857 posts • joined 20 Jun 2007
Rantic seems to barely exist as a corporate entity, though. This is itsself suspicious: It may well be a front to provide some protection, either legally or in anticipation that antagonising 4chan is likely to result in DDosing.
Re: "This is a false flag by /whichever agency/, probably NSA or something."
Paranoia, but potentially justified paranoia. Anonymous have made a lot of enemies - some of them very powerful people, as when they targeted banking infrastructure in protest of the financial blockade of Wikileaks. It's quite plausible some of those many enemies may have decided it desireable to close 4chan, the primary home and recruiting ground of Anonymous, and hired a PR agency to find a way to inspire public opinion against them.
Re: Not even North Korea
NKs done a pretty good job of it. No private internet connections. You can't even make an international phone call - there's one phone company, and unless you can file a lot of paperwork and pay a small fortune for a special international business license they won't put any international calls through. The only radios and televisions on sale, by law, are limited to push-button tuning with all presets hard-wired for the state channels. There's still a black market in smuggled DVDs, but you have to know someone who knows someone - and even then you run the risk of being caught up in one of their frequent crackdowns.
Every so often someone on Slashdot starts talking about how to bring freedom to NK with VPNs, Tor and Freenet, and I have to remind them that those tools don't do any good when very few people can even get a basic internet connection.
There was an amusing campaign a while ago - a group got together to send time-release balloons over the country with a payload of pamphlets. That's about the only way you're getting mass-distribution of anything against the government's wishes. Unfortunately the organization was a Christian missionary group, and their pamphlets were all trying to convince people to convert, so they didn't actually do any good. I suppose you could drop matchbox-sized radios tuned to South Korean stations (Common language, mostly), but the government would just respond by deploying a lot more jamming devices - there's no reason for them to care if they screw up reception across the border.
Re: What if.......
Russia has a population of 143 million. Thats a substantial population of potential revenue generators.
Google has four options I can see:
1. Bugger off out of Russia. Take a financial hit. Putin wins (He would likely block non-Russian google), but gets humiliated before the world. Not that he'd care.
2. Comply. This requires the owners swallow their pride and accept that money comes before principles.
3. Complyish. Meet the letter of the law, and use their presence to actively obstruct any attempts at oppression. Censor blocked content to the minimum extent, displaying clear 'Some search results are blocked by order of the Russian government' messages, even stating the official reason for the block or a hint as to how to circumvent it. Encrypt everything, so there can be no mass-snooping.
4. Any of the above, but combined with a bold act to reassure the world that they are no supporters of oppression - perhaps a wad of funding for Tor or Freenet.
Re: "cites disproving the existence of God"
God used to live above the sky, and Hell was underground.
Then Science invented telescopes seismic imaging. How did religion respond? By shunting heaven and hell off to some new vague otherworldly place, then retconning and claiming it said that all along.
Re: One Mistake
There isn't even a 'gene for an eye.' There are many genes involved in eyes. A lot of which serve other purposes as well.
Re: Quis custodiet ipsos custodes?
I'm not so sure about Chuck. He caught religion a while ago, and has been of dubious sanity since. The last time I heard from him he was warning of a conspiracy (Headed by Obama, naturally) to cover up the Parkinson's-and-cancer inducing consequences of genetically modified foods. This is actually one of his saner columns.
It's a stupid process too. It contains many many services - so when you see svchost.exe has started consuming every processor cycle it can, good luck figuring out which service is actually responsible for that.
Re: Damaged without authorization...
Botnets, possibly? They use technological means to conceal the location of whoever controls them.
Re: When it's convenient.
And the NSA does consulting work for both of them.
It's a handy tool for some of the more aggressive areas of forums and blogs too. There are certain topics which tend to bring out a vicious streak (Politics, religion, football, boy bands) - it's not difficult to incite an internet psycho who will then go off on a holy crusade to punish you for some perceived infraction (Insulting their god/endorsing views they believe threaten the country/suggesting Bieber doesn't write his own songs). I've seen these fanatics go quite crazy - in one extreme case, a particularly partisan political blogger went so far as to impersonate a debate opponent and create a website in their name endorsing sex with children. I've heard of others pulling stunts like contacting a person's employer claiming they were dismissed from their previous position for theft.
With people like that around, taking measures to conceal your identity is only common sense.
Re: And here we go again...
