Feeds

* Posts by Adam 1

528 posts • joined 7 May 2012

Page:

How Bitcoin could become a super-sized Wayback Machine

Adam 1
Bronze badge
Pint

Curious

I have read the paper and I am still a little**1 confused about how it works.

First things first, I really dislike the inherent uselessness in the BTC computations. It serves no beneficial purpose other than as an overhead in ensuring scarecity. But it does this by using frightful amounts of energy and wasting computing resources that could otherwise be used in useful pursuits (Folding / Climate Modeling / etc). At best you could call it an overhead; a necessary evil but finding something useful to do with those computations should be a high priority. Otherwise, the only people who will be able to profit from it**2 are those who run massive distributed botnets or cryptolocker malware who therefore don't need to pay input costs.

So I really WANT to like this, but there is one glaring problem that I can't see addressed. Let us assume that I agree to store X Bytes of data which is valued at a given amount Y. I can prove that I have stored X by signing some random challenges with my private key. Now I can believe a few things about all this:

* That due to the random challenge I can not predict which subset of X will be challenged.

* That due to my private key being needed to sign the challenge, I would not want to pool it in the cloud.

Now after some time, I want to sell my Y currency to buy a good/service. I am assuming that the buyer has the necessary mechanisms to prove that I am indeed the owner of the coin and the transaction goes ahead.

Now that I am no longer the owner of the coin, where is my motivation to not just wipe the data I am currently holding to realise the X Bytes of storage (or to use those same X bytes to store some other coin)? If I was to do this, there would be a coin that was not backed by the promised stored data which goes counter to the purpose of this.

How does the proposed solution prevent me from doing this? Surely I don't need to upload all of the data associated with the coin to the recipient in order to transact? Otherwise, where is the benefit in trading vs just mining fresh coins.

**1 by a little, I mean a lot.

**2 talking about mining here, not speculation; I will leave that for others to "solve".

0
0

CSIRO claims milestone in solar-powered steam turbines

Adam 1
Bronze badge

Re: What about the birds?

This is a good point. This thing looks potentially fatal to any passing bird, which is entirely unlike hydro electric dams and open cut coal mines which are completely safe to local fauna.

5
0
Adam 1
Bronze badge

Re: They must be stopped!

What has the CSIRO ever achieved though? (Not counting the flu vaccine, solar hot water, polymer bank notes, a stealth radar detection and WiFi)

4
0

Apple: We'll tailor Swift to be a fast new programming language

Adam 1
Bronze badge

Re: Just what the world needs

.NET is not a language, it is a runtime. There is a pretty low level language MSIL that many excellent c# programmers haven't even heard of which is what your c# or VB.net or whatever compiles into which is if you like the native tongue of the framework which JIT compiles to assembler (usually x86/x64).

But the point is that I can write some fancy component suite in c#** and you could buy it and use it within a VB.net codebase (or j sharp or whatever floats your boat)

** I probably couldn't

10
0

Snowden shoots back: 'So you DO have my emails, after all'

Adam 1
Bronze badge

Re: DD/MM/YYYY - Um....

What bothers me about dd/mm/yyyy is that we go all little endian on the date part and then switch to big endian for HH:MM:SS. (not even going to attempt to defend the brain fart that is mm/dd/yyyy).

8
0

Rap chap tapped for $3 BEELLION: Apple buys Dr Dre's Beats

Adam 1
Bronze badge

I don't know where to start with your rant. It should be glaringly obvious that it costs far less than $5 to manufacture them at this scale.

1
0
Adam 1
Bronze badge

Re: Overpriced

...rather than their customers

Where do you think apple's money comes from? They will pay for it eventually.

0
0
Adam 1
Bronze badge

Re: A marriage made in Heaven?

Technically a TomTom is a computer too...

But AAPL is not trading where it is because of their worth as a company that sells computers.

0
4
Adam 1
Bronze badge

Re: A marriage made in Heaven?

That is ridiculous. Apple haven't been a computer company in years.

7
3

TrueCrypt considered HARMFUL – downloads, website meddled to warn: 'It's not secure'

Adam 1
Bronze badge
Windows

Am I safe?

Downloaded 7 Apr 2014

fciv "TrueCrypt Setup 7.1a.exe" -sha1

//

// File Checksum Integrity Verifier version 2.05.

//

7689d038c76bd1df695d295c026961e50e4a62ea truecrypt setup 7.1a.exe

0
0

Tesla's TOP SECRET gigafactories: Lithium to power world's vehicles? Let's do the sums

Adam 1
Bronze badge

>I think that fuel cells – for at least some part of both the electricity storage and vehicle fleets – are going to be the preferred technology

Are we still using platinum for a catalyst? If so, would there not be similar supply constraints?

2
0

Hello Moto... It's the Nokia Lumia 630

Adam 1
Bronze badge

Re: No front facing camera

Meh, I have kit kat which is pretty useless for Skype too.

0
2
Adam 1
Bronze badge

Re: No more landfill?

I am personally wondering when the time may come whereby phone reviews mention how the phone copes when making or receiving phone calls. That is important to some people.

2
0

EBay, you keep using the word 'SECURITY'. I do not think it means what you think it means

Adam 1
Bronze badge

Re: "Encrypted" passwords

Don't confuse an implementation of salt with the definition of a salt. Salt is simply a technique. If can be 2 bytes but it can just as easily be 256 randomly generated bytes (or any number). It doesn't even have to be appended to the end. You know the size of the hash output so you can interleave the salt and resulting hash in the one field if you want. That approach means that your authentication server can easily get all the information it needs and you can not tell from the table what is hash and what is salt.

0
1

So you reckon Nokia-wielding Microsoft can't beat off Apple?

Adam 1
Bronze badge

Maybe they did overpay; in the sense that they didn't make enough of a profit as they otherwise could?

You don't seem to understand that whilst they are losing some money on Motorola DIRECTLY, they gain INDIRECTLY from loopholes in tax law.

1
1
Adam 1
Bronze badge

>Microsoft should look at how Google took a $6bn bath on Motorola and avoid making the same mistakes

What mistakes?

1
3

Apple, Google: WE SURRENDER ... to each other in patent war truce

Adam 1
Bronze badge

Your point is sound but I think any reasonable measure of Russia's contribution against the Nazis would come to the conclusion that "help" is a bit of an understatement. It would be like saying that the US "helped" in the pacific.

2
0

Urinating teen polluted 57 Olympic-sized swimming pools - cops

Adam 1
Bronze badge

Re: Some one else needs to be charged ...

>The person who ordered it to be flushed put it beyond use. It appears the latter person is guilty of a much more serious offence.

You're absolutely right. The first guy only pee'd. A half flush would have sufficed.

13
0

Boffins run iOS apps on Android hardware

Adam 1
Bronze badge

Officially yes, but you can still download the APK and install it directly. Not that I would recommend installing anything from Adobe that isn't frequently patched. I think their patches this month through windows update outnumbered the OS patches so abandonware from them is something I would recommend to avoid.

2
0
Adam 1
Bronze badge

Re: Am I missing something?

You are missing: enabling it to run **UNMODIFIED** foreign binaries.

Take the X Code output and upload it unchanged to your device. That is truly impressive, mind you I think I will take a raincheck on using iTunes....

4
1

Microsoft blinks, extends Windows 8.1 Update deadline for consumers

Adam 1
Bronze badge

Re: Moan moan moan

If 8.1 was just a free optional update you might have a point. But Microsoft have decided to cease support for 8.0 not us. As such, in order for us to avail of the support and maintenance promised to us at time or purchase, we need to install this update. If it is a prerequisite to any other critical update available on 8.1 but not 8.0 where the issue impacts 8.0, then the 8.1 upgrade itself must be labeled a critical update and available to us via the usual channels (windows update, WSUS, etc). If they want to deploy via app store as well then that is not a problem.

The fundamental inconsistency is that their windows update will give you a green tick saying all is well on an 8.0 system even though it would be missing patches. That is rightfully criticised.

0
0
Adam 1
Bronze badge

Re: Microsoft minutes?

Obligatory

0
0
Adam 1
Bronze badge

Re: The amusing part?

Technology to do binary diff for remote patching has been around since forever. In simple terms, take xyz.DLL with hash ABC and do a binary XOR against this file (which is compressed) and the output is the new version. In reality you would do it below the file level on specific chunks but either way the total download of 8.1 should be substantially smaller than a fresh image.

0
0
Adam 1
Bronze badge

Re: It's not the user's fault if you hide the updates.

Not just that but it won't install unless your 8.0 install is completely updated. Er, that will be another 875 MB from my factory image as of May thank you very much.

2
0
Adam 1
Bronze badge

Re: What a mess

It is possible to upgrade without a Microsoft account, though they do their utmost to bury that option behind the I can't be stuffed I give up where is the darn thing barrier.

If you haven't found it yet, you need to go into the create Microsoft account button After upgrade and in there you will find the option to keep your regular account.

1
0

LA air traffic meltdown: System simply 'RAN OUT OF MEMORY'

Adam 1
Bronze badge

Re: I think the time has come

TCAS by itself would have been enough there. One of the factors in that crash is that the air traffic controller on realising the problem sent instructions to each pilot to ascend/descend respectively but was coincidentally the opposite advice as given by TCAS. One pilot listened to the controller, the other to the computer.

5
0
Adam 1
Bronze badge

Re: Recursive programming

See replies to IdeaReforecasting.

0
0

$180,000 buys you lunch with Tim Cook as charity auction ending

Adam 1
Bronze badge

What a bargain. To think you can be the first one to walk on the moon, win the tour de France on seven consecutive attempts and now be at the helm of the worldwide leader in drinking coasters and yet no lunch. Just shows kids why you shouldn't do drugs.

0
1

Quick Q: How many FLOPPIES do I need for 16 MILLION image files?

Adam 1
Bronze badge

Ironically, I still have my old zip drive in the garage but no recent PC or laptop with the necessary parallel port to plug it into.

0
0
Adam 1
Bronze badge

Re: 5 1/4 ins floppies

Civ is still one of the best games ever made.

4
0

Japanese cops arrest man with five 3D printed guns at home

Adam 1
Bronze badge

Re: In Japan, no guns means children are safe!

A diisrbed person wielding a knife will do less damage than the same person with access to a firearm. Safety is clearly a relative concept. Until you can adequately address the reasons people inflict violence upon each other (substance abuse, mental health, jealousy, rage, etc) then you can limit the damage they do by controlling access to weapons and ammunition.

Most would argue that the general public should not be permitted to carry biological weapons. It would be ridiculous for me to assert that because people kill each other with guns anyway that there would be no benefit to banning such weapons.

Stricter gun control does reduce murder and suicide rates. You can look at these rates in Australia are and post 1996 when certain classes of weapons were banned. It isn't the only factor (see USA cc Switzerland) but it is a bit mind numbingly crazy to think that there is no link at all against the available evidence.

2
1
Adam 1
Bronze badge

Re: Boot strapping

Dear future lifeforms,

This is how skynet started. Beware!

0
0
Adam 1
Bronze badge

There may be insurance implications if the death occurred in the commission of a criminal act.

1
0

Goodbye, Mr Dong: Samsung Galaxy S5 boss disappears through trapdoor

Adam 1
Bronze badge

Come on reg. You can do better than that.

Wobbly Dong fails to stir target and pulls out.

4
0
Adam 1
Bronze badge

Re: S5 needs more internal storage

FYI, I had an similar problem with my old SE which only had 384MB internal storage which was low even at the time. I had an app I think called app2sd or something similar which while didn't completely remove the limit at least got a little more apps installed.

0
0

How Google's Android Silver could become 'Wintel for phones'

Adam 1
Bronze badge

Re: How does this affect patents and extortion by Microsoft/Apple?

Good point, at least on the software stack. Not going to stave off the rounded corner violations though.

0
0
Adam 1
Bronze badge

Re: Huh?

> But on the whole they don't actually do it (and if they do, are they not likely to be quickly outed as malware?)

Possibly, but it would be easy enough to hide if you truly cared. Many applications have legitimate reasons to contact the internet and you can't tell what is in an encrypted packet. Just google search for how many of your favourite freeware applications bundle OpenCandy into their installer. Now it is not necessarily spyware but it does look at what is installed on your computer and phones home so the boundary gets pretty blurred. And it gets installed with everything from uTorrent, Daemon tools, Foxit Reader and PDFCreator. It is nearly impossible to install an application these days without some hidden checkbox in some screen on your installer that installed some ask toolbar.

And diagnosed by Malware by whom? Seriously most AV companies are just as bad. Adobe tries to install McAfee whenever you update something.

0
0
Adam 1
Bronze badge

Re: Huh?

Applications running as pleb users in windows, Mac and *nix still have read access to your personal files in my documents or home. They can all in default configuration establish outgoing collections and do whatever they want. The only difference between wintel land and the mobile space here is that if you want access to the APIs that return that data or establish those connections then you are forced to disclose it.

4
1

Symantec: Antivirus is 'DEAD' – no longer 'a moneymaker'

Adam 1
Bronze badge

Re: It won't be missed

Whatever happened to them? I mean in the mid 90s they were to techos what sysinternals is today.

Speeddisk. Diskdoctor. Awesome batch file extensions. But now the best advice is to avoid their rubbish.

32
0
Adam 1
Bronze badge

Re: Maybe he's right but he's also short-sighted.

You are kidding right?

Norton has enough trouble uninstalling ITSELF.

46
0

Laser deflector shields possible with today's tech – but there's one small problem

Adam 1
Bronze badge

May the fourth be with you.

/here all week

1
1

NBN Co must wait until mid-2015 for fast cable modems

Adam 1
Bronze badge
FAIL

Vertical Integration

The problem with Telstra is that they were vertically integrated providing back-haul, connections to the premise as well as the retail side. This is an inherent conflict of interest making it more difficult for retail competitors to negotiate access to the connections.

Electricity market is a better example, where you have a single company responsible for "wires and polls" that purchases energy from a set of "generator companies" which is retailed by a set of retailers. You get benefit of competition at the generation and retail ends without cost of duplication at the wires and polls side. That the grid overspends on wires and polls putting multiple times the impact of the carbon tax on prices over the past few years relates to a silly lack of foresight by the government who make it in the companies financial interest to "gold plate" (unnecessarily upgrade or replace) the polls and wires. By illustrating that they are investing in the infrastructure, they are permitted to charge more at wholesale which means the retailers pass this on; but that is a problem for another day.

The NBN is still much better value for money under this sort of model because you don't need to pay for TPG fibre running side by side with Telstra, Optus, iiNet and customers can move from provider to provider without being told there is no room at the exchange.

1
0
Adam 1
Bronze badge
Unhappy

Re: These words don't belong in the same sentence

I beg to differ; the Liberal National Party has made good progress at wrecking the speed of the NBN whilst still spending 3/4 of the amount.

1
0

SpaceX: We NAILED the Falcon 9 landing! The video, on the other hand...

Adam 1
Bronze badge

Re: Not much hope

Maybe they need these guys?

1
0

FCC seeks $48K fine from mobile phone-jamming driver

Adam 1
Bronze badge

But my first amendment right to free speech in 3..2..1

1
1

Tim Cook: Apple's 'closer than it's ever been' to releasing new product range

Adam 1
Bronze badge

Re: Technically correct

Are you suggesting that they have invented time machine?

/grabs coat

0
0

DeSENSORtised: Why the 'Internet of Things' will FAIL without IPv6

Adam 1
Bronze badge

Like any 'scarce' resource the market will set a price. When they run low then anyone who really needs one will have to pay more than now and no doubt many companies and institutions who are currently sitting on addresses they don't actually need will 'realise' the value of that asset.

1
0
Adam 1
Bronze badge

Re: Security through transparency

>I don't want every hacker on the internet to be able to address every light bulb and every sensor in my house individually.

Oh don't worry about that. All comms will be completely secured using openSSL with session keys generated by Dual_EC_DRBG. Try to keep up.

2
0

Boffins claim machines now beat humans at face-matching

Adam 1
Bronze badge

Re: Abstract Mathematics

It depends what you mean by source. Compiled executables are pretty much source code written in assembler. Then you have the JIT compiled stuff like Java or MSIL produced by .NET.

You actually have to go through reasonable effort to obfuscate your code during the build process if avoiding others copying the logic is important to you.

But in most applications the GUI is only a small (relatively speaking) component of the application. I am not sure that the suggested approach would do a great job at reversing out the business objects or DAL or the logic contained in any stored procedures.

Otherwise you are basically looking at a screen recorder.

0
1
Adam 1
Bronze badge

One thing's for sure, they are not using this for face matching on my Nexus 5.

2
0

Page: