245 posts • joined 9 Jan 2012
Pension? At Apple? Are you joking?
Have you ever even been to America?
Re: Umm, not so sure.
Had Steve Jobs not been ousted from Apple, Apple would today be in the same place NeXT is - gone. I know a lot of people who spent 30+ year-long careers at Apple, starting in the early 80's. I also know people who were at NeXT. Jobs made mistake after mistake at NeXT, and those mistakes were fatal. While Apple ended up buying NeXT, that was really part of Job's return to Apple while NeXT was circling the drain. Had Jobs not been booted from Apple and founded NeXT, all of the lessons learned at NeXT, at NeXT's expense, would have been on Apple's dime (if they were learned at all), and Apple would have gone down the drain. I have no doubt that Apple would not be the company it is today had Job's not been booted and really broken his teeth on NeXT.
Re: Not so unlikely after all
It took 2.5M hits in the servers. I hope Cloudflare servers not noticing what is basically a DOS attack like that isn't indicative of Cloudflare's product effectiveness.
The Bloomberg report is probably NSA disinformation.
Some obvious points:
1. Running old versions of Windows or DOS within Virtual Box is pretty standard. My place of business has been doing it with Win 98 & Win 95 for years, due to legacy issues with needing to access old documents in discontinued file formats where the old applications will only run on Win 98 or earlier.
2. There's no need to run Virtual Box on a Linux machine, unless you like Linux. Running Virtual Box (and running your discontinued Windows versions on it) works just fine in Win 7 & 8, or even on a Mac.
3. If you are really paranoid, there are ways to allow the Virtual Box VM to access some things on the corporate network but not access the Internet.
4. Always keep an up-to-date backup of the VM's, in case they get hosed.
Re: Up the creek without paddle...
Agreed. There's a reason that French owned firms are building up their faculties outside of France.
This article conatins a major flaw
This article glosses over the issue that the buffer overflow returns RANDOM DATA, not specifically keys or passwords. An actual attack would require, generally, a whole lot of queries each returning 64K of RANDOM DATA. Such an ACTIVE attack might be noticed, for starters, and is not assured of ever returning useful data. Having said that, I certainly don't want to downplay this vulnerability. But even this article is, as it's first sentence shows, overly alarmist rather than rational.
Even if one agrees with the statement that "... Edward Snowden is "under the thumb" of the Russians and that his revelations about NSA spying tactics are assisting authoritarian government, including the government of Syria...", it is irrelevant.
Just because a revelation of lawbreaking by the NSA may help "the bad guys" does not mean that letting the lawbreaking continue is not creating worse damage to the people the NSA are supposed to be working for.
Irony - Linus Torvalds calling someone else a prima donna.
"All animals are equal, but some animals are more equal than others" is a two edge sword.
Mr. Worstall didn't read the book.
But I did.
@ A Non e-mouse
"It might not allow one country to control affairs outside its own borders, but surely it gives the country the right to decide who it sells to and at what price*?"
If I were your employer, I'd show you the door for a comment like that, because it says you don't understand, and are not likely to honor, any of that paper you signed as a condition of your employment, such as NDA's,
When a country joins the WTO, they give up a whole bunch of "rights", such as the one you describe, and they gain the reduction of tariffs into a whole bunch of other WTO member markets. And as the WTO ruling says, once you mine a material and remove it from the ground, it enters the WTO ruled international marketplace. That WTO ruled international marketplace basically says that if someone has the cash at the going price, you have to sell to them. You can't give preferential (or discriminatory) treatment or pricing based on things like whether they are a domestic customer vs WTO member customer. It really is that simple.
Jobs was a genius
At figuring out how to get Kool-Aid drinkers to overpay for hardware, software & services. It should not be a surprise that he'd not look kindly on TV. As he said, the hardware does not turn over, and the services had been crowded for years by the likes of Tivo, Roku, etc.
More to the point
It won't distract folks from United's horrible service and outrageous baggage fees.
Kind of like a cannibal rallying against slaughterhouses as cruel.
Re: Come on IBM..
The fact that what Twitter does is considered to have ANYTHING to do with intellectual property just underscores how broken the US Patent system is.
