* Posts by Donn Bly

447 publicly visible posts • joined 10 Jan 2008

Page:

That's bang out of order: Threesome hookup app 3Fun leaked lovers' data, locations, pix – report

Donn Bly

Re: Mind bleach

I'm more concerned about the ones waking up with a smile

US court nixes Google's $5.5m court payoff over Safari Workaround – no one affected saw cash

Donn Bly

Who gets the money?

Since this was a civil matter, not criminal, we can't give those who did it jail time - so what are the other options?

In order for a individual to claim damages, they have to be able to demonstrate an ACTUAL damage, and putting a cookie on a browser doesn't constitute a monetary damage to the owner or user of the iphone. Even with treble damages, 3 x 0 remains 0 so there wouldn't be any money going to the individuals.

Without changes to the laws, or misuse of existing law ("honest services fraud" perhaps?) the only people getting any money are the lawyers.

Choc-a-block: AWS sues sales exec for legging it to Google Cloud. Yup, another bitter battle over non-compete clauses

Donn Bly

Re: @Mage Not so crazy ... Crazy

Amazon sued Moyer, not Google, so Google isn't in a position to have anything tossed.

Donn Bly

Re: Incompetent counsel

Yes, you are missing something. If you read the linked filing you would find:

III.JURISDICTION AND VENUE

5. This Court has jurisdiction over Moyer and the subject matter of this action because Moyer entered into the Confidentiality, Noncompetition and Invention Assignment Agreement (“Noncompetition Agreement”) with Amazon in Washington and Moyer expressly consented to the exclusive jurisdiction of courts located in King County, Washington in the Noncompetition Agreement.

6.Venue properly lies in King County because a substantial part of the events giving rise to this claim occurred in King County and the express terms of Moyer’s Noncompetition Agreement with Amazon provide that venue for any action brought to enforce that agreement shall be in King County, Washington

F-B-Yikes! FBI bod allegedly hid spy camera under desk to snap coworker's upskirt pics

Donn Bly

In the American Court System you should always plead "not guilty" and make the prosecution prove their case. They might get over-confident and screw up, or make claims that you can disprove and weaken their overall case. You might even be able to claim some mitigating circumstance if your lawyer can think of one. But if you plead guilty you have no control and they might even throw in extra stuff that you DIDN'T do just to make the case seem like a bigger win for them, or just open with an overcharged offense.

If they come back with a plea deal you can always change your plea to "guilty" to take advantage of it, but you can't change your plea once you have plead guilty.

Jeff Bezos feels a tap on the shoulder. Ahem, Mr Amazon, care to explain how Capital One's AWS S3 buckets got hacked?

Donn Bly

Whose Fault

If a customer takes an enterprise class firewall and configures it in such a way to be insecure, is it the customer at fault or the manufacturer who "allows" its products to be used insecurely?

What ever happened to taking responsibility for your own stuff? We aren't talking about a $40 home router bought at a box store and plugged into a cable modem, we are talking about enterprise-class device configurations that don't route ANYTHING unless being told to do so. Proper security is HARD and mistakes can happen, but this senator sounds sounds clueless. I read his request as a demand for Amazon to deliver a list in 6 days of "all other companies that in the last 2 years have had their data pillaged while stored on AWS using both known and unknown vulnerabilities as well as misconfiguration". The scope of that question is enormous, and to expect an accurate answer in days?

I get the points about asking if there are known security-related bugs in their services or whether she used inside knowledge and access from her brief stint at Amazon to conduct the raid, but at this point I haven't even seen enough on the Capitol One fiasco to know whether the misconfigured firewall even sat in the AWS cloud or was a on-premise firewall that had a tunnel to AWS. All I have seen is that Capitol One (not Amazon) reconfigured the firewall to close the hole, and that she used the same VPN to hit the buckets as her GitHub account so it was trivilly easy to trace her back. Neither of those makes it sound like an inside job, nor would I expect AWS to be the one heading up the forensic examination.

I'm going to wait on the dust to settle so that an after-action report supported by documentation is written and published before I draw any other conclusions, and the US Senate should too. My guess is that the investigation by the FBI is "ongoing" and it would be improper for Amazon to even answer some of those questions.

Disabled by default: Microsoft ups the ante in its war against VBScript on Internet Explorer

Donn Bly

Internet Web Version = No.

Intranet Web Version = Maybe.

In the days before .Net and modern web development languages, it was a viable tool in the toolbox of things that could be used to for automating custom business processes.

