* Posts by JeffyPoooh

4286 publicly visible posts • joined 28 Jun 2013

How the FBI will lose its iPhone fight, thanks to 'West Coast Law'

JeffyPoooh
Pint

Good video explaining it...

Computerphile...

https://www.youtube.com/watch?v=6RNKtwAGvqc

Fifth time's the charm as SpaceX pops satellite into orbit

JeffyPoooh
Pint

"How are we going to get to the Moon if we can't talk between two buildings?"

How are we going to get to Mars if we can't get a video feed feed back from a barge parked just 600 miles off shore?

Hint: A 2nd smaller barge, stable for satellite feed since rockets aren't landing on it, with a ~1km fiber optic cable from one to the other. Easy.

Uncle Sam's boffins stumble upon battery storage holy grail

JeffyPoooh
Pint

"much-vaulted"

"...Musk's much-vaulted Powerwall battery packs for houses..."

I believe that you spelled 'much-ridiculed' incorrectly.

Only the gullible innumerate are falling for Musk's 'Battery Seconds Disposal Program'.

We survived a five-hour butt-numbing Congress hearing on FBI-Apple ... so you don't have to

JeffyPoooh
Pint

Re: counting attempts

"...the number of wrong attempts must be written somewhere non-volatile."

One of the presentation videos on CCC.de has the hacker/cracker illuminating an individual non-volatle memory cell (one bit, a flag) within a de-capped security chip to reset that security state flag bit (with light).

That's the sort of unforeseen approach that's used to get into a system with 'infallible' security. They might need to invent or discover something for the iPhone 5C. But there's always a way, unless this is the very first device with perfect security (seems unlikely).

Nothing to do with brute forcing. Seems to take days or weeks, not trillions of times the life of a universe filled with etc etc etc.

They'd certainly want to buy a box of phones to practise on, before their one-shot at the subject.

We're doing SETI the wrong and long way around, say boffins

JeffyPoooh
Pint

Re: Interstellar missionaries

CH "I wonder how Richard Dawkins would handle that?"

Give him 48 hours and he'd have them all converted to Atheism.

$17 smartwatch sends something to random Chinese IP address

JeffyPoooh
Pint

Re: I think I'll buy one

"...watching the accelerometer data trying to work out if I'm watching porn."

Send them accelerometer data that integrates to something like ~35cm of apparent motion.

Brit uni rattles tin for ultra-low latency audio board

JeffyPoooh
Pint

Ultra Low Latency

Advanced machine-level software, ...or the user could stand a bit closer.

Microsoft releases Windows 10 preview for Raspberry Pi 3

JeffyPoooh
Pint

PCs fading away...

Soon a PC will just be the fat lump in the HDMI cable.

The year after that it'll disappear into the HDMI connector.

Car-makers, telecoms bodies push standards for self-driving vehicles

JeffyPoooh
Pint

Re: Reliable communications, heh?

It'll need new magic 'Better Than GPS' (for lane keeping, accuracy 30 cm) if the idiot-car can't see the painted lines on the road.

JeffyPoooh
Pint

Re: WTF

@tnovelli

"...all this talk of autonomous vehicles seems infinitely premature."

I salute you. Have an e-beer.

JeffyPoooh
Pint

Re: Dumb idea?

GC not hq "Do you really believe that the people working on self-driving cars have not realised this?"

Yes.

My assumption is that they're idiots.

In related news, a Google car caused a crash today. Their accident rate per million km is presently higher than mine.

JeffyPoooh
Pint

New line of code added today to Google self-driving cars...

"Yield to buses."

Google car caused a crash:

http://www.bbc.com/news/technology-35692845

New York judge blocks FBI demand for Apple help to unlock iPhone

JeffyPoooh
Pint

"...extraction of data rom devices..."

...from...

Google robo-car backs into bendy-bus in California

JeffyPoooh
Pint

Re: No, just a failure of machine thinking.

You're right. The author is bending over backwards trying to find a reason to excuse the failure. The section you quoted is simply ridiculous.

