601 posts • joined 29 May 2007
Currently EULAs are one of several wild wests of the Internet. However: because they do not disadvantage corporations there is little action to control them and certainly no campaign contributions for doing so.
Computer Misuse or Data Protection ...
Surely there must be some infringement under the Computer Misuse Act for it doing something that the owner does not want .... Oh, he agreed to it on installing it did he ? Does this thing record the number of people who did not read the agreement ?
Looking at what is collected - it is personal information. This information is being taken out of the UK.
However I agree with those above who say ''just say 'no' - don't use it''.
Subject data access request
I wonder what would happen, if in a few years time, I were to demand that the insurance company were to give me a copy of all the information that it has on me. This would have to include anything obtained from the GP records.
Who defines terrorist ?
What if someone goes to join the conflict in Gaza, should he be allowed to go ?
Yes/no if he goes to join Hamas to throw bombs ?
Yes/no if he goes to join the Israeli army to throw bombs ?
Both almost as bad as each other - but I bet only one gets stopped!
Re: "I've never been someone who is a scaremonger..."
He might not be - but too many people like him have called 'wolf' too many times - we no longer believe them.
Re: Closed is out of flavour these days.
The difference between closed and open source is rather like the difference between religion and science.
Religion (closed source): you do not have evidence (source code) and have to just accept what someone says is true. Theory correction (bug fixes) is hidden - if it happens at all.
Science (open source): you know that you can look at the evidence (source code) and verify what you are being told. Theory correction (bug fixes) happens in public view.
You might not have the ability/desire to look at the source code, but know that other can.
Open source problems are visible for all the world to see, do you know what horrors lurk in closed source ?
I wonder what he would say about the idea that attacking computers in another country is OK and that those who do so are immune from prosecution ?
If nothing else this is breach of copyright .... people get sued for millions by the record/... companies for doing just that.
This will end up being ignored/forgotten
in a few weeks time. Just as almost everything else that Israel does as it slowly takes more Palestinain land to build more 'settlements'. It is a simple fight for land and resources that the rest of the world does nothing more than wring its hands muttering 'how terrible'. However genocide in other countries does get action.
Neither side comes out of it smelling of roses, but Palestinian fighters are called 'terrorists' and Israeli ones 'the army' -- in the sound bite media 'armies' are OK, 'terrorists' are not. But does it make a difference what they are called - they still kill people, the Israelis kill far more than do the Palestinians.
Israel has been condemned in 45 UN resolutions but the rest of the world looks the other way: https://en.wikipedia.org/wiki/List_of_the_UN_resolutions_concerning_Israel_and_Palestine
What is going on is a form of aparteid: http://www.youtube.com/watch?v=93hqlmrZKd8
Please do something useful with it
like recording details of the scammer's machine:
* machine registration details, OS, timezone, ...
* traceroute to google - will give some real IP address on the way out
It is the second that is useful - it should not be hard to work out who is using that IP address and send in the fuzz to grab all machines and use the first to identify the individual machine. They can then start throwing these people in jail.
Assuming that local law enforcement or politicians are not bought off with bribes - these scammers could be a non trivial foreigh earner in some parts of the world.
Don't tell the Daleks
This sounds like an excellent story for Dr Who - where the good Dr can, yet again, foil a darstadly plot by the tin pepper pots!
Re: BBC Worldwide
Some machines that I ssh into I do over a VPN ... does that make me doubly suspicious ?
The only way that I can see this coming in is if there is some kind of way of tunneling TCP inside NDN. Yes: this is not what you are supposed to do, but I cannot see people rewriting their applications until a lot of other applications exist -- so a chicken & egg situation.
Distasteful or Terrorist Act ?
Whereas watching someone being beheaded could be thought of distasteful or ghoulish, is it really a terrorist act ? This overly enthusiastic condemnation makes me less likely to believe that ISIS/IS really is ''The Threat'' to our way of life - just as Saddam being able to hit us with missiles in 45 minutes never was.
Anyway: what is the difference between watching this clip and the Texas Chainsaw Massacre or World War II footage or even playing Grand Theft Auto, all show people being killed - to various levels of realism ?
For the family involved - I have complete sympathy, but that is another matter.
Re: Missing information
both OS-X and enterprise Linux distributions have had far more security vulnerabilities than current Windows versions
Can you provide some information to back that claim up please.
I can see the start of a new game ...
asking Siri outrageous questions:
* what is the nearest bank that I can rob ?
* where is my nearest drug dealer ?
* how can I transfer money to ISIS ?
Points awarded on how funny the replies are; a bonus if the cops want to know why you are asking the questions.
How the gov't sets itself up for a fail ....
If you are carrying a covert mobile phone, you MUST NOT carry any personal communications device e. g. mobile phone, ....
and (my boldening):
officers .... may wish to advise family or friends of disruption to their travel plans. .... If a phone is not available at the airport, then during office hours contact the OPA-TAS OOA number ...
In other words they do not keep the OOA number monitored 24x7 which will vastly increase the temptation for a quick call home to tell the missus that you are late ...
For the sake of a few bob they increase the risk a security breach - stupid!
Re: Removable batteries
Could this be part of the reason for the recent requirement to switch on such devices when passing through airports ... most people will then just leave the battery in the device.
Re: "they would release the name of the daughter of St Louis County’s police chief"
Read further in the article ... they recognised the point that you make and said that they would not release the name.
Re: Any consequences?
The names of those responsible for this criminal activity have been REDACTED, so none of them will pay the price.
Until *individuals* are held responsible for their actions nothing will change.
Re: It's not Open Source it's an open standard
That is important since it levels the playing field, allows other s/ware to interoperate. I do not expect a sudden switch to Open Source s/ware, but people will start to care less since they do not need MS s/ware to properly handle their documents. One they care less the market will open out to other suppliers.
Also: documents will now be readable in 100 years time.
The link Sunswift in the article
takes you to something about sitting being bad for you. What is the relevance of this? OK: the study was done at Uni of NSW, but still hardly relevant ???
What a waste of space ...
has anyone told the ICO that their purpose is to protect us from people using data inappropriately ? Keeping registered is the least important part of that.
This tallys with my experience of them (when making a complaint) they are not very interested. When asking for advice on the cookie law a couple of years ago they were very reluctant to make clear statements.
I can see that from the ICO's point of view they need to keep the cash coming in - but that is not the purpose that Parliament created them for!
I may be naive ...
but these bandits extract money from their victims. That money will need to be extracted from a bank or similar somehow - why can the police not ''follow the money'' and collar whoever walks away with the foldy stuff ? I accept that it might be hard, but that they don't seem to do it at all suggest that the cops are not interested; each one might be small beer, but added up it is a lot of dosh, quite apart from the anguish caused and time wasted.
Also: Edward Snowden has told us how much the NSA/GCHQ snoop - why do they not put their efforts to some useful end -- I thought that they were charged with protecting us from harm. If this is not harm ... then what the hell is ?
Re: Educate the public
Add to that:
"I know, but what can I do about it ?
"I am too busy
I quote pastor Martin Niemöller at them, but they still can't be arsed :-(
Is the sun growing up ?
No longer a teenager - no more spots on it's face ?
Re: See ...
Am I the only one who wonders about the coincidence of timing:
* government rushes through act for preservation of snooping powers. Ministers cite dangers to this country from terrorism and paedophiles.
* last week there were increased restrictions of mobile phones, etc, on flights to the USA
* today 660 suspected paedophiles were arrested after a 6 month operation
Just what was needed to ensure that the act sailed though Parliament!
Not an ISO 3166 code
So it isn't a real country TLD therefore it is a vanity one.
Are they also going to get their own 'phone telephone country code or continue to live under +44 ?
Giving the NSA all the UK government confidential information is part of its bid to become the 51st state of the USA.
Robot taxi cabs
I wonder what grounds the TLC will use to ban robot taxi cabs when they become feasible in a few years time.
A lack of training by the BBC
This sort of thing will happen again & again. Education about computers in schools is hopeless; for most it centers around things like trying to produce powerpoint presentations in a point and click manner without much thought and imparting little insight. Few are taught a bit about what is happening behind the GUI menus. Hardly surprising since most school teachers do not have much IT clue.
Talk to many about security and they will think of blocking porn sites and stare blankly if you press for more.
Companies are generally little better: assume that staff will muddle through.
Until some real understanding is properly taught this script will be repeated endlessly.
This is easy to prevent
The problem is that file name starting with a '-' will be pattern matched; words on the command line that start with '-' can be interpretted as options. This is not usually a problem as most people do not create files with names starting '-', but a cracker might.
So get the shell to not expand (do wild card matching) on file names that start '-'. Put the following into your environment (eg via /etc/profile):
The first is for ksh, the second for bash. QED.
Re: dot and slash
P.S. If you really *were* trying to write a trapdoor into a system, surely you'd use "invisible" files with names containing backspaces or octal \000 characters?
You cannot create a file name with a NUL character in it - that would be the end of string to the system call.
We owe this man a debt of gratitude
for providing the evidence of what the spooks were up to in a form that is hard for them to deny and available to the general public.
However: let us not forget others who have helped to expose the malfaisance of governments, eg: Bradley/Chelsea Manning and those who have helped them, eg Wikileaks. Here is a list that may be of interest: https://en.wikipedia.org/wiki/List_of_whistleblowers
Re: I harbor some darknet myself
The folders in which said pics are stored are not indexed by Google because there is no link to them.
And if you send the private URL one of your friends via their Gmail account ... does google still not index it ? Are you quite sure about that ?
Software patents ?
We don't have them in Europe (yet), will this bring them in by the back door -- eg if some country allows them, then filing in that country will grant an EU wide software patent? This has been twisty turney and I have lost track.
They are going after the wrong people. If the content is deleted on whatever web site then, after a few weeks, Google will remove it from its index.
I suppose the court can twist Google's arm, whereas whatever web site might be outside its juristiction.
And SCO will rise from the dead ...
again to attack Linux -- after all, Linux follows the Unix (well, POSIX) API and since APIs are now copyrightable - then Linux will be subject to SCO royalties -- so beware the lawsuits!
Complete bollocks: but well worth Microsoft revitalising the umpteen times dead SCO corpse and create some more FUD to try to scare some of those contemplating a MS Windows -> Linux migration.
Who pays for missed connections ?
Several people will have missed connecting flights/trains/... Will the UK border agency pick up the bill of rebooking these journeys and maybe hotel bills ?
I suspect not.
Skip to interesting bits ...
Thanks for giving the times of the various parts of the discussion. Unfortunately the El-Reg player does not show you the time-since-start when you move the slider around.
Please add this and I might listen to (what I think are) the interesting bits next time.
What makes you think that other governments are really any different ?
BTW: I assume that you are talking about the USA, America is a continent.
Will they cover their NSA links ?
Ie how long it takes them to forward a copy of all your documents and spreadsheets to the NSA for analysis ? This is not just about personal data but also loss of commercial secrets to the USA.
If someone goes: please ask the questions and let us know what they say.
What is the purpose of checking another site ?
The recommendations appear to be to change passwords but not bother until the site(s) have patched the problem. As a result I have changed many passwords in the last few days, I have often used one of these vulnerability checkers to see if the site was no longer vulnerable (or maybe never was).
The intention is to protect my security, not to try to break in somewhere. Also scanning implies testing many machines, usually at random - I have done targetted testing of sites where I have accounts.
So, PC Plod: if I have done wrong email me via el-Reg and come to arrest me. My conscience is clear.
Disclaimer: I did not read the relevant acts before writing this.
Banks sue for *their* loss ...
But how many banks have been sued for the devastation that they caused to the rest of us ?
Homeopathy works ...
simply because your body will cure itself of many illnesses given a bit of time anyway. The other thing that a homeopathic practitioner will do is to spend much more than the NHS 10 minute GP appointment with the patient, a bit of sympathy goes a long way to making people feel better.
OK: not really homeopathy working, but probably explains why some people think that it does.
Read the T&Cs of the web site
Most people do not bother, partly because they are often long/hard-to-understand and partly because unlike a normal contract they are non negotiable - and most often because they are lazy/will-not-take-the-time.
Maybe people will slowly start to understand that they are agreeing to things, even if they can't be bothered to find out what.
What is needed are a set of standard agreements that have been approved by trading standards or similar ... they could have attached schedules to deal with thing like delivery times.
He is just annoyed that they are texting ...
and not updating their facebook page.
Re: This is why I don't have a sunroof in my car!
Why are you afraid that the spooks will see that your head is bald ?
Radio as well ?
Maybe they ought to schedule a reading of ''Eskimo Nell''
Well, as long as Bill keeps pushing some of his loot down 3rd world toilets & similar - it is better spent than on what some of the other rich boys do with theirs.
- Pic Forget the $2499 5K iMac – today we reveal Apple's most expensive computer to date
- RUMPY PUMPY: Bone says humans BONED Neanderthals 50,000 years B.C.
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Analysis Happy 2nd birthday, Windows 8 and Surface: Anatomy of a disaster
- Review Vulture trails claw across Lenovo's touchy N20p Chromebook