* Posts by copsewood

519 publicly visible posts • joined 24 Jun 2009

Page:

UK.gov finally kills ContactPoint

copsewood

don't go to town on a system before you know what you want

This is a classic and expensive failure. Private contractors should not be expensively involved in such developments prior to wider policy agreement on what the specifications should be. Clearly some incompetent civil servants are not up to their job due to lack of systems awareness skills. Or maybe these failures are down to private ambition and inter-departmental back stabbing. Who knows ?

If you are developing public architecture you have an open competition and you have design proposers make and throw away a few cardboard models before choosing the one you want to spend real money on. That should cost much less than 5% of your total design and build budget. And I don't see why a similar approach can't be adopted in relation to computer systems.

Unpatched kernel-level vuln affects all Windows versions

copsewood
Boffin

I do write code

I also teach students to code. High performance languages such as C and C++ are highly susceptible to this kind of error. I and just about any coder I have ever taught to use such languages have written code with buffer and heap overflow possibilities, probably many times over. Most of the code you create won't ever be used in a hostile environment, until this use context creeps up on you, when these security bugs really matter.

You will minimise occurrence by improving programmer education and by maximising code peer review, in some cases helped using automated code analysis tools. Even very experienced coders with deadlines to meet and insufficient time for peer review will create buffer overflows.

A good defence is likely to include opening up the source code to all interested. This doesn't defend against such bugs in open source code which isn't being inspected by many interested eyeballs. It does defend open source code which is being openly inspected. In this case there will still be some eyeballs finding these bugs and more interested in covert criminal or intelligence agency use of them than in reporting them and providing fixes upstream.

The security case for closed source is worse than this. Those with access to closed source code who are not the mainstream developers are more likely to have a covert interest than in reporting problems to other users and developers. Software development shops are rarely leak free and programmers with criminal intent are not deterred by closed source intellectual property restrictions. Also governments won't purchase Windows unless their intelligence agencies have access to the source code.

Eagles singer wins case against US politico

copsewood
Big Brother

Rumours of the death of copyright exaggerated

“The internet is slowly but surely killing the whole concept of copyright,”

Only 1 aspect of copyright is being obsoleted by the net: the right to control distribution. This doesn't prevent artists through their collection societies getting paid when music is used commercially, e.g. through broadcast, in restaurants and in shops. If the lobbyists employed by these societies and other media concerns started cooperating with the net rather than trying to fight it, they wouldn't be trashing the case for artists to benefit from commercial sales of bandwidth, blank media and playback devices by trying to prevent use of what the content creators help to sell.

Prior to home taping and the cheap photocopier, informal distribution wasn't affected by copyright law anyway. The attempt to do this is a recent innovation which started with home taping. When copyright law only covered printing presses and few existed, hand copying and memorising work (e.g. of sheet music) was never controlled. You can still copy a book out legally using pen and paper if you have the time and a high proportion of books were legally distributed by informal hand copying outside of copyright a couple of hundred years ago.

Aspects of copyright unlikely to be challenged are the rights to benefit from commercial exploitation of work and moral rights to be acknowledged as the author of work you have created.

Big brother icon, because privacy is a human right but copyright isn't. Your copyright doesn't extent to steaming open your neighbour's communications.

'Poo-powered' Volkswagen astounds world+dog

copsewood
Stop

most livestock poo is already collected

Just let the stuff they do outdoors on grass fertilise it in the time honoured fashion. Most livestock bred for meat are kept indoors and most animals which are on pasture during the summer are fed indoors through the winter. So no extra cost to collect, given indoor livestock have to be mucked out regularly anyway. Then there is the time the dairy herd on pasture are in the milking parlour, which also has to be mucked out very regularly.

Ballmer's 'lost generation' note finds resonance

copsewood
Headmaster

CLIs work well for some tasks

I probably use these for about an hour a day compared to 3 in GUI mode. Different interface styles are useful for different tasks. CLIs continue to improve, e.g. by being able to launch a GUI application by pressing enter on a highlighted filename or URL causing the GUI app associated with the resource to open it. Languages involving verbs, nouns, adjectives, adverbs, pronouns, wildcards, made parseable using spelling and punctuation are not about to become obsolete any time soon.

You may be able to do all the tasks you want to do with computers without using CLIs, but I certainly can't. Also if you choose to use computers entirely without CLIs the learning ladder you might otherwise have had between using and programming computers has most of the lower rungs kicked out.

