The "better browsers" BREAK the antiquated-yet-irreplaceable plugins on which your business relies. What's your answer to an antiquated-yet-irreplaceable piece of custom software that's too expensive to replace yet so insecure and rickety it can break at any moment?
4332 posts • joined 10 Jun 2009
They developed techniques during the '94 World Cup, which the US hosted, to allow for in line ads without having to resort to a lot of commercials. Many sporting events around the world use such techniques now. Also, American sports have the decency to limit most ads to the grounds and walls (auto racing is an exception-cars and uniforms there).
Re: Major Shock!
That doesn't sound that good to me. Sure, the price may be lower, but don't you also run the risk of hitting a fly-by-night counterfeit dealer, depending on the circumstances? I know some friends that got hit like this trying to bargain-hunt online.
"To go back to the TV tuner example, Linux provides a whole raft of TV tuner drivers. They all run in kernel space. BSD doesn't provide any TV tuner drivers, but provides a kernel mode character driver that can be used to communicate with USB devices. The Linux drivers are then run entirely in user space, communicating using this simple kernel driver. Performance + inability for a TV card to oops your system."
And while that may suffice for stuff like TV tuners, high-performance devices like 3D graphics and high-throughput (GBit+/sec) networking tend to need to be in kernel space due to the severe performance penalties involved in context switching. I've heard work on hybrid dual-space drivers but I haven't seen their application in graphics and certain other performance-intensive applications.
But the tricky part is figuring out early moves. Even chess has a limited move set towards the end game as pieces are removed and routes are cut off (particularly if the king is under threat--check cuts the number of possibilities drastically).
Re: Fact and fiction mix
But now the casinos have to watch out for linked smart watches and camera glasses (the latter in particular because there could be actual prescription lenses in the frame, rendering them a medical necessity due to otherwise-poor vision).
Re: Apple Watch is next
Go is much more difficult for computers simply because the number of positions is much greater (19x19 vs. 8x8) and because it's a game of placing rather than moving, so each turn has a much higher number of possibilities which then cascade in a look-ahead system. Shogi is tougher for a computer to lick because its move set is more varied.
This open-source personal crypto-key vault wants two things: To make the web safer ... and your donations
But to build a high-security module that's resistant to acoustic, electrical, and other forms of side-channel attacks, you need way more than a halfway-competent designer. You basically need an expert or three poring over every little detail for a significant amount of time. It also means going beyond the FPGA design and onto a more-dedicated chip design where every detail, even on the electrical level, can be scrutinized with the utmost care.
Re: More anonymity for criminals and terrorists
Cash doesn't necessarily allow the underworld to work, it's just the easiest thing for them to use over barter or a substitute currency like gold dust. If all cash were to disappear tomorrow, they'd quickly settle on something else, much as how the world of Fallout happened to settle on bottlecaps...
But watermarking of this nature is basically a variant of steganography, and there are already various techniques in the know to mangle stego. Even the vaunted Cinavia audio watermark has been shown to be vulnerable.
Re: Here's an Idea...
No, it's not common sense. That doesn't give enough time for advertisers to get the time they pay for, and recall that advertisers can usually pay more than any group of end-users can come up with, which is why many systems today are ad-based even when users are willing to pay (because the amount they'd have to pay to make up the difference would make them balk).
Re: Obvious idea.
It's a technique used for product placement these days, but IIRC they don't do it yet for HD broadcasts due to the re-encoding load this places.
Re: individual copies? easy then
Unless you BAKE the watermarks into the actual encode, anything you try will be easy to strip. And once you bake them in, you'll fall into the pit of having to encode the episode multiple times for each screener, which given they're 1080p will take a noticeable amount of time even with professional hardware, and even then the pirates have been noted to take watermarked copies and work on scrubbing them later.
And here are why your ideas won't work:
"1. Get the translators to come to your studio to do the translation and don't let them in or out with any media or recording equipment. I believe Apple had this approach when previewing the Watch to some devs."
They'll refuse to put down the travel expenses because it wouldn't be worth it for them. It's MUCH easier and less expensive to send a disc or hard drive than a translation team. If they're THAT paranoid, they can courier the copy with an agent from THEIR studio, with all the expenses that implies.
"2. Remove all the bits where nobody is speaking before sending it for translation. It would probably make the movie unwatchable."
Don't forget signs and other visual translations, at which point it would probably become barely watchable and worth a pirate's time.
"3. Obscure a significant portion of the image with a big black rectangle. Again, it would make it unwatchable."
It also removes key context needed for some translating to make sense. Recall that English isn't exactly the most precise of languages.
"4. Send each scene to a different translation bureau - chances of them all being dishonest is smaller."
As another poster noted, consistency is essential for a good translation, which means it has to be a single firm throughout the run or else inherent translation variations build up to result in misnterpretation which can occur at key plot points, ruining the experience.
Answer's probably no for two reasons. Making custom encodes for each of the screeners and translators is going to take a good deal of time, even with professional hardware. Second, custom encodes make the videos unsuitable for sending pressed BDs, which are the only way you can send ones protected by ROM-Marks (it's part of the spec). At least a short run of about 100 copies can be justified going through the process of making the press master.
They'll take it anyway. They take copies that emblazon "THIS IS A SCREENER," for crying out loud.
Re: Make it big and loud
Given the time it would take to encode each one for each screener/translator, not to mention the problem that this would also make them unsuitable for pressing (and you can only get a ROM-Mark with a pressed BD), how do you make a short-run screener unsuitable for pirating?
I suspect that ANY screener/translator copy is worth pirating. I see bootlegs with burned "THIS IS A SCREENER" subtitles here and there. If pirates are willing to take blatantly-obvious watermarked copies, few things will be taboo for them.
Re: Physical Copies
IIRC they're in high-def and some translators have shoddy Internet access, so it's physical or bust. Besides, even for an Internet copy, a determined foe would use an HDCP stripper combined with an HDMI recorder.
Re: I've always thought of:
The point is that MPEG video compression is lossy, so watermarks either have to play by MPEG's rules or risk being degraded beyond usability. That said, some screeners are willing to use destructive artifacts such as a burned "THIS IS A SCREENER" subtitle pasted periodically in the video. I suppose it depends on how far the producer is willing to go to detect or defeat screener pirates, since customizing each encode for each screener means you have to encode the movie multiple times, depending on how sophisticated your tools are (at the least, each altered section needs to be re-encoded and grafted onto the original stream).
"Doesn't matter. It changes the requirement from needing one compromised source to several in order to pull off this "co-operation". You are supposing many sources to be compromised and conspiring. If there are few or only one, you have again narrowed your investigation enormously."
Thing is, if nations can cooperate on matters of mutual benefit, a group of ragtag pirates with a common goal should be able to put their heads together easily, especially since each additional leaked source (and as these and other popular series prove, their very popularity makes them hot targets for theft, especially from the inside) means one more set of tracks on the same road, messing each other up. It's much like with computer entropy: barring a super-human intelligence able to deduce a complete entropy trail and negate it, any new source you throw into the mix will usually help the cause and at worst do nothing to help or hurt it.
There's also the issue that the screener copies can get stolen without the screener's knowledge, copied regardless of the watermarks (you should see the bootleg markets) and then sent to all and sundry.
Plus, as noted, some pirates are determined to cover their tracks and are willing to cooperate with others to cover each other's butts by collaborating on their copies to defeat watermarks. Even audio watermarking like Cinavia has been shown to be vulnerable.
So the correct answer is, "Turn away a customer?"
Even tungsten or DU with its high density?
OK, now repeat the experiment with a pointed tip, much as how a very high diver positions his hands in a specific way to minimize surface area on impact.
Not necessarily. The serials and stuff would be done on small ROM chips, meaning all the rest of the stuff can be mass-produced. That includes the label printer that doesn't have to actually read the ROM chips to learn the serial number (key word serial) to compute the PIN. IOW, using any method other than based on the easy-to-know-at-manufacture-time serial number will seriously slow down the manufacturing process.
Re: Go ahead and use serial number as your seed.
But again, how else can it guarantee a genuinely-unique ID without using something like the Serial Number? ANY other source and you run the remote but still possible and highly-consequential risk of a collision. And anything sufficiently unique may as well BE a serial number for all intents and purposes.
Kinda poses a problem. How else can you come up with a one-size-fits-all solution for coming up with a random WPS PIN that doesn't involve programming each and every device individually?
But wouldn't the very act of doing so attract attention to themselves, allowing the spooks to take care of them?
Re: Plug that leak
Not if the pieces can be transmitted remotely over secure channels and the pieces only come together inside a black box unit. Penetrating black boxes is still an active security exercise, meaning extracting the key from a black box is still far from a given.
Why would it be a boon for Microsoft? Do they still develop Windows and Windows applications for POWER?
In the US IIRC. Intel's foreign foundries are for older, less important chips.
Re: They're still at it
How? Bad as it looks now, the US is STILL a huge sight better than any other country on offer. Including China, or they would've ALREADY demonstrated self-sufficiency (they carry a cultural impetus) which proves they can successfully cut off the US.
Re: say again?
But once it's open, people can normally slip in or out as long as the door is open. No, what they demand is that the only way the fire door can open is by closing the way behind you first so that the ONLY direction one can go through the doorway is out. Normally this evokes images of airlocks, but you can also achieve this with the cylindrical doorways sometimes associated with darkrooms (to insure no light enters as people pass through). Imagine a weight-based mechanical latch so that once engaged, the door can only be spun to the outside and stays in that position until the door is emptied, upon which it can be spun inside again from within the building.
Better it go down due to a botched update rather than get pwned due to an overabundance of caution leading to the hax0rs getting through during the window of vulnerability. At least it can't be pwned while it's down.
Seems to me more like a CYA generalization. IOW, it's more an "Insert Sensitive Data Type Here". Name it, and apply it between the <>.