HTA files were a way to duct-tape different systems together using Internet Explorer. I once wrote a system to integrate an internet-facing online store (it used Zen Cart or OS Commerce, I forget) with UPS Worldship running on a shipping station in a warehouse. It would automatically download new orders (via xml over https), print out the barcoded picking tickets, insert the customer information into the shipping software and read the weights and tracking numbers out of the UPS Software via ODBC, update the shopping cart with shipment status and tracking information, print invoices to include in the box, send shipping notices to customers with their tracking numbers and estimated delivery dates, etc. -- all automated and running in background. The only thing the warehouse picker had to do was pick up a box and picking ticket at one end of the line, fill it with product, stick it on the scale, stick the picking ticket under the barcode scanner, press enter after the last box was weighed, tape up the box and apply the labels (which were automatically printed as well)

There was even a automatically refreshing web-based dashboard that the front office could use to see how many orders were queued, how long the oldest order had been in the queue, any products that were nearing re-ordering points, etc. -- but that part used Javascript and PHP so that it could be pulled up from anywhere,

It was relatively simple to design and implement using HTA and VBScript, but to do the same thing today using "modern" development tools would take 4 times as long and would be harder and more expensive to maintain. If I remember the hardest thing to do was figure out a way to automatically print the invoices on a local printer and the picking slips on a remote network printer.

Of course there were disadvantages too - but just like anything else you had to weigh and pros and the cons and determine the fitness for the application.

(and yes, this was all done more than 10 years ago)

Y2K, Windows NT4 Server and Notes. It's a 1990s Who, Me? special

Donn Bly

Re: Even to this day...

Agreed - and production machines get a red background embossed with the machine name while development and staging machines have different colors.

It's official: Deploying Facebook's 'Like' button on your website makes you a joint data slurper

Donn Bly

Re: No f in button?

I have the same image url on my end, and I checked a couple of different articles and they have the same image url as well so it isn't tagged to the article either.

The button uses jquery to launch the Facebook UI, passing the url of the page on which the button was clicked. There, you would then have to provide your facebook credentials if you are not already logged in from another tab, and at which point you are then tagged and tracked.

So, it looks like the button and image are not trackers in and of themselves, but if you click on it you will be launching a tracker.

We don't mean to poo-poo this, but... The Internet of S**t has literally arrived thanks to Pampers smart diapers

Donn Bly

As much as it is taking things too far

Not that I would buy it, but I can actually see a legitimate use for this technology in nursing homes, hospitals, day care facilities, etc. I know that there were times that I had to pick my child up from daycare and found their bottom irritated because the daycare workers left them sitting in a soiled diaper for too long, and I could see a market for a product or system that would do monitoring to ensure that the workers were changing the diapers when they should.

None of us wants to leave our children in the hands of a stranger, but it is a fact of life that at least some of us have to work. I see this more for the parent who ISN'T there than for the individual providing care at that moment.

FCC boosts broadband competition by, er, banning broadband competition in buildings

Donn Bly

Middle Ground

There needs to be a middle ground. If I as an individual or company use my own money to install wiring into a building with the idea of making money off of that investment later, the government (federal or local) should not have the right to force me to turn over that investment to someone else so that they can make money off of my hard work.

At the same time, if I am renting a unit or building to someone as property owner I shouldn't be allowed to dictate what provider they use, and facilitate access to all providers.

Both sides are using straw man arguments, both sides are exaggerating their opponent's positions, and both sides misrepresent their own written positions with their verbal explanations. In other words SNAFU

There are problems with the San Francisco law. For example, the law as written means that a property owner who installed wire for future installation of alarms or cameras would have to allow an ISP to use those lines to provide internet access instead of requiring the ISP to install their own cable, thus blocking the owner of the property from using their property and investment as intended.

The city's claim that their ordinance "does not require sharing of 'in-use' wiring" is a bit disingenuous, because their ordinance DOES require the sharing of wiring -- it just doesn't differentiate between in-use and idle facilities.

The San Francisco law *DOES NOT* however force a one cable company to give over their cables to a competitor -- it only applied to lines OWNED by the property owner.

Since I have PO'd both sides with a relatively balanced analysis, let the downvotes begin....

RTFM: Wireless Broadband Alliance squeezes out 40-page ode to the joy of Wi-Fi 6

Donn Bly

76 per cent of US households are using Wi-Fi as the primary broadband connection

No, they are not. No, their PRIMARY connection will be fiber, twisted pair, coax, or 4G Cellular.

The US does not even have 76% takeup of all broadband where it is available, let alone where it is not, and unless the household is on a small rural WISP they probably aren't using WiFi -- and if they are then the WiFi-based WISP doesn't deliver a service level that is compatible with the FCC's current definition of broadband.

Now, of households with broadband it is certainly probable that 76% or greater have WiFi, but even then many serious home users still use an Ethernet connection on their "primary" devices because they know that the more that they offload from WiFi that everything, WiFi connected or not, will run faster and better.

Years late to the SMB1-killing party, Samba finally dumps the unsafe file-sharing protocol version by default

Donn Bly

Re: "Off by default"

If you are far enough in to turn it back on, then you might as well install your own back door instead of using a SMB1 as a buggy one.

Oh snap! The road's closed. Never mind, Google Maps has a plan...

Donn Bly

Re: The technology is somewhat hit and miss

I used to have a Tom-Tom, but got tired of it telling me to get out of the cornfields. Even with their most recent (at the time) maps they were not not taking into consideration that the highway US-24 had been relocated years before, having been rebuilt as a 4-lane divided highway instead of a 2-lane road. Apple was no better, because at the time they bought their mapping data from Tom Tom.

