104 posts • joined 3 Mar 2010
Re: It's a positive step for UK broadband
Not so easy. BT would either have to strip out more cable, all the way back to an exchange where a fiber access point was available, or splice in multiplexers and demultiplexers at each end of the break.
Either way you're looking at massively increasing the length of the outage.
I wonder what (if any) relationship Broadcom has with the Alphabet soup?
Re: Do people have no memories at all?
They are however quite possibly that arrogant, vis a vis their badge for their latest spysat. And code monkeys sometimes think they're that clever.
Re: Whose routers ARE secure?
Ten years and more ago that suggestion was a show stopper, too many discrete components required, too little under-utilised bandwidth to hide in. Today, not so much, the silicon real estate necessary for such a "feature" would represent only a small percentage of a monolithic device managing a dozen communication protocols over hundreds of I/O channels, directly connected to a "pipe" the size of the Mersey Tunnel.
Fortunately, such attacks on the underlying physical hardware must be done at the front end of the manufacturing process. The blue prints themselves have to be altered, and opportunities for being found out subsequently are myriad all the way through the manufacturing process and even the junk bin. Any lazy college student with electron microscope time on his hands might find it.
Now, when the next layer of abstraction plus encryption gets offloaded to the I/O chipset all bets are off.
However, it's all somewhat moot when we know that a spread spectrum digital radio transmitter can be hidden inside a USB connector. We should just thank our lucky stars that RJ-45 connectors are transparent. the size of my mouse dongle tells me there might well be room for a "listening" bug in even that ethernet connector waved about by the talking head last week.
Re: "WPA keys, ISP creds, MD5 hashes - all in plain view"
Nope not personal at all. Held jointly by you and your ISP. Or I'd bet that's how they'd argue it. And not quite in public view. If I'm reading this correctly, someone up to no good needs physical, or at least guest wi-fi access, which put this in the class of trusting your neighbour not to take a soap impression of your keys while you're on the bog.
And that's as far as it goes. Without special effort on your part, your privacy in the modern world is pretty much entirely dependent on the size of your profile and the amount of interest you attract.
I just discovered my (not by my choice mind you) ISP stores passwords using reversible encryption. And worse their lost password procedure is to send it to you plaintext in an SMS message, in my case to a phone number I'd just given the tech not two minutes earlier.
And that my friend is an improvement. In my previous lost password conversation with them, the tech read my password out to me off their screen.
Better still, up until very recently all email logins were clear text only, and the last to be upgraded to encrypted logins were of course the primary logins for each account. Their argument was that it wasn't an issue because the connection from the modem to their server was secure. I asked what about remotely accessing email from another computer and the response was essentially, they provided what they contracted to provide - A HOME broadband internet connection, and they couldn't be held responsible for what I did with their credentials on a third party's network.
& RESCUE. Strikes me we've got an editor clarifying...
that our SES (State Emergency Service) conducts S&R operations.
A correspondent who demonstrates that such clarification is both necessary AND still insufficient.
Was thinking this myself. Re: TPP
The blanket meta regulation which forces all treaty partners to abide by the lowest common regulatory denominator, could well see future warranties become comparable to those which once came with "genuine" designer goods purchased in a Kowloon flea market.
@Chris_W - First in best dressed.
He saw an empty marketing niche (AKA people easily separated from their money) and filled it to the tune of a few thousand dollars.
Re: First amendment?
And no one appears to be asking Google to take the videos down.
Where Google could very well come undone is their ad matching technology under proceeds of crime legislation.
Only have to prove that someone used a YouTube video to commit a crime they could not have committed without knowledge gained from the video and Google could be screwed.
Hit them for the $3.64 raised by the ad and hand off to civil litigation by the victim(s).
Moral leadership is neither here nor there. Google regularly censors YouTube content. It's certainly fast enough to take down any bare titties which might appear. What this really boils down to is that wowsers have enough clout to scare Google into taking down content which they disapprove of, but without Gawd to whip folk into a frenzy, instructional videos for committing actual criminal acts just aren't the same threat to their revenue stream.