GPL scores historic court compliance victory

copsewood
Linux

My telly has an ethernet port

"Why does an HDTV need busybox at all?"

The manufacturer of just about any electronics that talks TCP/IP has the choice between:

a. developing software from scratch.

b. paying for a license to use a proprietary software stack.

c. using readily available open source.

Obviously c. is generally the most cost effective option, but if the variety of open source license is copyleft, then it comes with a legal obligation to make available source code including any modifications made to it to those to whom the software embedded in the hardware is distributed.

It's true that cheap display devices don't need to talk TCP/IP, but more expensive ones do nowadays and people paying money for HD generally want their tellies to be able to select and display from a variety of media, including media deliverable over a home network.

copsewood
Linux

Sure they were bankrupt

Companies that want to stay in business have invariably been willing to negotiate suitable terms including coming into compliance soon after the libre software lawyers come knocking. When they get a lawyers letter, their own legal advisers read the software licenses and tell them to settle the case out of court. What the libre software lawyers are working to obtain is license compliance, so that those being provided with software binaries are able to study and modify how the software they have been distributed works, as well as being able to make use of any modifications the distributor has made and included.

No sane lawyer looking at GPL license terms with any knowledge of copyright law would advise their clients to do otherwise. So while this case law may serve "pour encourager les autres" it probably wasn't strictly needed as such, other than arguably for those legally ill advised.

Hotmail upgrade finally reaches 350m users

copsewood
Gates Horns

Register your own domain

If you identity ends with @hotmail.com then Hotmail own your identity by definition: it's their domain, not yours.

If you register your own domain name you can move your email hosting between providers and it doesn't matter which ISP you use. To keep service providers as honest as possible you might also want to consider keeping your domain registration with a different company than your hosting.

copsewood
Gates Horns

customers will get what they pay for

Frankly I'm surprised people are not more suspicious of the motives of postmen who deliver letters gratis. Hotmail's customers are not the users. Those purchasing the advertising data and paying Hotmail's bills are the customers. The users and their messages are the commodity being sold.

Even if the raw data is sufficiently anonymised so that those who pay for this can't identify individuals yet, those selling this data have to make a profit or go out of business and those paying for data will want as much detail as possible from it about ever smaller targetted groups and even individuals. This strongly implies that anonymisation will have to be reduced to an extremely thin margin or competitors in the gratis email business which play faster and looser with user privacy will outcompete those which handle user data ethically.

'Be careful' warning accompanies latest Linux kernel

copsewood
Boffin

modular kernels don't perform

Speaking as a programmer, I would agree that making a kernel modular as with Minix or Hurd should make it easier to develop, as the better understood messaging between autonomous kernel processes should make the whole program more manageable. However, making these communications occur through shared memory data structures in a monolithic program rather than sockets between multiple autonomous processes does seem to offer much higher performance. The history of Linux v. Hurd seems to bear this out.

One of Hurd's problems is getting enough momentum so that enough people want to work on it. If it continues to perform poorly in practice compared to Linux the Hurd is likely to remain a research operating system used by a few hundred computer scientists as opposed to one which is used on millions of developer desktops, on value for money servers and on most embedded systems that can do Internet Protocol.

Minix isn't intended as competition for Linux, other than in a narrow area of computing science education where it is useful for a student to be able to work with a system small enough to be fully understandable.

copsewood
Linux

time to fix Linux-next

People developing patches intended for mainstream inclusion will always want to get them into the next stable release because that results in more testing, more feedback and more developers helping to maintain the changes. Keeping a set of changes up to date for several months or a couple of years against such a rapidly changing target is very hard work.

The solution is probably for Linus to delay work on the next mainstream release for a cycle of say 2-3 months, so that more work can take place on getting the contents of Linux-next into acceptable shape, either by improving what stays in there or by kicking out what shouldn't be in there.

Czechs toast Bud-beating beer win

copsewood
Pint

nanobrew versus manufactured beer

I do know an American who brews serious ale, because I sent him my recipe. Not that the sg 1070 (about 8% by volume alcohol) ale I brew in a 25 litre bucket before bottling it is for sale. But at that strength, you need a longer maturation in the bottle than a commercial brewery would afford. Also, top quality beer has to be naturally conditioned, but few people know how to pour it properly nowadays, and beer with yeast at the bottom of the bottle hasn't been available commercially for decades.

Apart from better beer, the other advantages of nanobrew include no tax and more energy efficient bottle reuse multiple times, as opposed to massively energy-wasteful bottle recycling.

Cell phone eavesdropping enters script-kiddie phase

copsewood
Boffin

No encryption unbreakable ?

Depends upon your value of unbreakable. An energy calculation of all the possible states of an AES256 key suggests you can't try them all given the limited energy in the universe. Doesn't stop you from guessing an AES key and getting it right first time, but you are a lot more likely to win the lottery 10 times in a row without a break. You might also find a non-linearity in AES256 making it susceptible to brute forcing or meet in the middle attacks given enough known plaintexts with a mere 2^128 operations or so and an unfeasibly large rainbow table assuming bits can be stored using single atoms in future. However, no cryptography expert who has found any serious flaw in it seems currently to want the valuable international reputation that would go with an effective published attack, suggesting not even the NSA are aware of one.

Reboot key Brit 'ready to save internet'

copsewood
Boffin

What would such an attack involve?

Compromise of the secret root-zone signing key associated with the widely known public part of this keypair, followed by the publication and circulation of a self-signed revocation certificate for the root zone key.

In practice as most DNSSEC clients will rarely need a top level domain (TLD) key that isn't more locally cached, if the root zone trust can be reestablished with this procedure within a week or so, most clients would rightly continue to trust the cached TLD keys so most Internet users and services wouldn't notice. Nothing to prevent clients establishing trust anchors elsewhere in the hierarchy, e.g. at frequently used TLDs or other frequently used domains.

Police force more suspects to give up crypto keys

copsewood
Big Brother

we used to have rights

Such as innocent until proven guilty and the right to silence. The RIPA obligation to handover keys violates these 2 principles by obliging a suspect to cooperate in the collection of evidence for the purpose of their own prosecution.

The possibility that a few guilty people might be locked up on account of this who otherwise wouldn't be doesn't justify locking up otherwise innocent people who refuse to cooperate in this procedure. How long it will take a case of someone who is innocent and does not cooperate to get before the European Court of Human Rights based on violation of the ECHR (European Convention on Human Rights, section 8 right to privacy and section 6 right to a fair trial) is an open question.

Unpatched shortcut vuln exploited by mainstream malware

copsewood
Boffin

Separation of data and code

There shouldn't be a risk on any widely used operating system or platform that when an application or user attempts to read data, that code which arrives with the data gets executed outside of a very tightly sandboxed environment. In a more ideal world market forces would prevent operating systems or platforms (e.g. Windows or Flash) which blur this boundary from existing. In a monopoly ridden (i.e. closed source) world, users of such platforms (e.g. Windows, or Flash on Linux) have to put up with or mitigate the growing number of exploits which arise as symptoms of this architectural disease. Having to run security updates every week is patching the symptoms, and not curing this disease.

Empires built on free code aren't cheap

copsewood
Welcome

software isn't cheap

"While ostensibly free, to make projects like Linux work for its purposes, Facebook heavily customizes them. While the company may not buy as much software, it ends up writing or customizing quite a bit of code."

Except where they are using Affero GPL code, Facebook are not under any obligation to contribute back. But if they don't, they'll find maintaining their changes cheaper against a rapidly moving mainstream project (e.g. Linux kernel) if they do contribute back and maintain their improvements and facilities as part of the mainstream. Many companies pay open source specialists to do this work for them e.g. Canonical, Suse or Red Hat, simply because working effectively within the wider development community to obtain the cost benefits of fork avoidance can require significant expertise.

Because software isn't cheap, whatever improves reuse is worth looking at, and this is the real strength of the open-source development model.

Linux police offer deviant Android return from exile

copsewood
Linux

taking the time needed to get it right

The Linux kernel maintainers will work with the Android developers on this one until the Android patches are in a state which makes the combination long-term maintainable. This means that the extra functionality implemented in Android can't be allowed to degrade anything needed by other kernel users and works in a manner which others wanting the same or similar extra functionality can use and work with.

Until then Google will have the extra cost of having to maintain their fork, compared to the smaller cost of maintaining the code which does what they want as an integral part of mainstream Linux. That is how significant improvement generally occurs in libre software, and it is why people who share the same set of requirements will more often collaborate on a mainstream version of something if they can, in preference to having the extra expense of maintaining everything in more than one place.

Occasionally a fork has to happen if the mainstream direction loses credibility within the developers, as happened with the successful transition from X11 to X.org . But for this to happen requires a leader with the clout to bring the developers along to the new model, and as far as Linux is concerned, no-one is challenging Linus' leadership AFAIK.

Whether the Android patches are accepted as part of a particular kernel version isn't as important as getting the changes right before they goes in.

Flaw could expose 'millions' of home routers

copsewood
Alert

Virgin DLINK routers

When they sent me one after I complained about something else and they upgraded my line speed, I continued using my existing router. I configured the DLINK one as a seperate wireless access point with WPA2 and very strong passwords. User manual comes on a CD. Easy enough to read it and set it up as required, but not much use for ungeeks who don't read manuals. Those who just plug it in and expect a secure default configuration probably get what's coming to them, though the defaults could be improved by printing strong passwords on labels stuck to the machine (different for each router) , configuring WPA2 by default and turning off UPnP.

The reason they don't is probably that sending them out secure increases the support desk traffic , and it probably costs a few pence more to have different passwords on every one they send out.

Firefox joins Microsoft in uncool kids class

copsewood
Big Brother

it's uncool to give away all your privacy

http://en.wikipedia.org/wiki/Google_Chrome#Usage_tracking states:

"Chrome sends details about its usage to Google through both optional and non-optional user tracking mechanisms."

See also

http://blog.chromium.org/2008/10/google-chrome-chromium-and-google.html

Double whammy: The music tax based on deep packet inspection

copsewood

Outdated unenforceable rights

"So you're saying these people have no right to dictate the terms of their own creative distribution?"

The law that gave landowners who produced hay the right to supply a bale to be carried in every taxicab in London was finally got rid of several decades after taxicabs had stopped being pulled by horses. Not that this right was enforced or could be enforced in respect of motorised cabs, its just that it was obsoleted by that technology.

The right of copyright owners to control distribution made perfect sense when there were only a few dozen printing presses in the country. This didn't cover the hand copying of books: Had I the time, I could legally copy a book in copyright by hand with a pen, ink and paper and distribute it.

Now that everyone has access to technology which can make perfect copies with trivial ease, the legal right to control reproduction makes no more sense that that of landowners to force motorcabs to carry bales of hay.

But this isn't saying that the creators of the copyright content being reproduced shouldn't benefit from the market in the reproduction devices and bandwidth which their effort helps to sell. Once the latter principle is established, it becomes possible to consider the question of the appropriate system that translates the value added in these markets into the hands that add that value, and once an appropriate system is in force we can all then move on.

copsewood

popular material will be downloaded more

And this will show up in the sampling. Not many people will download Vogon poetry. Also you don't need expensive and involuntary deep packet inspection if a large enough sample will accept a small discount or some other incentive in exchange for the hassle of hosting a download program which reports to the performing rights societies information about what is most popular.

copsewood

If there are many "flat rates" in what sense are they flat ?

Just review the consumer and business connectivity products at a selection of ISPs, and you'll see that different speed/usage specifications are available for different customers at different prices. Chances are that Lil Granny can find an offering that costs less than the one which would suit Bill Moviebuff who wants and can get a much higher Gb/month cap without rate limiting. ISPs are increasingly rate limiting heavy users until they upgrade to a higher cap at a higher monthly fee.

Mother faked ID to 'disappear' child from school waiting list

copsewood
Boffin

DNSSEC PKI and choice of electronic neighbourhood

With DNSSEC derived certification of identity, the value of an electronic address based on domain reputation may well start to change. I have to communicate with students in a very guarded fashion when they use Hotmail email addresses, in comparison with being able to be more open with them when they use the email addresses my university provides. This makes sense because I obviously can't trust the identity of a Hotmail address, but to receive a reply to a university address a student has to have access to the password and account issued by the university to the student.

Big brother centralised control through government PKI doesn't need to be such a great problem using DNSSEC as the PKI, given each domain has a chance to create it's own security policies and people have choice between domains or can register and run their own. With DNSSEC you get the certificate as part of the process of domain registration. Those wanting to trust an ID will have to check the reputation of the ID provider (based on a certification chain), and people wanting to be believed are then likely to drift away from the cheaper and less reputable domain names and will prefer to use domains which identify their users a bit more carefully before creating an address.

Dead Pink phone fallout hits Microsoft's top brass

copsewood
Gates Horns

Absolute power corrupts absolutely

Similar stories were coming out of IBM when they were losing their grip on the mainstream computing market in the late eighties. Because Microsoft is driven by the needs of the Windows and Office cash cows, this sacrifices the needs of the games, mobile phones and Internet services developers into choosing approaches consistent with another family of products.

