Subject access request
So does this mean that I can now give Google a subject access request and have it, within 40 days, give me a copy of all the data that it has one me ?
624 posts • joined 29 May 2007
So does this mean that I can now give Google a subject access request and have it, within 40 days, give me a copy of all the data that it has one me ?
I have just updated some 8 machines, none of them rebooted. I restarted some services (exim, httpd, sshd, ...) - but a reboot was not needed -- these are Linux systems, not MS Windows.
I agree that a reboot is an easy way of restarting everything - but if you know what you are doing it is not necessary.
Yes: 64 bit.
For something that seems designed for handheld use not using big.LITTLE seems strange. Any device will have times when it has little to do, so why not save the battery by powering down the fast but battery eating big core ?
IIRC a couple of years ago AMD sacked a lot of R&D types. It improves the bottom line for a couple of years and then the chickens come home to roost.
If I visit a web site by some means other than: doing a google search, using google as my ISP, ... it learns nothing about what I am doing (the NSA does not give them a feed!).
If google tells my machine where a domain's name servers are it will know that I am trying to reach the domain. It will not know why, or how long for - but it will know. This is why they provide a free to use name server at 184.108.40.206.
Yes: I do realise that if you use your ISP's name servers, your address is fuzzed and the ISP will cache results ... but google will still learn something.
Should there be legal limits one how data can be shared between the various different business units of large corporations ?
I do not have a problem with targetted surveillance where MI5 need to justify their concerns to a judge before they snoop. ISPs/website_operators must be given these decisions (judgements but not the evidence) as part of a request for help in an intercept. These applications to court must all be published after, say, 10 years. I do not like warentless hoovering of all communications data.
The other thing that I do not see is full auditing and a truely indepdendent auditor - ie not an establishment figure. This guy would be given free access to what is happening and will publish an annual report (yes: summary only) and when there is a 'bust' say how important surveillance was in achieving it - currently I get the feeling that how imporant e-evidence was in a bust is somewhat over played.
I doubt many people would be especially bothered about having to drink a specific soft drink brand at a concert
I would. If I have paid for a ticket for an event I do not expect to be further ripped off by having to buy some overly sweet fetid drink like coca cola or pepsi. I know that some people like them, to me they are disgusting.
There are all those snoops that were not noticed by anyone. It would be naive to assume that NSA auditors/... were able to catch them all.
We have been shown reports of a number of violations. I would not be surprised to learn that there were many more but that the NSA 'fessed up enough to make us all tu-tut and be satisfied that they have told us all that they know ... but the real number known internally is what ?
The NSA has been shown to lie in the past, we would be naive to assume that this is the full truth.
This Turla cd00r-based malware maintains stealth without requiring elevated privileges while running arbitrary remote commands. It can't be discovered via netstat, a commonly used administrative tool. It uses techniques that don't require root access, which allows it to be more freely run on more victim hosts. Even if a regular user with limited privileges launches it, it can continue to intercept incoming packets and run incoming commands on the system.
If it does not use elevated privileges then, I assume, that it has not tampered with the kernel. So how does it hide from netstat ?
Ah, later he says: The module statically links PCAP libraries, and uses this code to get a raw socket, ..., but use of PCAP requires superuser privileges???
I am not saying that this is not a threat ... but I would like to see something more plausible - if only so that we can protect ourselves -- without having to buy something from Kaspersky ... which is what I get the feeling this is all about - a marketing exercise.
If they put 10% of that into sponsoring open source projects I wonder how long before they have a royalty free suite that does what they need ? Run it on top of Linux using PostgreSQL, etc, and the bills would drop.
OK: open source projects will not do exactly what is needed, so pay FLOSS hackers to write the code and release it under the GPL. This code could be used/shared by different government departments, by industry and even other governments[**].
Do they not think that this is what Oracle is doing ? Write the code once and then implement it many times at different customers ?
I do realise that requirements will change, so any solution will need maintainance. I also realise that different use cases will have different detailed requirements, but well designed core components will be able to be reused.
[**] Hmmm, the thought of helping the French might put the kibosh on this :-)
in the Microsoft s/ware, will they pay the $499 back ?
Oh - look at the pigs fly by ...
I have not felt the slightest urge to go out and buy anything today. Is there something wrong with me that even my best friend won't tell me ?
Assange was about Wikileaks and, at the time, Snowden. It looks that the USA have succeeded in neutralising him as I seem to remember that there was a lot of talk about the rape charges being 'encouraged' by USA operatives. Assange has now been removed from this.
What would Assange have gone on to do if he were not holed up at the embassy ?
BTW: I wonder what he does with his time and how he pays for his keep ? Does he wash the dishes or perform office tasks ?
Is to ban exclusive deals, ie insist that every football match can be broadcast by at least 2 TV channels (or Internet stream). That gives the media the incentive to be cheaper than their rivals to get the eyeballs - thus introducing real competition. If the price paid to clubs drops, then so be it. There should be no minimum fee that has to be paid to a club; so if no (second) bidder bids more than your £100 to be there streaming from a web cam - then so be it.
The fans will gain from this.
The only losers will be the clubs & media.
Expect collusion between the clubs and the media and a few people going to prison as a result.
It is looking for a lamp post to pee on -- wouldn't you be after 10 years ?
A few days bank charges will pay that.
No one else.
I remember all too well Tony Blair saying how Saddam could blast us in 40 minutes and lots of other stuff from the dodgy dossier. I remember him asking us to trust him. What Therea May and the chief spooks are saying today smells as it came from a similar source.
If they want to convince me then show me the real evidence, come out with real numbers - not ones massages to support their case. I accept that I cannot see everything as it may destroy current investigations, but they could show it later. Show how they got to feel the bad guy's collars, how much by wire tapping, how much by old fashioned investigation. Do not sex it up.
And please don't blather mindlessly about terrorists, drug lords & paedophiles while vaguely waving your hands - it just does not wash. Whenever anyone tries to use emotions to make me forget logic: I switch off and put them in the 'not to be trusted' box.
Where is the daddy ?
We need to start to name & shame ISPs who do not offer IPv6 support.
I will start with Direct Save Telecom. I used them when I set up IP connectivity for the local community group office. I was told that they would provide IPv6 soon. Querying this 6 months later I was told "Oh, that was just the salesman - we have no plans for IPv6".
where it will be perfectly safe! Ahem :-(
What could possibly go wrong ?
+1 to MOJ ignoring the cost to the tax payer through job losses & tax lost if it were done in the UK.
#100m over 10 years = #10m a year. Job loss: 65000 = #154/year saved for every job lost!
MoJ might gain; UK as a whole loses. Morons.
They say that it bears the hallmarks of a state-sponsored attack, so presumably the White House will say ''fair enough, this is a legal crack into our network'', after all Prosecutors in Silk Road raid trial: If you're outside the US, you're fair game for hacking.
What is sauce for the goose, is sauce for the gander.
Currently EULAs are one of several wild wests of the Internet. However: because they do not disadvantage corporations there is little action to control them and certainly no campaign contributions for doing so.
Surely there must be some infringement under the Computer Misuse Act for it doing something that the owner does not want .... Oh, he agreed to it on installing it did he ? Does this thing record the number of people who did not read the agreement ?
Looking at what is collected - it is personal information. This information is being taken out of the UK.
However I agree with those above who say ''just say 'no' - don't use it''.
I wonder what would happen, if in a few years time, I were to demand that the insurance company were to give me a copy of all the information that it has on me. This would have to include anything obtained from the GP records.
What if someone goes to join the conflict in Gaza, should he be allowed to go ?
Yes/no if he goes to join Hamas to throw bombs ?
Yes/no if he goes to join the Israeli army to throw bombs ?
Both almost as bad as each other - but I bet only one gets stopped!
He might not be - but too many people like him have called 'wolf' too many times - we no longer believe them.
The difference between closed and open source is rather like the difference between religion and science.
Religion (closed source): you do not have evidence (source code) and have to just accept what someone says is true. Theory correction (bug fixes) is hidden - if it happens at all.
Science (open source): you know that you can look at the evidence (source code) and verify what you are being told. Theory correction (bug fixes) happens in public view.
You might not have the ability/desire to look at the source code, but know that other can.
Open source problems are visible for all the world to see, do you know what horrors lurk in closed source ?
I wonder what he would say about the idea that attacking computers in another country is OK and that those who do so are immune from prosecution ?
If nothing else this is breach of copyright .... people get sued for millions by the record/... companies for doing just that.
in a few weeks time. Just as almost everything else that Israel does as it slowly takes more Palestinain land to build more 'settlements'. It is a simple fight for land and resources that the rest of the world does nothing more than wring its hands muttering 'how terrible'. However genocide in other countries does get action.
Neither side comes out of it smelling of roses, but Palestinian fighters are called 'terrorists' and Israeli ones 'the army' -- in the sound bite media 'armies' are OK, 'terrorists' are not. But does it make a difference what they are called - they still kill people, the Israelis kill far more than do the Palestinians.
Israel has been condemned in 45 UN resolutions but the rest of the world looks the other way: https://en.wikipedia.org/wiki/List_of_the_UN_resolutions_concerning_Israel_and_Palestine
What is going on is a form of aparteid: http://www.youtube.com/watch?v=93hqlmrZKd8
like recording details of the scammer's machine:
* machine registration details, OS, timezone, ...
* traceroute to google - will give some real IP address on the way out
It is the second that is useful - it should not be hard to work out who is using that IP address and send in the fuzz to grab all machines and use the first to identify the individual machine. They can then start throwing these people in jail.
Assuming that local law enforcement or politicians are not bought off with bribes - these scammers could be a non trivial foreigh earner in some parts of the world.
This sounds like an excellent story for Dr Who - where the good Dr can, yet again, foil a darstadly plot by the tin pepper pots!
Some machines that I ssh into I do over a VPN ... does that make me doubly suspicious ?
The only way that I can see this coming in is if there is some kind of way of tunneling TCP inside NDN. Yes: this is not what you are supposed to do, but I cannot see people rewriting their applications until a lot of other applications exist -- so a chicken & egg situation.
Whereas watching someone being beheaded could be thought of distasteful or ghoulish, is it really a terrorist act ? This overly enthusiastic condemnation makes me less likely to believe that ISIS/IS really is ''The Threat'' to our way of life - just as Saddam being able to hit us with missiles in 45 minutes never was.
Anyway: what is the difference between watching this clip and the Texas Chainsaw Massacre or World War II footage or even playing Grand Theft Auto, all show people being killed - to various levels of realism ?
For the family involved - I have complete sympathy, but that is another matter.
both OS-X and enterprise Linux distributions have had far more security vulnerabilities than current Windows versions
Can you provide some information to back that claim up please.
asking Siri outrageous questions:
* what is the nearest bank that I can rob ?
* where is my nearest drug dealer ?
* how can I transfer money to ISIS ?
Points awarded on how funny the replies are; a bonus if the cops want to know why you are asking the questions.
If you are carrying a covert mobile phone, you MUST NOT carry any personal communications device e. g. mobile phone, ....
and (my boldening):
officers .... may wish to advise family or friends of disruption to their travel plans. .... If a phone is not available at the airport, then during office hours contact the OPA-TAS OOA number ...
In other words they do not keep the OOA number monitored 24x7 which will vastly increase the temptation for a quick call home to tell the missus that you are late ...
For the sake of a few bob they increase the risk a security breach - stupid!
Could this be part of the reason for the recent requirement to switch on such devices when passing through airports ... most people will then just leave the battery in the device.
Read further in the article ... they recognised the point that you make and said that they would not release the name.
The names of those responsible for this criminal activity have been REDACTED, so none of them will pay the price.
Until *individuals* are held responsible for their actions nothing will change.
That is important since it levels the playing field, allows other s/ware to interoperate. I do not expect a sudden switch to Open Source s/ware, but people will start to care less since they do not need MS s/ware to properly handle their documents. One they care less the market will open out to other suppliers.
Also: documents will now be readable in 100 years time.
takes you to something about sitting being bad for you. What is the relevance of this? OK: the study was done at Uni of NSW, but still hardly relevant ???
has anyone told the ICO that their purpose is to protect us from people using data inappropriately ? Keeping registered is the least important part of that.
This tallys with my experience of them (when making a complaint) they are not very interested. When asking for advice on the cookie law a couple of years ago they were very reluctant to make clear statements.
I can see that from the ICO's point of view they need to keep the cash coming in - but that is not the purpose that Parliament created them for!
but these bandits extract money from their victims. That money will need to be extracted from a bank or similar somehow - why can the police not ''follow the money'' and collar whoever walks away with the foldy stuff ? I accept that it might be hard, but that they don't seem to do it at all suggest that the cops are not interested; each one might be small beer, but added up it is a lot of dosh, quite apart from the anguish caused and time wasted.
Also: Edward Snowden has told us how much the NSA/GCHQ snoop - why do they not put their efforts to some useful end -- I thought that they were charged with protecting us from harm. If this is not harm ... then what the hell is ?
Add to that:
"I know, but what can I do about it ?
"I am too busy
I quote pastor Martin Niemöller at them, but they still can't be arsed :-(
No longer a teenager - no more spots on it's face ?
Am I the only one who wonders about the coincidence of timing:
* government rushes through act for preservation of snooping powers. Ministers cite dangers to this country from terrorism and paedophiles.
* last week there were increased restrictions of mobile phones, etc, on flights to the USA
* today 660 suspected paedophiles were arrested after a 6 month operation
Just what was needed to ensure that the act sailed though Parliament!