Re: GnuTzu - Proxy
Why do you think google invented hsts and hpkp?
102 posts • joined 28 Sep 2011
Google’s rationale is “can we virtually wipe every implementation off the planet?” or “can we harvest loads of juicy data to make a profit?”
If both of those are “no” then in the bin it goes. If they manage the first, and the second is still “no” *then* they bin it...
1) yes there are but that's not an unfixable problem and it should be sorted from a perspective of public safety
2) multicast is your friend
3) yes, fair point
4) pretty much all mobile handsets support IPv6 today, if the networks are still dragging their heels after over 2 decades then that's a very different problem and ultimately they aren't going to fix it without demand
So basically there aren't lots of reasons, there's one - the cost of internet access.
Labour *DID* bring in an ID Card system, it was scrapped by both the Tories (on financial grounds) and the Lib Dems (on the basis of civil liberty/privacy concerns).
Had it been merely an ID Card which establishes that the owner is who they say they are and a PKI cert so the owner could do the same for online transactions (exactly as they do in many other countries) then we'd probably still have it and there wouldn't have ever been a problem for most people. It would be quite useful for the homeless I'd have thought (once their ID was initially established, which is not always trivial).
Unfortunately that is not what we got... instead what we got was a vastly overreaching biometric database that logged every time it was accessed (forever) that could not be proved wrong in court (leading to an effective end-run around habeas corpus), that broke the web of trust based around other forms of ID, provided a single point of failure/weakness for identity theft and was really a multi-billion pound boondoggle for whoever got the backhander from Crapita.
I loved my 930 too, there are still things you could do *really quickly* with it that you simply cannot do with the iShinyThing (which is what I moved to when the battery just died one day, and landfill android never really appealed.)
Many of the layouts were just intuitive, connecting to APs was a doddle, the built in social media integration from early on was just something else and I really liked live tiles.
Ultimately what killed it was politics, they could have got over the kernel pain eventually - but the phone guys weren't in Nadella's 'tribe' and anyone who knows about the inner workings of MS will know that the tribalism is fierce and the victors are rarely gracious.
I tried it once, blocking google and all their other insidious services (entirely) is utterly impossible.
Don't believe me? Try it for yourself. The products you directly use, search, mail, maps are easy switches. The products you don't see (like analytics) you can lose easily. What about the stuff another site uses? fonts, api's etc all of a sudden things get very complicated!
Interestingly the whole debate you bring up centres around the products we choose to use, the bigger concern is surely the ones we don't and that we can't choose to avoid, try to decide you won't use any google services, blackhole their ASN at the gateway and see how long you last trying to get anything done online... it's a fun experiment if nothing else to determine how reliant you are on them.
TFM - It's hardly unknown that you saw the behaviour you did, that's how .doc works...
Rewriting big documents was very slow at the time .doc was conceived (think of users storing docs on floppy-disk) and both to make the saves quicker and to keep autosaves from interrupting the user the best way is to use a quick-save that just saves changes to the end of the file. Word would tidy up if you use 'Save As' instead of the normal 'Save' even if you use the same filename/type.
It has only been that way for as long as I can remember (right from my earliest PFY role back in the last century in the days when BOFH was in print.) Many pieces of juicy information could be had from documents back in the day - our government had to answer quite a few very awkward questions about the people who worked on "the dodgy dossier" as a direct result of metadata and edit histories found in the files...
What you're forgetting is that it is not always you that is using google or giving your data to them.
Go to the widget maker online shop and they have a map to their store - from googlemaps.
That cool font - from googlefonts.
That instruction video on how to use the widget - youtube.
...and so on. You think none of those are giving the goo your very useful marketing data in a way that you actually cannot opt out of if you want to actually get anything done?
There is far more to not using google than just not using their products and services directly. Block their ASN in your firewall then wait & see how long you last before you need to make an exception...
Have to agree with you there - I loved my 930 until the hardware gave out on me.
I trust Apple slightly more than Google when it comes to data slurping (though not much) and the use of the mach kernel rather than Torvalds hobby/experiment-turned-popular and I've now taken a dive into the walled-garden. It's amazing how intuitive the windows phone OS really was to do common tasks quickly - it was designed very much as a tool and not a toy. There are times when I try to do things on the iPhone and think "this is a ballache, my 930 would be done by now."
Microsoft were just starting to get it right when Nadella took over, at which point anyone who knows MS knows that the infighting and empire-building that goes on there is the stuff of legend and Nadella was never going to miss an opportunity to get rid of an opponent.
True that - I have a single key shutdown button on my keyboard, to make matters worse it also happens to be mapped to F4 which requires an 'fn' button to access the actual F-key behaviours... that box has gone down more times by accident than on purpose.
this nugget of wisdom from el-reg itself.
"Our testing produced very little evidence that registry fixers and third-party defragmenters do any good at all, although other users with serious computer problems may experience otherwise."
As such if I ever see a machine with CCleaner on it, I assume it is borked and due for nuking. :)
The issue is (and something that happened in the TalkTalk fraud attacks to a neighbour of mine) was that those scammed had initiated the call to the ISP and were then expecting a call back from a senior technician. They just got the call from a scammer instead; expecting a call from the ISP and without any technical knowledge they had no reason to doubt that's who was calling them until it was too late.
You missed a hell of a lot. I really do sound like some kind of tinfoil-helmeted nutter when I get onto the subject but I have a simple test - google say if you don't like their services, don't use them.
Try it - blackhole all routes to Google's IP space (the info's available online) and to their DNS servers... and then try to go about your normal daily business. I give you a matter of minutes (at most) of trying to get something done online before you need to open an exception even if you claim not to use their services.
Only when you really disconnect from them and get yourself out of their direct sight will you get even a rough idea of how much you actually give up to googles services. But that only covers the half of the equation which is the data that YOU give them directly. That doesn't begin to touch the data that other people add to their services about you - which is where things get *really* tricky.
just a little bit. It's an extreme, harsh and utterly illegal way to encourage vendors to deal with their security issues, but perhaps a shedload of support calls and returned 'faulty' items might get their attention.
...then again pigs might fly past satan skiing to work first!
...for a given value of 'premium' they are what people claim them to be.
If, like many of those people, your only experience is the typical SOHO crap like the usual D-Link, Buffalo, and Netgear (not even mentioning the no-name crap) it is a vastly premium product set with some big-ticket features for a low price, and you can run the server end on a raspberry pi. Most of those people will never see a big wireless installation.
Hahahaha! You'd think wouldn't you. No independent testing. But about this time last year it turned out that a huge number of the devices had to have their encryption keys changed as they were using THE SAME KEY... That is the level of competence behind this little endeavour.
We had an engineer come out to change our meter who couldn't understand why we wouldn't have one. After I showed him a couple of articles I think he may not be so keen any more.
Biting the hand that feeds IT © 1998–2020