I'm not convinced it would matter. The UK would be quite able to simply ignore the court, as they did with the judgement requiring voting rights for convicts - the UK response was a legally binding requirement to pass legislation to do so. That was in 2005, and no legislation has been so much as introduced yet.
Re: Re : Asperger syndrome...
There seems to be some sort of agreement in place, possibly informally: We don't try to arrest their spies, and they don't try to arrest ours. The US and Europe are still allies, and the social codes of alliances dictate that while both sides are fully expected to spy on the other, they aren't supposed to get caught doing it - and if they do catch someone spying for an ally, it wouldn't do to much a big fuss of it.
Re: @Richard 12
It is on android - the internal storage actually is an SD interface, just soldered to the board. Apple may be quite different, though.
It wouldn't be hard to get an encrypted link even over a horrible NK phone line. NK is so locked down that ordinary people can't make international calls, but I'm sure embassies have some way. They couldn't function otherwise. It would be a huge inconvenience for the embassy staff though, who would be all but cut-off from the rest of the world.
Re: "Accepting" Bitcoin
They'll have to find some way to get those coins back into circulation. Maybe they can pay all their employees in bitcoin?
Re: Might this be the DAP of networking?
Quite possible. Beneath the monstrosity of NDN lies an older idea, CAN - which is fundamentally brilliant, from a technological point of view. Less so from a business point of view, which is why it hasn't been deployed much - it'd inevitable become a wonderful tool of piracy, and for all the vast expense to ISPs of deploying it they wouldn't be the ones seeing the greatest benefit. Sure, it'd bring the cost of hosting large content down to a fraction of the current price - but it'd also see the ISPs shouldering that fraction, so they obviously have little incentive.
NDN seems to be an effort to address this by wrapping CAN up in a horrendously over-engineered mess orientated not at actually getting people the data they want, but at rendering the technology more palatable to the business side - giving ISPs a lot more control over the data, so they can do things like ensuring only partnered or reputable businesses can benefit while excluding DodgyFreeMovies.ru and the like.
It's worse than that. If this system allowed anyone to utilise it to speed up their network, it'd become the greatest tool of piracy since the invention of usenet binaries. Anyone who could rent a £10/m VM could happily host a few terabytes of downloads at minimal cost - every dodgy 'free movies' site in Russia would be doing it. The proposed architecture does include a means of verifying the publisher of data, probably to handle exactly this situation: ISPs can make sure their new caching network system only accepts the content of 'reputable' publishers (Those with money or influence enough to get whitelisted) while everyone else has to make do with the old, slow, inefficient and expensive methods we use today.
It also allows for geographic restrictions to be enforced by the network - eg, the BBC could tag iPlayer video content as 'UK exclusive' and routers for US ISPs would simply refuse requests for download. And Netflix could do the same to block their US-exclusive content over here. It'd be more reliable than geo-IP, which depends on a constantly changing and error-prone database.
Re: Stated Goals
Defibs are a bad example - a ten minute wait is too long.
If you're looking for something that is needed to rarely to keep stocked, but may be needed urgently at any moment, you want antivenom. Or some of the exceptionally rare blood types.
Look at the price graph.
It's starting to actually look stable now. At least compared with conventional currencies. If this continues, it might even become worth taking seriously.
Missing a point.
How many home-cinema-kit-owners actually get any benefit beyond placebo? Most people wouldn't be able to tell mono from stereo without listening carefully. Home cinema is a niche, and atmos and such are a niche within that niche. The vast majority of people use the speakers built into the telly, no matter how bad they are, and don't even notice any distortion.
Re: Goto considered harmful...
I rarely have call for goto, but they have their niches. In C, anyway. They can be handy for exiting a function while ensuring some cleanup code runs.
Re: *All* TV programs?
One of my favorite on-screen techie screens is from the low-budget scifi-horror movie Galaxy of Terror. Early in the film a damaged ship flashes up schematics on the screen while running a damage assessment. Pausing to examine the schematics closely, they can be identified as those for a chroma-key device. A piece of hardware that saw much use, including for that very shot. The most likely explanation is that someone searched the editing studio for something suitably technical they could display, and the chroma-key service manual was the first thing to come to hand.
Re: How do they plan to keep interest
Scratch is the new BASIC: It's a very quick way to get kids writing something that runs, but they'll need to learn most of it all over again as soon as they need a language that can do something less-than-trivial.
Re: Why it could or couldn't
It could be that they know very well, but just don't care. A case of violating the law in order to protest it. "They spies are taking pictures from your webcam chats, but they made it illegal for us to take pictures of them!"
