US thinking olny permitted!
"may be awarded only to individuals and teams of individuals who are citizens or permanent residents of the United States"
73 posts • joined 20 Oct 2010
"may be awarded only to individuals and teams of individuals who are citizens or permanent residents of the United States"
If you learnt nothing from the first four breaches it is "be open with your customers and tell them early" unfortunately the advice is still "if you have a connectivity problem simply reset your router".
As before, no proactive advice whatsoever - Yes I'm a customer - no I have not received any proactive communication.
Dido, your customers are reading about the severity in the papers and on the BBC, an email - if only to say "you do not have an affected router" would not go amiss. for those with affected routers then what you are actually doing.
Every vendor in the spaces used Credit Card strings and they are really simple and unique format, and thus easily defined.
The trick is finding all that "other stuff", so every time with catch someone doing something bad then in retrospect we write another string search......
Else you let your IT and/or security team go trawling for anything suspicious. [and that's so good for employee moral].
Apple playing catch up with a set of "me too" features that can already be found at half the price, and nothing that is leading edge, and at substantial premuim.
Still it's got an Apple logo on the back; Baaaaaa.............
"If privacy is outlawed, only outlaws will have privacy" [the original quote] often bastardised as "If encryption is outlawed, only outlaws will have encryption".
So, let's all assume a 1990's architecture where only corporates have networks and only use desktop computers with a hard perimeter!
Let's ignore that fact that since 2003 the Jericho Forum have highlighted the issues of the de-perimeterised network. Microsoft would do well to actually read the Jericho Forum commandments! https://www.opengroup.org/jericho/commandments_v1.2.pdf
Look at Wire, not open source, but a good raft of platform support as well as it works with my Chromebook (the acid test)
This is a vendor produced survey - so surely a little more of the scepticism the Register is famous for?
Last time I looked Gmail, Amazon, Sykpe, What'sApp all used HPPS and/or were Encrypted protocols.
So what is actually the problem?
And why do I need a VPN? Other than a vendor is trying to flog me one?
Paid the "lifetime subscription" fee and guess what - upgrades now cost.
* Have NFC?
* Have wireless charging?
* Support all the UK 4G Bands?
* Is is 4G or 4G+ (LTE-A or 4.5G)?
* Does is have a full range of sensors?
* Can it take Photosphere pictures?
* Removable media (plus max ROM & RAM) [yes, this was covered]
* Dual-SIM [yes, this was covered]
Because I agree with the above comments; Camera/Screen etc. Yawn.... Battery maybe, but lets review "flagship" phones against the flagship features.
Seems like no Band 20, so you are stuffed if you want 4G on O2
Agreed, but digital signage for the open-air (full sunlight) is at stupid pricing, so not needing to do video is fine if they can get the price down to a regular indoor digital signage panel.
The trick is to understand how to align business strategy to security architecture. Unfortunately having a rough idea and using goggle means you end up with a firewall and some boxes that often inhibit the business and security is thus seen as "the boys that say NO"
I'm sorry Trevor; "Proper information security requires defence in depth: layers of technologies, techniques, best practices and incident response woven together into the tapestry of everyday operations" may be correct for some businesses - but for most this approach is old-hat, and means kludging their architectures to take advantage of BYOD, Cloud, IoT and other such technologies that gives them strategic advantage.
The most agile companies are 100% cloud, using Chromebooks and BYOD; where is your need for firewalls, layers of technology etc.?? Then actually you need a CISO that understand Cloud Identity and entitlement, not layers defence.
But then you get what you pay for......
My submissions would be:
This is a great example of why you should ONLY use open formats. MP3 for you Music and e-Pub for your books. Yes, my Nook may only last until it dies, but I will have all my purchased content backed up and ready to port onto my next device. Will Apple be around in 10 or 20 years time? But at least my music (currently on my iPod) will be portable to whatever is around.
So now you will have to log any cash transaction over £5 with your local police station...... or have they forgotten the £63m, the €995bn and the US$1.2 trillion in circulation?
At what point does the CEO actually take responsibility for all this mess and resign?
When will hotels, restaurants and other establishments realise that people want free wi-fi that is truly free - slurping my personal data means it is not free.....
Let's all campaign for the mass adoption for openwirless.org as an SSID and simply let people connect.
Engine software (firmware) development is tightly controlled - to add a "feature" will have been tightly controlled with a specification, writing, testing and QA. All stages will have required approval and sign-off.
Thus is beggars belief it was "just a couple of rogue engineers".
If it really was a rogue addition then you should really worry about the whole production process and the rigour with which VW cars are produced.
I don't understand number 11; "Thou will be sceptical of everything on the Internet"
"We just need a little help about where the lock goes on this chastity bra"
In a very simple way, this neatly sidesteps all the technical arguments about can you put an backdoor into encryption for the "good guys" to use, and provides a really simple example of why ** ITS A REALLY BAD IDEA **
The Which customer satisfaction survey rated EE 2nd to bottom for "Pay monthly" and bottom for Pay as you go".
Lets ignore the real world top 35, and just splash out multi-millions on hardware, software and consultancy to implement a big-data, APT detection solution...... Oh, and lets not forget more billions on a GRC system.... and while we are trying to avoid actually fixing the root cause (at minimal cost) lets implement a "Cyber Threat Intelligence Integration Center" so we can share our woes with everyone else.....
But then we have always lived in an industry that is vendor driven, where common sense and getting the basics right have no part to play.
Why are the "experts" in this area not coming together to define how to work securely on open, public WiFi?
Secure protocols, with tools that switch on certificate pinning and force HTTPs only, and only allow you to connect with trusted sites must be the way to go; rather than needing to buy a VPN service from a company, as this:
a) does not solve the underlying problems, and
b) wont be used my the majority of the public, and
c) it liable to the same interception / attacks by anyone who owns the termination node.
By default, data must be appropriately secured when stored, in transit and in use - Jericho Forum Commandment #11. from 2005
Great shame to see they've forgotten about "when stored" and "when in use" - maybe in another 10 years....
As much I agree with what Which are trying to achieve, the speed is usually governed by physics, namely the length of copper from the exchange (or FTTC box) to the home.
Is not the pragmatic solution to charge for the percentage of actual speed delivered.
This if you advertise 18M for £10/month but I only get 9M then I only get charged £5 / month.
Or is this too simple?
So first, GIF is a global not-for-profit foundation, with matching charitable clauses with a commitment to everything being open source - it's exactly your first comment that means a new structure was needed.
And yes, if you read the original work from Jericho, and the white paper from GIF then you will see embedded the concepts of persona that meet the needs of privacy, primacy and agency.
Can't see why you are getting a blank web site - works for me!
Does not work on Chromebook, go figure..... As a web-based end-point surely this should be an ideal target for this technology - oh wait..... its a laptop that does not support Windows.....
No meaningful response from support whatsoever.
Closed ticket on not being able to send email, can only re-open by emailing from my email address #Doh! #Catch22
If I open new ticket I go the end of a very long queue.
Recommendations for a new domain hosting company please.
... the company will shortly be releasing a companion perpetual motion machine....
What you fail to mention is usability; I have TalkTalk2Go, Viber (horribly insecure) and Skype all as apps on my phone, in addition to the actual (standard) phone.
What I want, (and I think most people want,) is a ** SINGLE ** phone interface that works seamlessly whether on 3G, 4G or Wi-Fi.
If you suitcase is locked they will ask politely (demand) that you open it - What is the difference?
Don't carry anything through a border that you don't want to be subject to search - saying "electronic" is different is muddying the waters.
The more interesting case comes where if you are carrying a device that has encrypted material for which you do not hold the key (for example it's a corporate laptop used by multiple people one of which has received an encrypted file).
Take a look at the "acid tests" for a decent identity ecosystem, remembering business and e-commerce is global and "Verifiy" fails on all accounts.
Let's be clear, when no signal is available from my operator my phone will make call using any operator on the 999/112 number - and I believe even if no SIM is actually present?
Once you have started the call with a roaming operator then all cell handover will need to be done with that operator - big deal I can live with that restriction.
Simply mandate roaming; and Offcom can ensure that your provider pays a sensible surcharge to the roaming provider (at no additional cost to the user) - so when the usage gets too high in a particular area your provider has the ROI to upgrade, in-fill or provide new infrastructure in that area.
Market forces should take care of the rest!
The biggest advantage I can see in having an Android based UI - assuming it works this way - it that I do not need be be tied to the media sources that the TV manufacturer wants to give me and give long term support to.
Want ITV player - get it from the Playstore, want Plex again go to the store etc.
Need that latest version, no need to wait for a manufacturer supported version simply update it from the "standard" Playstore version.
If it really does work this way, then I for one, will be making my TV choice based on whether it has Android or not.
Note to the manufacture: locking me out of PlayStore and not letting me use Standard android media player apps will mean I will vote with my wallet!
If privacy is outlawed, only outlaws will have privacy.
Philip R. Zimmermann, June 1991
and it's corollary;
If encryption is outlawed, only outlaws will have encryption.
Thus if I encrypt, does that make me a bad guy, or just someone that wants to protect my privacy.
This is the start of a very slippy legal slope.
