinda do have to do that becuase people ARE ARMED to the Teeth!
Anyone can Open Carry in teh US state of New Mexico which means I can carry my 9mm or five of them strapped to my waist for all the see! I can also buy and have 1 or 10 or MORE AR-15's semi-auto rifles as a I see fit! So with people's mental health and in a country where there have been 4 disgruntled worker shootings in 3 days...YEAH! I kinda see why they would shut the facility down from a physical point of view.
Then you add in the virus and malware that USUALLY accompanies dark web material again that is a HUGE security risk so it all needs to be checked, scanned, cleaned up and tested.
Alien have been around for thousands of years on Earth. They're Here. There Over There. They're Everywhere. Get Over It!
Re: The most sexy hacker in Romania...
Lookup on Google:
Photos of Eveline Cismaru
as a search term!
HOLY SMOKE IS SHE EVER SMOKIN' HOT HOT HOT!!!!!
It's a pity that in a U.S. Women's Prison she will have her looks last about 10 days before she ends up bruised, battered and some lesboz "Prison B&*&*^^&". U.S Prisons ain't no picnic for MEN OR WOMEN!
She's small of stature so she is toast against the multiple prison gangs of 200 lbs (80 KG) butches and gangsta babes. Women affiliates of The 18th Street Gang, Savage Skulls, Du Roc Crips, The Sex Money Murda Gang, State Line Mob, 14k Triad, Menace of Destruction and any number of HUNDREDS of other big name US-based gangs are gonna do her in BUT GOOD! Her a(**&*( is Grass in about a week of entering the system!!!! THEN add in the guards who are gonna take a "Liking To Her" She is gonna be hurtin' baaaaaaad!
This ain't no comfy tush Euro-prison she's going to. It's a U.S. SLAMMA ... and she is gonna get SLAMMED!!!
Re: sci-fi ships were the order of the day at my first job.
If y'all want a decent naming convention, my friend down the road from me with his exa-scale systems uses a "Fun Name" (i.e. TEALC, CARTER, JACKSON, ONEILL, VALA, MCKAY, RONON, etc which are characters from the Stargate TV shows) and then appends a multi-digit 3D-XYZ coordinate.
TEALC-X122-Y271-Z1083-N127 indicating the network or cluster name, the actual physical cabinet number within the cluster, the shelf-number (i.e. RU rack case number counting up from the bottom of the 72 inch rack), and physical CPU number within each case. If we needed a physical core-number (some CPU's have up to 128 cores!) we would append an N-number at the end of the 3D-XYZ coordinate. This allowed our internal log systems to perfectly detail in physical real-world space where a problem piece of hardware is located.
It is ALSO useful for creating Virtual Processing Cluster where sub-jobs and sub-tasks could be assigned and tracked to specific locations within this HUGE data processing centre ensuring that no maintenance or downtime took place when those jobs were assigned to a specific geographic place.
Since we use a custom machine and networking OS that allows such long machine names, we can get away with such a naming convention. In Windows or Linux flavours, you assign each name as a DRIVE and SUB-FOLDER structure
Windows Server Name structure for all log files and data processing output.
We use an X+four-digit-number for our coordinate names but you can make it 5 to 8 digits or more if you have GIGANTIC server systems with tends of thousands or even millions of devices such as:
You can ALSO replace the X,Y,Z and N prefix monikers with C=Cabinet, S=Shelf, P=Processor, C=Core
so you get
which is fairly easy to read and learn where machines and sub-systems are in 3D-space.
Re: Gandalf box
OMG! The Gandaf Hybrid 2400 to 9600 baud modem with that weird advertisement in DEC-VAX oriented system admin magazines of a curly headed Centaur (man with legs and body of a horse) clicking together a giant multi-pin comms connector! That ad ran for YEARS and MANY people I know in the industry took those blue modems home after being retired and STILL use them as backup dialup connections if the main ADSL/Cable/Fibre lines go down! They STILL WORK after 30 years!
I still have five of them JUST IN CASE!!!! They STILL work and they were built TOUGH and even the rack-mount 2RU models I think I have one somewhere. If the fibre phone lines go down, I still have access to my 9600 to 56k DTMF-oriented modems which can be put out on a ShortWave radio for long range emergency digital communications amongst my fellow tech nerds who also have such gear!
Re: Naming Schemes
In the late 80's we had a rather militaristic SysOp who liked naming his VAX systems and even the major storage media clusters after various battle gods such as Thor, Odin, Zeus, Mars, etc, etc. AND if you didn't get the message of NOT to mess with "HIS" machines, the VERY REAL and VERY WELL SHARPENED full-working-replica Battle-Axe and Broad-Sword hanging above his desk with an inscription of "Situation All F***** Up? - Beheadings Normal!" ENSURED that people got the point ESPECIALLY since the Sysop was 6'5" (2+ metres tall!) and probably about 300 lbs of Like-The-Rock musculature...which is the COMPLETE OPPOSITE of what many think a SysOp SHOULD LOOK LIKE!!!