Car engine parts, yes - and in my experience, laptop parts. All those weird little plastic bits that are never quite the same between models.
Does that make Vastra a reverse-furry?
Re: Did the BBC just troll people?
I imagine it also helps that they are ectotherms. That saves a great deal of energy.
Now there's an idea for a future scene... Characters fighting against killer robots with thermal infra-red vision. Clara, Vastra and some other characters pinned down, as the killer robots stalk them looking for any sign of heat to shoot at. Then the cold-blooded one calmly steps out, walks behind one and hits the off switch.
Did the BBC just troll people?
The kiss served no purpose in the story, didn't do a whole lot in the way of character development, and was rather clumsily shoehorned into the writing with an excuse.
I almost looks like this was the BBC's plan all along: Put something a tad provocative in knowing it would be sure to stir up complains from the easily offended homophobes* thus giving them a little publicity and making said homophobes look like the prudes and idiots they are.
*They all deny it, but does anyone seriously believe there would have been complaints had one gender differed?
Re: Are you talking to me?
Spear phishing emails?
It's been on v1.0 for a very long time, and the dev isn't responding to requests.
They do have one niche: They make great anti-abortion propaganda.
If they actually invest properly in this, it could do a lot of good to all people wanting to escape the Microsoft ecosystem. China has the sheer size and buying power to force a new entrant into the market. Probably another linux-based OS or something like Android, but that doesn't matter. Even if it flops terribly outside China, it'll still keep Microsoft under some level of pressure.
Even if it flops terribly in China, it's understandable why they would want to try just from a strategic perspective. Right now the US could cripple China by just asking Microsoft to serve up some malware to Chinese IP ranges on windows update - they wouldn't do so for anything less than open war, but China is playing the long game and needs to be ready for whatever the political situation may bring in twenty or fifty years.
Re: Hello pot, this is kettle...
Windows RT, on the ARM-chip surface tablets, only runs software from the official Microsoft store. Enforced by requiring signed code.
They are just doing the sensible thing: They see the massive success of Apple's business model of profiting from after-sale services in the consumer space. They want in. The problem here is that they are latecomers to this party, and that puts them at a serious disadvantage which they tried to address by lowering acceptance standards in order to quickly increase the selection on offer.
Why all the CAM super-security?
The content is all on the pirate bay anyway.
That explains a few things.
Now we know who buys all those obsolete bitcoin miners on eBay.
Re: "with a competent operating system, these machines were essentially bomb proof."
Which is a way part of the problem. OSs have long competed on features out of the box - even Windows, though it was mostly competing with the previous version of Windows. This has lead to a clean-install OS steadily doing more and more and more over the years - and with more complexity and more active services, there are more things that can go wrong or contain vulnerabilities. Look at Windows as an example, though some linux distros are just as bad: From the first install, it runs a a SMB/CIFS server. Even if you have no network shares. It's already listening, even if just for devices wanting to access your media library for DLNA purposes. That's a great big juicy target, a service running that really shouldn't be running until after the user has indicated a desire for it. It's just as bad outgoing - every time you access a network drive it starts poking the address on port 80 to see if it's for a WebDAV service and it listens for UPnP devices on the network. That's just the easily-reached network services. If you include the rest it's got all manner or sillyness. A printer service that runs even if no printer is installed, a wireless configuration service that runs even if there is no wireless interface.
Complexity breeds vulnerability. An OS that tries to do everything, all of the time is going to grow bloated and insecure.
Re: IPv6 like OSI is far more complex than necessary
"The world uses IPv4 with NAT today and they can game, use VoIP, and every single other application that IPv6 end-to-end religious nutters whinge about just fine."
No. Those things work because of awkward hacks that work some of the time, and the rest of the time if you can reconfigure your router. Try running a game server some day - it can't be done without going to your router config and telling it to set up a port forward. That's an inconvenience for current home users, and will be impossible when the address shortage forces the deployment of carrier-level NAT.
Skype can communicate through double-NAT, but only because it uses a ridiculous three-party UDP mutual handshake bodge to trick both NAT routers into thinking their client spoke first. Such an approach is only possible when there's a third, port-accessible party (Skype's server) to act as a coordinator. A central point of failure.
The low-level stuff is continuing to incrementally innovate. Has been for decades: Drives get more capacity, SSDs likewise. This is component improvements, driven by people who are educated in such esoteric fields as quantum mechanics and magnetic domain modeling.