Furthermore, why was the idiot car backing up ? "Ooh, there's some obstacle in my path. I've stopped too close. Now I need to back up and crash backwards into an oncoming bus."

We'd better get used to this.

Microsoft sneaks onto Android while Android sneaks onto Windows

JeffyPoooh
Pint

Re: The future creeps closer...

Would it help if I clarified that 'eventually' is likely at least ten years out? Maybe 15-ish. Certainly less than 20.

To me the trends are crystal clear. Emulation. Virtualization. Moore's law. Etc. It all comes together in a few years into a big schmozzle where stale-thinking OS-as-religious-beliefs get utterly trampled.

Most apps will run under any of several OSes, unpacking themselves accordingly. OSes will accept apps from other OSes. OSes will themselves be apps. Apps may bring along their own OS. None of this requires more than a couple steps past where we are now. Obviously.

Cheers.

JeffyPoooh
Pint

The future creeps closer...

Eventually, most OSes will just run each other's apps (possibly interpretively), or each other, or layered-on copies of themselves. How about sharing hardware and running multiple OSes at once in parallel? Future CPU speeds will certainly allow almost anything.

Last time I posted this sort of prediction, I was heavily down-voted by the near-sighted.

Complex chips and crash-proof computer pioneer Edward McCluskey dies

JeffyPoooh
Pint

Self-driving cars?

For the next decade or two, the software faults in the top level self-driving algorithms will so dominate the self-driving fault / crash space that the computer hardware could be made from fragile vacuum tubes running wobbly Windows ME for all the difference it would make.

Eventually these concepts would rise to significance, just don't hold your breath.

And in related news, a Googly self driving car caused a crash today. Not just involved, but caused.

Microsoft scraps Android Windows 10 bridge, but says yes to Objective-C compiler

JeffyPoooh
Pint

Re: "2 bridges was 'unnecessary' says dev platform VP"

As written, it's clearly a plural ("2 bridges") followed by a 'was'.

It could have been written "Having two bridges was unnecessary"; but it was truncated into incorrectness.

"The idea" (offered as a counter-example) is singular. Thus perfectly non-applicable.

Anyway, by Godwin's Law, I win this debate anyway.

JeffyPoooh
Pint

"2 bridges was 'unnecessary' says dev platform VP"

Was they?

European Patent Office still in nosedive as union denies reaching deal

JeffyPoooh
Pint

In a nosedive since 1909...

Patent Offices in Europe peaked in about 1905.

They really started their nosedive in 1909 when Al left for other opportunities.

Apple TV can p0wn you in more ways than it entertains you

JeffyPoooh

Re: Does this mean...

AC: KODI vs AppleTV = false dichotomy.

Why limit yourself? Get one or two of each. They're all cheap.

They'd each have their own strengths and weaknesses, or unique content offerings.

Just buy TVs with plenty of HDMI inputs.

JeffyPoooh
Pint

This means...

10 PRINT "This means that it was believed to be secure, but it actually wasn't."

20 PRINT "But now it really is secure."

30 DELAY (RND)

40 GOTO 10

Dead Steve Jobs owed $174 by San Francisco parking ticket wardens

JeffyPoooh
Pint

"CEO of Uber Travis Kalanick, who is owed a significant $510..."

Uber CEO owns a car? That he has to park? Sometimes illegally?

Really?

Has his own car to avoid those sometimes violent Uber drivers?

California methane well leak filled a Rose Bowl a day

JeffyPoooh
Pint

Re: Pressure

PV=nRT

One of my favorite equations.

JeffyPoooh
Pint

According to a review of the numbers, read on a tech forum...

No question it was A Very Bad Thing, and - yes - we should strive to reduce methane emissions as a top priority since they've got such a large multiplier over CO2. Such things must be discouraged. Etc. Etc.

But reportedly its impact is clearly insignificant on the global scale. Mostly because it was a relatively short term source (as opposed to endless). It doesn't begin to compete with other methane sources in the long run. Reportedly...