Sneaky fingerprinting script in Microsoft ad slips onto StackOverflow, against site policy

Donn Bly

Re: Noscript to the rescue

Or use sandboxie if you are testing with Windows platforms.

Must watch: GE's smart light bulb reset process is a masterpiece... of modern techno-insanity

Donn Bly

Re: Designed by SW engineers

I don't know, I might implement something like that if they turned down my vacation request....

Donn Bly

Re: WTF?

Remote exploit -- you mean like pulling the outdoor electric meter from the base and plugging it back in repeatedly?

I remember one time many, many years ago in the days of BBS systems and FidoNet I was tasked with keeping our local net's echo server running when the normal Sysop was out of town -- but he didn't give me a key to his house and shortly after he left his system froze. I drove to his house, pulled the meter, waited for the UPS to die, and plugged it back in. Problem sorted ;-)

*Spits out coffee* £4m for a database of drone fliers, UK.gov? Defra did game shooters for £300k

Donn Bly

Re: Spot On

Yes, but those extra constraints are why the OP took the estimated $10K development costs and multiplied his estimate by 100 before offering it. I think that he would still be within budget.

US border cops confirm: Maker of America's license-plate, driver recognition tech hacked, camera images swiped

Donn Bly

Re: Subcontractor’s network compromised?

First, What difference does the "class" of computer make? Who cares if their storage network is on a mainframe or not as it was likely a workstation that was compromised -- and thus the criminals would have had access to whatever data the computer's user's credentials would have had.

Second, as the article clearly states, The Register had previously publicly identified Perceptics as the likely contractor.

This isn't Yahoo or MSN, the articles posted here do occasionally contain actual information if you actually read to the end.

When it comes to DNS over HTTPS, it's privacy in excess, frets UK child exploitation watchdog

Donn Bly

re: anarchism in action

Isn't Linux (at least in its earlier days), and many other open-source projects, not essentially an example of anarchism in action?

Not really, in my observance successful open source projects generally don't exhibit a high level of anarchy. When anarchy rises then the projects generally fork or die. Survival of the fittest then determines who survives.

I would say that most successful open source projects grow and thrive under a "benevolent dictator". For instance in your given example of Linux, when you think of Linux and of Linus Torvalds would you use the word "anarchist" or ""dictator" to describe his management style?

Legacy app whitelist can be abused to bypass latest macOS security defenses, expert warns

Donn Bly

Legacy Applications

Apple is now seeing the collateral damage caused by trying to maintain backwards compatibility with old applications -- something with which Microsoft's desktop operating systems have had to contend for years (and by doing so were largey security failures).

Upgrades are often a lose-lose proposition. Either they orphan the old applications (like they did when OSX came out) and take the heat on that, or they support the old applications and leave security holes. There is no middle ground. The only question is which way leaves them less liable in a lawsuit.

In the end, users run run applications not operating systems. If their applications won't run on your operating system they won't use it no matter how secure it may be. {{ Insert linux on the desktop reference here }}

News aggregator app Flipboard hacked: All passwords reset after hackers pinch user data

Donn Bly

Re: So...institutionally insecure?

or

Add no bit to user table, but expand the password field so that it is large enough to store a bcrypt hash.

Then, on logon validation, look at the length of the stored hash. If length != 20 ** then assume bcrypt and proceed accordingly, but if length == 20 then assume SHA1, validate against the stored hash, and if it passes updated the stored hash with the bcrypted version of the same value. After a REASONABLE period of time expire and wipe any account still having an SHA1 hash in the database and if the user does comes back make them go through a password reset procedure to establish a new, secure password.

** or 40 if storing the hexidecimal string instead of the actual hash.

Tesla driver killed after smashing into truck had just enabled Autopilot – US crash watchdog

Donn Bly

Re: what does a plane autopilot do?

"No. If you are flying VFR and using autopilot to maintain a constant speed and altitude, you are still scanning the sky and the instruments. Visual Flight Rules require that the pilot is always looking for traffic."

In other words, just like autopilot in a Telsa where the rules say you are supposed to keep your hands on the wheel and eyes on the road.

The point is that when those rules aren't followed then the two aircraft can and will fly into each other and the autopilot won't take evasive action on its own (unless equipped with TCAS, which most small general aviation craft are not). Mid-Air collisions are rare, but they do happen when people don't follow the rules. As such, your answer should have been "yes" instead of "no".

Donn Bly

Re: what does a plane autopilot do?

With aircraft autopilot you could be completely hands off and not paying attention while cruising. I'm not saying pilots actually do that, but that's the impression the public get when they hear "autopilot". Hence the confusion with Tesla's naming.

And if two planes on autopilot are at the same altitude and on a converging bearing then autopilot will fly those two planes into each other. Telsa's autopilot actually does MORE in the sense of evasive action than autopilot in a small plane.