Whether a settlement is taxable depends on the details. Which is why if you are ever suing (in the US) for a significant amount of money, it's a good idea to talk to a tax attorney before settling or before the court awards you anything. Even if the settlement or award is taxable, there can sometimes be ways to structure it to lower the taxes. For example, if the award or settlement covers your legal fees, often that can be structured so that you do not have to pay taxes on the money going to your legal team. But it has to be structured properly BEFORE the award or settlement is made. You can't play around with the paperwork after the check(s) is cut.
Re: Not sure what to think
"I wonder if her father made it clear that they couldn't tell others about the settlement?"
Typical "computer geek who knows zero about the law" statement.
The father violated the agreement the second he told his family. The daughter's post on Facebook simply provided irrefutable proof of his violation. The settlement's confidentiality requirement is no different than your employer's confidentiality requirement or a defense department confidentiality requirement. Disclosing to your family, even your spouse, is a violation.
Wow, a Maginot Line-like thing at sea. Looks great in calm waters. My money is that it won't fare so well in a North Atlantic storm.
Propeller needs a cage, like an airboat's. The tires are too narrow for any real use on sand.
Probably the best take on this deal
Re: It should be blocked by the anti-trust authorities
That, in a nutshell, just underscores the lack of competition in the US cable marketplace.
Re: Few CIOs or VP ITs can code
I've been with a number of startups in my career, as well as a couple of mature companies. In both environments, most of the people at all levels have mindsets that can be summed up as follows:
"Any job I don't understand & have no experience with is easy."
which is often seen in it's other form,
"No job is as difficult as mine."
The bottom line is that good companies require different talents for the different jobs, and they are all important. (Unless there are redundancies, in which case the place is over staffed.)
Re: A page from Google they can keep
No doubt that is the reason Mozilla abandoned Thunderbird without offering a viable alternative email client, thus screwing Thunderbird users.
Re: It doesn't matter anymore "Sieg Heil" NSA!!!!
"I'm quite sure that they have the worst dirt they have on everyone at the top of their respective folders and will threaten anyone that starts to be a real threat to the NSA's ability to crack any crypto."
All the more reason that when the Standards Bodies meet, all members should be required to wear these: http://www.thedailybeast.com/articles/2014/01/07/the-secret-world-of-men-who-dress-like-dolls.html
Then, it would be impossible for any intelligence agency to have worse dirt on them which could embarrass them any further.
The enemy you can see
Isn't as dangerous as the enemy you don't see. The bottom line is that all processes should be open and transparent so that "trust" in any participant isn't a factor. In other words, the processes should be designed as if every participant is untrustworthy.
The real issue with the Dodd-Frank Method
Is that it's trivial to fake the documentation as there is nothing objective to back up the paperwork. The refiner method, being a filter based on chemical analysis, would require the refiner to fake the results to cheat, and that is easy for a third party to monitor.
Dodd-Frank was written by NGO's to provide a revenue stream for the NGO's by providing source certifcations. It's also why the NGO's lied about costs to implement.
Re: Well I'm convinced.
"...the Everett many worlds interpretation is the correct one..."
You are making a distinction without a difference. The Everett many worlds interpretation is "the correct one", as it is entirely equivalent in all ways to the conventional collapsing wavefunction "correct" interpretation. Any competent Physicist could tell you that.
Re: Well I'm convinced.
I know this just proves that social media has no future.
None of this would be a problem if it was done right the first time
TOR suffers from the same fundamental flaw that SSL does, namely the fact that it's a single-path system. While multi-path isn't fool proof, it certainly makes the interception and tracking a lot harder. For a lot of purposes, the added latency is quite acceptable, and with a little thought, protocols can be envisioned that prioritize information so the less important goes the lower-latency pathways to increase the apparent responsiveness while the "important stuff" goes the tougher to intercept multi-pathways.
In a similar way, cloud services can be made more secure by having clients utilize liner functions. (i.e. Instead of encapsulating a complex function with a simple to call wrapper function, you "line" a complex storage functionality by lining it to make it appear simple.) For example, a locally encrypted virtual drive has its container file hosted on cloud(s) drives. If the cloud vendor proves untrustworthy by backdooring their services to others, the "other" gets the container file, and still has to compromise that to get its contents. (e.g. Something like Truthcrypt with the container file RAID 2 stripped, with part of the container file striped on Dropbox and part striped on Google Drive, yet looking like one Truecrypt drive to the user.) Tougher to get the "whole enchilada" container file, and then even if you did get it, you still have the fact that it's encrypted, and you have to deal with that.
