* Posts by tom dial

2187 publicly visible posts • joined 16 Jan 2011

Europe may ask Herr Google: Would you, er, snap off your search engine? Pretty please

tom dial Silver badge

Re: Funded by Google's oppostition

Every month or two I routinely try Google, Bing, Yahoo! and Duck Duck Go. By my judgment, the result rankings for exactly the same query typically are

1. Google

2. Bing or Duck Duck Go in variable order, and close to as good a Google.

3. Yahoo, a rather distant third.

I do not claim a great deal of validity for the sample. I only run one or two queries each time and they are random ones that I happen to be interested in at the time, and hardly ever look beyond the first page. And Adblock+ always is busy blocking whatever it does for a vanilla install. However, I never have seen Yahoo! not to be significantly poorer, or Google not the best of the lot, although on occasion Bing or Duck Duck Go have returned a list identical to Google's

I do wonder if the Mozilla people were thinking of anything beyond the size of the cash bundle.

tom dial Silver badge

Re: Funded by Google's oppostition

The point is that the opposition are attempting to get the government to set rules to provide them benefits that they have otherwise been unable to obtain because they are not, in fact, competitive in their own right.

Forget the climate: Fatties are a much bigger problem - study

tom dial Silver badge
Pint

Re: WRONG! (Was: I'm three terrorists at least!)

Now if The Register would just enable https we ALL could be terrorist-equivalent at least once.

Who is out there waiting to spy on you or steal your data?

tom dial Silver badge

Upvote for the thought, but is there any reason to think there will be anyone there to provide services?

Retail banks in the US have been trying to discourage this type of behavior for decades, and while they have not succeeded, have made substantial "progress" in some places.

Assange™ slumps back on Ecuador's sofa after detention appeal binned

tom dial Silver badge

Re: Since we're paying £7000 a day for some police officers to lurk around the embassy

You would be paying the police the £7000 daily for whatever their assigned duties were. There is an excess cost only if their assignment to Assange Monitoring has necessitated additional hiring.

Yet more NSA officials whisper of an internal revolt over US spying. And yet it still goes on

tom dial Silver badge

Re: If only they could put it to good use...

Since a sizable majority of the Senators voted in favor of a debate and vote on the proposed Freedom Act, and those voting against were those generally supportive of military and intelligence agencies, there seems to be no particular reason to think the NSA, or anyone else in the Executive branch, needed a resort to blackmail.

Sometimes the obvious answer is the correct one.

tom dial Silver badge

Re: "Agency spokespeople said Snowden filed no such objections"

So is Edward Snowden's career any less "over" for going illegal than it would have been for actually pushing within the organization? To be sure, the whistle blower protections, not entirely effective for civil service employees, are less so for contractors. However, it is not clear that Mr. Snowden could not have accomplished as much, or nearly so, by objecting within until NSA advised Booz-Allen that they no longer required his services and then contacting a sympathetic Senator. There has been, after all, very little change in NSA activities, and there is little prospect of significant change in the foreseeable future; and as far as I can tell, the same is true more or less in the other Five Eyes countries. The biggest change seems to be greater use of decent encryption, which everyone should have done years ago anyhow.

tom dial Silver badge

Re: Who needs a new 'law' when it's already written into the US CONSTITUTION?!

The present state of Fourth Amendment law still appears, on balance, to support, or at least consistent with collection of call record metadata without a warrant. Recent court decisions have answered the question differently, and the Supreme Court presumably will resolve the still-open question in due course. In any case, at the time the domestic call metadata program was developed, and extending through most of 2013, both it and the law under which it was authorized appear to have been within the limits of Constitutional behavior, opinions to the contrary notwithstanding.

tom dial Silver badge

Re: In defense of data slurping

"a sysadmin can't f*ck up your life by sending the men in black after you"

Probably not the men in black, but the NSA (or GCHQ ...) probably cannot do that either. On the other hand, I very strongly suspect that ordinary (service provider) sysadmins have sent police after viewers of child pornography, and think I have read of a case but am too lazy to support it. I know for a fact that some employers systematically review logs and act on at-work offenses against both work rules and laws.

tom dial Silver badge

Re: In defense of data slurping

We were talking here about Patriot Act section 215 metadata, provided by carriers from billing records, logs, and similar sources. Scanning content during transmission would be a different program, XKeyStore, which is foreign intelligence data collection authorized under Foreign Intelligence Surveillance Act section 702.

tom dial Silver badge

Re: In defense of data slurping

Concern about possibilities for misuse of collected metadata has a rational and historical basis in the US and perhaps more so in some other countries. Unfortunately, sloppy use of the English language (and doubtless others) in reporting on the "Snowden revelations" combined with widespread underlying distrust of government activities has whipped up a certain part of the population into a moral panic not greatly different from the satanic ritual abuse panic of 25 or 30 years ago.

