213 posts • joined Monday 9th January 2012 17:36 GMT
Re: Who the hell cares what any Iranian News Agency has to say?
You know the story is fake because of the Dr. Evil-like "$1M". Only an ignorant Iranian propaganda hack would think $1M is enough money to develop a cyberweapon.
Yes. As bad as Outlook is (and it is really bad), Yahoo mail is one of the few mail systems that is worse. I've yet to see any webmail service that was as good as using a mail client like Thunderbird.
Re: How long...?
To sue the US govrrnment for damages in a US court, the government has to agree to be sued. Under normal circumstances, this is granted. But often in National Security cases, it's not. In addition, the US hss been holding billions of dollars of seized Iranian assets since the Iranian revolution due to damage claims by US entities from the Iranians seizing property during their revolution. The bottom line is that the Iranians can't do squat in US courts until they decide to normalize relations with the US. And to do that, they need to start behaving in regards to nukes, terrorism, etc.
AWS and Google will throw GreatFire and others under the bus in a heartbeat.
It's basically the EM equivalent of noise cancelation
Noise cancellation does the acoustic equivalent of this. It's amazingly simple, as you can see by reading the Physical Review X article.
Re: Plenty of standards...
Encryption should be thought of in the same way as for physical containment systems, namely as barriers that take time to breach or errode, not as impenetrable shields. As such, it is false logic to claim that you should do nothing because what you can do isn't perfect.
Never send a computer guy to do a material scientists job
Sapphire is very hard and strong, which is why the best watch glasses are made from it. However, it's crystal structure makes it cleave pretty easily, as anyone (like me) who has worked with it knows. And the probability of tapping it just the right way to cleave goes way up the larger the piece of sapphire is. That's why it works well for small windows like on watches. It would not surprise me if Apple goes to all of this trouble only to find the incidence of iThing (other than watches) displays cracking when dropped stays the same or goes up.
Wasn't that compromised by the NSA?
Re: This is useful
It seems like the reply "Better yet, go f*ck yourself." to the users meets all advice criteria.
Iran & China must be so proud
Google giving them a browser that makes the whole country Supervised Users.
"... automatically analyze code, find its weak spots, and patch them against attack."
If it's your own code.
If it's the others, then attack.
So it beings.
Re: iPhone and iPad?
I had both an Apple II and an Atari 800 computer in 1981. Plus a pile of CD's. I'd suggest this family jump back another couple of decades.
The other takaway
The other takeaway from these latest revelations as published in the New York Times is the NSA's infiltration of the cryptography community to influence implementations. In other words, many of the "talking heads", perhaps even ones The Register talks to, are NSA moles who will try to misdirect the community from improving the standards and such.
Apparently treason against the US Constitution is now a requirement to be employed in US Federal Law Enforcement.
This is the OTHER way some people in Silicon Valley get very rich.
Re: The computer that 'lives on your head' will change mankind
Google Glass is the poster child for "Just because you can, does not mean you should."
Re: Won't somebody think of the children!
Ironic given the Russian Government being the protector of most web scams and malware.
Re: What is needed
Maybe combine the split routing with the spam suggestion (AC 13th August 2013 13:47 GMT), which is really a form of chaff. The idea is that since one can't make the fact a message is being transmitted undetectable, at least make it complicated to detect and winnow the grain from the chaff
What is needed
Is an email scheme where the email is encrypted/decrypted at the client level and the bulk of the routing is done in a torrent style with random routing and forced splitting ( & routing) so that no one route handles the entire encrypted message.
Re: What is needed...
Or a dynamic peer-to-peer network analogous to a torrent.
Re: What is needed...
It's not just the encryption, it's the metadata the NSA values because that maps the organization for you. One needs a method to at least complicate the that part as well.
What is needed to to at least help obfuscate the connections would be to do something like the following: Have an email client that automatically encrypts the message, splits it into N pieces, emails those N pieces out via N email addresses hosted by N independent email providers to the true recipient's M email addresses (M <=N) also hosted at M independent email providers, the recipients email client gathering those N email sub-messages, assembling the intact original encrypted email message, and decrypting the original encrypted email message.
A New Email RFC is Needed
A fundamentally new RFC for email is needed that combines intrinsically encrypted message subject & body, and separately implements a bind (or double blind) encrypted and/or secure route addressing scheme.
The only way that US based cloud storage companies can address clients fears is to create systems where everything is encrypted on the clients hardware with open source software to insure there are no back doors before leaving their premises, stays encrypted in the cloud, and can only be decrypted when back on the clients hardware. And have the whole thing under some type of non-US (and non-cahoots country like the UK) based third party certification.
Of course, anyone using cloud storage should have been doing all of this anyway from the get go.
Agreed. On my home planet, we figured out long ago that the uniqueness of the atoms is immaterial. In other words, you only need to transport the location of each carbon, hydrogen, oxygen, nitrogen, etc, as every atom of a specific type & isotope is interchangable. In addition, no interstellar species would use puny microwave frequencies for teleportation, you use the highest frequency that will do the job, which usually means optical through gamma data links. So between the lack of uniqueness (and the resulting data compression) and the faster data links than you near-hunter gatherers can envision, its doable.
Dealing with you hunter gatherers is a pain.
The integration drift on INS is small enough over mission times you don't casually reset it like that.
This is why good navigation systems, for military aircraft & weapons (e.g. JDAM) for example, also have an inertial navigation system (INS) in them and use that as the primary navigation sensor. If the GPS location is much outside the INS integration error, then one knows something is amiss. Since INS isn't jammable, you know the GPS is the thing that is messed up. Especially if the INS system has redundant INS sensors.
Re: Yes, it is a retransmission fee avoidance tool...
If you live within about 100 miles of a major metro area of the US, you can just unplug from cable and go over the air with a $100-$150 antenna on your roof. If you do that, and keep high speed internet service, you'll never miss dropping the cable TV.
Yes. How many do you want?
Yes. How many do you want?
As any smart Banker will tell you, making purchases with debit cards are for people who can't get credit and/or don't know how to manage money. Credit cards don't charge interest if you pay your balance off in full every month, in which case they are an interest-free 1-month loan, during which your actual money is earning interest. And if you are smart, you only use credit cards with zero-fees and good reward programs, which adds icing to the cake.
Re: And by dammit!
You mean there are people using Firefox without the Ghostery, BetteryPrivacy, NoScript and Flashblock plugins, plus settings adjusted to delete all cookies, history & cache upon exit?
Re: Designing a perfectly safe computer
One first needs to define what is meant by "safe". Is a computer that is not connected to any network but has no security software except that native to the OS "safer" than a computer with all sorts of "security" software running but is directly connected to the internet? It all depends on the definition of "safe", as well as what functions the computer needs to perform.
So let's first define what functions the computer needs to be capable of performing, and then define what is meant by "safe". Only then is there any chance of a meaningful discussion.
Your provincialism is so quaint.
There's more to international trade than "tech". As a matter of fact, "tech" isn't even the dominant part of international trade. Here's a new word for you: Commodities.
BEST PATENT APPLICATION EVER!
United States Patent Application 20080270152, by a Halliburton Patent Attorney, seeks a Patent for "Patent Acquisition and Assertion by a (Non-Inventor) First Party Against a Second Party"
In other words, it's a patent application to patent the business model of patent trolling.
Sorry for the all caps in the title. (Not really.)
Re: World's cleverest company states the obvious
I agree. One of the absolute stupidest idiots I know is a long time Google employee, pretty high up in management. On the other hand, a couple of really smart people I know are also Google employees. The idiot guy would always brag about Googles brain teasers for interviewees. The smart people thought the whole thing was an exercise in intellectual masturbation.
That last paragraph about polls is meaningless. If the US were run based solely on polls, we'd still have slavery.
Of course, it's always "middle management" new CEOs' want to sweep away, instead of the incompetent upper management that mismanaged the problems into existence in the first place.
The problem with an iWatch
Is that given Apple's demographic for the iPhone which has most of their present customers either need reading glasses now, or will shortly. One would presume the audience for the iWatch is even older, given young people's tendency to go watchless now. Who the hell wants to have to put your reading glasses on to look at your iWatch?
Re: Don't you just love ... Er.....
Has it dawned on anyone to ask Shinichi Mochizuki directly? Or is there a presumption that Shinichi Mochizuki would lie if asked, and thus dishonor himself?
Re: Does their ubiquity make us stronger or more feeble
No, the last wave (for us) will be when machines see no value in humans continued existence.
New Apple Motto
All your identity are belong to us.
It takes a scammer to see another scammer
The bottom line is recreating a C64 makes as much sense are recreating the wax cylinder gramophone. Stupid doesn't even begin to describe it.
Re: Give me your money!
I view this as a business opportunity for competing products as long as those competitors remain stand-alone.
Re: Heads up
The term "Chinese security software" is an oxymoron.
Re: Cesium is not radioactive
Correct. Cesium atomic clocks don't involve radioactivity. Mr. Smith should stop doing drugs while writing for The Register.
As the union representative for the killer robots on my planet, I think it's my duty to let you know that while a machine would be able to recognize the difference between a Reuters photographer and a guy with a rocket launcher, we'd still find it best practice to terminate them both.
The real issue is whether the phones were rejected for cosmetic reasons or functional reasons. If cosmetic, then the bulk of the units can be recycled as is and new shells substituted for the old. If the rejections were due to the units being non-functional, then how much the rework, if they can be reworked at all, is a lot more complicated.
- On the matter of shooting down Amazon delivery drones with shotguns
- Review Bring Your Own Disks: The Synology DS214 network storage box
- OHM MY GOD! Move over graphene, here comes '100% PERFECT' stanene
- Google's new cloud CRUSHES Amazon in RAM battle
- Beijing leans on Microsoft to maintain Windows XP support