* Posts by clod computing is big

8 posts • joined 3 Oct 2009

'Get a VPN to defeat metadata retention' is good advice. Sometimes

clod computing is big
FAIL

wrong test

tl;dr The actual IP address your traffic is coming from is a more reliable indication of whether the VPN is in play than latency measured by ping.

Wouldn't the ip address reported by visiting an external site such as http://iplocation.net on the device you hope is protected by the VPN be a far more direct and reliable indicator of how your traffic is being routed?

If it's the router/ISP assigned address, you have zero protection; if the ip address is assigned to the VPN provider then you are in better shape.

A phone web browser or ssh client *might* with any luck be directed to a vpn tunnelling application running on the phone but it's unlikely that the authors of your devices "hot spot" app would have written code to look for a VPN application and route through that application if one is running. Not that it's a lot of work.

At home, I have an independent wireless network through PIA using a separate wireless device running openvpn on tomato firmware. Every device connected to that network has all traffic directed through PIA making it harder for our data slurpers. Otherwise I assume I'm under surveillance and act accordingly - wearing my tinfoil hat and underpants.

7
0

'No, I CAN'T write code myself,' admits woman in charge of teaching our kids to code

clod computing is big

Re: Kids who can think ...

Sure. But if any of the poohbahs knew their asses from holes in the ground, you could "teach them to code" simple games and interactive web thingys for the olds to feel proud of with http://scratch.mit.edu/ - the technology is free and very limited but in a way that should allow teachers to focus on what they do best - helping the kids learn some subject matter creatively. In making things, kids that get it learn that writing code is sometimes like putting lego bricks together which is probably a fairly good primary school lesson - plus they (apparently) can have fun. Checkout the simple game video and http://scratch.mit.edu/educators/

No, I'm not affiliated in any way.

6
0

Google patents swish, swosh, swoosh pattern unlock app swipe

clod computing is big

Yeah that way you'll know the approximate cash value to anyone who can part you from both your shiny fruity device and your right forefinger. Handy.

0
0

NHS trust to digitise millions of patient records

clod computing is big

Images of paper charts? Really? Delivered by pneumatic tubes I hope.

The problem being addressed (records available in multiple physical locations) is being addressed by distributing images of the records. None of the many benefits (such as researchable coded data on a defined population) from real electronic medical records arise. Also none of the risks and disruptions to old skool doctoring - this is a brutal approach - we need reliable research data from complete patient records for (eg) post marketing surveillance and comparative effectiveness of drugs.

Good one, NIH. After all the pathetic incompetence and resources wasted on real EMR, we have the low risk but dumb as a doorknob approach.

1
0

Car wrecks rise after texting bans imposed

clod computing is big

Laws don't change behavior. Enforcement might.

In the states with laws, how many prosecutions and convictions did they lead to?

France has had laws banning women from wearing trousers since 1799 http://www.telegraph.co.uk/news/worldnews/europe/france/7677686/Paris-trouser-ban-for-women-could-be-lifted.html

So why do women in France still sometimes wear trousers? Because the law has never been enforced.

2
1

Californian university drops Gmail over privacy concerns

clod computing is big
Alert

secure email is an oxymoron, dumbasses

gmail not private? Shock! Horror! OMFG! LOL etc..

Outlook correspondence not private? Impossible!

Come on folks. Unencrypted text in an email is by definition not even remotely secure.

If it's plain text on a disk, your friendly sysadmin can read it, and any bored miscreant with a well situated router can read whatever flies by if it's in plain text. That is if they could be bothered.

We (a 500 or so academic subspecies at Harvard) moved to gmail 2 years ago and it's been fantastic - much more reliable and far less expense for us. Privacy? We've heard of that but for email (gmail or otherwise), you must be kidding..

1
4

IE zero-day used in Chinese cyber assault on 34 firms

clod computing is big

corporate secrets =/= using IE

Sure, opera/firefox/etc are unlikely to be entirely free of current or future exploitable weaknesses, but even adjusting for market share, they seem far lower risk as far as exploits go.

Seriously folks - any modern company with secrets to manage with a CIO who allows anyone on one of their laptops or on their internal networks to use internet explorer 6, or for that matter, any other version needs a new CIO? This is just getting silly.

3
1

Amazon pumps sky-high Big Data cruncher

clod computing is big
FAIL

evaporating clouds

http://www.theregister.co.uk/Design/graphics/icons/comment/fail_32.png

At least I do understand that sometimes these things break and the consequences can affect a lot of people - like those of us with projects housed at the otherwise wonderful http://bitbucket.org/ as at Friday/Saturday oct 3 - it's down with a bad case of missingness.

0
0

Forums

Biting the hand that feeds IT © 1998–2017