At the root is a widespread sense that the Government is not to be trusted, that its operators view themselves as better than the rest of us and therefore entitled to make the rules and to to establish and operate the agencies and programs that govern us for our own good irrespective of our wishes. They supply confirmation in the form of comments like Jonathan Gruber's recently outed description of the tactics used to obtain passage of the Affordable Care Act and their rationale, as well as the presumed Presidential action to revise enforcement of US immigration laws, details of which are to be announced this evening. To worsen things, such actions tend to be supported enthusiastically by their supporters without much consideration of the possibility that another President and Congress might act quite differently, although surely "for our own good".

Conflation of "logging" with "spying" and portrayal of the government's capability to track pretty much anyone as a fact that the government tracks pretty much everyone feeds the diffuse general anxiety about whether the government officials consider themselves our masters or our agents. Selective reporting that tended to omit context, conflate foreign and domestic data collection, overlook NSA's internal controls, and deprecate the Foreign Intelligence Surveillance Court except where it found fault with NSA activities have further contributed to a widespread sense that the government is to be distrusted and feared, and the program needs to be stopped, this despite the fact that it has not been shown to be instrumental in any oppression.

The truth is that if you are a target of government interest, there is not a lot you can do about it and they very likely will get you if they want. They can collect your metadata, as well as that of your contacts and their contacts from providers without a warrant and without notification. They can conduct physical surveillance without much justification, and a police officer behind your car will query a variety of databases for your license plate if he has the time. They can conduct heavily armed raids based on sometimes flimsy justification: Randy Weaver, David Koresh and the Branch Davidians, and the YFZ Ranch come readily to mind as probable government overreach. The government's prosecutors can use old or badly written laws to lay on outrageously excessive charges - Aaron Swartz and the Ohio Amish beard cutters, as well as a number of whistle blowers, are recent examples. And the governments' police can seize your property if they think it was used for or resulted from illegal activity. And not a bit of this is even remotely dependent on "mass surveillance", electronic or otherwise.

Jason Bloomberg is quite correct. The US communication metadata is potentially useful after the fact in finding those responsible for criminal (including terrorist) acts. The notion that it can be used prospectively to detect and thwart terrorism and other crimes probably is as much a pipe dream now as when Admiral Poindexter prototyped and advocated the canceled "Total Information Awareness" program. That is indicated by the scarcity of evidence offered by the NSA (and, as far as I know, the other Five Eyes SIGINT agencies), and the data would be similarly (un)useful for identifying anti-government domestic activity.

tom dial Silver badge

Re: information collected on innocent Americans did little

The most compelling argument against the NSA's bulk metadata collection probably is that for the few hundred times a year it is searched the operation is not cost effective relative to the alternative of executing a series of search warrants against the various communication carriers. If done piecemeal, though, current legal precedent is fairly clear that a warrant is unnecessary.

tom dial Silver badge

What does it say about a high rank NSA executive who became aware of the call data collection in 2009 that citizens who read the New York Times knew of about three years earlier?

That said, policy differences are to be expected in any government agency and the approval decision in any case might go either way. There are technical arguments that favor routinely collecting the metadata and storing it in a database. These include timeliness, uniformity of format and content, and availability of data from all carriers at the same time. Those apply irrespective of the internal or judicial controls that govern access to the data. There also are legal arguments and judicial precedents that favor use of court orders rather than search warrants to authorize metadata collection. Many may find them unpersuasive, but until quite recently there seems to have been a lack of decisions in favor of requiring a warrant for metadata collection, and they are part of the legal environment in which the NSA operates.

Bada-Bing! Mozilla flips Firefox to YAHOO! for search

tom dial Silver badge

So?

If I ever choose to switch from Chrome to Iceweasel I'll have to change the default browser. I check several every month or two and Yahoo! consistently runs a distinct third to Bing (2) and Google (1).

Heyyy! NICE e-bracelet you've got there ... SHAME if someone were to SUBPOENA it

tom dial Silver badge

Re: Hmm, I see an angle.....

Aside from that, how the plaintiff compares with others is not the relevant fact. What counts is how the accident changed her capabilities, and unless the new data can be compared with data from before the injury my reaction as a juror would be to pretty much ignore it in favor of relevant testimony about the injury and her actual capabilities before and after it occurred. Bringing in the Fitbit and a statistical analysis of currently collected data seems a flim-flam to put a gloss of science on a claim.

ISPs are stripping encryption from netizens' email – EFF

tom dial Silver badge

Re: Meh!!

It is true that various democratic governments require production of metadata under various circumstances, and may take notice if you encrypt the body (and, of course, the true subject). Numerous others, arguably less democratic, restrict encryption to government approved methods, require government issued licenses to use it, or forbid it completely. Those governments almost certainly also collect the metadata.

SCREW YOU, net neutrality hippies – AT&T halts gigabit fiber

tom dial Silver badge

Re: Not going to happen, but....

A government plan - UTOPIA - has not worked out at all well in Utah, so there is some reason to be skeptical about doing it on a national basis.

Net neutrality, Verizon, open internet ... How can we solve this mess?

tom dial Silver badge

I do wonder if this is an attempt to solve a potential problem more than an actual one. Part of the push seems to be to disallow sale of quality of service, which was put into standards for a reason As a Netflix user I have been quite irritated from time to time by "buffering" that might have occurred during times of network congestion, and note with some pleasure that it has not been noticeable since they made a deal with Comcast. In general, I do not have a problem if Comcast delays someone else's (or my) email, file downloads, or web page loads a bit to ensure that my (or someone else's) TV or audio streaming or voice conversations to go without interruption or choppiness.

And the argument about the next YouTube or whatever being squelched because they could not afford the right kind of internet service also appears to be in the nature of a bogeyman more than a real worry. It seems fairly unlikely that a garage workshop service that looks capable of profitable operation at volume would be unable to raise venture capital to buy adequate internet service. Certainly there have been many startups that went through one or more VC rounds before vanishing into the nothing, so anything even remotely plausible is likely to get a chance.

There is a difficulty, too, with trying to apply 80 year old and largely inapplicable law to a problem, whether it is a real or imagined one, with the inapplicable parts "foreborne", even aside from the glut of litigation that almost surely would ensue. Declining to apply the laws in a reasonably full and transparent way undermines respect for the laws and legal process generally, something we surely do not need more of.

Net neutrality, Obama, FCC, Title II:Your ESSENTIAL guide to WTF is happening

tom dial Silver badge

Re: The problem is not with the cable part of these cable companies...

In some areas near Salt Lake City we are hoping for CenturyLink to extend decent broadband to our area, or for Google to treat us like Kansas City, having pretty much given up on a multi-government consortium to bring fiber that ran into delays and overruns that pretty much brought it to a halt some years ago. So we might be justified in skepticism about the benefits of government activity in this area.

Meanwhile, we get along with Comcast, which is decent, but fairly expensive.

Aussie spooks warn of state-sponsored online attacks during G20

tom dial Silver badge

Re: Aussie spooks should know

And non-friends. No doubt the national intelligence services of all participants, signal and other, will be present and active, along with those of many non-participants.

New GCHQ spymaster: US tech giants are 'command and control networks for terror'

tom dial Silver badge

Re: Not really thinking things through.

They probably will generally "uphold the law upon which our society is built", although they certainly will not be infallible. The fundamental problem is not surveillance activities that drive the law to be oppressive, but the laws that, whether intentionally or not, can be used oppressively and seem to necessitate ever-increasing surveillance.

tom dial Silver badge

Re: Facebook and Tor

I take it the point is that law enforcement officials sometimes show an appalling lack of judgment. That certainly is true, although it appears all three instances cited were based on a complete message, so the question of being taken out of a recognizable context does not arise and all three warrant at least a cursory inquiry that should have convinced the authorities that nothing really was amiss. Certainly none should have gone so far as Paul Chambers' prosecution, which certainly represents overreach, but prosecutors (Angela Corey, Steven Dettlebach, Carmen Ortiz, to name a few) sometimes do that for reasons that are not clear.

tom dial Silver badge

Re: No-one actually believes that they can't crack this stuff right?

AES, used by both Android and Apple, was developed in Europe and subjected to a good deal of study both before submission to NIST as a candidate standard and after, and by both government and private sector cryptanalysts. There is no reason I have seen to think it has been broken by NSA or anyone else. Whether the Android or Apple implementation and key security are adequate is uncertain - both are likely to be somewhat vulnerable to key recovery as well as file access by anyone (law enforcement or not) who gains physical control of a powered on phone with the encrypted file system mounted.

tom dial Silver badge

Re: well said Evil Auditor

There are xxx problems with hypothetical arguments such as Mr. Katz gives. The first, of course, is that they are hypothetical. The main one, when used to argue against surveillance, is that demands for surveillance are not the cause of creeping legal oppression, but the result. The new, more detailed laws require ever greater oversight, some in the form of general surveillance, and a good deal in the form of required self-reporting, things like income tax forms to be matched with income reports from employers, banks, or securities issuers. Another US example is the requirement on banks to report cash deposits above $10,000 which, to the authorities, suggest drug money laundering. Based on the same law, repeated deposits a bit under $10,000 are considered to be "structuring" of deposits, and therefore also suspect of money laundering and subject to seizure, with the owner required to prove the source legal.

The fussing over surveillance, while somewhat entertaining, distracts attention from the real problem of too many laws that seem to necessitate it. The often repeated Franklin quote is not relevant to the case. It is oppressive laws against which we require eternal vigilance, and which represent the real choice between liberty and safety. Remove or modify them and reduce the justification for surveillance.

tom dial Silver badge

Re: well said Evil Auditor

One more upvote for omitting the Franklin quote.

tom dial Silver badge

Claims that the signals intelligence agencies are spying on everyone and claims that device encryption, or even proper link encryption, will cause a large increase in terrorist attacks are, in my opinion, all pretty much rubbish. Although the agencies scan and filter a large amount of data, it is only a small part of the entire data communication volume, they discard most of it almost immediately and very likely do not search most of what they retain for varying periods. The NSA documents that Edward Snowden released show this quite clearly if considered in the context of the total internet and telephone data volume. They reveal mainly details of underwhelming importance about matters that James Bamford and others have been writing about for years, along with the fact that major service providers like Google and Microsoft failed to secure their logically internal traffic that used external facilities that they did not control. On the other hand, Android devices, which constitute the overwhelming majority of the world's smartphones, have had decent quality and easily enabled device data encryption for three years or so, and it is likely that most terrorists worthy of concern have taken the trouble to use it. Making it the default for phones with a lock code is unlikely to benefit those we might reasonably fear or to seriously affect law enforcement activity. Apple providing an equivalent capability mainly increases the choices available to those who think they need that security. Those who are truly worried about their vulnerability to law enforcement or intelligence surveillance surely will be looking to more esoteric services that promise communication encryption in addition to data storage encryption. Most of the rest* can encrypt or not, as they choose, and neither they nor the authorities are likely to notice or care very much.

*Five Eyes, Western Europe, India, Israel, and most other countries with democratic regimes. Countries that regulate encryption methods and use would be somewhat different.

Google’s dot-com forget-me-not bomb: EU court still aiming at giant

tom dial Silver badge

Re: Hmmmm I await the Rumble in the Jungle --->

I seem to recall that the Agencia Española de Protección de Datos declined to apply the obvious correction of requirintg La Vanguardia to remove from public view the article Mr. Costeja found objectionable. Perhaps this was due to the obvious infringement of the right, or even the requirement, to publish what, in this case, was a record of the Spanish government's official action.

So instead of taking care of a perceived problem in the simplest, cheapest, and most effective way we are left with a costly, contentious, and relatively ineffective and easily gamed procedure to be implemented by anyone who operates a publicly accessible internet search service.

tom dial Silver badge

Re: Limted intelligence failure

If someone were actually to put up a search engine that gave better results than Google, it would gain users at Google's expense. Google might try, and might succeed, in buying it, but could not reduce their end price to users to undercut it.

On the other hand, a quick examination of google.co.uk, google.de, and google.es suggests that Mr. Costejo Gonzalez has been remarkably unsuccessful if his intent was that his earlier tax troubles have been "forgotten" by anyone - the results seem about on a par with those from google.com, and somewhat better than those from DuckDuckGo.

Feds seek potential 'second Snowden' gov doc leaker – report

tom dial Silver badge

Re: "So" protective of... definitions of right and left, perhaps.

"Despite the sad excuses given here Barack Obama has the sole authority to start and stop these surveillance programs." No, not quite true. The Congress can do that, but the President is fairly limited in his authority to not spend appropriated funds. He can, of course, omit funding from programs he dislikes from his budget request, but if they have Congressional support they are liable to be put back. The history of the GE-Rolls Royce F-35 engine is instructive.

Schneier, Diffie, ex-MI5 bod, privacy advocates team up on Code Red

tom dial Silver badge

Re: WTF? Cynthia McKenney?

"opportunist politician": a person who holds or actively seeks elective office.

And really: the Green party? In the US? Might just as well be a Libertarian or member of the Natural Law party.

Ubuntu's shiny 10th birthday Unicorn: An upgrade fantasy

tom dial Silver badge

Re: The best thing about Ubuntu is...

Yes. We are the 1%!

Microsoft promises Windows 10 will mean two-factor auth for all

tom dial Silver badge

Re: Meh.

I'm not at all clear about why anyone would expect multifactor user authentication to be very helpful. Has anyone a census of the number of Windows machines hacked by way of password guessing? My hunch is that better than 99% of compromises result from software and wetware errors. The main advantage for users might be that it can simplify login procedures.

Those who administer a large number of systems will want to disable user admin rights as much as politically possible in their organization, so they also may not receive much benefit from multifactor authentication, perhaps using it only for those with administrative rights. I know of one federal agency where everyone has a smart card for access and those with admin privileges, which included many of the application developers, had a second one associated with authority to install and configure software. Management thought that preferable to the cost, which I think was around $50 a call, for the outside provider to do it.

Signed-by-trusted-providers software sounds useful, but might be ignored in part or full unless Microsoft provides a capability for users to add to the list of trusted signers. Wouldn't hurt to make people think a bit about it, so there's no need to make it a simple check box.

Guns don't scare people, hackers do: Americans fear identity theft more than shooting sprees

tom dial Silver badge

Re: The media strikes again!

Notable school mass killings before the mid 90's:

1927: Bath Township, Michigan.

1966: University of Texas

1976: California State University, Fullerton

The earliest was bombs placed by a school board member, but killed 44 (38 school children) and injured 58 others.

UNIX greybeards threaten Debian fork over systemd plan

tom dial Silver badge

Re: the "fun" part about systemd

Well, I have noticed that since I set up a couple of systems on Jessie and systemd I wind up booting them a lot more often than the Wheezy ones that still use sysv. I'm not sure whether to blame that on the slight instability that goes with a testing release or on systemd. The do seem a bit more unstable than my past experience given the announced freeze date of 5 Nov, only two weeks from now.

FBI boss: We don't want a backdoor, we want the front door to phones

tom dial Silver badge

Re: Encryption blocks nothing.

References to encryption of communications are generally off topic here. Comey was complaining about Android and Apple encryption of data at rest. The FBI, as well as state and local police, can obtain warrants to obtain telephone call content. CALEA provides for that. And as noted, they can obtain warrants for email and other communications, and subpoenas for communication metadata, although users may encrypt them so that the results from Google, Microsoft, or others is effectively as unusable as what is stored on an encrypted phone.

The complaints of Comey, Holder, and others about cell phone data encryption, in addition to almost certainly overstating its importance by quite a few orders of magnitude are, unfortunately from their viewpoint, pretty much about a dead issue, at least for Android phones. The Google Play Store shows 250 encryption programs of various kinds, nearly all of them free and some of them probably decent implementations of secure protocols and algorithms. An Android user willing to install programs from other, perhaps dodgier, sources probably has a much larger set to choose from.Apple users may have to root their device if they don't trust Apple's implementation or one of those available from the Apple store. However, it is likely that those able and willing to root an iPhone, like Android users, can find encryption capabilities from sources that national governments do not control.

tom dial Silver badge

Re: So...FBI wants extra powers then

The FBI boss said nothing to indicate a wish "to read any and all correspondence on your device at any time".

He expressed a wish to be able to do that with a search warrant, issued by a court based on a showing of probable cause to think the phone contains usable evidence of a crime.

As stated, providing a back door is madness and was rejected in principle over twenty years ago.

And, unfortunately for the FBI and others, government resistant encryption has been widely available for use by those with moderate technical knowledge and expertise for over two decades (email and computer files), built in and easy to activate for three years or so on Android devices, and is available as a default for Apple portable devices beginning with iOS8.

tom dial Silver badge

First, the requirement for a warrant to search cell phones incident to arrest has been settled law since June, 2014. Before that there was some doubt, but warrants would have been required for cell phones in essentially all other circumstances based on prior law and court decisions. Comey's complaint is not that encryption will prevent searches without warrant (which are illegal) but that when he obtains a legitimate warrant to search a cell phone he may lack the practical capability to do it due to encryption. It is not clear why cell phone encryption hit his hot button (and the Attorney General's as well), since the argument applies equally to many other types of computing equipment.

Second, it not clear that complaining now makes sense. That horse left the barn more than 20 years ago, not long after PGP became widely available when someone noticed that it could be used for files. Those with a need have been able to use government resistant encryption for quite a while, with a relatively little and declining effort. If they did not do so, and by that became vulnerable to capture for crimes, it is their problem.

Third, law enforcement officials still have the capability to obtain call metadata by a court order and, with a warrant, to tap phones. The additional capability to decrypt stored data probably would be useful in some edge cases, but probably also represents a tiny part of the search warrant universe, which itself is a small part of the criminal investigation universe. As they cannot do anything effective to prevent encryption, they might as well put it behind them and get on with their business as well as they can. When it turns out that they have enough probable cause to obtain a warrant, they also are likely to have the authority of the issuing court to bring a good deal of pressure to bear on the recipient who denies access to search the device.

If I had a conspiratorial bent I might think this was a ploy to confuse us into believing that cell phone data encryption was a new and significant impediment to law enforcement activity. I do not think that, but that the complaining officials, like many in all kinds of organizations, have confused themselves into thinking that obscure corner cases are as important as the ordinary common ones.

tom dial Silver badge

Re: Is this

The last I heard, all first class snail mail was photographed to obtain the metadata.

I am skeptical, though, about the implied proposition that X-ray would produce a useful image of a letter's contents.

tom dial Silver badge

Re: Founding fathers?

On average, the founding fathers opposed slavery, but to get agreement on the Constitution pinched their noses and signed off on the 3/5 rule and prohibition until 1808 of laws forbidding slave importation. You may think that cowardly or immoral, but it is not clear that slavery in the middle part of North America would have ended as early as 1865 if there had been two nations instead of one.

The same founding fathers, by the way, also insisted on the Bill of Rights as a deferred condition.

tom dial Silver badge

Re: "was seriously hampering the efforts of cops"

Encryption capability superior to Apple's pre iOS8 has been baked into Android releases for about the last three years. Default activation has not, but we may reasonably think that anyone who thought they had a need activated it, yet life has gone on. Law enforcement officials seem to think all criminals are so stupid that they need Apple and Google to protect them.

Arab States make play for greater government control of the internet

tom dial Silver badge

Re: In general - and not specifically about Arab States...

"Why should a State have any rights ..."

Traditional answers often have come down to "because God wills it."

One early 20th century answer was "the vanguard of the proletariat, because it understands their proper will better than they do themselves".

One reason for the enormous disconnect between "The West" and most of the Middle East is that the fundamental idea that legitimacy derives from the consent of the citizens is not well rooted there. That notion is far from universal even in modern countries with liberal democratic regimes.

tom dial Silver badge

doesn't a legitimate government have a mandate to at least try to decide on what content is available in its country ?

To a first approximation in the US: No.

Copyright and copyright enforcement, although seriously damaged or broken, would be an exception; like it or not, they were established by processes generally considered legitimate and the way to change them, if we wish, is to use those same processes.

Porn might be an exception, but courts have not, in the end, treated its suppression with favor except in the matter of child porn.

Some statements published via the Internet may be legally actionable in civil courts and subject to takedown orders, although the effectiveness of such orders might be quite limited.

In other countries, the government's authority - legitimate power - to limit content availability may be much greater. The government of the People's Republic of China certainly is legitimate (on the mainland), yet it exercises great control over content availability without calling its legitimacy into question.

tom dial Silver badge

Re: Hmmmm

I tire of reading things like "We get controlled via the media tied to corporate interests ..." with scarcely a hint of exactly how, other than our presumed laziness, this is done in the US (and other Five Eyes countries, and NATO, and quite a few others).

Those who make such claims should occasionally explain just how this is equivalent to expropriating, jailing, or killing the opposition, as done in some countries that all of us could name.

Scientists skeptical of Lockheed Martin's truck-sized fusion reactor breakthrough boast

tom dial Silver badge

Three comments

1. The announcement, for some reason, reminded me of Fleischmann, Pons, adn electrochemical cold fusion claims.

2. We already have a fusion reactor at our disposal. The problem is that it's 93 million miles distant and we need to find a way to collect its energy with decent efficiency.

3. On the other hand, it really will be nice if isn't BS.

tom dial Silver badge
Joke

Re: Naive is certainly an appropriate name for you

But we developed the iPhone!

Surely that should make up for all the rest.

Microsoft, Docker bid to bring Linux-y containers to Windows: What YOU need to know

tom dial Silver badge

Just as Virtualization (along with virtual memory) was an IBM invention. We always are indebted to those who went before and had new, interesting, and useful ideas.

tom dial Silver badge
Stop

"And what year did Linux get even a half decent interface that the average Joe could use?"

By my recollection that would be about 1995, and I found references back to 1996 for X11 and OpenWin with either olwm or olvwm. I quite liked the latter for its easily changed (by drag & drop) number of virtual desktops, the number of which apparently was limited only by the available memory. Originally developed by Sun for Solaris, it was a well thought out and implemented piece of work performance was quite good on a 486-33 with 16 Meg memory. After nearly 20 years I can't be sure, but think there was a pointy-clicky way then to unmount and eject a CD, along with a fair number of other useful things, and it seemed to support pretty much anything that knew how to run as an X client.

As I recall, Microsoft's best consumer offer at the time was Windows 95, probably not their premier offering and, from a stability viewpoint, substantially inferior to either OS2 or Linux and X Window. Its saving was that it was supplied by default on just about every PC sold commercially and would run most or all of the applications developed for MS-DOS and earlier MS Windows versions.

It is incorrect also to confuse the task of installing Windows, which almost nobody had to do, with installing Linux, which required a bit of knowledge and, depending on the release, a possibly significant amount of interaction with the installer application. The proper thing is to compare operation after installation and configuration.

Right To Be Forgotten in the US: Americans wanna be like EU-oo-oo, says watchdog

tom dial Silver badge

Re: Oh goody

Retention and publication restrictions already cover the organizations named.

- Experian, TransUnion, and Equifax are governed by a number of laws and civil court decisions, including a legal requirement to drop information after a period of time.

- The IRS, as I understand it, ignores information over about three years old unless they find evidence of fraud, in which case the effective period is indefinite.

- For the NSA, the legal retention is 5 years or less for nearly everything and generally 0 for US person information, although that obviously conflicts to a degree with retention of communication information between a US person and a foreigner. The FISA and USSID 18 rules are quite specific in this area.

- The CIA is expected to pass to the FBI or maybe, now, DHS, any material pertinent to US persons or activities; for the latter agencies I would expect the rules for criminal investigations and proceedings to apply.

tom dial Silver badge

I do not know whether Google (Yahoo!, Bing) would be misclassified in the US as "publishers", but suspect it would make little difference, as restriction of the right to publish true information here is quite difficult to get and therefore quite exceptional. Notable instances are classified government documents and copyrighted material, and occasionally court proceedings and documents are suppressed for a time. The idea of deleting or delisting "outdated or no longer relevant" information is alien, as is the curious notion that unpopular ideas like white supremacy or holocaust denial could be regulated or suppressed. The idea that official and public actions of a government body, like that taken against Mario Costeja Gonzalez in Spain, could be ordered "forgotten" is, in the context of the first amendment, preposterous.

If anything, we err in the other direction, as in assigning "sexual predator" labels that are legally required to remain public for long periods or permanently for the life of the assignee.

South Korea faces $1bn bill after hackers raid national ID database

tom dial Silver badge

Re: Scrap the whole system

And people whine about NSA's presumed tracking capabilities?