* Posts by Michael Wojcik

12268 publicly visible posts • joined 21 Dec 2007

$600m in cryptocurrencies swiped from Poly Network

Michael Wojcik Silver badge

Re: Reset the clock!

Citation needed.

Cryptocurrencies are highly vulnerable to theft. There's no evidence I'm aware of to demonstrate that a majority of high-profile thefts are fraudulent. Care to provide some?

Michael Wojcik Silver badge

Shrug. Most of the victims are going to be legitimate cryptocurrency fans, high-risk investors, or small-time criminals. The chances of identifying the attacker are very low.

The DAO attacker retained around $8.5M (circa April 2021; I haven't looked for more recent figures) in ETC even after the post-DAO hard fork of Ethereum, and hasn't been identified yet. Probably never will be.

It wouldn't be hard to launder $300M in cryptocurrency, as long as you're patient and don't try to convert a lot at once. While there has been some promising work on de-anonymization and tracking of cryptocurrency transactions, including "tumbling" and other laundering operations, it's still quite limited, particularly against operators who have decent opsec.

I'm certainly not endorsing this sort of thing, but as criminal enterprises go I think it's both lucrative and low-risk, and so I expect we'll continue to see quite a lot of it.

Michael Wojcik Silver badge

Re: Oh poor deluded fools.

known as "exit scams", they make far more sense than theft

I'd estimate an exit scam is about as probable as straightforward theft. It's not like we haven't had other massive cryptocurrency thefts (e.g. the DAO), and someone who finds a vulnerability that enables this sort of theft – highly probable – and is sufficiently unethical to exploit it – also probable – will likely take the chance even knowing it may not be possible to make use of all of the stolen assets. The associated risk is very low, so if you have no moral qualms, why not?

Microsoft Patch Tuesday bug drought: No, it's not climate change or unexpected code quality improvements

Michael Wojcik Silver badge

Re: More to come of course...

That's the thing. The actual driver isn't all that large, though it's still a bloated mess. It's all the horrible garbage HP packages with their drivers that's taking up most of the space.

I will never buy another HP printer. The hardware is junk, from what I've seen; the ink is a blatant scam; and the software is just malware you pay for up front.

We'll drop SBOMs on UK.gov to solve Telecoms Security Bill's technical demands, beams Cisco

Michael Wojcik Silver badge

Re: And so we have churn

So we should ignore updating, because there's no difference between a version with both published and unpublished vulnerabilities, and a version with only unpublished ones?

If refraining from using computers at all fits your needs and threat model, then by all means feel free to do so. Otherwise your objection has no practical value.

Apple responds to critics of CSAM scan plan with FAQs, says it'd block governments subverting its system

Michael Wojcik Silver badge

Re: the hash?

It's not useless because of user behavior. Some users might go through the effort of transforming images until the output has a PhotoDNA vector sufficiently far from the original. Some might even create software to do that automatically. Hell, the really smart ones would train GANs to generate similar images based on an existing corpus – that's a lot cheaper1 than producing real images with real children.

But the vast majority will almost certainly continue to share images verbatim through various off-the-app-store-shelf messaging apps, and for them the PhotoDNA vectors will remain stable.

If the match rate ever fell below whatever target Apple have,2 they can switch to more-sophisticated algorithms. Run each photo through an CNN stack to extract high-level features, compress those, and measure distance in a high-dimensional space, for example. We have lots of classifier architectures that let you split the process at arbitrary points so you're not transmitting the original data.

1Is it less immoral and/or exploitative? There's a fun question for your ethics class.

2And that's probably very, very low. I have no evidence to speculate on how much of this is Apple trying to placate governments and NGOs, and how much is virtue-signalling, and how much is just meant to be the thin edge of the wedge, and how much might even be some sort of misguided altruism. But Apple can't reasonably be expecting to have many true positives, and probably is hoping the positive rate – true and false – is very, very low.

GitHub's npm gave away a package name while it was in use, causing rethink

Michael Wojcik Silver badge

Re: domain name system

Public package repositories and the "ecosystems" that have grown around them are toxic. The namespace problem is only one small part of that. Fixing it won't help much.

Some of the older public repositories, such as CPAN, are not quite as much of a mess because they began with better governance and evolved a measure of community oversight, and because they're not so popular with the kids and therefore don't attract quite so many trivial submissions. But on the whole it's a concept which can't be fixed in its current form.

Building applications with a vast and largely hidden array of direct and transitive dependencies of unknown provenance and quality is never going to work well.

Elastic amends Elasticsearch Python client so it won't work with forks then blocks comments

Michael Wojcik Silver badge

Re: Knickers

Well, I see my underwear has already been forked, so it's probably inevitable anyway.

Michael Wojcik Silver badge

Service bureaus are not "exactly the same" as cloud computing. They were a step in the direction of IT as a utility, but modern cloud platforms and infrastructure have gone far beyond what service bureaus did. And, importantly, the utility function for cloud computing is very different from that of service bureaus. The latter chiefly existed to amortize the large capital investment required for IT in various forms prior to 1990 or so, and so offered a value proposition mostly relevant to small and medium-size businesses. Cloud computing has a much flatter utility function with a much larger potential market because it's much more automated, has much finer granularity, and scales much larger.

And that's to be expected. Different economic constraints (and in this case they're very different on both the supply and consumption side) produce different economic formations. Disregarding those differences just produces false generalizations with little explanatory or predictive power.

Carr certainly wasn't right about everything in The Big Switch, but after 13 years his overall thesis is holding up pretty well.

I personally am not fond of cloud computing; I'm a hacker at heart and like to have control over the systems I work with. That's my comfort zone. And as an IT security professional I recognize the security issues of outsourced IT (though I'm also well aware of the issues with in-house IT...). But I understand the economics of cloud computing, how they beat the value propositions of earlier forms of centralized computing for many use cases, and why that's compelling to many organizations.

Michael Wojcik Silver badge

Re: Licences exist for a reason...

And, conversely, some of us Really Don't Care what other people do with our code or other intellectual property, including selling it and forking it and adding proprietary elements to it.

Michael Wojcik Silver badge

Re: Ugh...

Yes. Long before the FSF was a glint in Stallman's eye people were distributing software in source code and permitting its use in commercial products – regardless of whether it was the "sole basis".

And neither the FSF nor the OSI own the concept of open source or the term "open source", however they or their fans might wish otherwise. While various sources (including the inevitable one) credit Christine Petersen with coining it in 1998, "open source" was used at least in other contexts years earlier.

Wireless powersats promise clean, permanent, abundant energy. Sound familiar?

Michael Wojcik Silver badge

Re: Lets do the maths

I've always been fond of the "generate electric in the Sahara and use it to reform hydrocarbons on the coast" blue-sky proposal myself (as I dare say I've posted before).

I don't think CO2 capture from the atmosphere scales, though. (I mean, yes, it does for green plants, but not for this purpose.) And seawater doesn't look like a much better solution to me. I'd suggest shipping organic trash to the reforming plant -– it'd just be going to landfills or incinerators anyway – and reducing it to mostly carbon.

And I'd reform it into propane, not methane. Less to worry about a leak because propane is heavier than air so you can build capture-and-evacuate systems for it more easily, and methane is a potent GHG so a leak would have bad publicity.

We already have a good global propane delivery-and-storage network which just needs building up as we scale this process up; and it's easy to convert gasoline (petrol) engines to use propane, so the market for it can expand quickly. Lots of propane-consuming appliances are available at various price points, from household to industrial. Most "natural gas" appliances can be retrofitted to use propane. It's kind of a sweet spot for a hydrocarbon fuel.

Michael Wojcik Silver badge

Re: Modern, safe nuclear power as a baseload / backstop is a possibility

jake, you live in California, you should know better. In dam country, dams are a religion. Thou Shalt Not Question Dams. Nothing ever goes wrong with dams.

(I'll also note the original poster wrote "in most countries". There's a reason why hydroelectric isn't the dominant source of electrical generation in most places. The Hydro-Quebec objection is cherry-picking.)

Please, no Moore: 'Law' that defined how chips have been made for decades has run itself into a cul-de-sac

Michael Wojcik Silver badge

Masoch's Law got a boost thanks to Rule 34 but has plateaued since.

Michael Wojcik Silver badge

Re: Yes but...

Quantum computing has nothing to do with general-purpose computing power.

There is a family of algorithms in the BQP complexity class which experience a benefit in terms of computational complexity in a (general) quantum computer.1 That's a complexity improvement – they might not actually be faster at identifying a solution than typical already-available classical computers until the problem size gets large enough that the required number of qubits becomes infeasible.

There are other complexity classes which describe hypothetical QC algorithms, such as PDQP, but they're probably not possible to achieve in real machines. And there are classes which tweak BQP (such as PostBQP, which just means "if you get the wrong answer, try again"; it's most notable because it's been proven to equal PP, but then so has PQP so eventually it's all turtles), but they don't fundamentally change what sorts of problems general QC addresses.

Quantum computing isn't "MOR SPEEDZ!". It's a very particular thing which addresses certain computations that, while applicable to many problems, by no means cover all computable functions. And QC in practice is vanishingly unlikely to ever be fast enough to be interesting for small problems. It will only apply when N is large enough to be intractable for classical machines.

1Non-general QC approaches, such as the quantum-annealing approach that D-Wave's machines might be using (last I looked, there was still some debate about that), are even more limited. QA machines can't implement Shor's or Grover's algorithm (except in the sense that they could emulate them using classical computing, just like any other digital computer); they just solve spin-glass problems using annealing.

Michael Wojcik Silver badge

Re: About time too

As a rule of thumb, if a programming dictum is short enough to fit on a bumper sticker, it's probably naive and generally unhelpful.

(That rule doesn't apply to itself, because it's at a higher layer of abstraction.)

Michael Wojcik Silver badge

Re: Moore's law expired in 1975

Philosophically speaking, there's no reason that intelligence couldn't arise in computation

This is wrong as stated – philosophy is precisely the domain where such reasons have been proposed.

Personally I am not convinced by them, but they exist.

Michael Wojcik Silver badge

Re: Moore's law expired in 1975

Whatever a computer does succeed in doing via boolean logic, you could decide afterwards that it doesn't count.

This is precisely why the question is one of philosophy, not of science or engineering. Any definition of "intelligence" is always going to be substantially subjective.

There's a substantial body of work in theory of mind that considers the question of non-human minds in general and mechanical minds in particular. Some of this is well-known, though often misunderstood – Turing's Imitation Game and Searle's Chinese Room are the two leading examples.

The Imitation Game is a proposal in the Pragmatist tradition which suggests that intelligence ought to be defined by evaluating its surface attributes. (The exact definition of the game is irrelevant; it's simply an illustration. The obsession in some parts of the computing community with actually conducting it is a bit embarrassing.)

The Chinese Room is a refutation of one particular approach to machine intelligence, the one Searle described as "symbolic manipulation". It's essentially in the Logical-Positivist tradition (though not in a strict sense – it's allied with ideas from some of critics of LP), at least in being motivated by the critique of language. In the original paper Searle says, in effect, that while he's not sure what intelligence is, he's pretty sure that it's not symbolic manipulation. Some people take this to be a rejection of any possibility of artificial intelligence, but Searle himself wrote, in one of his responses to critiques of the Chinese Room paper, that he believes mind to be a phenomenon produced by physical processes, and thus some sort of machine mind is possible.

Neither of these positions considers the distinction between anthropic (human-like) machine intelligence and non-anthropic. It's entirely possible (and this has been considered by others working in philosophy of mind, in a wide variety of schools) that the first, or even only, machine minds we ever create will be fundamentally so alien that there will never be consensus on whether they ought to be called "mind" or "intelligence" at all. Nor do they deal with many other problems in philosophy of mind such as the p-zombie question.

I would suggest, though, that to draw a hard line between "intelligence" (even if some attempt is made to define it, which few commentators bother to do) and any given technology is to commit a category error. It is possible, if you're very careful and thorough, to draw a distinction between instantiation of a process and simulation of a process – Searle tries to do this elsewhere in arguing for his biological naturalism – but not everyone finds such arguments convincing, and they are not as sweeping as simply declaring that some technology (whether physical or formal) is incompatible with the requirements for a foundation for intelligence (or mind, or sapience, or whatever handwaving term you prefer).

Ch-ch-ch-Chia! HDD sales soar to record levels as latest crypto craze sweeps Europe

Michael Wojcik Silver badge

Re: Hunters-gatherers

The real trick would be a cryptocurrency based on Proof of Hype. That appears to be an unlimited resource.

Michael Wojcik Silver badge

Re: Quick buck

To be fair, there is a quick buck to be made. Just guess which new tweak will become the next fad, get in early, and cash out before things sour. Or, of course, sell shovels drives.

I suspect there's still money to be made in Ether, because so much is tied up in Ethereum smart contracts1 and, according to studies I've read, a large portion of those are doing actual business processing for someone. So the value base is broader.

But I wouldn't get into it myself. Not interested in the risk, and even less in spending my time and energy in figuring out a profitable angle and working it.

1Which are neither.

Google hits undo on Chrome browser alert change that broke websites, web apps

Michael Wojcik Silver badge

It's more secure than encryption

"This apple is more food than baking!"

Michael Wojcik Silver badge

Not 1980. ALTER was moved to "Obsolete" status in COBOL-85 and removed entirely in COBOL-2002.

It might be worth noting that ALTER didn't enable arbitrary code modifications. It only permits changing a specific subset of GO TO statements (they have to be non-computed GO TOs that are the only statements in their enclosing paragraphs) to refer to different labels.

Since COBOL's GO TO uses paragraph names as its labels, and given the restrictions on COBOL's paragraph-level control flow and the aspects of it which the standard leaves to the implementation, ALTER can easily be implemented without actually modifying code at runtime. It can be treated as syntactic sugar for conditional branches or implemented with (the equivalent of) function pointers, for example.

The primary argument against ALTER was that it made control-flow analysis too difficult, but it's really not any worse than function pointers in C. In fact it's better, because the target has to be in the same translation unit and has to be a literal; you can't play games with, say, dynamic symbol resolution as you can in many C implementations (if not in strictly-conforming C). Hysteria over an inflated bugbear.

Michael Wojcik Silver badge

Re: Chrome is not a browser

Because no one uses TLS? And <input type="password"> is magically safer on the wire than Basic Auth?

Facebook takes bold stance on privacy – of its ads: Independent transparency research blocked

Michael Wojcik Silver badge

It's not possible to avoid all of them without significantly reducing your consumer choice

This may be true for you, and for many other people; I haven't seen any methodologically-sound research on the subject. But I have never contacted any company by Facebook, and while I've used it on a couple of occasions to respond to meeting announcements for local organizations, I could easily do without that.

I haven't read Twitter in years and I've never posted anything to it. I've never even had an Instagram or WhatsApp account.

I haven't "reduc[ed my] consumer choice" in any way I can discern. My refusal to use social media has had precisely no effect on how I interact with businesses or my ability to do so, and has had minimal effect on how I interact with organizations and individuals.

Don't rush to adopt QUIC – it's a slog to make it faster than TCP

Michael Wojcik Silver badge

Re: TCP is wrong for most network transactions

Not really. The original point of the OSI stack was to be descriptive. Actual implementations were a secondary concern.

But in any case the claim you quoted is wrong, for the obvious reason that a great many programmers will use existing implementations of higher-level protocols which provide framing and messaging. Most programmers working on distributed systems are writing web applications – most commonly in Javascript – which use existing HTTP implementations. Someone writing XHR requests for an RIA / SPA (or, more likely, writing to a Javascript framework which hides XHR under more layers of abstraction) is most certainly not worrying about framing and messaging of those requests and their responses.

So "invariably" is a load of rubbish.

There are those of us who do work with protocols at a lower level and have to worry about implementing things like message reassembly, but that's relatively rare, and should be rarer. I'd say 90% of the questions I see about sockets and other lower-level communications APIs online should be answered with "you're doing it wrong – use a higher level".

SolarWinds urges US judge to toss out crap infosec sueball: We got pwned by actual Russia, give us a break

Michael Wojcik Silver badge

Re: Precedent

Frankly, the motion should be thrown out merely for the "most sophisticated cyberattack in history" claim.

Google: Linux kernel and its toolchains are underinvested by at least 100 engineers

Michael Wojcik Silver badge

Re: Please stop calling computer programmers "engineers".

Engineers drive trains. When was the last time you saw a programmer driving a train?

Language changes. I don't care for the title "Engineer" for software developers myself – and it's in my official title – and I sympathize with the desire to keep "engineer" as a professional designation, though that's certainly not without problems. But this ship appears to have sailed.

Michael Wojcik Silver badge

Re: The mythical man hour

Certainly adding a hundred developers won't reduce the run rate of kernel fixes any time soon. Either they'll be fixing more bugs, or they won't be productive. So most of the issues raised by Cook – the rapid fix rate, the need to upgrade or backport fixes, and so on – aren't alleviated by adding kernel developers.

That doesn't mean kernel development isn't understaffed or doesn't need additional resources. It just means adding developers doesn't address most of Cook's list.

Michael Wojcik Silver badge

Re: Linus' bugs

EVERY program issue fundamentally gets reduced to an improperly coded function - every one.

This is only supportable if you allow "improperly coded" to include errors in system design, errors in requirement discover or specification, and other concerns which are far from coding in the levels of abstraction. Even then it's probably not valid. How is a change in requirements "improper coding", for example?

In short, it's nonsense. And so is Linus's statement. Being intelligent and having strong opinions does not make someone automatically correct.

US SEC chair calls for crypto regulation

Michael Wojcik Silver badge

Re: They're doing such a fine job thus far

So, be perfect or do nothing? That's a fine plan.

Michael Wojcik Silver badge

Re: Hmm.

Gensler didn't claim it was new – quite the opposite, in fact. Try reading for comprehension.

Michael Wojcik Silver badge

Re: He doesn't go far enough

Anything can be a currency.

A sophomorism. Currencies are distinguished in part by their use of fungible tokens. Works of art and other collectables are by definition not fungible; that's what makes them collectable.

Bitcoins are securities. Equity-backed stablecoins (which, from the article, it apepars Gensler referred to specifically) are securities. NFTs are not. Paintings and trading cards are not.

Michael Wojcik Silver badge

Re: Go Gary !

Really it's more like the wildcat-banking era than the Wild West. The Wild West wasn't all that wild, economically.

Michael Wojcik Silver badge

Re: Probably Long Overdue

Cryptocurrency is based on a fundamental error: that proof of labour is necessarily equivalent to proof of value.

Proof-of-work is not a necessary feature of cryptocurrencies. (Nor is a public, distributed ledger, which another commentator mentioned.)

I'm not a fan of cryptocurrencies, but if we're going to critique them in the abstract, we ought to define them properly.

UK chancellor: Getting back to the altar of corporate dreams (the office) will boost young folks' careers

Michael Wojcik Silver badge

That sounds plausible, but out of curiosity I dug up some analyses on the recent performance of REITs (Real Estate Investment Trusts), as a proxy for the health of the commercial real-estate market, and it appears they've been surprisingly robust. A sample quote:

It is important to take note of the REIT resilience through the crisis and their ongoing recovery. The year-to-date total return of the FTSE Nareit All Equity REITs index at the end of May was 18.1% and the index is 4.3% above its pre-pandemic high. Capital markets are open and we are observing growth oriented M&A transactions that reflect confidence in business models and the sector outlooks. Operationally, REIT earnings are recovering quickly, with aggregate FFO now at 85% of its pre-pandemic level.

That article did go on to note that WFH remains a concern for its long-term effect on the commercial-property market. But for now, at least, commercial real estate in the US (no idea about other countries) seems strong.

I suppose we'll see in a year or two how that unfolds. I certainly don't know enough about the commercial real-estate market to make any predictions that aren't better than wild guesses. (Whether anyone does ... well, I'll let you decide that for yourself.)