Long-distance dildo devotee deploys ding-dong over data deceit

Donn Bly

re: why a manufacturer thought it would be fine to store details of the use of its products

There can be any number of legitimate purposes for collecting the data -- but they need to be spelled out in the privacy and data retention policies. None of the product's users would have read the policies anyway and the company would have had legal coverage. However, associating the data to a clear-text email address (if that is in fact what they were doing) instead of something like a serial number is a poor technical decision. Whomever made THAT decision should be job-shifted to "product testing".

Still, I am unsure if wiretapping is the correct legal category for this. Control of the device is through a cloud-based control system so the manufacturer IS a party to the "conversation". The users cannot connect directly, so user A sends a control message the cloud, which in turn tells user B. Presumably user B sends a message back via the same channels to user A that the control message was received and was accepted. Ignoring the salacious nature of the product, logging the fact that a message of a given type was processed is pretty much standard on any of these IOT devices: Light On. Light Off, Set Temperature to 71°F, doorbell contact triggered, pump relay activated, etc.

For any given email message, my mail server logs show the sending and recipient email addresses as well as the subject line and the date and time the message was received. Could the judge consider that "wiretapping" as well? I realize that this is just a preliminary hearing, but my worry with cases like this are the unintended consequences that impact seemingly unrelated things.

California court sentences ex-Autonomy CFO Sushovan Hussain to five years in clink for fraud

Donn Bly

Autonomy's actual worth

So Autonomy fiddled the books to make it look like they had more value than they really did -- however, worth is really defined by quantifying how much someone is willing to pay for it. HPE was obviously willing the pay the amount they paid, so there is a valid argument that Autonomy was "worth" the amount in HPE's myopic eyes.

If Autonomy overstated the number of contracts, etc. then there is a clear case of misrepresentation of the goods being sold, but if they just obscured them using "valid" accounting gimmicks then the case isn't as clear cut. So over-inflated yes, but nothing that I have seen has convinced me that they were able to overinflate the value in an amount anywhere close to what HPE wrote off.

Donn Bly

Re: Extrateritoriality

I get your point, but if the Indian citizens traveled to the UK where they then became victims (or willful participants) of the Ponzi scheme, is it really within the jurisdiction of India to seek justice as opposed to the UK?

Google puts Chrome on a cookie diet (which just so happens to starve its rivals, cough, cough...)

Donn Bly

Re: @DougS Crocodile tears

if you are an advertiser and there is no competition in ad flinging. Do you look towards another medium?

If I am an advertiser (and as a small business owner, I suppose I would qualify) then I am ALWAYS looking at other mediums. Nobody smart puts all of their eggs in one basket.

A few years ago there weren't any targeted ads and advertisers still advertised. A few years before that there weren't any web ads at all and advertisers still advertised. The shape of the market changes and evolves all of the time.

However the Internet is not like past mediums. It changes quickly and radically, and whomever is on top can be on the bottom or completely gone in a matter of years. A kid in a dorm room can come up with an idea, put together a prototype in a few caffeine-fueled weeks or months, and for better or worse turn the entire market upside down.

It doesn't do you any good to try to predict the market because any prediction you make will be so wrong it isn't worth the effort -- so you just diversify and go with whatever is the "in" thing this week.

The only thing you can assume is going to be steady is the cost. Cost is driven by demand and not by technology or supply, because in internet advertising the supply is so elastic that it might as well be infinite. You and your competitors are going to have a budget, and if the budgets don't change then the spend remains the same, and thus the costs remain the same.

As the "ad flinger" market consolidates as an advertiser I don't really care. I know that if the price per ad goes up then I will place less ads, and so will my competition, thus the ratio of my ads to theirs will remain the same. If the costs exceed return, then another avenue will always present itself.

So, when google makes "privacy" changes like this it affects other ad-flingers, but it doesn't really affect the advertisers. If the ad-flinger market was a level playing field then it wouldn't matter but we all know that it isn't, but while the other ad-flingers cry foul remember that it was Google that pretty much INVENTED the category of targeted advertising and that as such they have been playing in Google's sandbox since the beginning and had to expect that things would change to their determent at some time or another.

Loose Women woman's IR35 win deals another high-profile blow to UK taxman's grip on rules

Donn Bly

Re: Avoidance vs Evasion

And who's "fault" is it that Starbucks didn't show a profit on paper -- Starbucks or the politicians that wrote the laws that they followed to arrive at situation?

I submit to you that the problem is the tax code, not the businesses that FOLLOW the tax code. They are just law abiding corporate citizens that are doing what the law says they should be doing.

The solution is to change the law, not go after the guy who is following the existing one. The problem AND the solution start and stop with the government. Nobody else has any responsibility to fix it - not the individual taxpayers, and not the businesses that are following the existing tax code.

Also -

If you tax on turnover instead of profit on a high volume / low margin business your taxes would exceed the margins. Many companies run on razor-thin margins of 1% or less, but can do it because of high volume. If you put ANY turnover tax on such products, the increase will be added directly price of whatever the consumer pays. Any politician that thinks that you can increase taxes on a business and that the tax won't be passed on is incompetent. Anyone who believes that politician is gullible.

Donn Bly

Avoidance vs Evasion

There is no "Hook" in the context in which you use it. The "Spirit" of the law is subjective, and a subjective law is a bad law because you never know what side of law you are on. What is legal today can be illegal tomorrow even if neither you nor the law have changed, and since the law itself hasn't changed you end up with a potential "ex post facto" situation . The letter of the law should be an accurate reflection of its spirit or it too is a bad law.

Don't ever castigate someone for following the letter of the law, blame instead the ones who wrote the law and/or responsible for maintaining it.

Tax EVASION is criminal. But in general those companies aren't actually evading the tax. Tax AVOIDANCE is just paying the tax due based on the rules put in place by the taxing authority. It is the responsibility of the GOVERNMENT to fix the laws, not for an individual or corporation to ignore the written law and just do what they or someone else "feel" the law should say.

Two last things --

(1) If you increase the companies costs by increasing their taxes, the increase is just going to be passed on to their customers anyway -- just like VAT. A greedy company is still going to take the same amount in profits.

(2) Taxing on turnover instead of profit penalizes high volume/low margin businesses, increases consumer costs, and contributes to inflation which then lowers your individual purchasing power. You need to consider the side effects of such a policy change.

Europe's home PC buyers reach for their collective smartphone, sigh: We don't need a new desktop. This is a computer, right?

Donn Bly

What about refurbished?

Around here most of my small business clients have switched to primarily buying refurbished desktops as they grow or replace old workstations. When you can buy a Dell Quad-Core I7 w/ 16 GB RAM, 240 GB SSD Drive, dual displayport video, and Windows 10 Pro for under $350 why buy something new? At 8x to 10x the price with only marginal performance increases the business case just isn't there for a new general purpose office computer which is primarily running office, a web browser, and some customer-specific vertical market applications. At that price you just buy a couple of extra so that you have spares on hand and don't worry about the warranty, because if they last the first 30 days then they will probably last years -- and if they don't that's why you buy the spares.

We just throw them on the bench, open them up to make sure that everything is seated, run general diagnostics to make sure that they are good, and do a fresh OS load so that we are at a known starting point -- which is exactly what we do with new computers too so there really isn't any difference in deployment labor costs.

Apple disables iPad for 48 years after toddler runs amok

Donn Bly

Re: Three year olds can't read

My youngest wasn't reading Heinlein at 3, but she was reading her older sisters' books and well into chapter books before she went to preschool. I didn't realize how much of a problem that would cause when she got a bit older, as she was always in trouble in school because she was so bored.

Scare-bnb: Family finds creeper cams hidden in their weekend rental by scanning Wi-Fi

Donn Bly

Re: Ceilings don't have Internet

I take it you didn't read far enough into the comment to see the part about "Ethernet over mains" - or perhaps you are an American that doesn't understand what "mains" means in this context? This link should help:

http://lmgtfy.com/?q=powerline+ethernet

Additionally, in this particular situation the smoke detector was installed in a room where a smoke detector would not normally be installed. If you are going to run wire to make such an installation, then running CAT5 was well as romex isn't going to be a problem.

And by the way FING won't find the device unless it is in the same subnet, either hardwired or wireless. It can't even find devices on the same subnet if the isolation is enabled on the guest network to which you are attached.

Donn Bly

Re: A learning experience.

1) Plenty of small or pinhole cameras available that would fit in a smoke alarm housing. Cameras require power, so if you are running power to the camera there wouldn't be an issue running Ethernet as well, or just use a POE camera. If you have hardwired smoke alarms then you already have mains power there, so all you have to do is tuck an Ethernet over mains adapter and the camera power supply in a small box in the wall or ceiling behind it and you're done. Absolutely no reason to use WiFi unless you are going for battery powered, and that wouldn't last you a day trying to stream a video feed. Totally unfit for purpose.

2) Many people who would be trying to do this with nefarious intent would also know enough not to put it on the same network as the guest WiFi, as the guest WiFi is the only thing the guest (meaning you, the renter) could access.

Ethiopian Airlines boss confirms suspect flight software was in use as Boeing 737 Max crashed

Donn Bly

Why not just disable the system and put the planes back in the air?

Every pilot that sits in one of these aircraft is now painfully aware of the MCAS system and why it was installed, and since the system was designed to offset the unawareness of the pilot the MCAS is now at best superfluous and at worst detrimental to the operation of the aircraft.

We know by now that the planes CAN fly without the sensor and its attempted automatic corrections -- and probably fly safer without it -- so why not disable it and get them back in the air?

The only thing that comes to my mind is that the powers that be want to toss all certifications for the aircraft and start over, since they no longer trust any of them. that seems something like throwing the baby out with the bathwater. Still, I would feel a lot safer and would rather fly on a 737 MAX than ride cross-country on the highways in an automobile -- especially during spring break season over here in the states.