I should note his systems ALWAYS worked like a charm and that there actually WERE FULLY TESTED Disaster Recovery Systems and MULTIPLE FULLY-TESTED ON A WEEKLY BASIS On-Site and Off-Site Full Image and Incremental backups "READY FOR ACTION" at a moment's notice!
Uptime on "HIS" systems was literally calculated at Six-Sigma (i.e. 99.9999% per year) uptime before that term even became popular in industry! We had people from major corporations and worldwide NGO and Government organizations come in all the time for VERY EXPENSIVE courses (5 figure sums for EACH student!) on how to keep six sigma uptime on major VAX and IBM computer systems like ours! I worked there only a few years (3) but even I must admit that was a VERY VERY WELL-RUN compute centre with great IT security and fantastic hardware/software recovery systems in place!
I do ALL the procedures then espoused and learned all those years ago IN FULL NOW on our own much-larger-in-scale systems! And YES it's Six-Sigma uptime !!!!
New MeX-Files: The curious case of an evacuated US solar lab, the FBI – and bananas conspiracy theories
I always WONDERED why they used Mercury bearings when modern silicone oils (non-conductive) or something like Mobil SHC 527 Series hydraulic oil that resists high temperatures and high pressures can be bought by the barrel at a much reduced environmental cost versus Mercury!
Try the Mobil SHC 527 stuff for better safety and high-performance in your astrometric products!
You can also use MAGNETIC BEARINGS or FERRO-FLUID for damping purposes which Cadillac does for their MagneRide shocks on their high end CTS-V sports cars!
Re: They will change the target in legislation
I will make the statement that you will ALWAYS be able to have end-to-end encryption because people like me and my colleagues will make it available OPEN SOURCE and UTTERLY FREE for use by anyone! We can ALSO GIVE YOU GUI-based desktop and server operating systems and CPU/GPU chip designs that are completely free and open source!
Re: "No homebrew" is NOT elitist
Nah! I've been doing this for probably a LOT longer than you have! Unless you've been programming computers since 1978 then you might have something on me. I grew up a digital native of PDP, VAX, PET, Sun/Apollo, IBM 360 and AS400, Apple II/Mac/PC/Windows/Linux and so much else that I've been able to do decent security in my sleep!
I'm the type of guy who makes custom flat panels with custom controller/RGBA driver chips with custom motherboards. I do custom massively parallel systems using custom motherboards that use custom FPGA network, drive, display and bios logic. I've even been DABBLING in actual 64-bit/128-bit+ CPU/GPU design on GaAs/GaN and CMOS since we have a 7 nm electron beam etcher to send our tape-outs to! We use custom cross-compilers, custom assemblers, custom OS'es, custom BIOS'es, custom microcode and even an advanced custom-designed VHDL system for outputting CPU/GPU designs. There isn't ANYTHING we can't do that isn't fully custom down to the gate/diode level.
So security-wise, good luck! We have doing this for a LOOOOOOOONG TIME!!!!!!
The gear and tech we have makes even LMCO, Raytheon, Boeing,, Northrup, IBM, Google, Microsoft, Apple, Intel, TI, TMSC, Foxconn, Huaweii, Ericsson, Nokia, Philips, Thales, D'assault, EADS, Bosch, NEC, Sony, Canon, Matsushita, JPL, NASA, LLNL, etc ultra-ultra-green with envy! We have tech expertise, software and hardware that literally IS SECOND TO NONE and in some cases IS ABSOLUTELY NUMBER ONE IN THE WORLD !!!!!!!!!!!!!!!!!!!!!!
To put it mildly, if the powers-that-be want to make security insecure, we can EASILY put a stop to it and make our software and hardware results COMPLETELY OPEN SOURCE AND UTTER FREE FOR USE BY ANYONE !!!!
AND WE ARE ABSOLUTELY WILLING TO DO IT WITH NO HESITATION WHATSOEVER since we are NOT affected by any external financial pressures! And upon any external political pressure? WE ARE ALL ABSOLUTELY THE TYPES TO JUST DO IT FOR THE HECK OF IT!!!! We will ABSOLUTELY IGNORE ANY AND ALL DIRECTIVES FROM EVERYONE AT EVERY LEVEL OF GOVERNMENT PERIOD !!!!!!!! We will SIMPLY IGNORE ANY AND ALL INJUNCTIONS !!!!!!!!!!!
Re: Tide, stop coming in!
I don't have to worry about THAT ANYMORE! I've got friends in VERY HIGH PLACES NOW !!!!! And I can now say DO WANNA SEE WHAT TWENTY TRILLION TONNES LOOKS LIKE? Like ... AS IF you're gonna fight against THAT!
I dare ya! NO! I double Dare Ya! Say What ONE MORE g'dam time!