224 posts • joined Thursday 10th December 2009 15:18 GMT
There is a hidden piece of software that looks at everything the phone does and in realtime decides that it won't do anything with it. Oh and this software can be configured to do something else by receiving an sms that the user will never see and has no way of knowing what the sms changed.
And somehow this is all ok and you are satisfied there is no risk?
Ask the important questions please. Why was this software kept secret. Sure the telcos installed it but who the eff did they get it from? IQ cant just say "it's them, not us" when they've had this software installed and running for so long without so much as a peep.
Decides in realtime does it? So you telling me this has no effect on battery life, responsiveness, cpu load etc at all. Somehow I doubt it..
You admit the profile of what to send and capture can be changed over the air and that some telcos do receive a list of apps youve installed and used on the phone.
And this is ok somehow. No problem with having all the apps you use on your phone transmitted. Really now..
Good idea, implementation lacking
I really really wanted Sky Go to be good, however, when the web service requires silverlight and you have to wait for Sky to come out with an app for the mobile device of your choosing then that already limits the number of people that can use the service in the first place.
If it were HTML5 based I'd reconsider it.
Thank you Andrew. Don't always agree with your opinions, this being an exception, but generally enjoy your articles and reasoning.
Virgin reminds me of an old userfriendly comic about a guy that went and bought a massive pipe but had no idea on how to use it.
With Virgin, however, you pay for a massive pipe that you _can't_ use even if you want to! Genious
Being anti-competitive. Especially if they turn around and start their own subscription service.
Doesn't help that prices trippled within a week of the floods actually happening. Run out in a week? Somehow I doubt it.
x86 mini-ITX frontend
First off - kudos on the setup, very nice :)
As for your question, I am not aware of any blueray set top box that is 'open', forgive the wording, enough to let you use it as a Myth TV front end.
So basically, yes, you are looking at a small headless front end box to get a mythTV frontend on the telly.
You might have issues with sound, depending on your audio setup. Basically it's a bit of a b**ch to get HDMI audio output on linux. If you have an external receiver I recommend connecting to that via SPDIF out on your audio card/motherboard from the linux front end box and connecting the bluray player to the external receiver separately via HDMI.
Otherwise, if you have no external receiver and want to connect speakers directly to the linux front end box, the easiest way would be to get a good analog soundcard like the Asus Xonar D2X or similar (make sure it supports HDCP..) and connect bluray box to soundcard via HDMI with analog speaker outputs from the soundcard to speakers.
I wouldn't use an ARM based box personally, getting audio/video drivers to work properly on ARM is a nightmare/will not work at all. Maybe an ION2 based mini-itx board that has a built in nvidia graphics chip, for proper video output.
Can verify the ION2 works well for this purpose, am using it myself. Can even do accelerated flash decoding.
The front end box can be very very small, I used a Jetway JC200 case and it's just about the smallest case you can fit a slim DVD drive and a 2.5" SSD in. You can mount it on the back of the TV, or the back of some furniture near the TV. With an ION2 motherboard it's completely silent.
Agreed, slightly hypocritical, however, there is a world of difference between releasing secret footage of, as an example, a helicopter gunning down reuters reporters which the military previously denied ever happened and allowing warantless search and seizure of electronic records of citizens without cause.
Especially if said warantless search and seizure follows the release of said footage.
Yes, and the Ultrabook is not a marketing name attached to the Atom line of cpus by Intel as an attempt to persuade the industry to use their cpus for their netbooks, oops sorry I mean ultrabooks, instead of better alternatives that shall remain nameless.
I wonder if the goverment realises how hyporcitical it is to complain about foreign use of UK made spy software while ignoring the UK's use of said software, either UK made or not.
Who has time for it
That alien life forms even need lighting like we do.
Just like nothing has ever gone wrong with any technology security done by the goverment. Oh wait..
Battle Royal with politicians? Oh my... that's a genuine awesome idea.
If we're talking HD streams over HDMI here you won't even be able to record them, not at HD quality anyway, for viewing later, thanks to the joy that is HDCP.
If Apple TV won't record and you need another box to do that then what's the point? You're right back where you started.
ASLR on 32-bit code is vulnerable to brute force attacks on the entire memory address space with today's hardware. Won't stop a real cracker.