We don't want to be Latch key-less kids: NYC tenants sue landlords for bunging IoT 'smart' lock on their front door

Donn Bly

It is all about options

I have no problem with the landlord giving tenants options, such as a the OPTION to use the smart-phone app to enter the building common areas. I don't even have a problem with a landlord doing away with metal keys and issuing fobs -- I did the same here after having to rekey the perimeter doors in my office building 4 times in 3 months. Fobs make a better key replacement than key cards because you can put them on the ring just like you can a key, though for my own access I put an RFID sticker on the inside of my phone case and use it instead (more reliable than a bluetooth app).

The apps use bluetooth so data and wifi aren't at issue, but you CANNOT mandate that tenants use the smart-phone app for a variety of other reasons. The tenants have a valid case -- but they weaken it when they make claims that they cannot sustain such as that the landlord is tracking their movements. If they limited their claims to things that they could prove they would already have an open and shut case instead of clouding the issue.

Another way to look at Amazon's counterfeit-busting Project Zero: Making merchants cough up protection money

Donn Bly

Buyer Beware

Another reason Amazon has so many counterfeits is that they have removed the functionality for a user to report a bogus seller.

There used to be a way to report a listing - I had used it before - but I discovered last week when I noticed something seriously amiss in the pictures on a sellers account -- improper use of trademarks, obviously bogus stamps, etc. -- that there there was no way to report it unless I had a sellers account. It told me by buyer's account wasn't enabled to make such reports.

So, I left a one star review complete with photo's showing the vendor's photos side by side with real items and arrows pointing out the differences. Two days later that I got a notice from Amazon that my review was being rejected, but the seller has changed their product images to no longer show bogus product and their reviews are all 5 stars.

At least I can still ship bogus product back to them free of charge.

Never mind that naked selfie scandal... Brazil lights the, er, kindling, dot-Amazon saga roars back into life

Donn Bly

Its just another bureaucratic money grab

In my recollection, the official language of Brazil is Portuguese, and in that language the name of the river is spelled "Amazona". I would concede ACTO *may* have considerable rights to that version of the name, but their rights are a bit shaky when they claim to have the rights to the anglicized version of the name when it is being used by a company outside of their region in a manner that does not even refer or relate to the river. Especially when the origin of the name actually comes from GREEK mythology and does not have a corresponding origination anywhere within the geographic region that ACTO was formed to represent.

If ACTO has rights that supersede Amazon Inc., then any publisher that publishes the works of Homer, Herodotus, Strabo, or any other other ancient Greek historians translated to English from their original Greek would have rights that supersede ACTO. Where would that end?

I am not a fan of the .{whatever} GTLD craze. It was a clear money-grab by a supposed not-for-profit organization that did not have legitimate expenses to justify raising funds in that matter. However, ICANN set up the rules and should abide by them -- or refund ALL of the monies earned in that manner (for ALL GTLDs)

Our vulture listened to four hours of obtuse net neutrality legal blah-blah so you don't have to: Here's what's happening

Donn Bly

Does the FCC have the authority?

Regardless of anything else, if the FCC had the authority to create the rule, then the FCC has the power to change or scrap the rule.

What should happen is that the Legislature should be the ones creating the rules (it is, after all, their ONE job)

Appointed people shouldn't be in the business of making rules. They should be in the business of implementing them.

And Kieren, thank you for another balanced and informative article.

Texas lawyer suing Apple over FaceTime bug claims it was used to snoop on a meeting

Donn Bly

Re: I guess this is going to be tossed out

First, he is going to have to prove that the meeting was even recorded, and he will have to state who did the recording. In his filing, he didn't even provide a date of the alleged meeting.

He will have to provide sworn affidavits from either the person who did the recording (self-incriminating) or someone who has first hand knowledge (anything other than first-hand knowledge is inadmissible hearsay.)

Once that has been established as fact, THEN he will have to prove that the Apple product was used to record the meeting. Then he is going to have have to establish that he didn't have any other applications on his phone that could be used to remotely record the meeting.

Now, this is civil court and not criminal court, so he doesn't have to establish proof beyond a shadow of doubt. He only has to establish a preponderance of evidence -- meaning that it is more likely than not.

However, he is going to have a very tough time doing that. The only way that he is going to prove that the meeting was recorded is to provide a copy of the recording. He could also find someone willing to testify under penalty of perjury that they have personally listened to the recording and that they have first-hand knowledge that the recording was of the meeting in question -- meaning that they themselves would have to have been at the meeting -- but if they can do that then they could have made the recording themselves using any number of means unrelated to this bug, and it IS more likely that someone used a standard digital recorder than used an undisclosed bug, especially as the bug doesn't have the ability to create a recording in an of itself. He will also have to provide affidavits for all in attendance that they didn't record the meeting, and explain what due diligence he undertook to insure privacy at this meeting.

Additionally, he is not just suing Apple -- He is also suing the developers, distributors, and advertising agents. He is claiming that each of them not only knew of the bug, but recklessly proceeded in bringing the product to market knowing ahead of time that the bug existed. The discovery is to get the names of the people who acted in that capacity so that he can add them to the suit by name.