Above that though, what is there to innovate? You can't turn X bytes of storage into >X bytes through any form of elaborate software misdirection, you can only provide the illusion. You can't recover your X bytes of data if less than X bytes remains after a drive failure, so you always need X+Y for redundancy. The mathematics is unforgiving. You can only try to make the best from the hardware with tiering and management functionality, a field which is pretty much done to death now.
Re: @ Brian Scott (was: Broadcast?)
UDP can be broadcast, though. Just set a destination of all-ones and every node on the subnet gets it, thanks to the use of a similar all-ones address at the next layer down.
Re: I solved this a while ago:
That, or a truecrypt or crypto-loop device, are pretty good options. But you can't promise security because someone could still hack the laptop with something like a keylogger for the master password. That's why I went standalone. You couldn't hack that thing short of physical access, and even then you'd need to retrieve it a second time to get the data off as it has no network connection and no place to add one that wouldn't be noticed.
I solved this a while ago:
- No online store to be compromised.
- The sensitive data consists of one numerical sequence of variable length, which you need to memorise. It needs to be pretty long, but it's only the one thing.
- Unique password for every website.
- Totally unhackable: Dedicated hardware, no network connectivity.
- Device stores no data: If lost, may be replaced without loss of passwords.
- Doubles as a serial TTY line monitor. Handy.
- Mine generates eight-character passwords, but easily adapted to longer.
Re: I've often wondered
The two major costs in bitcoin mining are hardware and power. I'm guessing they build where power is cheap. Like next to big, dirty, Chinese coal plants.
Re: Finally a standard for booting
UFI is fine, in itsself. The problem is implimentation. Many manufacturers do a quick job of it - so long as it'll boot Windows, they consider it job done. This results in all manner of nasty hacks and bugs to work around.
With the old BIOS system, there was lots of really ugly bodges involved in adapting a 8086-era boot process to modern hardware - but they were familiar bodges, and everyone knew how to handle them, and every system handled them in the same way.
I hate to meme, but...
I put a processor on your processor so you can process while you process.
Re: Currency fluctuations
It's been gradually falling ever since the $1000 bubble period ended. What makes you think the trend will reverse?
It's possible that the price will rise as the flow of new coins from miners slows. The free money is over. I just got a new miner myself, and calculate it'll take a year to pay for itsself.
Re: No need to sign up with coinbase
For now, yes. But when when Dell's suppliers start accepting bitcoin too? Someone at Dell will realise that sending the coins straight on means no need to give coinbase a cut. After all, one of the points often cited in Bitcoin's favor is eliminating the need for financial service providers and their fees.
I vaguely recall we came close to doing this in the UK a few years ago. To stop the kiddie porn traders, of course.
Re: basic premise faulty?
You are not a representative user. Few people even know what EXIF, and most wouldn't care if they did.
Re: What law has been broken. @veti
I nearly got expelled from school for that confusion. I did something-or-other on the computers - I forget just what it was, but it scared the teacher who then accused me of hacking. I admitted to hacking and commenced trying to explain to her the confusion over definitions. This failed miserably - due to both my inexperience in communication and the well-established meaning of the word in her experience, my attempted debate over the word was taken instead as a confession of guilt.
I did hack the school computers in the media sense, too - but not on that occasion.
Re: What law has been broken.
I did just that - posted lots of music. All pre-1963 and thus public domain in the UK, but I'm still expecting to hear something from a US company that fails to realize this - a lot of it is still covered there.
What I did notice was bots. Lots of bots, for various 'mp3 search' sites indexing my collection and often downloading the whole thing*. Sites that they return links to the files in their search results, resulting in me paying the hosting costs and them pocketing any advertising money.
This stopped when I made progress on replacing most of the mp3 files with ogg files.Seems the bots don't care about those. Not does anyone else: Traffic plumeted. I was hoping to make enough off the advertising to cover at least a fraction of the hosting (It's not expensive), but that's not happening. I'm in pennies-per-month.
*As does Yandex, curiously enough.
- +Comment Anti-Facebook Ello: Here's why we're still in beta. SPAMGASM!
- NASA rover Curiosity drills HOLE in MARS 'GOLF COURSE'
- Vid+Pics Microsoft unwraps WINDOWS 10. Evidently, Seven ate Nine
- WHY did Sunday Mirror stoop to slurping selfies for smut sting?
- Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9