Someone needs to water that pitch.
Or perhaps, one of the DSLAM-2s 'retired' in the upgrade...
...might be relocated to your nature strip as an interim solution. If not, there's NO BLOODY HARM in asking if it were possible for this to be done.
Thick edge put at the bottom because it's more stable.
Simple as that. If the thick edge was consistently placed towards the top, in a leaded pane, mechanical forces would encorage to the pane to peel out of the opening if the fixings were compromised.
Less robust (even if only marginally) restraint is needed if the thick edges rests on thin, than with thin on thick.
Central Coast? Point Clare? Gosford?
Where's the offence?
It's a nearly vertical, temperate rainforest, bedroom community. It has 4 shops and a vet clinic, a volunteer sea rescue base, and a land based "training ship".
And really shitty fishing.
Re: Rape IS a hard crime to prove... BULLSH*T!
Rape victims are easy subjects to denigrate.
If it can be made this simple and potentially even simpler and cheaper still, why shouldn't it be as casual as the sex?
Re: Here say?
Nope. Releasing evidence that implicates a hell of a lot more than two people, and supposedly didn't exist according to police/prosecutors.
BTW its hearsay.
Are you aware:
That one of the parties where the girl was raped was hosted by the original prosecutor, and that the prosecutor's son was one of the alleged participants?
That the prosecutor disuaded the girl and her parents from pressing charges?
That she did not recuse herself until six weeks after the original allegation, and that by the time she did, almost no evidence remained.
That the accused were already known as "The Rape Crew" BEFORE this assault took place.
That the ONLY members of the football team who were suspended were the two who developed consciences (possibly quite gulity ones) and spoke up.
Re: Browser bars and Antiviruses
Only works if there's a doctor in the family, but boy does it work.
He asks you about his computer, you drop your strides in the middle of x-mas dinner and ask for a his opinion on your hemaroids.
Re: "Foxconn and Apple - totally amoral."
So let's make that Western consumerism and outsourced labour.
Why "F" & "A"? "F" because they are the ones attracting headlines, due to their assosciation with "A" for doing the shit. And "A" because they are the ones who constantly crow about how bloody wonderful they are and charge a premium price into the bargain, when their labour sourcing practices are not one single whit different to most of the rest of the industry.
The rest simply say here's a product at the prices you demanded, your culpability in slave and child labour practices is assumed. Just as it is when you buy 99 cent underpants and ten dollar jeans.
Given a choice between overpriced crap, and functionally identical crap from the exact same source sold with a fair margin, I will go with cheap every time. It might not make any difference to the poor bastard putting my crap together, but i'll be damned to the reverse ingestion of pineapples before I'll pay a fooking premium for nothing but the logo on the outside of the product.
Re: Why must the injured travel to the doctors?
Excuse me. What a person is capable of doing on a one off basis, when circumstances leave no other option, has absolutely no frigging bearing on what that person is able to do day in and day out. Nor does it address how much recovery time, their exertions might necessitate after the fact.
For myself I have tendonitis in both wrists and elbows. Day to day I am perfectly fine, but after about two hours of any repetetive activity which requires gripping and controlled motion (eg painting with a brush or roller) I start feeling the pain, and by about halfway through a working week I'm on anti-inflamatory drugs and planning ahead of time how I will lift that bottle or glass of water.
Feeping Creaturism at it's finest.
From its introduction of the Mac, Apple has built their devices with a minimalist human interface and then "inovated" with (more and more frequently) patented methods and procdures designed around overcoming the limitations of that minimalist interface.
Damned near every bloody thing coming out of Apple seems to be built around one overriding criterion:
Can it make a fanboi maik squee?
One button, translucent cases, sleek lines, rounded corners, pretty colours, "go faster" stripes, hide the buttons altogether.
Imagine if the current crop of so called innovators got in on the ground floor with power tools: The Makita pistol grip, Ryobi double hand grips, Black and Decker 8-ball speed selector. Palm grip or fingerwrap? Pushbutton or trigger switch? Slide, push, pull, twist or toggle?
