You have got to be trolling
Steve Bong is a CEO, thinkfluencer, and inspirational ventrepreneur - not a "legal begal (sic)".
28 posts • joined 16 May 2007
Steve Bong is a CEO, thinkfluencer, and inspirational ventrepreneur - not a "legal begal (sic)".
Guess which one of these comments was blocked by the mods, and which one was posted (on today's article about Tor):
I don't think the author is particularly well informed, especially with regard to terminology. Starting with the (admittedly trivial) fact that Tor is a name, and properly capitalized as such, despite its acronymic origins.
But more importantly, exit node has a specific meaning, and it most definitely doesn't refer to "every user". It's also 100% incorrect that everyone using Tor automatically shares bandwidth, either as an exit node (i.e. a gateway to the normal internet) or otherwise. You have to specifically turn on sharing if you want to help out.
The article seems confused about the JS exploit incident too. The exploit was specifically inserted in hidden service websites hosted by Freedom Hosting (which incidentally included legitimate sites like webmail service). So I'm not sure in what sense it could be "not aimed at Freedom Hosting". And then in the second paragraph down it starts talking about exit nodes again, when hidden services like these don't use exit nodes.
I'm afraid the description of Tor (not TOR, just to be pedantic) in the article is somewhat confused.
No, not every user is an exit node. You only become an exit node if you specifically configure your Tor installation to be one. In fact, in the standard configuration for end-users, you are neither an exit node, nor an entry node, nor even a middle-man relay. You are solely a client that connects to entry nodes and you send and receive only your own traffic.
There are other inaccuracies and mis-statements in the article, but I'm posting this from a tablet and don't want to write a long response on a soft keyboard, so maybe I'll follow up later from something with a real keyboard.
(Hint: it's not the one that was worded to avoid personal attacks on the author.)
For bonus points, explain how El Reg's comment policy justifies this decision, and how anyone could know in advance what they will or will not be allowed to post.
Your first priority should be to clean your glasses, not your keyboard. Nothing in the article even remotely suggests they are teaching VB to kids.
I had been using PGPDisk for years and it was on my hard drive, so switching was quick and easy. I have no inside information that Symantec hasn't given the government a back door.
Reflecting on it, my switch was hasty. I agree with those who write that TrueCrypt 7.1 is no less secure now than it was a month ago. And I recommend that people don't switch until we figure out what's going on.
How would closing the website prevent a review of the code, when everybody's already downloaded it?
(Title to be read in a Lady Bracknell voice.)
Well, at least Apple have actually invented something here, rather than just patenting some pre-existing or obvious idea, but seriously, someone must have had their Complicator's Gloves on when they came up with this one. If you can sense that a button-press is unintentional electronically, then you can just discard/ignore it electronically. Adding a solenoid to make the button resist being pressed just seems stupid to me. One more thing to go expensively wrong.
Hang on, maybe that's Apple's real motivation here.
That's a bit like presenting a cutaway diagram of a car and calling it "Human anatomy" because of the driver, isn't it?
Everything is broken, according to the various references linked in the story; Gmail, FB, banking sites, everything. They just don't care what breaks as long as they can control everything that still works.
... you must work for or support a repressive government. Or perhaps the RIAA.
you tap it.
Hell, it wouldn't even fit in the card reader.
Developing and testing code on the same machine was never a good way to work back in the old days before memory-protected processes. Too much saving and reloading around the inevitable crashes. (At least rebooting was quick!)
I built a crude homebrew dev system by plugging two C-64s into the same 1541 disk drive, and running some software on the target C-64 that monitored the IEEE serial lines and pretended to be a second drive. I wrote code on the other C-64, and when I told my assembler to assemble directly to file on disk drive #9 rather than #8, it would be loaded straight to target memory by the stub on the second machine and executed. Combined with an Action Replay on the target for debugging and stepping, development was really pretty smooth.
There is actually quite a lot of 5HT (serotonin) in banana peel, but it can't cross the blood-brain barrier, so smoking them, or any other kind of ingestion isn't going to work. You'd basically have to extract it into liquid form and then inject it straight through your skull directly into your brain to get some kind of a hit off it.
How about we institute "National Everybody Photograph A Copper Day", on which as many of us as possible go out - armed with plenty of printed copies of the relevant guidance, of course - and photograph as many coppers in the course of their daily duties as we can?
Because like the guy above (Nigel11) mentioned, "The authorities need watching every bit as much as the terrorists". Damn right they do, and what's more they need *reminding*: they need reminding that we do *not* live under martial law, they need reminding that they can *not* just issue orders to civilians and that we do *not* have to do what they say just because they are coppers.
So, how about it, commentards. Anyone else think it would be a laugh? We could make it September 9th for the 9/9/09 = 999 connection. Set up a website on a freebie webhost somewhere, get a few of the amateur photographer magazines to pitch in with it - could be quite a bit of fun as well as making a serious point about how far outside the limits of their *actual* powers the police very regularly go.
Post replies here if you're interested and maybe we can get the ball rolling if enough people say they like the sound of it. ElReg, you'd give us some write-ups if we were going to arrange it, wouldn't you?
AKA brainwashing and torture.
>"So, by way of impotent protest, we shall decline to explain what Sonic Emotion do, or sell."
</standingovation> You win an internets!
I'd like to see a lot more of this sort of response to the frequently inane, offensive and/or fraudulently dishonest marketroid spew we are so often besieged with!
>"HP has come under fire for nullifying BIOS password protection steps on laptops by publishing reset data on its website."
And you have to be TOLD that we want to see the link? Sheesh, you don't seem to know us readers very well by now...
They're called "URL flips".
... No, no, no, he's outside, looking in.
Cheerio mate, and lots of thanks. We won't forget the debt of gratitude we owe you.
The trinity of RIA security can best be summed up as:
Zip, Nada, Zilch.
We've known this ever since Active-X was first deployed. Here's Microsoft's "First immutable law of computer security":
"Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore."
Here's DaveK's corollorary to the first immutable law of computer security:
> If you let remote websites execute code on your computer, it's not your computer any more.
When combined with DaveK's axiom of rich internet application security:
> Microsoft invented Active-X /so/ that remote websites can execute code on your computer.
It leads us to DaveK's syllogisms of computer security:
>1. If you let Microsoft execute code on your computer, it's not your computer any more.
>2. Microsoft are the "bad guys".
Heh, so there are still some people out there who won't admit the ST was a pile of poo compared to the Amiga? I remember the old "ST has a MIDI interface" argument from way back when, it goes something like:
"Sure... your Amiga has a higher resolution display, more colours, four channels of sampled sound, a display coprocessor, sprites, a blitter, DMA engines....... but my ST has a serial port! Yes, I know the Amiga has a serial port too, but my ST's serial port comes on a midi DIN connector instead of a db9".
So yes, you lucky ST owners, you did indeed save yourselves the three or four quid that a DB9 <-> DIN level adapter would have cost you. Well worth sacrificing 90% of the multimedia functionality of the machine for, eh?
Um, no, actually.
You chose wrong, you got burned - it's twenty years later now, it's time you faced up to it.
- DaveK a.k.a "Ubik".
No it doesn't, asshole. It just gives you a motive to engage in pathetic and despicable self-delusion. You are not exculpated.
And THE SAME RULE GOES FOR YOU, BALLMER, GATES AND JOBS!
Thanks for that, but I missed you posting - what time does it say *now*?
Hey, thanks for the link, I guess it was fairly obvious after all.
What's really brilliantly beautifully poetically ironic about it is that when I surf to that address, all I see is a web page announcing:
Epochalypse Countdown: 00 years 0 months 0 weeks 0 days 00:00:00:000
[yeh, I know it's only because of noscript really...]
Hey, I just invented a catchy new term to describe the y2038 bug when it rolls around!
<dons sandwich board> Beware, unbelievers! The Epochalypse is coming!
.... I thought Apple had cornered the market, but no! Look at all the gimps memorising and then mindlessly parroting the strapline from Marmite's recent advertising campaign.
"Hey! Look at me! I'll demonstrate my quirkiness and individuality by... oh.... I dunno, how about by identifying myself with a mass-manufactured consumer item and repeating something they told me to say in their ads".
Sad, sad people. You are all SOooo pWn3d!
God knows what you would have thought if the article had said "David Niesel was on hand ..."!
" even when the people affected have proved they are innocent of any crime. "
Remember the old days, when it was up to the police to prove you guilty of a crime, not up to you to prove yourself innocent? I miss them.
systemdwith faint praise
Biting the hand that feeds IT © 1998–2017