For example, it's very unlikely that anyone proposing a Linux or even open-source based mobile phone or games console would get very far in Microsoft, regardless of which methodology is more effective in that development space. Large vertical corporations become inefficient to the point of becoming ineffective, due to over centralised control stifling innovation and initiative at ground level. The former Soviet Union was a classic case of this kind of hubris prior to its inevitable collapse.

SCO rises from the dead (again)

copsewood
Flame

Not the first time

This isn't the first time someone has tried to sell a significant engineering artefact it turned out they didn't own:

http://en.wikipedia.org/wiki/Victor_Lustig#Eiffel_Tower_scam .

The difference between the claimed "intellectual property" SCO was offering and the alledged scrappage rights to the Eiffel Tower which Victor Lustig offered in 1925, is that the US courts have demonstrated willingness to spend years considering SCO's equally bogus case despite the evidence of ownership being almost as contrived.

Fusion reactor eats Euro science budgets

copsewood

wind, wave and solar

We've already got an excellent and relatively stable fusion reactor at a safe distance likely to burn for a few billion years called the Sun. Putting a fraction of this budget into research for better methods of harnessing the Sun's output either directly (solar) or indirectly (wind and wave) would get much better and more immediately useful results. Good fun to be able to start up your own fusion reactor for sure, and certainly worth spending a few bob on, but being able to mass produce them and being able to get the energy out of such systems at a sensible cost is likely to be another story.

So what are the budgets for research into more probable renewable means of harnessing Sun energy outputs in comparison ?

Most new 2009 EU powerplant was wind oops, gas

copsewood
Boffin

All electricity is subsidised

Hydroelectricity was subsidised by the families displaced from flooded land losing homes and communities. Nuclear was subsidised by the generators not having to insure against making a whole region radioactive e.g. as with Chernobyl, and by offloading the cost of long-term waste management. Oil, coal and gas is subsidised by generators not having to pay the C02 pollution cost. That's your and my house insurance against extreme weather going up because the actuaries reckon that extreme weather is becoming more frequent, or if you've been flooded recently, they remove flooding cover from the policy and the risk and cost is then yours. Yes it's true, governments in their relatively recent wisdom have imposed a renewables obligation on the electricity supply industry because the first 2% of wind power will cost more per KWh generated than when wind is providing 20-30% of UK electricity demand, due to wind industry tooling up, R+D, training and other investment costs.

Given that no energy sources come into being without the political will and the subsidy that follows what's new ?

First true submarine captured from American drug smugglers

copsewood

what's wrong with the standard shipping container ?

http://en.wikipedia.org/wiki/Intermodal_container

These must beat having mules going through air travel with swallowed condoms and custom-built submarines in terms of bulk delivery cost. According to Wikipedia, there are 17 million such containers around the world. All the drug smugglers have to do is contain one covert cargo inside the reported one. Such items have alternative uses, e.g. delivery of chemo/bio/nuclear warheads for rogue states and terrorist groups unable to afford a guided rocketry program.

The Linux Chronicles, Part 1

copsewood
Linux

PDF viewers on Linux

Evince is more capable than Acrobat because you can cut and paste out of password protected PDFs with Evince but not with Acrobat.

http://bcu.copsewood.net/sectheory/drm/ProtectedPdfCanBeCopied.jpg

Facebook bars crawls from all but select few

copsewood
Grenade

respect robots.txt or welcome to my infinite tarpit

It's entirely possible to tarpit a crawler you really don't like by generating an infinite number of random pages and links for it extremely slowly, tying up its resources for months on end. The robots.txt protocol is so well known that there is no excuse for a site owner not to use it to express policy or for a crawler operator not to respect it.

Given that a crawler which doesn't respect the wishes of a site owner can be tarpitted until it gives up, there is no point suing if a crawler respects robots.txt and a better punishment available if a crawler doesn't, given that all a crawler is doing is making automated use of information you have chosen to publish.

Shadow Analyser speeds digital analysis of recovery files

copsewood
Linux

someone has

from http://linux.die.net/man/1/shred

shred(1) - Linux man page

Name

shred - overwrite a file to hide its contents, and optionally delete it

Synopsis

shred [OPTIONS] FILE [...]

Description

Overwrite the specified FILE(s) repeatedly, in order to make it harder for even very expensive hardware probing to recover the data.

Secret ancient code, basis of all modern civilisation, cracked

copsewood
IT Angle

Plato's ideals and shadows

"If the point is that mathemathics (sic) is so perfect that it must be of divine origin, well, that's exactly the sort of bullshit that causes atheists to feel justified looking down on theists."

Proving that (aspects of) mathematics either are not contained by material/physical reality or that material reality isn't all there is (assuming the statement above does this) isn't a proof of the divine at all. It simply exposes an interesting contradiction in the "physical materialism is all there is" mindset. I'm sure there are contradictions in all mindsets, including my own, and I doubt it proves anything Plato wasn't aware of: http://en.wikipedia.org/wiki/Theory_of_Forms .

copsewood
IT Angle

to infinity and beyond

1. Infinity, e.g. as in the existence of an infinite number of primes, is proven.

2. Finite sets do not contain infinite sets.

Therefore a finite Universe isn't all there is. Anyone care to refute this without disconnecting maths from being part of reality ?

Europe approves US mass data grab

copsewood
Big Brother

Balance needed

A good way to go after crime is to follow the money. For serious international crime this does need cross border police cooperation. Mass data transfers should not be needed to find out where a particular payment ended up. They also won't give you the information needed for law enforcement, if a couple of drug dealers meet in the toilet of a Caribbean casino and identical briefcases, one containing a large quantity of chips are transferred. So if these data transfers are neither necessary nor sufficient, what are they for ?

Power line tech could crash aircraft and shut down the Archers

copsewood

Yes, it would be swell and I'd probably favour it ...

Current power line equipment is what it is: inherently interference noisy and giving flexibility and convenience to home networking that otherwise doesn't yet exist. No harm though in considering in advance of this development what wiring standards should look like if the power wiring were designed for communications rather than retro fitted with comms capabilities. Certainly upgrading existing installations to new wiring standards will take a few decades after the new standards stabilise - I was pulling obsolete rubber covered mains cabling out of my first house 25 years after it had been replaced by the current PVC insulated standard.

As to device security, the migration to IPV6 may give enough addresses to avoid NAT, but it sure isn't going to make firewalling obsolete. Should a lightswitch or fridge once installed advertise itself on the LAN ? Probably, but only enough so that someone who knows the unique password labelled on the back of the device can connect to it using a web browser to choose what it should do. If and when the economics suggested (transformer, chip and TCP/IP stack all cost a few pence) becomes a reality these concepts are no longer utopian, so it's better to start considering the security and cabling or wireless distribution issues beforehand. Would it cost very much more to string a pair of optic fibres into standard mains cable making this upwards compatible with existing installations ?

copsewood
Boffin

mains cabling needs to be designed for comms

Once the cost of chip + transformer + TCP/IP stack falls to a few pence, just about anything that connects to the mains as with every lightswitch or bulb will be manufactured with a net connection, communicating over the mains power it needs. This enables all kinds of smart energy efficient electrical room environment and device control. Probably won't happen if it needs seperate comms cabling, though it might just using WiFi. But if the mains power is also the comms channel such devices should just work and communicate amongst themselves once they are given a mains connection given suitable standards and software.

Once your mains cabling is designed to communicate information as well as power higher comms speeds become possible with less interference. Interference will still be a problem with older buildings until rewired though, though eventually everything will be upgraded as with flaky rubber covered mains cables and 3 pin round hole plugs.

Brazilian banker's crypto baffles FBI

copsewood

the algorithm matters

"The case is an illustration of how care in choosing secure (hard-to-guess) passwords and applying encryption techniques to avoid leaving file fragments that could aid code breakers are more important in maintaining security than the algorithm a code maker chooses."

True so long as the algorithm is strong enough. AES256 probably is (assuming the NSA don't know something about it which very many expert cryptographers who would earn a very big prize and reputation if they could crack it don't). DES certainly isn't strong enough against an attacker with the resources as described: http://en.wikipedia.org/wiki/Deep_crack

Prof: Carbon sequestration 'as bad as nuclear waste'

copsewood
Boffin

synfuel theory and practice

In practice likely synfuel CO2 feedstocks are going to come from fossil fuel burning generated CO2, rather than CO2 extracted from the atmosphere due to the differences in costs of these 2 kinds of CO2. In theory, if synfuels were made from sustainably generated electricity and CO2 obtained from the atmosphere (e.g. by growing, harvesting and drying wood or algae), then yes use of synfuels would be carbon neutral.

copsewood
Flame

externalities

Economists call shifting costs of the activities of an entrepreneur elsewhere externalities. Example: factory owner pollutes river, fisheries downstream pick up the cost. But now major carbon burners are rightly to be treated like the polluting factory which was made to clean up its act in the last century. As other commentators have pointed out, this won't prevent major carbon burners trying to shift costs elsewhere using the illusion of carbon capture and storage to move the genuine costs of their operation onto someone else's balance sheets.

Even if you grow trees and bury them to sequester carbon, you'll still need to make sure the carbon buried is more than that involved in growing, cutting down and burying the trees, so to the extent government research grants and subsidies are added to the CO2 into atmosphere externality subsidy, you'd still need to do the energy accounting carefully even if your carbon sequestration method were proven to be geologically stable over millennia.

Ofcom opens Neutrality debate with 'hands off' warning

copsewood
Welcome

imperfect competition

Where there is competition in provision better information about what your current and other potential ISPs are doing to prioritise traffic can only improve it. The main purposes of regulation here has to be to ensure transparency and to prevent competition deteriorating through corporate cannibalism leading to cartelisation.

Where there is deficient competition, e.g. in rural areas with little broadband provision, the effects of a monopoly and the role of regulation is another story entirely. The neutrality debate arose from memory of the behaviour of the late nineteenth century US robber barons who used rail monopolies to create monopolies in other areas of business e.g. steel by being in a position to decide which products would get moved and which would get delayed. Microsoft did something similar more recently in the applications market prior to the regulators getting up to speed to limit what they were allowed to get away with.

Rail and telecom monopolies are a natural phenomena, because the investment needed to place rail lines or phone exchanges can't be multiplied by competitive providers and practical use of rail capacity is too inflexible for competitive service provision (ref. UK rail privatisation) to be very effective. In connection with the UK phone network, smart regulation has opened up competition over a singular network infrastructure by forcing the provider (BT) to wholesale capacity to many different ISPs.

In practice competition will be non-existent in some areas and less than perfect in others so a further purpose of the regulator will be to monitor the extent of abuses where competition is imperfect. This monitoring also needs many eyeballs, so what the ISPs do in connection with prioritisation, quality of service and traffic shaping has to be put in real time into the public domain.

Google vanishes Android apps from citizen phones

copsewood
Linux

customer expectations

The problem here is partly that mobile phones have traditionally been controlled by the phone company. If you have your phone on a contract or PAYG you expect the thing to work and the phone company to be able to make it work or you don't pay the phone company to use it. The phone company has to keep the thing operating on the correct frequencies and transmit power levels or the phone violates wireless regulations and creates unwelcome interference. So the part of the phone that talks to the phone mast becomes a liability if it is software controllable, but in a manner which the mobile phone company doesn't control.

We now have mobile phones which run a selection of apps more like a traditional PC where the user of the PC is likely to expect to use software of their choosing as they see fit. But most mobile phone customers are probably not going to change the expectation that the mobile phone company are responsible for it all working or they don't pay the mobile phone company.

For other users it is possible to have computers with mobile phone functionality where the part of the mobile which runs applications either is sold and stays unlocked or can be unlocked or rooted, while the part which handles the wireless frequencies and power levels remains under the control of the mobile phone company. What is needed here is clearer understanding by the mobile phone companies of the needs of the minority of customers who want control over their systems, and clearer language describing these products so those buying them know exactly the level of support expected by the supplier and the area of their own responsibility in relation to malware and potential costs.

Horse-headed human trots through Street View

copsewood
Heart

LOL

I was the front end of a cow with a wonderful cardboard head in a carnival parade once, years before streetview. Not sure my older brother ever fully got over being the back end.

Big EU imports of Sahara sun-power coming soon?

copsewood

storing it using hydro

We'd be a lot less worried about electricity storage if the world's hydro dams had been designed to generate fluctuating output when it isn't coming from the sun or wind as opposed to constant output,e.g. for feeding aluminium smelters or baseload. Allowing the water to rise and fall behind the dam by uprating the turbines on existing dams is going to get this kind of attention, as with continental size DC grids, because the places with the best hydro resources are often a couple of thousand kilometers away from the places with good wind or solar potential. As it is, the investment needed to uprate existing dams is much less than building them in the first place.