Michael Wojcik Silver badge

I don't know. If you've ever seen the debates in the US Congress (either chamber), you might well find yourself missing some booing and braying. US legislative debates – such as they are, since they're usually just junior members reading prepared statements into the record while no one pays attention – tend to be mind-bogglingly boring.

Russia tells UN it wants vast expansion of cybercrime offenses, plus network backdoors, online censorship

Michael Wojcik Silver badge

My guess is that the US government is at least as heavily engaged in "cyber crime" (and probably better at it) as Russia is, just not for altogether the same ends.

Really, there's no need to guess; it's amply documented. I don't think any reputable IT-security experts disagree that the US is one of the top-tier nation-state IT-weapon developers. Generally speaking, the top-tier and second-tier rankings from various observers are pretty consistent, and they're supported by plenty of evidence. In the case of the US, that includes disclosures like the Snowden and Winner leaks, breaches like the Shadow Brokers dump, journalist and NGO investigations into incidents such as Stuxnet, and information from official sources such as government reports.

On the other hand, it doesn't make much sense to make wild claims about which of the top-tier nations "does the most", as some commentators have here. We have some idea of the scope of US hacking activity, and some of the scope of Russia's, and China's, and Israel's, and so forth. Those give us lower bounds. The evidence to support upper bounds is much scarcer and less reliable.

And, more importantly, it doesn't matter. All the top-tier, second-tier, and even third-tier states are doing as much as they can. As you say, they have different goals as well as different capabilities, and those shape what those efforts look like and how successful they are. That's a far more interesting and useful observation than the sophomoric tu quoques being thrown about by some people.

I do take exception to this statement, though: "The West will never agree to a proposal that will in any way endanger or expose our hacking". History shows quite the opposite. Nations, including Russia and those of "the West", have been perfectly happy to propose, and agree to, all sorts of things in public, while ignoring them in private – and for that matter often abrogating them in public as well.

There will be more proposals like this. There may well be treaties. They won't change much of anything, except perhaps the public posturing and claims of innocence. If anything, they'll be a bit more incentive for signatories to improve their false-flagging efforts.

Credit-card-stealing, backdoored packages found in Python's PyPI library hub

Michael Wojcik Silver badge

Re: Application Overreach

the secrecy of a 16 digit (10 of which differ) number that we give out to every waiter / gas station / store clerk

Virtual credit cards, like those issued by privacy.com, avoid this problem. One number per merchant, locked to that merchant, and with other limits set by the user: single use, maximum per transaction, maximum per time period, etc. Push notifications every time the card is used.

But since they're virtual they're online-only (unless you're up for manufacturing your own physical cards), and there are still some payment processors who won't accept them (due to not following the standards properly).

privacy.com makes its money off transaction fees, so there's no additional cost to the consumer over using a bank-issued card.

I have no relationship with privacy.com except as a customer.

PwnedPiper vulns have potential to turn Swisslog's PTS hospital products into Swiss cheese, says Armis

Michael Wojcik Silver badge

Re: wow

Telnet is still widely used, particularly the TN3270 / TN3270E variants1 with z systems, and in somewhat smaller numbers the Telnet variants for other mainframe-class systems such as i and Unisys ClearPath.

Telnet can be used securely when tunneled over TLS, or even using "opportunistic TLS" (STARTTLS) provided both sides enforce it (so a MITM can't downgrade to plaintext). There's also Thomas Wu's SRP-enabled Telnet, which offers not only message confidentiality and integrity but ZKP authentication; it's less widely available but there are both clients and servers.

1Technically, TN3270 is "regular" Telnet with various options such as Binary and EOR enabled during negotiation. TN3270E negotiates a single more-complex option with various sub-options, and then adds a header to the Telnet records. Both use EBCDIC once negotiation completes and are significantly different from NVT mode, but TN3270E is more different.

Australian court rules an AI can be considered an inventor on patent filings

Michael Wojcik Silver badge

Indeed. It's Sommerfield who's advocating "judicial activism", at least based on what's in the article.