No, he is trying for an out-of-court settlement because he knows that the cost of discovery is going to be high and is hoping that SOMEONE (he knows it won't be Apple) would rather pay off a nuisance lawsuit than undergo the expense of fighting it. He is leveraging the "vast experience" that he has gained in his less than 4 years of practicing personal injury law on the claim that within the less than 90 days that it has been since the bug was introduced that an event has occurred that has resulted in irreparable harm and PHYSICAL pain and suffering, but can't even give the date of the alleged event. He is smart enough not to have himself for a client and is using another attorney to file the suit -- however if he was serious about taking this to court you would think that he would pick someone who is well versed and has lots of experience in this area of law -- but instead he hires a personal injury lawyer who specializes in car accidents with just of a year of experience as an attorney.

If it goes to court he is going to have to affirm, under oath, under penalty of perjury subject to incarceration and disbarment, to the events alleged in his filing. He certainly doesn't want to do that, otherwise he risks irreparable harm to his future as an attorney and it will have been at his own hand.

I kind of hope that Apple doesn't settle. Lawyers like this shouldn't be practicing law.

Big Red's big pay gap: $13,000 gulf between male and female Oracle staffers – reports

Donn Bly

Re: All else being equal...

An as employee in a free market YOU get to decide how much you make. A prospective employer makes an offer, and you are free to accept or decline the offer.

If you accept it, it is YOUR OWN FAULT if you accepted an offer lower than average. Furthermore, you are only WORTH as much as the person behind you on the list is willing to take for the same job, no matter how much you think you are worth. Your labor is essentially a commodity, treat it as such.**

The solution? Know your worth, and don't accept less. Don't wait for them to tell you what they think you are worth, step up and make your worth known. If you remain unemployed then you overestimated your worth. If you want to increase your worth, learn some marketable skills.

It is up to you and you alone. Quit blaming others. It is not the job of society to train or educate you, and it is not the job of society to employ you.

** Think of your labor as a gallon of milk. As a consumer you can go into any number of grocery stores to buy your milk. The price is going to vary from store to store. Some decide go to the cheapest store, some decide to go to a more convenient store and pay more. The fact that someone else paid more for the milk at a convenient store doesn't make the lower price of the grocery store "unfair" to the milk or to the farmer who produced it. It also doesn't mean that the person going to the convenient store was price gouged. There are many more factors than just price that go into a purchasing decision.

US midterms barely over when Russians came knocking on our servers (again), Democrats claim

Donn Bly

Re: Always blaming Russia

The thing about spear-fishing email, I'm confident it doesn't take the CERN experts to figure out where it came from and who it benefits. I'm sure there's a whole industry around tracing down the who, what, and why.

The thing about spear-phishing is that it NEVER comes from where they say it comes from. That is, after all, the point of the phish. I can send a message and make it look like it came from any number of countries, doing so is trivial to anybody who knows what they are doing. The harder part is getting around SPF, domain keys, and message signing so that the phishing messages don't end up in a spam folder.

As to who it benefits -- You can try to guess who it benefits but all you would really be doing is bias confirmation. This week the DNC wants the bad guys to be Russian, so they will ignore any evidence that says otherwise or interpret any evidence to justify their conclusion. Next week it they could want it to be a Trump staffer or North Korea and make the same case. Do you really think that ONLY the Russians would be interested in a tap on DNC internal communications?

In order to really track it and find origin you have to set some bait for them to take, and then follow it back. You have to gain access to the mail server where the replies to their messages go to see if the server has been compromised, and then trace whomever accesses the mailbox to trace it back. You have to see if the machines used to access the server have been compromised, and go back further. They would have to establish a dialog with the phisher to keep them on the line so that all of this could happen without them finding out. All of that is very time consuming, expensive, and requires cooperation from friendly judges issuing warrants and lots of IT people sworn to secrecy.

None of that has occurred, therefore they are guessing and don't REALLY want the facts because the facts may not support their accusations. They are more interested in controlling perception for the purposes for political persuasion than they are establishing fact. Of course they are a political organization, and that is what political organizations do (no matter what side of the isle). Nothing unusual, just the normal day-to-day operations of a political organization.

Donn Bly

Always blaming Russia

My servers are targeted on a weekly, if not daily, basis from IP addresses in a variety of countries - especially Russia, South Africa, China, and India. It is such a routine occurrence that I don't even bother to take action unless they are doing something that causes me other problems.

Unlike the DNC however, I realize that these are probably not state actors but just compromised systems that are part of a botnet, and probably not even being controlled by an organization headquartered in the same country as the compromised machines.

It baffles me why a competent IT security person would even try to connect a nationality to an attack based on the limited information found in logs and message headers. Still, the lawyers and the media want to keep blaming Russia -- when it just as likely to be a 14 year old kid in Albuquerque New Mexico hooked into his neighbor's WiFi.