Perhaps people would like pushbikes where only Raleigh has a monopoly on a grip which places one hand either side of the pivot point and everyone else must make do with a tiller.
Oh and a freebie to Samsung and the others. Slide a thumb downwards on either side of screen to unlock, just like the thumblatch once found beneath the the crescent moon.
Re: What exactly is the crime?
Swindling if you're lucky. Keyloggers, trojans, zombification, ransomware, you name it. Anything you might pick up surfing on the shadier side of the internet, but worse since clueless luser lets the black hat in on his side of whatever security he might have.
China's capsule is basically a Soyuz knock off, so doesn't exactly count as original.
I will say I do like their seriously low tech oak heatshield.
Is there anything to indicate that the material in the brief case....
...was specifically sought?
Or was it just an opportunistic chav looking for something to turn into "ready" to turn into packaged happiness?
Chill in flat pans. Drop in ice chips. 5, 4, 3, 2, 1. Remove ice sheets. Decant. Age.... There that's about right. Drink.
Always too much water in the way.
Gaps in the membrane are exactly "one water wide". There's NEVER any room for anything else. As soon as there's room for a fresh water molecule at a gap, it displaces anthing which might physically occupy the space. He (and everything else) gets left behind.
It's probably quantum too.
Hand operated tumble washer.
Any decent camping supplier can provide.
Same principle:- a screw top bucket left to roll about in the boot of the car also works marvelously.
Unfortunately vacuum bogs have a bad habit...
...of doing exactly that if the piston returns before the bowl has completely cleared.
No problem is exactly the opposite.
What I don't get is the deliberate introduction of single points of failure on a fucking warship.
Banks of bogs serviced by centralised vacuum systems? That is a guaranteed disaster, no matter how massively over engineered.
Vacuum should always be generated as close to the point of need as possible.
Still too effing complex. Too stupid to be hacked...
...is the only way to go.
1. Hardwired (not coded) refusal to exceed "normal operational parameters" by more than x%.
2. A very limited command set.
3. Chained encryption of commands and responses with a null operation failure mode, and a hardwired restart sequence.
Not lazy. Cheap.
At the very least, a manually operated system reuqires a nearby "on call" operator. More likely a permannent on site operator, who would spend most of his time with his heels up waiting for something to happen.
Truly dedicated communications infrastructure is also prohibitively expensive.
The true problem is piggybacking something as bloody simple as industrial control systems on top of any complex operating system. Water pumps just plain don't need to be able to run a word processor, a database and 50 active porn windows.
Ride it like it were a bicycle in traffic.
I always assume at any choke point, that a car capable of placing itself in the same volume of space as me and my silent e-bike will attempt to do so, and behave accordingly.
The only thing I have to worry about are red light runners and they will clean anyone up regardless of audibility.
Outside of sports fixtures, events beer is small potatoes.
Most serious drinkers have a preferred brand, and not much but a traitorous new recipie will shift their taste.
Kids are the market to aim at :- Packaging for every junk food under the sun. Use a laminated capacitor (a new dilectric membrane shows enormous promise) and induction power while on the shelves.
Greeting cards. Advertising fliers. all the drech and blech you could never wish for.
But also product age indicators, cheap disposable slap on medical monitors attached to an adhesive bandage. $5 EKG machine. $0.50 heartrate monitor. $10 EEG. Even an entire sticking plaster defibulator for a few dollars might be possible.
My first thought was: CSI would have fun in there.
And I live just a few hours (15 or so) up the road.
What that is, is pre-marble. Limestone which has not undergone metamorphic heating.
Get a decent gennie and run it on cow farts.
Some gestures are just plain ridiculous.
Mounting a side cart to a couple of push bikes and dragging around a gennie powered by biogas or ethanol to recharge people's phones makes a lot more sense.
Even charging car batteries offsite with filthy coal and biking them in would make more sense.
Time required, alone will keep granny's transit card safe enough.
The 7 hour access requirement means that the potential reward will need to be a little more than Granny's $20 fare top up.
This is NOT the oyster card hack which permits on the fly theft/modification of card details, where a Marylbone worth of skimming might net a few hundred K $ in a morning.
So while technically interesting, and of potential use in compromising a major facility, this isn't likely to affect the likes of you and I. If the tea leaves can get at your card for 7 hours, they can also get at your brass house keys, and copying them takes a few seconds and a bar of soap.
A big part of the data retention headache...
...is the ever broadening criteria for what has to be kept and for how long.
Here in Australia, it's now necessary to retain documentation on kids for up to 21 years, medical , childcare, schooling, anything "official".
Hmm, 9/11, 2001 perhaps? Routine site access logs once held for 3 months suddenly shifting to 7 years plus retention alone could do it? Rinse repeat for OR swab logs; A budget cut which slowed down the process of moving records to microfiche?
Loquats in my back yard.
many many years back my cat would climb onto the neighbour's garrage and snag them out of mid-air. 10 feet later cat would hit the pavers with a thump and he and the bird would stagger off in different directions.
ER pic of his arse masquerading as a pincushion.
That my friend would have been very lol worthy. Particularly with a nice solid grogan enspiked.
my guess is everyone convicted gets touched for it.
It goes into a pool and victims of crime may apply for compensation for small losses.
I can't believe no mentions of...
Oh come now. The lady isn't that loose.
Oh, you meant the city. 17 miles of gusset coverage did seem a tad excessive.
IF they use (and reuse) the same password.
Strikes me, that a badge #, or other job related "word" as a password would indicate at least rudimentary attempts to use DIFFERENT passwords.
BTW Zane, not necessarily if it's less than 100% compromise of PWs. A dictionary attack on most enctrypted password files will succeed on a great many of the passwords, whatever the source. The exact contents of the released data would tell though. 100% of passwords would indicate either a broken reversible algorithm, or plaintext storage.
But then again, consider the number of subscription websites that even today return the actual original password to an "I forgot my password" request. It most certainly is possible.
My money is on when Steve decided...
...to borrow a page from the printer manufacturer's book, and use a chip to block third party products.
In the name of protecting the customer from dodgy products of course.
And what happens when someone uses "The Cloud"...
...for illegal purposes. Already "white hats" have used rented cloud capacity to cheaply demonstrate proof of concept attacts which would otherwise be impossible or impractical with resources available to ordinary folk.
So what happens when LulzSec, Anonymous, uses a cloud to carry out a DDoS or to brute force a password table? What happens if Pakistan or Iran is discovered using a cloud to run nuclear simulations?
They WON'T be told that it's a commoditised service. They WON'T be told the evidence they are after is not there. They will take every machine (or at least datastore) within their reach and make whatever is outside that reach effectively inaccessible, at least from within the US.
To all of the above. Tera(peta?)bytes.
BOFH descriptions of "industry best practice" describe constant, off site, hot duplication of data.
So if I were to want to do something like this, perhaps I would come at the "problem" bass ackwards. After compromising the main system, I'd posion only the backups over enough time to "get" them all. And only then take down the main.
Supose Sagan hold the copyright on B&B.
Hence millions still to be found. Many, many, many millions.
Or is El-Reg being coming over all Brit pedantic about what a billion really is?
I suppose they couldn't find a pollie with his dick out.
Surely they could do better than this in their efforts to avoid addressing the subject the WHOLE FUCKING WORLD wants them to.
Given that all the parts are basic PC components...
...there are no real barriers to their purchase.
How the buyer assembles them into a complete system IS NOT SUBJECT to the whims of paranoid 'Merkin spooks.
And a small newsflash. NEVER REALLY HAS BEEN.
Since the letters G, P & S appear consecutively...
...in the article, AND the car's list of features includes "GPS navigation", i'd say yes.
However, I do suspect that precision is not QUITE the submilimetric resolution of the coordinates shown in the video.