That's not to say that machine-generated inventions should be allowed, just that Australian law apparently does not forbid them. That's a legislative issue, not a judicial one.

Apparently many commentators here also have trouble with that concept. (But then this is a Reg tradition: the comments on any article which mentions "AI" or machine learning must include a standard set of sophomoric claims about statistics, the Turing test, "real AI", etc., all displaying a distressing lack of understanding of the subject.)

Wanna use your Nvidia GPU for acceleration but put off by CUDA? OpenAI has a Python-based alternative

Michael Wojcik Silver badge

Re: The idea that ShotSpotter 'alters' or 'fabricates' evidence in any way is an outrageous lie

In this case, ShotSpotter did nothing to bias or alter the outcome.

And your evidence for this is what? The claim from ShotSpotter? Yes, that's very convincing.

One of the many problems with the US justice system is that it is increasingly being infiltrated with black-box proprietary algorithms. Defendants have claimed this violates their due-process and Sixth Amendment (right to confront witnesses) rights – correctly, in my opinion.

The vendors of these systems need to be compelled to make all of the relevant information, including hardware designs, source code, test results, and actual data, available to the defense and whatever experts it wishes to employ. If not, then it shouldn't be admissible. If that's a problem for the continued commercial success of those vendors, tough. They decided to get into the conviction business.

The Register just found 300-odd Itanium CPUs on eBay

Michael Wojcik Silver badge

Re: Optimised in compiler

To be fair, it wasn't just the Alpha team. NexGen showed it was feasible to ship an x86 CPU that decoded the CISC stream into RISC instructions to speed up the ALU, for example – and more importantly, showed Intel that if they didn't do it, someone else would. A lesson they'd have to learn all over again when AMD started shipping x64 CPUs.

(AMD also acquired NexGen, of course. And eventually some of the stuff from Cyrix after its acquisition by National Semi.)

Michael Wojcik Silver badge

Re: Optimised in compiler

IBM moved the AS/400 from a proprietary CISC architecture (IMPI) to POWER around the same time Apple switched to PPC. Many binaries (those that were "observable", i.e. included debug information) didn't even need to be recompiled, because the '400 used a binary format (TIMI) that was compiled to machine code at load time.

And, of course, we must have the obligatory mentions of various portable-software systems such as UCSD p-Code, Java bytecode, and OSF's AND-F (meant to be converted to native at installation time). Not to mention Micro Focus's own INT format, which came after UCSD p-code but preceded the other two.

Sysadmins: Why not simply verify there's no backdoor in every program you install, and thus avoid any cyber-drama?

Michael Wojcik Silver badge

Re: lack of a clue on the basics

Yeah. Code signing certainly isn't a silver bullet, and plenty of attacks have bypassed it in various ways. Organizations are often very poor about key hygiene. But defense in depth, man.

Of course, it hasn't been all that many years since I last saw an organization that didn't even use a change-management system for source code. Even the most basic good practices will go ignored in some places.

Michael Wojcik Silver badge

Not ENISA's best work

This report is a bit bizarre.

Their definition of "supply-chain attack" is at least spelled out pretty well, but it's also a bit arbitrary. They require "a supplier being compromised", so for example uploading malicious packages to public repositories doesn't count unless you actually replace someone else's package – even for "brandjacking" cases (chapter 6).

And even given their restrictive definition, I'm not sure how NotPetya – by far the most damaging supply-chain attack thus far – didn't make the cut. It involved planting a malicious update in the update stream for the M.E.Doc software package. That update was then used to compromise systems that had M.E.Doc installed. The payload was a worm, so it spread much further, but the initial infection vector was supply-chain.

That said, the taxonomy they propose is straightforward and easy to use. And they have an icon of a hacker as some dude in an anorak, so they're not flouting tradition.

Michael Wojcik Silver badge

Re: How about using proper change control ?

Argh. Look at the mechanisms involved in most software supply-chain attacks. Code signing (there's no need for a separate hash, so I have no idea why you mentioned MD5 – which is no longer sufficiently collision-safe anyway) would not have prevented them.

It's not like we don't understand how supply-chain attacks work. There's plenty of analysis readily available which would demonstrate why simple solutions aren't effective.

I know, I know. This is the Reg forums, where everyone with an armchair is an expert.

Here's 30 servers Russian intelligence uses to fling malware at the West, beams RiskIQ

Michael Wojcik Silver badge

Re: if you know the suspect addresses

Which leads to the question why can't you, or won't, just stamp it out?

"Can't" is very difficult. The US most certainly does not have the capability to do that without massive collateral damage (sorry, NSA trufans).

To really understand why you'd need to learn quite a lot about the current state of IT security, but you might start by reading some of the major IT-security blogs and mailing lists such as (just as examples, in no particular order) Full Disclosure, Threatpost, Brian Krebs' blog, Bruce Schneier's blog (or his CRYPTO-GRAM email newsletter), and Graham Cluley's blog. And also some of the more-rigorous research outlets such as Citizen Labs' publications and the research announced in Cambridge's Light Blue Touchpaper blog.

Or you could just read decent popular treatments such as Greenberg's Sandworm, which is a pretty good piece of investigative reporting. (I'm not usually a fan of Wired's output, but Greenberg does his research.)

As for "won't" – well, as it happens, a number of people have asked US Federal officials about why the US response to IT attacks has been so inconsistent and generally muted. The answers (when they aren't just the usual waffling bullshit) are pretty consistent: the US government doesn't want to advocate rules in this area that it doesn't want to abide by. Various agencies in the US believe we have good IT offensive capabilities and can develop better ones, so they aren't willing to take, say, attacks on civilian infrastructure (like the Ukraine blackouts perpetrated by Sandworm / Voodoo Bear1) off the table. Those are likely to be very useful in future conflicts.

As for why the US government doesn't just happily rattle its sabre over these sorts of attacks and then go on to do the same thing ... well, that's a matter of geopolitics and diplomacy. Sometimes not appearing hypocritical is useful. Sometimes not making promises you don't want to keep is useful.

1Some reports have grouped Sandworm, aka Voodoo Bear, in APT28 (aka Fancy Bear), but there's evidence to suggest this is incorrect; specifically that Fancy Bear and Sandworm / Voodoo Bear are separate GRU units which sometimes both contribute to specific campaigns.

Tech spec experts seek allies to tear down ISO standards paywall

Michael Wojcik Silver badge

Re: Eye opener

It used to be the case that some national standards bodies published standards "aligned with", and essentially identical to, various ISO standards, for much less money. Other posters have mentioned that BSI used to do this in the UK. In the US, for another example, you could by the ANSI 1990 C standard for (IIRC) $18, which was much cheaper than ISO 9899:1990 at the time (about an order of magnitude more expensive, I think), but they had the same content.1

So in many places, many of the more-popular ISO standards were ignored because you'd just refer to the corresponding national standard instead. Even things like section numbers were the same, so you could cite the ISO standard without actually consulting it.

Alas, that is no longer the case, at least as far as ANSI is concerned. I get the impression it's not true of BSI either.

1Of course, the C90 standard was a special case, because of the existence of Schildt's book The Annotated ANSI C Standard, which reproduced the entire standard and cost less at the time than the actual standard did from ANSI. The predominant opinion on comp.std.c was that the price difference reflected the value of Schildt's annotations, but you were free to ignore those.

Michael Wojcik Silver badge

Re: Short, succint and to the point

Many consumers don't care, at least for organizational purchases. Someone in the C-suite reads an article about, say, ISO 27001, and sends out a memo: "Our vendors should comply with ISO 27001!". Then it becomes a checkbox when someone needs to complete a purchasing request or RFP.

They may well never have seen the 27001 specification, or even know anything about it. That's irrelevant.

Jack Dorsey's side hustle – payments outfit Square – acquires buy now pay later darling Afterpay for $29bn

Michael Wojcik Silver badge

Re: Remember Lay by?

Alternatively, some vendors will offer discounts if you buy on credit, as long as you go through one of their partners, who will give them a kickback. Banks are eager to sign up new revolving-credit customers whom they can milk for years afterward.