1) It is true that diamonds are not rare, and that the jewelry "value" is completely artificial due to the De Beers diamond cartel. The cartel had to operate outside of the US until 2001 due to it's violating US antitrust laws. Former CIA chief, Admiral Stansfield Turner, claimed that De Beers restricted US access to industrial diamonds needed for the country's war effort during World War II. As Turner's statement indicates, diamonds have considerable industrial uses as polishing grits. Diamond grit is slightly harder than silicon carbide grit and much harder than alumina (aluminum oxide) grit.
2) True, that was part of Cecil Rhodes (who founded De Beers in the late 1800's) marketing campaign.
3) Most diamonds mined are used for industrial purposes, not jewelery. Since diamond is a rather common gem stone with an industrial use, the fact that most diamonds mined are not "gem quality" does not matter much. Remember, the whole reason the cartels limit the number of diamonds on the market is because even though gem quality diamonds are rare compared to non-gem quality, diamond is so common a mineral that not restricting the gem quality ones would cause their value to plummet to a fraction of their present value.
One little problem...
Who's going to teach the "Genius Bar" kiddies how to program, so they can teach the classes?
Re: Who the hell cares what any Iranian News Agency has to say?
You know the story is fake because of the Dr. Evil-like "$1M". Only an ignorant Iranian propaganda hack would think $1M is enough money to develop a cyberweapon.
Re: Excellent Article
I'd rather see an iBeacon app or gizmo that I can take into the store and flood their system with misleading data.
Yes. As bad as Outlook is (and it is really bad), Yahoo mail is one of the few mail systems that is worse. I've yet to see any webmail service that was as good as using a mail client like Thunderbird.
Re: How long...?
To sue the US govrrnment for damages in a US court, the government has to agree to be sued. Under normal circumstances, this is granted. But often in National Security cases, it's not. In addition, the US hss been holding billions of dollars of seized Iranian assets since the Iranian revolution due to damage claims by US entities from the Iranians seizing property during their revolution. The bottom line is that the Iranians can't do squat in US courts until they decide to normalize relations with the US. And to do that, they need to start behaving in regards to nukes, terrorism, etc.
Re: The first selfie? Really?
Actually, the oldest selfies are about 40,000 years old.
AWS and Google will throw GreatFire and others under the bus in a heartbeat.
It's basically the EM equivalent of noise cancelation
Noise cancellation does the acoustic equivalent of this. It's amazingly simple, as you can see by reading the Physical Review X article.
Re: Plenty of standards...
Encryption should be thought of in the same way as for physical containment systems, namely as barriers that take time to breach or errode, not as impenetrable shields. As such, it is false logic to claim that you should do nothing because what you can do isn't perfect.
Never send a computer guy to do a material scientists job
Sapphire is very hard and strong, which is why the best watch glasses are made from it. However, it's crystal structure makes it cleave pretty easily, as anyone (like me) who has worked with it knows. And the probability of tapping it just the right way to cleave goes way up the larger the piece of sapphire is. That's why it works well for small windows like on watches. It would not surprise me if Apple goes to all of this trouble only to find the incidence of iThing (other than watches) displays cracking when dropped stays the same or goes up.
Wasn't that compromised by the NSA?
Re: This is useful
It seems like the reply "Better yet, go f*ck yourself." to the users meets all advice criteria.
Iran & China must be so proud
Google giving them a browser that makes the whole country Supervised Users.
"... automatically analyze code, find its weak spots, and patch them against attack."
If it's your own code.
If it's the others, then attack.
So it beings.
Re: Switching from big iron to x86 virtualisation
Probably pleases the NSA very much.
Re: iPhone and iPad?
I had both an Apple II and an Atari 800 computer in 1981. Plus a pile of CD's. I'd suggest this family jump back another couple of decades.
The other takaway
The other takeaway from these latest revelations as published in the New York Times is the NSA's infiltration of the cryptography community to influence implementations. In other words, many of the "talking heads", perhaps even ones The Register talks to, are NSA moles who will try to misdirect the community from improving the standards and such.
Apparently treason against the US Constitution is now a requirement to be employed in US Federal Law Enforcement.
This is the OTHER way some people in Silicon Valley get very rich.