If you dislike paragraph 2, then please reread paragraph 1.

Building a fanless PC is now realistic. But it still ain't cheap

JeffyPoooh
Pint

"...now..."

"...now realistic..."

CPU/GPU performance per watt improvement is a steady trend, any demarcation point is obviously arbitrary. People have been doing fanless PCs for years already, while others will insist that they will need PCs with several fans for the foreseeable future.

So I take issue with the word 'now'. It implies that this demarcation point (26 Feb 2016) is somehow silently assumed to be superior, or somehow more appropriate, to anyone else's demarcation point (past or future).

It's arbitrary.

90% of SSL VPNs are ‘hopelessly insecure’, say researchers

JeffyPoooh
Pint

Re: Clickbait.

DropBear on El Reg "...script... ...(zero pictures btw.)..."

What!??

The pictures are almost always hilarious, sometimes subtly hilarious which makes them even hilariouser.

Oftentimes they're the perfect representation of a famous meme.

One does require a sense of humour to enjoy them.

JeffyPoooh
Pint

"...outdated encryption..."

"...outdated encryption..."

The word "outdated" papers-over a recurring theme in the history of cryptography.

It often refers to an encryption standard that was once believed to be secure, but was then subsequently shown to be less secure than was once imagined.

Preempting your next thought: Almost all of the time, at least in the history of modern cryptography, the 'outdatedness' has NOTHING to do with the progress of Moore's Law and 'brute forcing'. More often it has to do with the cryptanalysts beavering away until they uncover the seemingly-inevitable subtle flaws; either in the fundamental algorithm, some particular implementation, or (in some applications) an unacceptably high risk of operator error.

Too many have the incorrect impression that the deterioration over time of an encryption standard is due only to some external process, like the weathering or erosion of a big rock. In fact, 'the rock' was typically internally-flawed from Day 0. The subtle flaws are eventually exposed by close examination, which may take several years.

The timing of the public pronouncement of 'outdatedness' often comes down to motivation (effort, speed) of the crackers, or even if they wish to keep their success a secret for a while (e.g. Churchill and the Enigma, kept Ultra Secret for decades). An encryption standard may actually be 'outdated', but hardly anyone is in on the secret.

The adjective 'outdated' tends to support muddled naïve, wishful thinking about whatever cryptography algorithm is the present standard du jour.

Sometimes the best adjective would be 'flawed'.

Randomness is a lottery, so why not use a lottery for randomness?

JeffyPoooh
Pint

RANDOM.ORG

"RANDOM.ORG offers true random numbers to anyone on the Internet. The randomness comes from atmospheric noise..."

But (as already mentioned) you need to keep your random number a secret. Lotteries don't do that.

PS: RANDOM.ORG at least uses 'https', in case the 's' helps a bit.

Hijack wireless mice, keyboards, with $15 of kit and 15 lines of code

JeffyPoooh
Pint

Re: @DropBear

Which is why I closed with: "...Your post may lead some to make that mistake."

There are plenty of people that make the logical error of confusing difficulty with security.

Since you were describing difficulties, I thought I'd make the point.

Cheers.

JeffyPoooh
Pint

@DropBear

Typically these very complicated steps need to be done once, by someone, and then published.

Then somebody releases the attack as a 'script'.

Then the script kiddies just 'Click-Click'.

It's a mistake to assume that every attacker needs to start from scratch.

Your post may lead some to make that mistake.

JeffyPoooh
Pint

"...Travis Goodspeed documented[1]..."

Style Guide: no point including the reference ("[1]") unless you include the citation to which it points.

Reminder: How to get a grip on your files, data that Windows 10 phones home to Microsoft

JeffyPoooh
Pint

"...why apps and services crash."

For some folks, still stuck with a low bandwidth connection (e.g. dial-up, cellular, or even 2400 bps Iridium) to the 'net, the crashes are probably caused by their connection being completely plugged up with all this 'telemetry' data.

Does setting a 'Metered Connection' flag automatically turn off all this rubbish?

It really should be fully integrated in the OS. Set one (for example) 'Dial-Up (56kbps) Connection' flag, and the OS should configure itself and installed apps to minimize traffic.

It should have been implemented decades ago.

Lithium ion batteries banned from passenger aircraft holds

JeffyPoooh
Pint

Re: Bad assumption on some of the proposed solutions...

"...rob the lithium of oxygen ."

A typical 18650 Li-ion cell (super common in laptops) might be something like 3.7 volts and 2000 mA-hour. So it contains within it (when charged) about 7 watt-hours of energy, roughly. If it internally shorts out, due to contamination, damage or random what-not, and that energy is all discharged in, say, one minute of excitement due to an internal short circuit, then that's roughly 400 watts of power, over one-half horsepower, being liberated in that minute. It could be in a hard vacuum, and it would still be very exciting. It wouldn't last a minute. It would vent and/or explode. Might trigger off the neighbouring cells too.

Random factoid: Lithium primary (non-rechargeable) cells as used in some avionics (INUs, ELTs, etc.) are now often LiMnO2, and they're usually certified very safe. Plus or minus the occasional smoldering ELT in a 787 parked at Heathrow.

Ref https://www.gov.uk/aaib-reports/aircraft-accident-report-2-2015-boeing-b787-8-et-aop-12-july-2013

JeffyPoooh
Pint

Bad assumption on some of the proposed solutions...

The nickel-studded mentioned in the item is a solution (like many) that is based on an assumption that the short circuit is outside the cell.

But some of the more-famous failures (cough Sony cough) have been caused by metal particles causing shorts through the insulating film INSIDE the battery.

There's next to nothing that can be done about such internal short circuits, except to invent some new-fangled self-limiting or self-extinguishing action within the cell materials.

Wi-Fi operators must notify device users of potential data processing

JeffyPoooh
Pint

Re: Potential?

If it's not free, how would one avoid revealing identifying information?

Pay with Bitcoin?

JeffyPoooh
Pint

"...reveal data about people's location..."

Using a Wifi hotspot.

.: They're probably in the area.

Latest in Apple v FBI public squabble over iPhone crack demand

JeffyPoooh
Pint

"... the data in the memory chips is not encrypted."

That's ---^ where you went wrong.

I believe it's very likely possible to 'crack' their way past the phone's security, but I don't think it's "very easy".

My assumption is that it's very unlikely that there's not at least several subtle implementation flaws. History of cryptography indicates that it's almost a general rule.

NSA data centre brings 300 million daily security scares to its Utah home

JeffyPoooh
Pint

But on the bright side...

Utah has really good connectivity to the Internet.

Is DNSSEC causing more problems than it solves?

JeffyPoooh
Pint

Specifications, the long road to perfection...

A specification is only perfect when it's infinitely long, but then it's too long.

What we all really need is an SD card for our cars. Thanks, SanDisk

JeffyPoooh
Pint

Re: "as well as remotely monitoring the thing "

A4 "Or does it include a GSM modem ? That would be interesting."

There are, as you may know, SD memory cards with Wifi built in.

It'll be at least a couple more 'Moore cycles' to get a GSM modem built in. Where would the SIM card go? ;-)

JeffyPoooh
Pint

Re: Copy Protection

E.S. "...copy protection / DRM support... ...maps... ...eBay..."

Such DRM measures should delay the inevitable for about 4 to 6 hours.

Well worth the effort.

JeffyPoooh
Pint

Re: Car interior temps

Smooth Newt "...but then I only drive around Slough."

Ah, home of the famous 'Peppermint Hippopotamus Club' from that Top Gear Challenge.

Nice.

JeffyPoooh
Pint

Re: Car interior temps

cirby "... -40°C (found in some parts of the world during winter)..."

As opposed to -40°F ? :-)

PS: Much of Canada. Thankfully not the part I'm in.

FBI says it helped mess up that iPhone – the one it wants Apple to crack

JeffyPoooh
Pint

Re: Speculation?

Keef asked "...most downvotes..."

