151 posts • joined Saturday 20th October 2007 09:58 GMT
Please, please, Please let us see the match!
goes to fetch popcorn
Re: I expect to get a zillion downvotes but...
"the NSA probably are after something is flagged it will inevitably end up at the hands of another person who has not been given explicit permission to read your email"
Just as a thought experiment, imagine that NSA establishes an automated system that scans emails, searches for specific signals, and notifies human operators that the people involved are suspect. Without presenting actual emails to the human operators. According to your line of thought, that would be acceptable, no? Human-free system at Google learns something from users' email and make decisions about advertising tactics. Human-free system at NSA learns something from users' email and makes decisions about investigatory tactics. I don't see much difference.
On a second thought,
Bring Ariadne to Spain for a quick holiday, and let her do the job herself!
+1 David Stockman's
because it is:
- reminiscent of a bikini
- is red+white+blue as Union Jack
- has the Vulture logo (and in the right place too!)
If Angela Merkel or any other European leaders are so outraged by the NSA practices, they surely ought to show some gratitude to the person who made evidence of such practices public, and give him political asylum. No?
Because they where not the spooks
In Russia, spooks basically get everything that they want without asking anybody, under the "СОРМ" (SORM) legislation. In this case, the company stood up to a request for data that came from somebody other then spooks, i.e. financial authorities. Nothing to see here, move along!
Re: Reply @Rascak
Accessing yahoo mail via IMAP (and presumably POP) is free, this is how I reach it from Android.
For that matter, you can perfectly access gmail with an IMAP client too.
Re: TCP/IP has been multi-path from the git-go.
@jake, err, no it hadn't
Sure enough, IP has always been, and is now, multipath. TCP session, however, is defined by the quadruple of source and destination layer3 addresses, and source and destination (layer4) ports. For a host with multiple interfaces that means one TCP session can use only one interface (at least, the incoming packets can only arrive on one interface). What they are talking about here is having different packets with different pairs of source and desitnation addresses belong to a single TCP session. Standard published in January 2013: http://tools.ietf.org/html/rfc6824
Social network != "Social network"
Someone on reddit makes a good point:
A lot of people commenting are confused by how New York Times is using the term "social network." They're not talking about Facebook, Myspace, etc. They're talking about the NSA secretly building graphsyour real-life social network without warrants: everyone you talk to, do business with, etc.
Re: Two part PIN?
Or, you could just use chip and pin.
Compromised terminal can show on screen that it's charging $10, but in fact charge $100. The only way is to build a mini display and keypad into the card.
Linus Torvalds let the new name be known in a Git commit
... and regretted shortly thereafter.
Re: satisfied customer
Depends on who you prefer to be watching you - NSA or FSB. For non-Russian citizens, it might be sensible to prefer FSB. But keep in mind that here you don't have even the token judicial oversight of the FISA court - they just take what they want without asking anybody.
Encrypted backup to rescue
When the data is encrypted (and decrypted for restore) locally on your system, and exists outside only in encrypted form, then the issues of ownership and sovereignty become largely irrelevant. I personally use duplicity.
Re: sudo echo $'The Register on Pi-Lite' > /dev/ttyAMA0
When you use shell redirection, the file is opened by the shell process, that runs under the original userid. Sudo launches the command under root userid, and if it opened the file it would be able to, but it does not, it just uses stdout that was already opened by the shell. If it could.
If the command worked, it means that the file was writeable for the original userid, and running without sudo would also work. So, sudo is either unnecessary, or does not help.
sudo echo $'The Register on Pi-Lite' > /dev/ttyAMA0
will not work.
Exactly why it won't is left as an exercise to the writer.
Having a secure OS is not enough. These days, many exploits are very high level: XSS and suchlike. They never leave the browser, so the OS has no chance do deploy its defences.
Qubes mentioned in this thread tries to address this problem by sanboxing multiple instances of the browser in separate VMs.
Double speak alert
Putin said "He must stop his work aimed at harming our American partners" ("Он должен прекратить свою работу, направленную на то, чтобы наносить ущерб нашим американским партнерам"). He did not say about it being "harmful to the US" as the author of this piece interpreted it. Putin't "American partners" are not necessary the "US, the Country".
Putin probably still feels that he belongs to the "intelligence community", and perceives the US secret service establishment as his partners, so it makes sense.
Indeed, my Apache with default configuration handshakes with DHE. However, this article explains the performance problem with DH, and solution that is apparently adopted by Google now: they handshake with ECDHE at the moment.
Re: Pulse dialling?
Where I live, last time I checked, you had to personally visit the office of the phone company and write a paper request to have DTMF enabled on your home line. So, I had to configure my SIP ATA to use pulse dialling.
Speaking of vintage tech, years before that, I was rather thrilled when I had an opportunity to connect a 386 PC running SCO UNIX to the telegraph network with a specialized adapter, and could login and enter commands from a real electromechanical telegraph terminal. At 50 baud!
Asymmetric crpyto is used for authentication (to verify the site you're going to isn't spoofed), but the session keys are negotiated by a Diffie-Hellman key exchange
When you do PK authentication you can establish the session key "for free" as a side effect. I guess this is usually done because it somewhat simplifies the handshake.
Arguably, encrypting data on a NAS is pointless.
Encrypting an Android device is mostly useless too.
Encrypting all data on a device makes sense if that device spends most of the time turned off. Such as a thumb drive, for instance. When "they" get the device, it does not contain the decryption key, so your data is safe. Ditto a laptop with FDE if you turn it off while not in use.
Encrypting data on a NAS device only helps against burglary, while the most probable attack is to take over the running device. While it is running, the decryption key is in its memory, and all data is accessible. Ditto Android device in your pocket that has dark screen, but running CPU. Encrypting it may be useful to comply with some stupid corporate policy, but does very little to protect the data from leakage.
What makes sense is to keep select sensitive bits encrypted, such as to keep passwords in a "crypto wallet". In such applications, the decryption key and decrypted data only stays in memory for a few minutes after you've entered the password, and is safely encrypted for the most of the lifetime of the device that carries it.
Mechanism for emergency mission abort?
Could it be useful to be able to destruct the balloon when it flies outside of the desired area, on command from the ground (if you have an upstream radio channel), or automatically by analysing the GPS data? Would have saved the payload on the last test flight.
@trevor and all interested should take a look at yubico's products. They are primarily designed to work with LastPass-alikes, but can be used without relying on a third-party cloud service. They are rather open (implement standards, most of the accompanying software is open source), which, to some degree, can solve the trust issue. I use their token to log into my machines locally, using challenge-response mode and open source PAM module.
I am not affiliated with them, just an enthusiastic user.
Re: What's the big deal?
Admittedly, one might call it "going out of the way", especially since it is not yet implemented.
Some Internet cafes in Ohio where running a side business of gambling.
New state legislation would make such side business unrewarding (without affecting the main business).
Some Internet cafes will become unprofitable without said side business and have to close.
So what? Why are we discussing this, again?
Internet access permission?
Why would a launcher need it? I think I pass.
Re: Butane is pointess
In general, batteries have much lower energy density than fossil fuels (including butane). The power output of a camp stove is about 3 kW. However, given low efficiency of the converter, it indeed does not make much sense economically.
It's cool, though.
Cross the sea, and settle in Morocco (or something) for these five days. I think you can get more rice for £1 there than in Spain. Maybe even some lamb.
Then again, in some remote Indian village, with £1/day to spend, you'd be a rich man. Probably.
Could be a contender as a "stick it to the back of the monitor" type PC if it had more RAM...
Re: another advert for supermicro?
Indeed, Supremicro was late to the LOM party. And, at the time when I was in this business, much less reliable than the competition.
I admit my experience with light out management is dated, I am in development for the last seven years. Still - ipmi is rather problematic from the security standpoint. No audit (and usually no source available), no updates if/when problems are discovered, limited choice of connection/authentication methods. This boils down to the need for a well-maintained gatekeeper machine on premises, isolating your management network from the Internet. Which means extra cost in equipment and support, and partly defeats the purpose because you won't be able to remotely handle that machine if it fails. We could afford such arrangement for a datacenter of a few hundred servers, but if you only have a few machines on a remote location, it's uneconomical.
because Somalia is the home of pirates these days.
That, or apply for a gTLD, as other suggested.
I was waiting till I could act like this: http://www.youtube.com/watch?v=MW9vSgUaXZU#t=1m2s
(loudspeaker because it speaks!)
How much help does the heater provide? Is it worth at all?
If could be useful to make measurements with the heater disconnected from the battery, for comparison.
If all you can get is 5℃, it may be not worth the effort. -60℃ vs. -55℃ - not likely to make any difference.
"Nokia is throwing its best engineering talent at Microsoft's mobile OS"
Nokia has thrown its best (well, allegedly..) engineering talent in the ditch...
People who want to "draw a raster display directly onto the retina" do not understand high-school-level optics.
"on-demand television - a business safe from the ARM-based competitors"
umm... I am not so sure.
is what the marketing types call it. In our tongue, that would be just "proper CSS" on the main web site. That is what we need, not another app.
Plus-one to the author for using the term "criminal hackers".
Another plus-one for the subtitle..
Re: USB authenticator cards...
What the hell are..
.. Home and Away and Round the Twist that cost you two downvotes?! Never heard of them. Here, have an upvote.
What does it mean?
SPEARS is programmed to issue the launch command only if the current altitude is above 20,000 metres (to be clear of air traffic) and we achieve the desired launch height.
You said it before, too, but the "and" does not make sense to me. Presuming the desired launch altitude is greater than 20000m, the first part is redundant:
if ((x > 2) ∧ (x > 5))
is equivalent to
if (x > 5)
Re: Orbital fuel dump
for the space economy to make any sense at all, we'll need propellent produced outside of the Earth's gravitational well. Lots and lots and lots of propellent. Everything else will be just marginal costs/benefits.
That is, assuming no wormholes or warp drive is invented soon.
Re: The cold cottage
Also, switching from cold beer to hot Glühwein (or Whisk[e]y, depending on your preferences) for the duration of the winter season should help!
But... will it be lucid?
that's all I need to know
- On the matter of shooting down Amazon delivery drones with shotguns
- Review Bring Your Own Disks: The Synology DS214 network storage box
- OHM MY GOD! Move over graphene, here comes '100% PERFECT' stanene
- IT MELTDOWN ruins Cyber Monday for RBS, Natwest customers
- Google's new cloud CRUSHES Amazon in RAM battle