Re: A colleague simply smashed the box to pieces
Well maybe it was a sort of parable about how as soon as the attacker has physical access, your security is invariably fucked...
3766 posts • joined 4 Mar 2013
Well maybe it was a sort of parable about how as soon as the attacker has physical access, your security is invariably fucked...
"Three piece Armani"
Dang it, even suits come in DIY IKEA kits now?!?
Hmmm, tough one... dunno, maybe... sprockets...?
But that's too simplistic! Are those things before or after the whooshy-spongy thing...?
Well, let me know when you've finished the Kalevala...
Attempting to start any online business with inherent local clientele limitations (like personally delivering fish ought to be) is a monumental mistake. It's fine if you're merely tacking a webpage onto an already flourishing local business but it has zero hope of ever taking off if it can't even take advantage of at least national (and preferably worldwide) market coverage...
Yeah, I do keep all my mail* indefinitely, ever since my 14400 baud modem days. What of it? My storage space, my mail, my rules. And no, I don't keep them all in the Inbox - I have a few categories in different folders, each one is a different file and that's that. Even so, compared to the whole drive's capacity, the mail folder is basically a rounding error.
* well not quite; I do get a certain amount of advertising fluff that isn't quite spam and other random notifications eg. about forum messages and such - no, I don't keep those. Anything related to an actual online transaction (ie. anything I chose to get actively involved in) or any personal correspondence is however definitely kept.
What you are talking about is the equivalent of bouncing a basketball off a moored oil tanker and expecting it to float away. Not even close.
So... be a good little sheep. Revel in your conformity. Don't have significantly different interests than your designated peer group. Or else risk getting declared a non-person. Lovely...
Yes. Embarrassing your liege has been a crime since before we invented fire. It still is. The laws proclaiming it so just happen to be unwritten, but not any less real.
For some definitions, something only counts as "authorized" access on the web if there is a way to arrive at a link saying "click here to download <thing>" strictly by clicking through from the site's main landing page. Not that I particularly agree, but things are what they are, and I can see institutions preferring to stick to this one whenever they have egg on their faces; and in a world capable of seriously debating whether linking to something is the exact same thing as publishing it yourself I wouldn't fancy my chances of judges making the right call.
I'm thoroughly astonished that there still are apparently sane adult people willing to use concepts like "honour" and "anything related to politics, government or the state" in the same paragraph with a straight face - I have to conclude it must be some kind of Stockholm syndrome. Now do excuse me, I need to lie down and laugh uncontrollably for the rest of the day.
Well maybe the plumb line broke and they need hang a new one from the top of the rocket. I mean, that's why rockets are so bloody tall, isn't it - so they can house a super-long plumb line inside for extra-precise detection of which way "up" is...?
No. They're busy conducting talks for taking over Geocities.com
Of course those things do go together: it's just that the first is the consequence of the second...
"local structure anomaly"...? Don't those tend to decay into a "global structure anomaly" with a very short half-life...?
Maybe he meant "life is a lemon and I want my money back"...? Hard to disagree with that...
"how would I know"
There's a simple test; just start watching FailArmy videos - if you hear a faint "blyat!" after each gag from your router, it's probably compromised...
Oh boo-hoo. And punched cards held mere bytes. Yeah, the 8" floppies on our CP/M Z80 boxes held stupid little, but it's irrelevant - by the time buying a HDD for a home computer was a thing that even non-NASA personnel could reasonably do, nobody used anything other than 1.44 floppies; compared to which 40 megs were a luxury, but a vewwy-vewwy modest luxury indeed. Nobody I knew walked around with less than a full box of floppies by then, and when your existing data instantly takes up over a third of your allegedly humongolicious new HDD, starting to longingly ogle one at least four times as big before you even installed this one is what you do, not expecting it to never fill up.
"I bought a 40MB HDD [...] I was never likely to fill"
Considering floppy disks used to carry 1.44 megs meaning 40 megs held less than thirty disks, and even back then a single floppy held basically not a whole lot of anything, that sounds a tad bit optimistic if said PC was meant for anything beyond Haiku storage.
From random vans? No idea, never tried. From a passing cab? Hells yeah!
"we will have to buy a new phone of some kind or else run the risk of being pwned"
There's your mistake right there, assuming that buying a new phone you're somehow magically free of the risk of being pwned. Actually, ANY statement extolling the security benefits of new phones beyond a simple "older = more pwnable" is highly arguable regarding the exact amount of "additional protection" they are supposed to be offering. No amount of money in the world can buy you "security". You cannot achieve it. You cannot get anywhere near it. You can only get very, very, very, very, very, very slightly closer...
It may well work like that now, I wouldn't know. That said, My Galaxy S2 started shipping with Gingerbread, got upgraded to Ice Cream Sandwich, and currently keeps marching on Jelly Bean. Not a bad run altogether I'd say.
@veti how dare you suggest using one's own head! These days both (all) sides agree that you're either with them unconditionally, or part of the problem...
Unfortunately in today's Network-Based Everything there is an alarming number of genuinely useful apps that are legitimately useless if you don't allow them network access. What then? And no offense, but which "firewalled" app is prevented from launching the system browser at the URL "http://www.shadysite.com/?ScrewNetworkPermissions=true&UsersPhoneNumber=123456"...?
Dang it, ninja'd by half a day... *redfaced* ...say, can I buy you a pint...?
Screw tunnelling through the Sun. Let's just use gravity wave comms...!
To be fair, while the pucker factor of restarting something like this so far away is never going to be zero, it shouldn't exactly be that hard to make something damn near update-proof*. Just make sure you have enough memory to store at least two whole OS images and ensure that unless the updated OS can present suitable proof of successful two-way comms with Earth within a convenient time frame following an update (or on an ongoing basis), it gets mercilessly booted by a hardware watchdog** back into the original OS image which tells you this and asks "okay, now what?"
*don't even THINK about "completely update-proof". No such thing. The Universe is on Murphy's side.
**by which I mean multiple redundant independent watchdogs of course. Paranoia IS a virtue.
Sorry but I find it hard to trust all the "keys of the kingdom" to a specification (U2F) containing phrases such as "assuming the browser is working as it should", especially in the same sentence as "this is a critical privacy property". Furthermore, as long as U2F in practice seems to mainly just mean "Yubikey", which specifically chooses to base the security of every single account you entrust to it to ONE single, common, fixed (to the key) secret, I won't be using any of it thankyouverymuch. Especially seeing as how they still want me to remember a per-site password, completely eradicating the need of which being the absolute minimum I would expect in exchange for agreeing to keep all my eggs in a single basket that isn't my brain.
That's quite ok, would you like to buy some of my consumption-randomizing desktop UPSes? They also have embedded AI that starts beeping like crazy as soon as it detects suspicious patterns in the consumption of the attached load! The AIs even share their experience securely, via blockchain...!
Oh, those should be easy to recognize if you know what to look for - Hollywood taught me all those have a company name that includes two adjacent "O"s painted on their sides in large, friendly letters to mask the holes where you're supposed to stick the binoculars out...
Find will for me forever be associated with having to look up Yet Again how to redirect eleven hundred pages worth of "unable to open" to /dev/null. Until the next time I need it, when I duly have to look it up again. As for locate - it can find absolutely everything under the sun in the current- and any number of parallel dimensions, _except_ the exact file you're looking for.
Screw Norton. Volkov Commander for me! (Well ok, these days I accept MC as a substitute...)
Ah, you're right - I forgot search isn't spelled "Agent Ransack" by default in windows...
...How come the first commit to the vulnerability's "Github repo" dates several months back...? How long have they been keeping us in the dark?!? Soylent green is people...!!!
Motherboards with 7-segment LED displays do exist, but they're by far the exception, not the rule.
Based on the laws of natural selection I predict that the first true AI will be a system developed to write convincing AI research grant applications...
Well, you could have chosen to go fashionably noir instead and propose "a bathtub full of acid"...
"We can discuss these with them, but we cannot force an intelligent being to do something against their will."
Oh, really? Robocop would like to have a word with you*...
* starting to argue on what is and isn't possible with an intelligent brain while we have hardly any idea what either of those two words really mean is not a worthwhile use of anyone's time IMHO. But placing constraints on intelligence is definitely a neither novel nor unexplored concept.
It's not really complicated though. "What can we possibly do next to delay slowly sliding even further into irrelevance? Quick, throw some fashionable buzzwords at me...!"
Are we back yet at "it's a Unix system, I know this"...? More prosaically, does anyone still remember VRML? From the era when people thought Second Life and its ilk is the Next Big Thing...? Do we need to go all the way back to Microsoft Bob...? Yes, I grok the great deal of mental comfort provided by using a familiar paradigm; unfortunately the concept of "things nicely laid out in 3D space" invariably turns out to be a much, much inferior paradigm to the ethereal alternative of "there is zero distance between any two object connected through a single click".
In practice, 3D's superior storage density based on its extra dimension compared to 2D inevitably turns out to be an illusion as soon as we need to access any of it - a 2D surface is something humans can perceive and interact with in its entirety, while a true 3D one (that doesn't just decorate 3D walls with 2D windows) isn't; you can see all objects in a 2D matrix at a glance, but the first layer of a proper 3D matrix of objects would be obscuring everything behind it. And making everything transparent would just serve to confuse things even worse - I'll prefer a browser with thirty tabs any day over one with thirty windows overlaid on top of (or behind) each other. The specific relation between each object and all the others that 3D seeks to preserve and express simply doesn't exist in the amorphous world of ones and zeros.
IMHO as long as we are attempting to replicate things from the real world in the form of VR (or especially if we are attempting to pull data out onto the real world AR-style) 3D does make sense in computing - but as soon as we start dealing with abstract concepts related to pure-data-in-a-box, 3D immediately becomes more of a hindrance than an advantage regardless of how attractive it may seem at first glance.
Obligatory flashback to the comic strip with the (from memory) "here's a nickel son, go buy yourself a real computer..."
You mean compared to the list of updates I just applied on Debian which at some point modestly noted: "A reboot is required to replace the running dbus-daemon. Please reboot the system when convenient."...?
I'm trying to picture this hypothetical crystal pyramid and somehow I keep seeing the sort of visuals associated with the original Battlestar Galactica's Cylons (best viewed through welding goggles)...
"Because it's there"
How odd the same never seems to apply to certain other contexts like eg. "why wash those dishes"...
What they should have done was reserve the name "Autopilot" to their fully autonomous driving tech (if they do indeed have that capability) and call their non-autonomous assist features something more reasonable and intuitive like "CO-pilot".
Holy shit, that section of road is murder materialized! I saw the setting of the accident before so I knew what to look for and yet watching the "recreation" the first I realized anything at all is wrong was when the guy dropped the camera and hit the breaks. By the fourth re-watch I could see where the lane split marking were supposed to be, but they're dim as fuck, I would have probably completely missed them the first time around even driving personally. Yes, a fully self-driving vehicle would need to be able to detect that, but I'm not particularly surprised Tesla's glorified lane assist didn't. Crash barrier or no crash barrier, the absolute non-negotiable bare minimum that road needs there at all times is a long string of traffic cones in that "lane". And some actual fucking paint.
No they don't. Maybe they do where you live. Sure as fuck not where I do. Strangely enough, that's the sole point of the existence of marked pedestrian crossing points. No idea how it works in the US, but considering the mere existence of the term "jaywalking" your odds don't look good.
Not really, no. The whole sensor package looks mounted to the front section on the roof. There isn't any roof in front of it to block anything. I would expect the whole "blind spot" to be on the order of "something shorter than a foot, within two or three feet of the front bumper".
LIDAR maker CEO waxing about the indisputable need for more of its wares... laughable. That single one should have been perfectly capable of detecting the pedestrian, and I'm pretty sure it did too - at least at LIDAR reflection level. Why that never resulted in the car breaking is the actual million dollar question.
Biting the hand that feeds IT © 1998–2018