I'm running 5.0.0 on a UK Nexus 4 with no problems. Chose to do a full install from scratch. New OS is great - with some fantastic features. Minor niggles - Photosheres will not play (they just error) and the promised integration with my Chromebook has not materialised - (may be a Chromebook issue though).
Couple it with Snapgragon's BatteryGuru and the batter life is very acceptable given it's two years old.
Love the open to application from notifications on lock screen, and the ability to not lock then connected to a trusted device - car BT or BT headset.
All in all a must have.
Critical mass on content (apps) is critical, which is why there are only two OS players in town, Android and IOS. Outside of the emerging markets, no one will buy a high end phone unless it runs all the apps they want. So in the west it's all Marketing, marketing and more marketing either to pay a huge premium for an apple badge, or to differentiate my Android from their android.
Based on the iPhone 6 launch, it will be a 4:3 format service with 500 lines and only 4 channels available, but people will still be queueing around the block to but it.
Just use the Google authenticator app......
When will businesses (who want to leverage my information to make money) understand that the only person I want to be in control of my information is ME (Primacy) and that I want to be able to define who then has access to it (Agency).
See the original work out the Jericho Forum on Identity, and now being moved forward by the Global Identity Foundation (www.globalidentityfoundation.org)
The chromebook advantage is not only about cost - my 11in laptop with 9hrs usable battery life, instant on, 7 seconds boot, automatic updating, no additional costs for Office, AV, etc.
Performance - fantastic, browser faster than my BIG windows desktop, just plays 1080p video without problem etc. etc.
Yes the cost is significantly less.
Looking forward to the next generation of 13in 1080 screens, still with 9hrs battery!
Personal Data has value, thus any "Free" WI-Fi that asks for personal information is by definition NOT free and should be prosecuted under the trades descriptions act.
IMHO a good reason to support openwireless.org
An Acer C720 was my Christmas "experiment" - to see if I could live with this rather than my "full-fat" Windows 7 Toshiba. The answer is YES, including giving conference "powerpoint" presentations in off-line mode.
I only needed to buy an HDMI to VGA converter dongle for a couple of quid on e-bay.
Apart from that, the ability to just plug in my Android phone and get (configuration free) network connection means working on the road is now simple and instantaneous.
Add to that instant-on when I lift the lid, and a 7 second boot from cold, and a battery lifetime of 9 hours that means I really can do a whole day in London in meetings without needing to carry a charger brick with me.
Configuration free with no updates to manage.....
Close the lid, it sleeps, lift the lid it is ready to go; No more worrying of "will it resume"
The only thing missing is the ability to mount Windows file shares, but it looks like this will be here very soon.
Not only that, the reason for many people to replace the standard box supplied by the ISP is additional flexibility required, my list of things I need a router to do includes;
* VLAN Isolation
* Ability to configure "openwireless.org" and isolate from home traffic
* Ability to stream Linear IPTV
* USB Dongle for 4G Auto-failover
* (Nicety) Ability to directly support Fibre (FTTC)
Hence the use of a Draytek, however I would be interested how many more routers support configuration at this more advanced level.
“I think we can take lessons from how physical security has been mounted historically: something as simple as a castle didn’t have just one wall. There were layers of walls and eventually a redoubt within which the most precious items were kept,” Woodward says.
And how many working, walled cities are there in the world right now? Look at the history, the merchants and the people were too contained by the walls and simply bypassed them, making them obsolete, so now they are simply tourist attractions.
Fast forward to today, and if you put (more) security in the way of businesses (friction) then they simply go BYoD, Cloud. Parallel IT etc.
The Jericho Forum outlined this over 10 years ago and also gave you better models to implement.
But those who don't learn from history are doomed to repeat it (or be out of a job).
Works just fine, boot 6.5 seconds from cold, instant on from standby and I can work a whole day without needing to carry a charger.
Can produce documents and have done conference presentations from it - no it's not full blown windows but then E-mail, Word Processing, Spreadsheets and Presentations are fine.
OS is getting the API's added (not quite there) for mounting Windows Server File Shares - then we will see fuller corporate SOHO adoption.
Brought it as an experiment to see if it was usable when out and about - and it's been real success.
Only downside - Google Docs, import and export of Word, but then Libre Office on a PC also suffers, but then the blame should rest squarely with MS and their "open standard" docx format.
Really nice, 3CX Voice-mail will mail you a copy of the voice-mail left. However, it still (despite many requests and much grumbling on the bulletin board) support MP3, so it's a full-fat WAV file - not great over a poor (or mobile) e-mail link.
Other than that - probably the best SIP exchange for SOHO/SME. IMHO
Notwithstanding the date....
£10000 for a backup contract vs £10 for a subject access request - no contest!