Cyber cops want stronger domain rules

copsewood
Welcome

Follow the money

Anyone who wants less criminal spam should welcome balanced measures here which don't prevent identified entities from proxying for genuine privacy needs. All the domain registrar should need is the account number and originating bank sort code from which the payment for the domain is made, so if a registration is linked by an investigation with criminal behaviour the police should find tracing the money gives better information than the IP address of a fast fluxing mobile internet connection or one used by an Internet cafe.

Retaining payment details securely shouldn't increase the cost to the registrar of registering a domain as this is likely to be done for sound business reasons anyway, so that a returning customer doesn't need to give all their credit card details every time for a repeat purchase. The lawmakers can hardly complain if the Internet industry can't cough up the information they want if the banking industry can't either, unless they admit that the banks are above the law. This may limit payment options for domain registration, though I doubt many registrars accept cash anyway, and even if they did there's no reason they couldn't insist on cash presented in person with ID and a transaction charge commensurate with the increased cost.

Try before you buy domain registration should have been stopped a long time ago. So if there is always a payment involved, and no reason for the payment not to be traceable, I don't see much reason for plods chasing ISPs for secure customer ID rather than banks.

Google hits coder G-spot with Linux command line tool

copsewood
Coffee/keyboard

tools for the job

GUIs for things you do infrequently or that inherently require a human being to be in full attendance e.g. games. Command lines where verbs, adverbs, nouns, pronouns and adjectives give greater flexibility of control, more rapid selection of multiple objects and an easier route to learning how to automate something where the bottom rungs of the ladder haven't been kicked out of the learning curve.

Probably the main difference between humans and animals is verbal communication so we all have the inherent ability to learn new languages, if this isn't stamped out of us at childhood soon after we have learned out first verbal language. Frankly I'm too lazy not to do command lines - get the computers to do the repetitive work, because that is primarily what computers are supposed to be for.

Killer piranha stalk Folkestone pond

copsewood
Alert

a fishy tale

I met a bloke once who told me a bucket of pirhana fish were discarded, presumably by a pet owner unable to afford his butcher's bills, just downstream of the power station condenser outlet on the river Severn at Ironbridge once. The water there was so warm they loved it. In order to kill them off they had to turn off the power station for a few days.

$11.7m judgment against Spamhaus slashed to $27,000

copsewood
Stop

Spamming reduces life

>>> 3600*24*365.25*80

2524608000.0

If it takes 1 second for every recipient of 2.524 billion spams to delete it, the above calculation shows the total cost as equivalent to the lifespan of someone who lives for 80 years. The cost is much worse than this, because it often takes more than a second, and if you delete your spams based on sender and subject header you are likely to delete wanted messages by accident.

Murdering a couple of 40 year olds expected to live to 80 represents the same reduction in life. The fact that a small amount of time is taken from a very great number of people doesn't somehow make it OK. Locking up large scale spammers for very long periods is therefore entirely justified QED.

Linux IRC server leaves backdoor open

copsewood
Boffin

Did this trojan get downstream ?

It would be worse had this trojan got into the quality assured and cryptographically signed off RPM and APT software installation packages for the Linux distros out there that most Linux users actually use. If it did, that would be more serious than a single developer of a single program which isn't widely used getting hacked. Linux users/admins who install from .tgz files distributed by upstream projects should know that they don't get the same verified and integrated supply chain quality assurance if they obtain software from developers directly. The fact that it is more difficult to install from developer .tgz files is good, because those doing this should know more about what they are doing. Nothing new here about trojans, but no-one in the Microsoft world gets the extra security provided by the distribution packagers if they use 3rd party applications obtained directly from the developer

Google geek slammed over XP exploit

copsewood
Linux

too long for those going somewhere

In what sense does the fact that megacorp likes to have a 6 monthly develop test patch cycle on vulnerabilities mean that an indvididual who has discovered something embarrassing about a megacorp product has to put his/her career on hold ? Supposing someone is going to be interviewed for an important security job in a fortnight's time, and publishing a week after discovery is likely to raise security researcher's reputation ? Perhaps if you were the interviewer, you might consider a week too short so he/she wouldn't get the job on grounds of poor judgement. But if the employer is open source with an agile development and patch process they would more likely consider a week adequate. So why should sclerotic and inflexible megacorp with methods stuck in the past hold up security researcher's career ?

I megacorp is willing to compensate security researcher to sit on something for longer than a week generously enough to want to keep this out of his/her CV then that would seem a fair trade.

Page: