"forces to be deployed without human loss of life"
On your side. While that is generally a good thing, if it makes politicians more trigger-happy it is probable not.
3063 posts • joined 15 Mar 2007
On your side. While that is generally a good thing, if it makes politicians more trigger-happy it is probable not.
Lets face it, if you worry about a TLA recovering data you should have been using an encrypted file system with the HDD when in use, so not only do they have to try and undo the overwrite, but they also have to know your encryption key as well.
Thing is, you need an order of magnitude greater skills to get data out of those areas, and probably you are looking at a tiny fraction of what was once stored on the HDD.
Deleted via recycle bin? Piss-easy to get back.
Formatted? Not too hard if standard structure used and/or you use a scanning tool looking for recognisable data (word doccuments, JPEG images, etc)
Overwritten with zeros? Damn hard without low-level HDD access below the usual SATA command set (possibly even custom forensics hardware & software).
Physically destroyed with thermite? No chance.
Considering the effort and possible desire to get some 2nd hand value/use, simply doing a full disk wipe or using the "secure erase" option is plenty good enough.
Greece was looking like a good cheap holiday option with ancient historical sites to visit and fantastic food.
Not so cheap from the UK now, of course...
Have an up-vote!
"I wonder how many of these aren't supported by anyone including the manufacturers of them?"
Fixed it for you...
I can think of a few very good reasons for centralised storage, such as (1) simplifying the task of recognising, protecting and managing your data (snapshots, data replicated to off-site store and/or tape robot), and (2) allowing common data/programs to be updated in one go for everyone who needs access, (3) allowing applications on differing native OS to share data.
However, (1) it will never match local storage for speed on any comparable basis, and (2) you get a degree of redundancy in your company that one central fault won't take down everything.
So really depending on what attribute matters more you you will go for one, the other, or maybe a bit of both (e.g. fast data local, central for share/replication/off-site transfer).
I guess it should be uW per IOPS (or SI alternative) given that IOPS is I/O per second, and energy per I/O would then be energy/second = power.
Just. It is a Lenovo X3650 M5 Server and a Dell PowerVault MD1220 Storage Array which have PSU rated for 900W+600W = 1500W but allowing a bit of margin for PF not exactly 1.0 you would really be looking at a 2kVA UPS (even though average power is likely a bit lower). Oddly enough the SPC benchmarks have $/IOPS but not pJ/IOPS or equivalent indication of actual power consumption which in this day is likely to factor in to the overall ownership cost as well.
p.s. I guess you missed the joke icon?
You are seriously underestimating the cost of a UPS for that sort of system, why it is likely to be MUCH higher, probably around $5,000 which will make an impact of almost 4% to the $/IOPS cost!
I thought Dropbox provided snapshots? What went wrong with that?
Squeal like a piggy boy, squeal like a piggy that ain't got no back-up copies! Squee! Squee!
Turkeys voting for Christmas on the basis its not halal, now asking what Christmas means for them.
"The act of hacking it, shows
its backdoored that they exploited a flaw in firefox to reveal the machine's local IP address."
Fixed it for you. Please check the facts of this case before making such general assertions.
Oh I do hope so :)
If Firefox is run under an apparmor profile would that achieve much the same?
After all that is what CESG recommend:
What the web browser dev should be doing is fixing this, not endless dicking around with GUIs or finding ever smarter ways to whore us to the advertisers.
We should have browsers that only yield the minimum of necessary information back to a web site, and that tricks like canvas rendering hashes, etc, are deliberately broken by inducing some ~1/2 pixel random dither in the drawing so now two hashes are ever the same.
And that is before we get in to the unholy mess of SSL certificates and the half-measures like pining to try and catch MITM by state level actors.
Indeed, one can help a lot.
Ah, that odd half hour spent with the GIMP touching up a friend's daughter...
Also if you are not "doing business" in Russia by making the app free and not whoring for profit with their advertisers, who do they fine?
Yes, they could start a Great Firewall of Russia to try and block apps that are not on the good list but a little use of P2P technology and/or making use of ports like 443 that always look encrypted will make that whack-a-mole game a bit harder.
That is why we should have 5 year warranties on electronics. Then they would have to consider the repair cost or replacement cost when designing it and one way or another you would see up front what the true cost of a gadget is likely to be..
Why, by the 9" already mentioned!
Mind you, that could work another way if browser coders decided to undermine that sort of system by randomly connecting to anything/everything in the background. Suddenly everyone's ICR logs are massive and expensive to maintain, and everyone looks equally suspicious and has plausible denyability about looking at any odd site.
You know those sites only too well =>
Difficult, though some of my accounts have a card reader that generates a code based on the card/PIN and the transfer amount to be used. This is a separate validation path that is very hard for a compromised phone (or PC, or MITM from hacked wifi point, etc) to to bypass.
Advantage - no internet connection to said device so it can't be hacked (directly, lets overlook the RSA Token breach for a moment).
Disadvantage - it is something annoying to carry with you if you really want banking on the move.
Even if the banking app can't tell the phone's IP address, the bank surely can tell if the connection is coming out of a Tor node. Maybe not 100% as I doubt there is a very up-to-date list, but pretty much most connections would be identifiable that way. Also if its an app that can get your location then a geo-lookup should be able to tell if the phone's IP address is sane as well.
But one way or another, they should not be placing great trust the bank app, phone, or network path in the first place. 2FA is needed if it matters, but sadly for a mobile-only customer that is a single point of failure.
You are right but also mistaken.
Yes, I can see that banks should not accept business via Tor due to the additional risk of the originator not being the real person, and no doubt the use of the IP address and geo-lookup is one aspect banks use in detecting fraud.
But you are mistaken here: the whole point of the article is the banking app won't allow you to have a Tor browser installed on the same phone even though it is cleared via Google's own Play store, not that it won't work via a Tor network. Those are two very different things.
You are indeed a moron if you think that the presence or otherwise of a tor browser is the single most important thing for banking security.
Here is a clue - if security matters, and one has to assume banks are aware of this, you must start by the assumption that any device or communication channel may be compromised and design a system to catch that. That is the whole point of 2FA (you can't trust a single path/factor).
Of course if the '2' in your 2FA both via your phone (e.g. banking app & text message confirmation) this is a big FAIL as you really have 1FA (and considering the numerous unpatched bugs in many phones, really SFA). Banks must know this, but take the risk that fraud is less expensive than the lost business of forcing a more secure model on the customer.
"I don't know where you're getting your info from"
Experience. My first "smartphone" was an HTC Wildfire and it received a single OS update in 3-4 years for some wifi bug but remained remained buggy (would reboot in poor signal strength areas after a while). Also that update wiped phone so was really a factory reset as well. Now have a ~3 year old Motorola G which has had 2 OS updates so far and currently is telling me that its Android 5.1 patch 2016-03-01 is as up to date as there is.
So while *you* might be lucky with your phone, the majority of phone owners get SAF in the way of timely updates.
Really, as far as I can see from the Play store is it not a tor node and just a tor access point or proxy. And if for access then I can't believe it is much worse than some unpatched browser on the phone as you go to legitimate web sites already hacked and serving up malware.
WTF? The app is complaining about the Tor app installed on a non-rooted phone.
So what if Tor is used by "some of the worst people on the planet to conduct their despicable business" as you could easily say "mobiles phones are used by..." or the Internet, or cars, etc, etc. So long as he is not using Tor for kiddy-fiddling etc then it is none of your damn business.
Don't use a banking app on Android in the first place.
Every sane OS is patched at least monthly, if not more often as bugs and security holes are found. Most phones one per year if you are lucky for core OS parts, occasionally more often for app and that often asks for more permissions.
I also have a couple of mechanical watches, one is self-winding if I wear it all day, otherwise needs wound up daily. But the thing is, I don't have to carry a special winder with me, nor do I need an compatible power point for the winder.
My usual watch is a Casio that is automatically set by radio and is solar charged. Had it now for several years and no battery change needed (and resulting leaky seals) so pretty happy with it. Now if a smart watch could do the same...
Indeed the discovery phase and details of the data gathering are essential. After all, if the police have hacked in to my computer to gather evidence, how can the jury be sure they did not plant it there?
I'm not saying such techniques should be banned, but there must be proper rules for the use and full traceability of the actions and method presented at the trial so both sides can be sure the evidence is valid.
Since when was "Mountain Bikers" three words?
Isn’t the case and extra cost option?
Why did I read that as "a genital smile in my direction"?
The bankruptcy is probably a move to protect what they can (e.g. all in wife’s name, etc) and in other cases may have nothing to do with the low-life practices seen here.
Being disbarred from practice should follow such a judgement though as a separate step.
Great idea, send him on the B-arks first
You are also making the very dubious assumption that the UK post-Brexit would not just roll over and do what the US wanted on IP law giving us just as much, if not more, trouble.
Thanks for the detailed info.
"The HFS Resource-fork ... deprecated since 2001"
Maybe, but as far as I know it was still used just a couple of years ago for Apple's own photo management program, and was such a pain that a friend's only solution to allow NAS/RAID for his parents Mac's collection of images was to use iSCSI export from the NAS and format it in HFS. Of course, that sort of approach also makes sharing the NAS' contents impossible as you really don't want two machines able to write the file system tables, etc.
While some folk might think case-insensitive is good as humans don't care, as you and other point out it is a right pain to make it sane and consistent with multiple character sets.
Its a computer, it should be case-sensitive and the muppets writing Adobe software who are not using consistent case in thier stuff just shows how dumb they are. Not that Flash's endless stream of exploitable bugs would suggest otherwise.
But the real elephant in the room is the incredibly dumb "feature" of data fork (Alternate Data Streams) that results in some Apple software being unusable on any file system that lacks this. So you can't put your photos on a NAS, etc. as it breaks the thumbnails, etc, which are stored in a 2nd or other stream of data behind the same filename.
"which conveniently lends itself to the terrorist angle rather than being a hate crime"
No, sounds more like self-loathing being projected on the innocent from someone who's culture demonises homosexuality. Same as right-wing Christian nutters do.
It won't prevent all murders, would reduce the number of murders because its harder to kill many people in a short window with simple "secondary use" weapons. Restricting guns won't stop dedicated murderers but it makes it a bit harder to do, maybe gives the perpetrator cause to think twice, maybe gives the victim a more sporting chance to escape or defend themselves.
That is it in a nutshell.
Ah yes, so the number of gun deaths in the USA has nothing to do with the number of guns?
Sometimes satire is just too close to the truth:
What is this Cortana you speak of? How will she/it spy on me? I have looked, but this is what I get:
$ apt-cache policy Cortana
N: Unable to locate package Cortana
Now then, to add "teledildonic DevOps using .net" over and over again to my Linkedin profile...
Yes and those utilities are "fungible" (a nice word that AO sometimes uses on El Reg) where they are interchangeable. Gas is gas from any utility to certain defined standards and to me they just burn and heat things.
My data is unique which is why it is valuable to me, and if some cloud provide vanishes or deletes my account due to incompetence or a dispute over billing then I am stuffed unless i have my own copy. Or have two cloud provides that don't share the same points of failure. And that is even before we get in to data sovereignty and who can use a legal warrant (secret or otherwise) to access it.
"crypto virus automate the stupidity process"
Very much so. While I do feel for those suffering data loss, it could just as easily be a careless file deletion, and accidental format of a partition, a hardware fault, or the theft/loss of a laptop.
If you don't have a usable and protected backup, you don't really have your data. It is simply a matter of time...
Lets not single out the police now, after all the same sort of problem appears to impact on most UK gov IT systems. And quite a few private companies as well.
Really? Companies think they can get $4/quarter of additional profit per
narcissist user by punting ads on Twitter?
Am I lacking in marketing and business nous, or is that a seriously deluded return rate?
68-pin ones were easy to get for SCSI. I needed the 80-pin version (not used for SCSI but for a custom board). Think it was DigiKey I got them from.
Some years ago I needed some 80-pin versions of the old SCSI mini parallel connector, only sold in the USA as far as I could find. So had to fill out various forms, etc, to get clearance to have them exported to me as clearly such connectors are in big demand by terrorists, government spies and pinko-commie-subversives worldwide.
On arrival I saw they were made in Mexico.
But look at the up-side where ITAR has done wonders for the European space industry.
The way it has been "negotiated" is an affront to democracy EVERYWHERE and for that reason alone it should be slapped down.
What if it has benefits? Does not matter. Our political leaders and their Machiavellian ministers who negotiated and/or supported this need to be told in no uncertain terms that secrecy is not acceptable. After every round of negotiation the whole document should have been published as "draft" for the world to see so the next round has a democratic input. Nothing is perfect, but as it stands my MP (good or useless) can't go and look at it and bring a copy of bits back to me for discussion. It stinks of corruption.