Man drives 6,000 miles to prove Uncle Sam's cellphone coverage maps are wrong – and, boy, did he manage it

Donn Bly

Re: I'm sure the FCC will get right on it

As though Obama and Wheeler, or Clinton and Hunt, were any better. Unfortunately incompetence in federal bureaucracies is a problem that transcends political party.

Oh, SSH, IT please see this: Malicious servers can fsck with your PC's files during scp slurps

Donn Bly

Re: WinSCP 5.14...

I thought that this was fixed in the WinSCP 5.13.5 hotfix last November, though it would be nice to get a confirmation on that from someone connected with the project.

Error pop-up? Don't worry, let's just get this migration done... BTW it's my day off tomorrow

Donn Bly

Re: It definitely happens

Never ever use personal email addresses for things like that. Use an administrative name that is really a distribution list.

I have come across more and more vendors and services, such as SSL Certificates, that no longer allow that. You have to resort to using a email address that LOOKS like a personal address even though it is a distribution list.

Poor people should get slower internet speeds, American ISPs tell FCC

Donn Bly

@Amplex

You might be confusing the quote (the part in italics) with my post, because I don't make such assumptions.

In addition, I don't have to imagine investing my own money. I used to own a wireless ISP back in the time-frame with WISPA was starting, and some of my friends/friendly local competitors were even among their officers. I am quite aware of the market and its challenges. Some 12-15 years ago when the municipality where I live looked at doing their own fiber rollout I saw the writing on the wall and sold off the ISP, even though we were the ones supplying the municipality with their bandwidth, and signed up my home to be on the waiting list for the municipal network. It took a few years before it got connected (and I suffered with DSL in the meantime) but it was worth the wait.

I wasn't happy at the time with public money being used to compete with private enterprise, but today I would be among the first to admit that in my local situation it was the right thing to do -- even though I was one of the private enterprises with which they were competing.

Donn Bly

It isn't about being cheaper for themselves

Well ISPs in the US already get a subsidy to pay for them rolling out broadband to less well off areas. This whole article is about how they'd like to reduce the definition of 'broadband' to make it easier (and cheaper) for themselves.

Actually, this article was about a meeting with WISPA. WISPA is a trade organization of local independently owned ISPs that deliver services over license-free wireless. The problem is that license-free wireless does not support the speeds of "broadband" as currently defined, even though they supported broadband as it was defined when they first started. Most WISPA members don't currently get subsidies, so your premise is incorrect.

WISPA members' problem isn't that their networks are worse, it is that the definition of broadband changed. Since the definition changed, they are no longer eligible for the subsidies. Since they aren't eligible for the subsidies, their growth rate is slower and unserved areas still don't get any service.

The areas we are talking about here aren't cities and urban areas, they are small towns and farms out in rural America where the antennas go on top of tall buildings and grain silos. The networks are slow and fragile, but in many parts of the country they are the only thing short of satellite service or dialup for Internet access. Many of these areas don't even have reliable cellular service.

Part of their problem is they use obsolete technologies that were never originally intended for outdoor point-to-multipoint use, the other part of the problem is that the cost to change exceeds the price point that consumers will pay. In effect, they are the obsolete wagon makers being superseded by the automobile. In that sense they will die off by attrition on their own without outside life support, so the question then becomes should public money be used to support them?

If yes, then people complain about the subsidies, but if no then areas will continue to go unserved.

Any area in the United States that is currently unserved is because it isn't economically feasible to do so. Internet access is a commercial venture so the companies have to operate to make a profit, and they aren't going to willingly enter a market where they know that they are going to lose money. That's why you don't see cable companies or phone companies building in those areas.

Note that I use the term "unserved". Unserved and Underserved are two different things, and you cannot equate the two. Since the subsidies go for both unserved and underserved, the larger players are taking subsidies to build out in the "underserved" areas where they can make money, but not in the "unserved" areas where they cannot.

Quite frankly, none of the choices are a good ones. Either you put public money into a dead business model or citizens don't get any Internet access at all, and even if you spend the public money the citizens still don't get broadband. Is half a loaf better than none?

My hope is that newer technologies will evolve to fill this gap, but I've been waiting for decades. Technologies have improved, but they haven't outpaced the consumer demand in this area.

Let the downvotes begin by all of the people who are too ignorant to know that there are more flavors of wireless and more types networks than cellular.

Linux.org domain hacked, plastered with trolling, filth and anti-transgender vandalism

Donn Bly

Re: Ooooh...

It may be easy to steal domains from them, but it is a real pain in the @ss to try to transfer any away from them. Sometimes it is easier just to pay their extortion fees for another year than spend the amount of time it takes.

Cops called after pair enter Canadian home and give it a good clean

Donn Bly

Re: Ooooh...

In my college days I can remember one of my roommates going out on a cold and snowy morning to warm up their car, which also involved cleaning off about a foot a snow and digging it out from where it had been plowed in by the plow truck. However, when he went to leave for classes he noticed a problem in that the car he warmed up was a stick, while his was an automatic.

Page: