* Posts by Charles 9

16605 publicly visible posts • joined 10 Jun 2009

FYI: That Hawaii missile alert was no UI blunder. Someone really thought the islands were toast

Charles 9

Re: a call to the day shift warning

I recall that's why George Washington chose to cross the Delaware River into New Jersey on either Christmas Day or New Year's Day. Either way, he was banking on the Hessians on the other side partying the previous night, and it worked.

Charles 9

Re: Conflicting information

Honest question. Why is there an aversion these days to unannounced tests, given the reason for preparedness drills in the first place is to ensure procedures are followed in as close to emergency (read: unannounced) situations as possible? Yes, it's nerve-racking, but acting as a disaster sentinel will inevitably be nerve-racking because disaster can come at any time...without notice.

Charles 9

Re: I may be weird, but...

So you're basically saying there's no real way to properly prepare for a real, extreme emergency without an actual emergency?

Charles 9

Re: I may be weird, but...

"Point being it would take deliberate collusion and just not a normal confused cock-up to send a false alert."

Not necessarily. Never underestimate Murphy. We don't know if there is a "break glass" scenario for the unlikely-but-not-impossible scenario that all three executives (and anyone else with the possible authority) can be dead, unconscious, or otherwise incapable of performing the duty at the same time. The Hawaii scenario along with many other faultless engineering disasters show it is possible to "thread the needle" and bypass every single failsafe and still fail spectacularly.

Charles 9

Re: EMA - puzzling

"Semaphore code using brightly coloured grass skirts signalling arm and body movements."

Lost in the horizon due to the distances between islands, unless you're of the Flat Earth cult who honestly believe that's the opposing beach you see across the miles of ocean between islands.

As for radio, one good typhoon or volcanic eruption will knock out all the power to the radio transmitters (including the backups).

Charles 9

Plus there's the whole Fifth Amendment thing: protection against self-incrimination, the whole "right to remain silent" bit now mandatory reading due to the Miranda decision.

Here we go again... UK Prime Minister urges nerds to come up with magic crypto backdoors

Charles 9

It's also very difficult to get sociopathy out of politics; it's basically a requirement, as anyone else decent enough has other, more immediate concerns.

Charles 9

Re: Cyphers

"Basically, if I was fighting against the "western powers", I would already not trust the technology they produce."

Trouble is, no other power is any cleaner. You're basically painting yourself into the dreaded DTA corner, since you can't even trust YOURSELF to do it right, either.

Charles 9

Re: Cyphers

"A message about grandmas oatmeal cookie recipe could easily be code for some nefarious plot, but good luck detecting that with your fancy AI that can barely read a Wikipedia article."

But you have to establish the code beforehand (First Contact problem), raising the possibility of moles. Unless you can demonstrate a zero-knowledge code.

Who's using 2FA? Sweet FA. Less than 10% of Gmail users enable two-factor authentication

Charles 9

"What is coming is smarter, faster AI-driven software-based biometrics that will allow us to be secure using one factor."

I frankly don't see how you can make biometrics any more secure than the crapsack they are now. In fact, given all your criteria, practical security is a fool's game because the minimum standard for anything that's practically worthwhile is basically too irksome for the average Joe. Thus why we're stuck at deadbolts (that can be defeated with a well-placed kick), passwords that people forget, and fobs people tend to lose.

Frankly, if you want better security, you're going to need to start with a better human being.

FYI: Processor bugs are everywhere – just ask Intel and AMD

Charles 9

Re: Fabbing is really expensive

"The root cause of the problem is the combination of the following subsystems of a processor’s microarchitecture. Note that none of the individual components is to be blamed for the vulnerability - it is how they work together"

IOW, we have a "gestfault" here: something worse than the sum of the parts.

As for solutions, why not find a way to solve the bottleneck of context switching so that it can be used more liberally to keep things more separated without killing your performance?

Charles 9

Re: All Processors have bugs

"So 'cause admins want it, it was rammed down every throat - and I thought a lot of h/w venders had a problem with business users using consumer tech"

But what about the other way around--consumers using business tech--which means the foundry process gets simpler and you know what they say about the KISS principle?