Nah, you have to denigrate Linux (which is a really stupid OS, by the way) to get lots of downvotes. In recent months, my best was:

"...your Master Boot Record was delicious." 7 thumbs up & 24 thumbs down

Good luck.

US DoJ files motion to compel Apple to obey FBI iPhone crack order

JeffyPoooh
Pint

Re: Surely...

AC (John?) "...as yet unproven assumption that Apple has made the sort of trivial errors that would indeed reduce the available keyspace."

The latest crypto and latest implementations are just the latest in a very long line.

It's called Inductive Reasoning to see the sun 'rise' in the East every morning and leap to the unproven hypothesis that it'll almost certainly continue to 'rise' in future mornings.

It's extremely unlikely that the iPhone 5C will end up in a museum as the very first perfect implementation in history.

In fact, the Feds have already identified an attack vector. It's underway and they're very likely to succeed.

There would be 'N' such attack vectors. The theory that 'N' = 0 is extremely unlikely.

"...trivial errors..."

The crackers find implementation errors that are sometimes trivial (often only in hindsight), but sometimes they find implementation errors are unbelievably subtle. Other times they're exploiting an inherent physical or design weakness, that may have nothing directly to do with the security designers.

The attacks do not "reduce the available keyspace" (you're still stuck in that same limited thinking, sigh... seriously, please stop...). The side-channel attacks often reveal the key almost directly. The key could be a million bits and their attack would still read it out bit by bit.

Just because I can't be arsed to give you anything more than a quote from Wiki, it doesn't mean that I don't have a shelf bulging with books on the history of cryptography. Cryptographer-Hubris is a recurring theme in history. I'm here to make the world a better place by gently mocking such dangerous cryptographer-hubris.

You'd be a better person if you drop the naive faith in cryptography. Learn the endlessly recurring history. We've been through this exact same cycle so many times before.

(Unless you're a terrorist. Then, please... ...trust the crypto fully.)

JeffyPoooh
Pint

Re: Surely...

John H Woods = this post has been deleted by its author

Seriously?

Boss reminded you not to post crypto topics from work? Your work being in GCHQ?

JeffyPoooh
Pint

"...key hidden away in a secure chip that....without self-destructing..."

AC "Even if the key hidden away in a secure chip that can't be removed or decapped without self-destructing, thus the ONLY place the encrypted memory can be read is on the actual device?"

Congratulations! You're clearly NOT a hardware cracker! Yay!

Neither am I. But I've seen how they work. Because I have Internet, a video player and *interest*.

One video I saw was cracking a 'totally secure' SmartCard. The card processor had all sorts of physical roadblocks. It took him almost four hours to get the keys out. All friggin' morning. Crikey!

Try CCC.de Media. It's a goldmine of presentations.

It'll shake your worldview to its core.

JeffyPoooh
Pint

"...device in your possession... full control... anything can be broken..."

partypop69 "Whenever the device in your possession you have full control, I don't care what encryption it has, anything can be broken."

Agree.

Anyone that disagrees needs to spend some remidial education time on CCC.de Media presentations to address their missing background understanding of the real world.

What's really shocking is how quickly the hardware-in-possession crackers can crack. Days or a couple of weeks, done and dusted.

Cryptographer-hubris is dangerous. It's an attitude that needs to stamped out.

Cryptography-Keyspace fanboyism ("...10^77 years!!") is just annoying.

JeffyPoooh
Pint

Re: Honest Question

John H Woods - "The 'serious' encryption is universally the XOR function -- No, it isn't."

At its heart, yes it is.

Advanced Encryption Standard: "...InitialRound - AddRoundKey - each byte of the state is combined with a block of the round key using bitwise XOR." "The subkey is added by combining each byte of the state with the corresponding byte of the subkey using bitwise XOR."

Note the "XOR" mentioned.

Yes, there's also some shuffling and such. But it's nearly universal that there be an XOR function at the heart of any cryptographic system, ...obviously.

You were clearly incorrect in your rebuttal. Clearly.