* Posts by Charles 9

4735 posts • joined 10 Jun 2009

Chrome version 42 will pour your Java coffee down the drain: Plugin blocked by default

Charles 9
Silver badge

Re: Goodbye Chrome

But what happens when the only alternatives lead to pwning, which leave users in a bind: the ONLY browsers they can use to work leave them with their butts in the breeze, so to speak, basically putting am minefield between them and their work and in the dilemma of neither being able to stand still nor move forward.

1
5
Charles 9
Silver badge

Re: Although plugin vendors are dancing to Google's tune

Java's supposed to be sandboxed, too. Guess what happened? Malware found ways to escape sandboxes, so perhaps Google doesn't consider a sandbox much of an assurance. Firefox added the capability, too, but it's not on by default. Probably because of the risk of the access restrictions breaking essential plugins: another concern of any form of new access restriction.

2
2
Charles 9
Silver badge

Re: Sigh...

Except because we're only human, every single implementation would be vulnerable to some human mistake. The chief (and irremovable) reason software is vulnerable is because it or something else along the line is made by humans.

1
1
Charles 9
Silver badge
Facepalm

The "better browsers" BREAK the antiquated-yet-irreplaceable plugins on which your business relies. What's your answer to an antiquated-yet-irreplaceable piece of custom software that's too expensive to replace yet so insecure and rickety it can break at any moment?

3
0

You. FTC. Get over here. Google is INVADING our children's MINDS – anti-ad campaigners

Charles 9
Silver badge

Re: Ummmm

They developed techniques during the '94 World Cup, which the US hosted, to allow for in line ads without having to resort to a lot of commercials. Many sporting events around the world use such techniques now. Also, American sports have the decency to limit most ads to the grounds and walls (auto racing is an exception-cars and uniforms there).

0
0
Charles 9
Silver badge

Re: Major Shock!

That doesn't sound that good to me. Sure, the price may be lower, but don't you also run the risk of hitting a fly-by-night counterfeit dealer, depending on the circumstances? I know some friends that got hit like this trying to bargain-hunt online.

0
0

'Linus Torvalds is UNFIT for the WORKPLACE!' And you've given the world what, exactly?

Charles 9
Silver badge

"To go back to the TV tuner example, Linux provides a whole raft of TV tuner drivers. They all run in kernel space. BSD doesn't provide any TV tuner drivers, but provides a kernel mode character driver that can be used to communicate with USB devices. The Linux drivers are then run entirely in user space, communicating using this simple kernel driver. Performance + inability for a TV card to oops your system."

And while that may suffice for stuff like TV tuners, high-performance devices like 3D graphics and high-throughput (GBit+/sec) networking tend to need to be in kernel space due to the severe performance penalties involved in context switching. I've heard work on hybrid dual-space drivers but I haven't seen their application in graphics and certain other performance-intensive applications.

0
0

Grandmaster FLUSH: Chess champ booted for allegedly cheating with iPod app in the loo

Charles 9
Silver badge

Re: Endgames

But the tricky part is figuring out early moves. Even chess has a limited move set towards the end game as pieces are removed and routes are cut off (particularly if the king is under threat--check cuts the number of possibilities drastically).

0
0
Charles 9
Silver badge

Re: Fact and fiction mix

But now the casinos have to watch out for linked smart watches and camera glasses (the latter in particular because there could be actual prescription lenses in the frame, rendering them a medical necessity due to otherwise-poor vision).

0
0
Charles 9
Silver badge

Re: Apple Watch is next

Go is much more difficult for computers simply because the number of positions is much greater (19x19 vs. 8x8) and because it's a game of placing rather than moving, so each turn has a much higher number of possibilities which then cascade in a look-ahead system. Shogi is tougher for a computer to lick because its move set is more varied.

0
0

This open-source personal crypto-key vault wants two things: To make the web safer ... and your donations

Charles 9
Silver badge

But to build a high-security module that's resistant to acoustic, electrical, and other forms of side-channel attacks, you need way more than a halfway-competent designer. You basically need an expert or three poring over every little detail for a significant amount of time. It also means going beyond the FPGA design and onto a more-dedicated chip design where every detail, even on the electrical level, can be scrutinized with the utmost care.

1
0
Charles 9
Silver badge

Re: More anonymity for criminals and terrorists

Cash doesn't necessarily allow the underworld to work, it's just the easiest thing for them to use over barter or a substitute currency like gold dust. If all cash were to disappear tomorrow, they'd quickly settle on something else, much as how the world of Fallout happened to settle on bottlecaps...

4
0

Dev gives HBO free math tips to nail Game of Thrones pirate leakers

Charles 9
Silver badge

But watermarking of this nature is basically a variant of steganography, and there are already various techniques in the know to mangle stego. Even the vaunted Cinavia audio watermark has been shown to be vulnerable.

0
0
Charles 9
Silver badge

Re: Here's an Idea...

No, it's not common sense. That doesn't give enough time for advertisers to get the time they pay for, and recall that advertisers can usually pay more than any group of end-users can come up with, which is why many systems today are ad-based even when users are willing to pay (because the amount they'd have to pay to make up the difference would make them balk).

0
0
Charles 9
Silver badge

Re: Obvious idea.

It's a technique used for product placement these days, but IIRC they don't do it yet for HD broadcasts due to the re-encoding load this places.

0
0
Charles 9
Silver badge

Re: individual copies? easy then

Unless you BAKE the watermarks into the actual encode, anything you try will be easy to strip. And once you bake them in, you'll fall into the pit of having to encode the episode multiple times for each screener, which given they're 1080p will take a noticeable amount of time even with professional hardware, and even then the pirates have been noted to take watermarked copies and work on scrubbing them later.

0
0
Charles 9
Silver badge

Re: Translation

And here are why your ideas won't work:

"1. Get the translators to come to your studio to do the translation and don't let them in or out with any media or recording equipment. I believe Apple had this approach when previewing the Watch to some devs."

They'll refuse to put down the travel expenses because it wouldn't be worth it for them. It's MUCH easier and less expensive to send a disc or hard drive than a translation team. If they're THAT paranoid, they can courier the copy with an agent from THEIR studio, with all the expenses that implies.

"2. Remove all the bits where nobody is speaking before sending it for translation. It would probably make the movie unwatchable."

Don't forget signs and other visual translations, at which point it would probably become barely watchable and worth a pirate's time.

"3. Obscure a significant portion of the image with a big black rectangle. Again, it would make it unwatchable."

It also removes key context needed for some translating to make sense. Recall that English isn't exactly the most precise of languages.

"4. Send each scene to a different translation bureau - chances of them all being dishonest is smaller."

As another poster noted, consistency is essential for a good translation, which means it has to be a single firm throughout the run or else inherent translation variations build up to result in misnterpretation which can occur at key plot points, ruining the experience.

1
0
Charles 9
Silver badge

Answer's probably no for two reasons. Making custom encodes for each of the screeners and translators is going to take a good deal of time, even with professional hardware. Second, custom encodes make the videos unsuitable for sending pressed BDs, which are the only way you can send ones protected by ROM-Marks (it's part of the spec). At least a short run of about 100 copies can be justified going through the process of making the press master.

0
0
Charles 9
Silver badge

They'll take it anyway. They take copies that emblazon "THIS IS A SCREENER," for crying out loud.

0
0
Charles 9
Silver badge

Re: Make it big and loud

Given the time it would take to encode each one for each screener/translator, not to mention the problem that this would also make them unsuitable for pressing (and you can only get a ROM-Mark with a pressed BD), how do you make a short-run screener unsuitable for pirating?

I suspect that ANY screener/translator copy is worth pirating. I see bootlegs with burned "THIS IS A SCREENER" subtitles here and there. If pirates are willing to take blatantly-obvious watermarked copies, few things will be taboo for them.

3
0
Charles 9
Silver badge

Re: Physical Copies

IIRC they're in high-def and some translators have shoddy Internet access, so it's physical or bust. Besides, even for an Internet copy, a determined foe would use an HDCP stripper combined with an HDMI recorder.

1
0
Charles 9
Silver badge

Re: I've always thought of:

The point is that MPEG video compression is lossy, so watermarks either have to play by MPEG's rules or risk being degraded beyond usability. That said, some screeners are willing to use destructive artifacts such as a burned "THIS IS A SCREENER" subtitle pasted periodically in the video. I suppose it depends on how far the producer is willing to go to detect or defeat screener pirates, since customizing each encode for each screener means you have to encode the movie multiple times, depending on how sophisticated your tools are (at the least, each altered section needs to be re-encoded and grafted onto the original stream).

0
0
Charles 9
Silver badge

"Doesn't matter. It changes the requirement from needing one compromised source to several in order to pull off this "co-operation". You are supposing many sources to be compromised and conspiring. If there are few or only one, you have again narrowed your investigation enormously."

Thing is, if nations can cooperate on matters of mutual benefit, a group of ragtag pirates with a common goal should be able to put their heads together easily, especially since each additional leaked source (and as these and other popular series prove, their very popularity makes them hot targets for theft, especially from the inside) means one more set of tracks on the same road, messing each other up. It's much like with computer entropy: barring a super-human intelligence able to deduce a complete entropy trail and negate it, any new source you throw into the mix will usually help the cause and at worst do nothing to help or hurt it.

0
0
Charles 9
Silver badge

There's also the issue that the screener copies can get stolen without the screener's knowledge, copied regardless of the watermarks (you should see the bootleg markets) and then sent to all and sundry.

Plus, as noted, some pirates are determined to cover their tracks and are willing to cooperate with others to cover each other's butts by collaborating on their copies to defeat watermarks. Even audio watermarking like Cinavia has been shown to be vulnerable.

8
1

FREAKing hell: ALL Windows versions vulnerable to SSL snoop

Charles 9
Silver badge

So the correct answer is, "Turn away a customer?"

0
0

Soil and sand harden as SPEEDING MISSILES and METEORS SLAM into GROUND – boffins

Charles 9
Silver badge

Even tungsten or DU with its high density?

0
0
Charles 9
Silver badge

OK, now repeat the experiment with a pointed tip, much as how a very high diver positions his hands in a specific way to minimize surface area on impact.

2
0

ɘƨɿɘvɘЯ algo attack cracks Belkin router WPS PINs: researcher

Charles 9
Silver badge

Not necessarily. The serials and stuff would be done on small ROM chips, meaning all the rest of the stuff can be mass-produced. That includes the label printer that doesn't have to actually read the ROM chips to learn the serial number (key word serial) to compute the PIN. IOW, using any method other than based on the easy-to-know-at-manufacture-time serial number will seriously slow down the manufacturing process.

0
2
Charles 9
Silver badge

Re: Go ahead and use serial number as your seed.

But again, how else can it guarantee a genuinely-unique ID without using something like the Serial Number? ANY other source and you run the remote but still possible and highly-consequential risk of a collision. And anything sufficiently unique may as well BE a serial number for all intents and purposes.

0
2
Charles 9
Silver badge

Kinda poses a problem. How else can you come up with a one-size-fits-all solution for coming up with a random WPS PIN that doesn't involve programming each and every device individually?

0
1

NSA: 'Back doors are a bad idea, give us a FRONT door key'

Charles 9
Silver badge

But wouldn't the very act of doing so attract attention to themselves, allowing the spooks to take care of them?

0
0
Charles 9
Silver badge

Re: Plug that leak

Not if the pieces can be transmitted remotely over secure channels and the pieces only come together inside a black box unit. Penetrating black boxes is still an active security exercise, meaning extracting the key from a black box is still far from a given.

0
0

US govt bans Intel from selling chips to China's supercomputer boffins

Charles 9
Silver badge

Re: Q:

Why would it be a boon for Microsoft? Do they still develop Windows and Windows applications for POWER?

0
0
Charles 9
Silver badge

Re: Q:

In the US IIRC. Intel's foreign foundries are for older, less important chips.

0
0
Charles 9
Silver badge

Re: They're still at it

How? Bad as it looks now, the US is STILL a huge sight better than any other country on offer. Including China, or they would've ALREADY demonstrated self-sufficiency (they carry a cultural impetus) which proves they can successfully cut off the US.

1
8

Credit card factories given new secure manufacturing rules

Charles 9
Silver badge

Re: say again?

But once it's open, people can normally slip in or out as long as the door is open. No, what they demand is that the only way the fire door can open is by closing the way behind you first so that the ONLY direction one can go through the doorway is out. Normally this evokes images of airlocks, but you can also achieve this with the cylindrical doorways sometimes associated with darkrooms (to insure no light enters as people pass through). Imagine a weight-based mechanical latch so that once engaged, the door can only be spun to the outside and stays in that position until the door is emptied, upon which it can be spun inside again from within the building.

1
0
Charles 9
Silver badge

Better it go down due to a botched update rather than get pwned due to an overabundance of caution leading to the hax0rs getting through during the window of vulnerability. At least it can't be pwned while it's down.

2
1
Charles 9
Silver badge

Re: Oh?

Seems to me more like a CYA generalization. IOW, it's more an "Insert Sensitive Data Type Here". Name it, and apply it between the <>.

0
0

China weaponizes its Great Firewall into the GREAT FIRE CANNON, menaces entire globe

Charles 9
Silver badge

Re: A Browser-based solution?

I am keeping up. But what if China outright steals legitimate certificates belonging to Western companies, thus are able to perfectly mimic them and prevent them being blacklisted without collateral damage?

0
0
Charles 9
Silver badge

Re: A Browser-based solution?

What happens then if the Chinese start taking over non-Chinese IPs, particularly those already in use by non-Chinese businesses? Now how will you be able to know what's coming before you get attacked by the Great Cannon's zero-days?

0
0

Videogame publishers to fans: Oi, freetard! STOP RESURRECTING our dead titles online

Charles 9
Silver badge

"Try Myst Masterpiece Edition. It runs on Win 7 and has higher resolution, true colour graphics. I played it through a while back."

RealMyst actually postdates Master Edition by about a year. This was supposed to be the "ultimate" edition of the game: the way they had really wanted the game to be played: not as a slideshow but an actual 3D first-person experience.

However, according to GoG, neither version is 64-bit compatible. Too old for today's hardware, it seems.

1
1
Charles 9
Silver badge

Re: Expand this to all technology

I've noticed that, even today, companies make use of the proprietary Bink codec. Anyone know why it's still in such wide use vs. something less encumbered like WebM?

3
0
Charles 9
Silver badge

Re: Expand this to all technology

Well, when it comes to products, those are covered by patents, and when the patents expire, the plans associated with that patent actually become public domain.

The trick with copyright is that works can get "second wind," so this raises a debate on just how long an author/artist/etc. should be entitled to exclusivity. Plus of course there's the argument of copyrighted works made under contract (which changes the terms).

3
0
Charles 9
Silver badge

Have you tried RealMyst? This redoes Myst as a 3D FPA, no QT necessary. It was made during the P3 era, so the hardware requirements in today's terms are easy, and IIRC it's available on Steam so should work even today.

3
1

Foreign firms must obey EU laws no matter where they're based, says EU. Hear that, Google?

Charles 9
Silver badge

Re: missing the point

"OH...... and pay taxes where you Physically Trade.... Just a WILD idea !!!!!!!"

But here's a wild idea to your wild idea. Consider e-commerce, where the buyer and seller never meet but stuff gets transferred between them. Now you have a clash because each party is within the borders of his respective country, so each country can legally claim jurisdiction: the buyer because currency changes hands in his country, the seller because the goods ship from his country. So if the laws clash between them, which takes precedence? The buyer's law or the seller's law?

0
0
Charles 9
Silver badge

Re: missing the point

Nope. That's due to the roads being owned or at least regulated by the respective governments. Their road, their rules. But what about privacy rights? They're of a more personal nature and don't involve government property. So who gets the call? The country of location or the country of origin?

0
5

Sorry, Qualcomm, Apple – your patents don't scare us

Charles 9
Silver badge

Re: First mover advantage

"If someone wrote something equivalent to your software, by the time they got it to market you would have version 2 ready."

Thing is, copycatting also makes it easier to leapfrog. Since all the effort of the v1's already done, they can think of ways to one-up you. So by the time you come up with a version 2, they may have not only anticipated but also gotten ahead of you, coming up with the equivalent of your version 3 at the same time. Suddenly you're in the uncomfortable position known as "First is Worst."

If you can be so easily leapfrogged with no recourse, why bother trying? As a result, we could end up back in the days of the Renaissance when most works were reserved for commissions from the wealthy and powerful. Note that most of the revered works of art were just that: commissions only revealed to the public long after it was originally made and therefore useless in a contemporary sense. How would you like it if the most useful software (and by that you can include the stuff needed to make other software: compilers and the like) was instead kept under the lock and key of ultra-conglomerates a la Gibson's Sprawl?

0
0
Charles 9
Silver badge

Re: Inventing the IP ≠ Being The Bully

But who was the first to put ALL of them together into a whole greater than the sum of its parts? Gestalt effect.

0
0
Charles 9
Silver badge

Re: First mover advantage

The main problem now isn't the exclusivity but the length. When the length was first used, industries were usually about durable things that last decades. But software cycles quickly. You can fix the patent problem by specifying different lengths for different industries: say a max 3 years for software and 5 for hardware.

0
0

+5 ROOTKIT OF VENGEANCE defeats forces of gaming good

Charles 9
Silver badge

What's to stop a miscreant from hacking the sent OGL commands to make the scene look different to the competition? A setup like this can still allow a hacker to tell "lies" to his opponents.

0
0

Forums