Charles 9

Re: All Processors have bugs

"Would there be any less if theses companies didn't try hare-brained schemes like IME or other bloat and complexities when there is little need."

Do you think they would've stuffed such a thing into the chip if there wasn't a demand for things like long-distance remote administration? Remember, ME was demanded by admins.

"I'd prefer the hardware equivalent of Archlinux and i3wm - that way, I can be sure any bugs aren't introduced by fripperies."

That may be you, but you're in the minority. In the REAL real world, people just want to get crap done, using whatever tools are at hand.

Charles 9

"It's not so good that they are a necessity in the first place."

Hey, we're only human. If you can find the perfect human, he/she probably wouldn't be human at all.

Basically, if it's made by man, it's probably going to have mistakes, plain and simple.

OK, who had 'Montana' in the net neutrality state pool? Congratulations

Charles 9

Re: They have no right to do that

Worse, they may even BELIEVE their own bollocks with absolute conviction, in which case they're basically irrational, and it's impossible to argue with the irrational.

FYI: There's now an AI app that generates convincing fake smut vids using celebs' faces

Charles 9

Re: Another Brunner prediction comes to pass

"Upshot? Anything can be faked. Always be sceptical. Engage brain before feelings."

But feelings are in the brain, too, and unfortunately, instinct tends to favor emotion over reason, thus something that appeals to emotion has more power than one appealing to reason, and there's little we can do to control it; we're no Vulcans.

Charles 9

Re: Authentication stamps

Simply put, you can't. Camera signing keys have been extracted in the past.

Julian Assange to UK court: Put an end to my unwarranted Ecuadorean couch-surf

Charles 9

Re: Another solution

Nope, he's only two stories up IIRC. He'd survive the attempt.

Charles 9

Re: If he gets his way...

It's your source that is incorrect. The date in question refers to the passage of The Diplomatic Privileges Act, 1964, which adopt MOST the Vienna Convention to UK law but not ALL of it, AND there are local additions like the override clause I previously mentioned, which is Section 3. You can feel free to read the text for yourself in that link. It's all there, including a PDF copy of the original printing. BTW, MY source is considered authoritative since it comes directly from the UK government itself.

Charles 9

Re: What will really happen

Neglecting Assange's concern that he will be "Extraordinarily Rendered" or simply have an "unfortunate accident" between any two points of your plan.

Charles 9

Re: Time for a new couch?

Van is not immune. ANYTHING potentially large enough to conceal a person is subject to search as part of the ongoing investigation. Scotland Yard ain't stupid.

Charles 9

ANY diplomatic immunity in the UK can ONLY be accorded BY the UK. That's why the UK also has the power to declare someone persona non grata in the UK.

Charles 9

Re: If he gets his way...

"You're right that the Convention isn't UK law (few treaties explicitly are), but invoking that loophole puts you on exactly the same thin to non-existent ice as detaining a courier - it's a flagrant breach of international law."

Not in this case because the UK is not explicitly signatory to the Vienna Convention. The Diplomatic Privileges Act is not the Vienna Convention and has various local alterations as noted. The local override is one of them. Plus there's also the matter of abusing immunity (talking the mick, as another put it). You mention the Yvonne Fletcher incident but neglect to mention they couldn't pin the culpability to a single individual due to (1) there being more than one shooter and (2) secrecy concerns. Plus it should be noted the UK got theirs back. They severed diplomatic relations with Libya and allowed the US to bomb Libya from bases in the UK in retaliation. Plus Libya eventually paid compensation for the incident, probably because they had no friends on northern Africa.

This time, we know exactly who the culprit is, he hasn't made any move to conceal his crimes, so as the saying goes it's open-and-shut. Any attempt to use diplomatic immunity to try to get him out can and would get called out as abuse of immunity. About the only reason the UK doesn't sever diplomatic relations with Ecuador is that Ecuador DOES have friends in South America which can result in reprisals. And while there is little the UK needs that comes from Ecuador, other South American countries may have products of value (like say Venezuela with its petroleum).

"That's an awkward position to be in since you're explicitly asserting that local statutes trump the Convention which means that you're agreeing that Afghan blasphemy law (for example) overrides the immunities of our people in Kabul."

That depends on the laws specifically set down in Afghanistan. If blasphemy laws explicitly take precedence over anything the Vienna Convention defines, then you're up the proverbial creek. I strongly suspect this was very much the case when the Taliban had full authority there, thus the lack of diplomatic relations there at the time.

Charles 9

Re: If he gets his way...

Ah, found it. The relevant part IS an earlier article: Article 9, which does take precedence because it covers more fundamental issues, including the issue of personae non gratae. Last I checked, Assange IS persona non grata in the UK, meaning if Ecuador tried to make him a diplomatic courier (which they can do unilaterally now that Assange is an Equadorian national, before it would've required UK approval), the UK can still cry foul. After all, the Vienna Convention is not actually UK law. Not entirely. The parts that apply are contained in the Diplomatic Privileges Act, 1964. One important consideration of this Act is that it gives the UK the power to withdraw immunity within its territory, subject to procedure. IOW, the UK possesses an override, and since the embassy is in UK territory, there's SFA Equador can do about it.

When you play this song backwards, you can hear Satan. Play it forwards, and it hijacks Siri, Alexa

Charles 9

Re: Passive ultrasound absorption

And if they counter by going ballistic in the shopping and then pinning the blame on YOUR hidden messages...oh AND knows the number to a good divorce lawyer (meaning divorce runs the risk of losing more than half your stuff)?

Charles 9

Re: How well does this attack work

Simple. There probably will just be one there without your knowledge.

Charles 9

Who wants to bet some stunt like this gets inserted into the Super Bowl halftime show? By the time the fallout clears, someone's bound to have made out like a bandit.

You can't ignore Spectre. Look, it's pressing its nose against your screen

Charles 9

Re: I wonder how many years intelligence agencies have been using spectre?

There's no way to have complete security, short of total destruction. The only way to be sure is to burn it, dissolve it, or melt it: something sufficiently physical and irreversible.

But if you have to use it, then there WILL be a way to pwn it, simply because legal and illegal access can use the same interfaces.

Charles 9

Re: For 5 decades we've known no connected computer is truly secure

You forget TEMPEST. They can glean information simply from electromagnetic radiation: a natural consequence of it being SWITCHED ON. Basically, the only secure computer is one that is never used AT ALL. If it's used in any way, it CAN be pwned by a sufficiently-determined adversary. Problem is, that bar keeps getting lower.

Charles 9

Re: Smells like the financial crash...

But it didn't seem like bad ideas at the time, particularly with other, more immediate pressures to address like DEADLINES.

Charles 9

Trouble is, speed sells. If you can't get them through quickly, customers leave you for someone who can.

Charles 9

Re: Arm A53

But some stuff is too interdependent for efficient multiprocessing, like video encoding.

Crypto-jackers slip Coinhive mining code into YouTube site ads

Charles 9

Re: in favor of ones where you pay actual coin

Plus there are alternatives available now (some legal, like libraries).

Charles 9

I think if ad blockers become the norm, ad agencies will simply relocate to Western-hostile countries and offer blocker-proof proxy services whereby blocking the ads blocks the contrnt, full stop, by making the site look single-origin. Wonder if it'll be time to abandon the Internet at that point.

Charles 9

Re: Static HTML is the best

Given there's still ways to track you solely based on stuff the Internet needs to function, perhaps it's time to give up the Internet and go back to the Sears catalog...

Charles 9

Yet we don't hate them enough to eschew ad-suppoorted media in favor of ones where you pay actual coin.

Death notice: Moore's Law. 19 April 1965 – 2 January 2018

Charles 9

Re: George Orwell was right: Some are more equal then others

But what happens when Userland has to talk to Kernelland A LOT (which tends to happen on things like high-speed networking)? There MUST be some interface between them, and as long as there's an interface, there's a way to exploit it.

Charles 9

Re: Absolute tosh!

"However, we should recognise that it's impossible to exploit an properly implemented execution-less protocol; perhaps we should consider it as a way forward."

But then how does the client interpret the stuff you send down the wire? Through a client, which no one can guarantee can't be exploited in some way. Remember, some clients (including browsers) have been directly pwned through strange code: not via things like JavaScript.

User stepped on mouse, complained pedal wasn’t making PC go faster

Charles 9

Re: A little challenge to all those who are scoffing

Can do. Have been using a Singer (and old one, mind you) unassisted since I was 9 or so, sewing up small projects as I needed. I'm at least passing familiar with different thread types and needles, I still possess enough ocular clarity to hand-thread the needle, and I DO know how to set up the bobbin.

Charles 9

Re: Reminds me of a story

"The youngsters often feel they must answer every call even when it disruptive."

Because the young live every moment like it's their last, or at least someone else's. So they treat every call like it's "A chance to move up if you act before everyone else." Or "Your mother just had a heart attack and is dying."

Europe slaps €997m antitrust fine on Qualcomm

Charles 9

Re: and Apple's fine is ?

"Apple and Qualcomm are hardly good friends so they may have been fairly forthcoming with evidence against Qualcomm."

Maybe that's one reason Apple took out its own ARM license and started rolling their own CPUS rather than be held hostage to Snapdragons.

If you've ever wondered whether the FCC boss is a Big Cable stooge – well, wonder no more

Charles 9

Re: Not a new phenomenon

Trouble is the Feds can still fight back and challenge state laws on the grounds that communication is predominantly interstate in nature, meaning the Commerce Clause kicks in and gives the Feds overriding authority (after all, where does the FCC get its authority)?

Charles 9

Cell towers are strictly last-mile and still need terrestrial backhaul. Microwave and satellite are reserved for installations too remote or complicated for landline. The vast bulk of the Internet travels on landlines.

Charles 9

Re: "A boastful, insecure and slightly pathetic figure."

Don't be so sure. This could well b ed a longer-term plan to either delay the FCC so much it can't be reconstituted even after a changeover, or maybe an excuse to dissolve the FCC completely, something much harder to reverse.

Charles 9

Re: Pardon?

"If the US really wanted to be great again, they need to dump their ridiculous partisan politics."

Partisanship goes to labeling and ganging up, and labeling is part of the natural human condition. Not even George Washington, who was all too aware of the risks, couldn't stop the Democratic-Republican Party from separating from the Federalists, and even Washington got labeled a Federalist, against his wishes.

IOW, if George F'n Washington couldn't stop partisanship in spite of his charisma, who's got a chance in he'll to best him?

No parcel drones. No robo-trucks – Teamsters driver union delivers its demands to UPS

Charles 9

Re: In The USA,

You just watch. Coming soon, the self-driving keg.

Charles 9

20 years is a lot better than two, especially if you have spouses and children to feed right now and no hope for other employment (because the available jobs is shrinking, not expanding or holding steady like before). If you can't stop the inevitable March of progress from killing you, the best you can do is to slow it as much as possible.

Charles 9

Re: " eliminate night-time deliveries."

Because they know the long-term outlook is the robot replacing them, full stop. And with the job market shaping as it is, retraining isn't an option for many. Add in spouses and kids to feed, and you get a recipe for something very ugly.

Google can't innovate anymore, exiting programmer laments

Charles 9

Re: As Gandhi once said...

As the Bible once said, "Grant me the Serenity to accept the things I cannot change, the Courage to change the things I can, and the Wisdom to know the difference." Plus, knowing when to fold 'em implies knowing when jumping ship isn't an option.

Ever wondered why tech products fail so frequently? No, me neither

Charles 9

Re: original devs

No, it's because no one expects to need to read them anymore. If a device isn't pick-up-and-play intuitive without directions, it's considered too complicated.