Re: A Browser-based solution?
I am keeping up. But what if China outright steals legitimate certificates belonging to Western companies, thus are able to perfectly mimic them and prevent them being blacklisted without collateral damage?
Re: A Browser-based solution?
What happens then if the Chinese start taking over non-Chinese IPs, particularly those already in use by non-Chinese businesses? Now how will you be able to know what's coming before you get attacked by the Great Cannon's zero-days?
"Try Myst Masterpiece Edition. It runs on Win 7 and has higher resolution, true colour graphics. I played it through a while back."
RealMyst actually postdates Master Edition by about a year. This was supposed to be the "ultimate" edition of the game: the way they had really wanted the game to be played: not as a slideshow but an actual 3D first-person experience.
However, according to GoG, neither version is 64-bit compatible. Too old for today's hardware, it seems.
Re: Expand this to all technology
I've noticed that, even today, companies make use of the proprietary Bink codec. Anyone know why it's still in such wide use vs. something less encumbered like WebM?
Re: Expand this to all technology
Well, when it comes to products, those are covered by patents, and when the patents expire, the plans associated with that patent actually become public domain.
The trick with copyright is that works can get "second wind," so this raises a debate on just how long an author/artist/etc. should be entitled to exclusivity. Plus of course there's the argument of copyrighted works made under contract (which changes the terms).
Have you tried RealMyst? This redoes Myst as a 3D FPA, no QT necessary. It was made during the P3 era, so the hardware requirements in today's terms are easy, and IIRC it's available on Steam so should work even today.
Re: missing the point
"OH...... and pay taxes where you Physically Trade.... Just a WILD idea !!!!!!!"
But here's a wild idea to your wild idea. Consider e-commerce, where the buyer and seller never meet but stuff gets transferred between them. Now you have a clash because each party is within the borders of his respective country, so each country can legally claim jurisdiction: the buyer because currency changes hands in his country, the seller because the goods ship from his country. So if the laws clash between them, which takes precedence? The buyer's law or the seller's law?
Re: missing the point
Nope. That's due to the roads being owned or at least regulated by the respective governments. Their road, their rules. But what about privacy rights? They're of a more personal nature and don't involve government property. So who gets the call? The country of location or the country of origin?
Re: First mover advantage
"If someone wrote something equivalent to your software, by the time they got it to market you would have version 2 ready."
Thing is, copycatting also makes it easier to leapfrog. Since all the effort of the v1's already done, they can think of ways to one-up you. So by the time you come up with a version 2, they may have not only anticipated but also gotten ahead of you, coming up with the equivalent of your version 3 at the same time. Suddenly you're in the uncomfortable position known as "First is Worst."
If you can be so easily leapfrogged with no recourse, why bother trying? As a result, we could end up back in the days of the Renaissance when most works were reserved for commissions from the wealthy and powerful. Note that most of the revered works of art were just that: commissions only revealed to the public long after it was originally made and therefore useless in a contemporary sense. How would you like it if the most useful software (and by that you can include the stuff needed to make other software: compilers and the like) was instead kept under the lock and key of ultra-conglomerates a la Gibson's Sprawl?
Re: Inventing the IP ≠ Being The Bully
But who was the first to put ALL of them together into a whole greater than the sum of its parts? Gestalt effect.
Re: First mover advantage
The main problem now isn't the exclusivity but the length. When the length was first used, industries were usually about durable things that last decades. But software cycles quickly. You can fix the patent problem by specifying different lengths for different industries: say a max 3 years for software and 5 for hardware.
What's to stop a miscreant from hacking the sent OGL commands to make the scene look different to the competition? A setup like this can still allow a hacker to tell "lies" to his opponents.
VM's are not useful for this type of cheat. The cheat would be on the host, giving it hypervisor access where it can snoop any memory at will, including pre-encryption (making a secure tunnel useless here, too).
Re: Confusing paper
"If the hardware/OS/games are created using the generally hated (at least here) concepts proposed by Trusted Computing Group (previously known as the TCPA and the previous Microsoft Palladium project), it would be possible to implement a hardware and software stack that would prevent client side privileged access to the system unless it was signed by a recognised key. This would at a stroke prevent almost all of this type of client side attack, but at the same time would wrest almost total control of a machine from it's owner, making it a data appliance rather than a PC."
You will note how little you hear of the Trusted Platform Module outside of tightly-controlled settings such as businesses who need the control for their own reasons. Simply put, it's a non-starter on the consumer (and gamers are a subset of consumers mostly) end. If the only practical solution is to implement a system that isn't accepted by your customers, your market is basically a dead end. Either people won't buy your games because they're full of cheats or people won't buy your games because they won't buy the "secure" hardware needed to run them.
Re: Bitwise XOR is a completely legit way to encrypt...
The One-Time-Pad is the only encryption system proven to be perfectly secure. Furthermore, any other perfectly-secure system must (also proven) be essentially the same as a OTP. Using XOR, the OTP also has deniability since you can change the message simply by changing the key.