He's hit the proverbial nail on the head. If you have a key which restricts who can install software on your system then obviously the onus falls on the persons in charge of the key, just like you have with TPM enabled motherboards currently.
There is absolutely nothing, again apart from the persons in charge of the key, stopping companies/goverments/whoever from using that exact same mechanism to make their not so innocent software installable, without fearing detection. In simple terms, Sony's rootkit would have been undetectable by the OS if run under this.
Too little, too late
Surely it's a little late for anything to pick up the slack of a decade's worth of overspending and ignoring the inevitable future. Well, guess what, the future is now.
As long as these companies which have got used to a certain level of.. opulence, let's say, continue to spend beyond their means then there's only one outcome. Failure to compete and make profit can only have one result. And the blame only lies at the feet of the one that takes no action, or rather takes action too late.
Use of 'hacker'
Is no one upset at the inappropriate use of the term 'hacker' anymore? Not even by IT security firms and IT news sites?
To paraphrase a martial arts movie, talking about martial arts skill - "An astronomer can be a hacker with his relentless pursuit of knowledge, constantly peering at the stars. A unix guru can be a hacker with his thirst for knowing more about his system of choice, a student can be a hacker by constantly teaching himself new things at a level most people do not bother going to."
Persons with malicious intent or script kiddies et al. - hackers, they are not.
You're conveniently ignoring the fact that _all_ tablets look the same... There's only so many ways you can put a large 7-10" touchscreen on the front without visible buttons and not have all your 'designs' look the same. Nevermind that the exact same design has been in movies since the late 60s.
You might as well be saying that all minimalistic website designs with a single search box and a picture above it are copying google's 'design', ie scroogle/google/tons of others. It's a search box with a picture above it, get over yourself. Ditto for the tablets., it's a screen with no buttons.
Obviously sarcasm needs to be clearly identified as such.. Noted
The only way you're going to have the stock market work the way it was originally designed to is if you disallow electronic trading altogether and force real humans to make trades manually, like 'the good ol' days'.
Times change, people will always be looking for ways to push the envelope. Once you have electronic trading, which everyone wants, the next step is to push that as far as it can go which inevitably leads to faster and faster electronic trading.
And here I thought adults could do, you know, adult things, without the goverment on their ass. It looks like on the internet, everyone is presumed to be a child, just in case. Lovely
Needless to say this is some bullshit and trivial to avoid. Meanwhile it's yet another censoring of content on the internet pushed through under the guise of 'protecting the children'. Who's going to protect us adults is anyone's guess.
Yeah, my thought is that CUPS predates OSX, nor is Apple the original developer of it.
In fact it was only made OSX's printing system in OSX 10.2. Apple bought the CUPS source code in 2007, hence why it's now referred to as the owner of CUPS.
Odds on Larry releasing their DTrace for linux port under the GPL so it can be included in the mainline kernel? Slim to none I gather.. Meanwhile DTrace was supposedly open sourced by Sun back in the day
Agreed regarding vmotion but still, 4Gb coming out of the storage server is nothing. Not to mention that with a single storage server then the point of failure is your storage server.. You could do HA on both the storage and VM host for your failover.
The point I'm making is you can't complain about how you can saturate an aggregated 4Gb or 10Gb ethernet san when there are other options available if you want to remove that bottleneck. Sure, there may be things that are more important to you, not the point tho.
I believe vmotion can migrate a live vm to another vmotion running with different underlying storage, correct me if I'm wrong.
Why a SAN?
I'm curious, since you've found the bottleneck is in your network speed why not take that out of the equation by direct attaching your storage to your VM hosts? A single external mini-SAS connection can do 24Gb/s so you won't be reaching that limit right off the bat.
I'm guessing that is not an option because you have a centralised filer type of machine and multiple VM hosts that share the underlying storage. In that case you could replace the filer with smaller storage systems direct attached to each VM host, if that's feasible with the number of hosts you have.
If you are using a cenrtalised filer do you think that the I/O speed on the filer itself would handle all your VMs _if_ network speed was not a limiting factor? If not then obviously if net speed was no longer a limiting factor the filer would then become the bottleneck.
The perfect system would then present the attacker with a password prompt and take every step necessary to present the attacker with what looks like a brilliantly designed system that uses what seems to be a 2056-bit key.
Little does the attacker know that the password prompt is a fake. Password? There is no password.
Now _that's_ security.
Second hand sales laws?
Are there any laws prohibiting tampering with a products' advertised and sold features after the sale? Much like a company cannot advertise a feature its product does not have, does that extend to second hand sales?
People that can't distinguish between fiction and reality were effed up long before even touching a video game. That includes yourself.
As a thought exercise, substitute video games in your little rant there with violent films and tell me why video games are a problem while movies are apparently not.
"You own it."
That would be the first mistake, by the customer. You do not, in fact, own it, as should be obvious after this outage.
Does a skin make a new UI?
Nice article but personally I don't see much difference from Metro and any of the myriad of UI 'enhancement' programs that have come out for Windows over the years. Anyone here remember WindowBlinds?
When you get right down to it it's a fullscreen UI replacement running on top of the traditional windows UI. Which you can see if you launch any windows program that doesn't exist in Metro, completely ruining the experience, as you have noted yourself.
Like before, the need for Windows to have backwards compatability might be what kills yet another promising idea.
It is impossible to implement a filesystem which uses patented 'technologies' without falling foul of the patents, by definition. This is also the reason that keeps native zfs away from linux, even though the code itself was open sourced.
No word on
Whose fault it is that browser plugins are allowed to do pretty much anything on a windows system, thus allowing for malware to spread that way.
After all, when's the last time there _wasn't_ a zero day adobe reader exploit?
No mention of Citrix and/or Xen? I'd say that's another choice other than Redhat's KVM or Microsoft's Hyper-V, arguably a better one.
Interesting. Yet again from OCZ however only Windows is noted as a supported OS.
DIsappointing to say the least, especially considering there are very few caching SSD solutions for the *nix market, other than the extremely expensive Fusion-IO products.
Optional but relevant
Well if it means anything Be was and is one of the few that do no traffic shaping and with no traffic limits.
Now if we could just get 100MB/s to the home, not just the large apartment building and I'd be happy.
In other news..
The mayor of New York yesterday - 'Bloomberg: "For 10 years we have not allowed terrorists to intimidate us"'
Really now. So you do not, in fact, take finger prints of every single woman, man and child entering the free united states, 'just in case'.
You do not, in fact, monitor all communications in and out of the United States, including those of American citizens, 'just in case'. And so on.
An even more worrying sight for me is the blatant propaganda that seeps out of TV shows like '24', with its 'if you have nothing to hide, then what's the problem' and their 'My name is Ahmed! You can't even pronounce my name and you think we're friends?' and their every foreign person is a terrorist jig. Meanwhile a whole generation is growing up thinking all of this is 'normal' and that every dark skinned person with a backpack is a threat to mankind.
This world disgusts me more by the minute. It's good to see some people are not blind. Thank you for the article Duncan.
"have created a strain of ransomware Trojan which masquerades as a Microsoft utility"
What's the difference?
It's all well and good but if any service is going to match the illegal but convenient option it absolutely has to be worldwide. Spotify won't even let me subscribe, you have to jump through hoops to get some random japanese song from itunes if you don't happen to live there. The result?
A five second search on whatever illegal method happens to be popular. That is what needs to be matched.
"44 per cent of them now know that the lines represent contactless payment, and 65 per cent are aware that cards in general are capable of such a thing."
I wonder what the percentage is for people (rightly) concerned about security and privacy issues with said cards. 'Contactless' implies 'remotely' you know.
Not my experience either. Indeed, their RMA rate is higher than, say, Intel, however the RMA process is painless and quick.
My experience is similar to turtle fan, RMA'd the first I received (DOA), the replacement has been rock solid for over a year now running 24/7.
- Geek's Guide to Britain BT Tower is just a relic? Wrong: It relays 18,000hrs of telly daily
- Product Round-up Smartwatch face off: Pebble, MetaWatch and new hi-tech timepieces
- Geek's Guide to Britain The bunker at the end of the world - in Essex
- Review: Sony Xperia SP
- Dell's PC-on-a-stick landing in July: report