* Posts by Bartholomew

62 posts • joined 10 Dec 2013


Intel TOCK BLOCK: 10nm Cannonlake delayed to 2017, bonus 14nm Kaby Lake to '16


If you can't go smaller, make more and/or build skyscrappers.

My prediction is that the next step will be 64,128, 256, 1024, 2048, 4096, 8192, 16384, 32768, .... cores on a single piece of silicon, keep the size small, to keep the power usage low and the switching speed high. Also small means less complex clocking, where the entire circuit is much much much smaller than a wavelength of the clock, and the clock level can be approximated as constant over an entire core.

Another option is to build the chips more in the Z direction. We use to have mostly single sided PCB's 40+ years ago (still used in PSU's), these days they are like 4-38 layers on PCB's. Each extra manufacturing step adds a risk of defects. What really needs to happen is new methods for defects to be repaired, tolerated or bypassed.

Private cloud is NOT dead – and for one good reason: Control of data


If the value of your company is in your data, or having access to your data, having to rely on the public Internet for access would be a very foolish move.

Well YES, Silicon Valley VCs do think you're a CRETIN


Re: Dumb question

Short answer is either.

You can mine individually, and if you solve it first and get added to the blockchain first then you win the full finders fee reward.

Or you can join a pool, where the pool distributes the work to search for the next valid block to all the machines in the pool and they search together in parallel in different parts of the search space and if any machine in the pool finds the next valid block (and gets added to the blockchain first by the pool) then you will gain one Nth of the reward. Where N is the number of machines in that pool searching at the time that the block was found, and the pool gets to keep a tiny amount as well, so it is slightly less than one Nth that you will get.

The first way, for example - depending on your computing power, you may find on average one valid block every 2 years. The second way, in a pool, you will gain 1/(2x365.25) of the reward for valid blocks a day on average.

Give biometrics the FINGER: Horror tales from the ENCRYPT


When someone compromises your password, you can change it.

The real problem with biometrics is once it is compromised, it is not like you can change it. Unless they perfect altering DNA and not killing the subject.

Have YOU got Equation NSAware in your drives? Meh, not really our concern, says EU


Re: Business Opportunity

So add a tiny prom who's sole purpose is to either read back and dump the firmware or just generate and return multiple hashes the eeprom firmware (MD5,SHA1,SHA256,SHA512). One checksum can be faked with enough computing power but by returning a few of them calculated by different algorithms it would make it exponentially more difficult by multiple orders of magnitude with each additional checksum.

It sounds like a good idea.

Of course this could be circumvented by measures to fake the calls in the host OS. Hard to kill every workaround.

Linux chaps want to recycle your mobe as a supercomputer


least expensive bit

5 years is about the useful lifetime of most supercomputers. And the big cost is usually running a supercomputer, the ongoing power and cooling is easily 5+€/£/$ million a year. Throw in a 6+ support staff for 24/7/52 operation and the hardware is the cheapest part.

In reality, this is just advertising .

UK flights CRIPPLED by system outage that shut ALL London airspace


Re: It would appear to be worse...

I've seen where they have slowly added more load, over years, than the system was designed to handle. The zero crossover switches, switch flawlessly to they synchronised backup generators and, then fail because they are not rated to carry the larger currents. Then you need to call the sparks in to jury rig a temporary workaround solution, which takes time.

Hey, non-US websites – FBI don't have to show you any stinkin' warrant


Re: If the FBI hacked the foreign server

The problem is probably that the FBI and NSA are slightly more buddy buddy than the CIA and NSA are. I do not think that the black baggers who destabilise governments and the global peeping toms are allowed to work directly with each other anyhow.


So by their 'logical' extension

Iran or North Korea can hack into US servers suspected of crimes that may have taken place in Iran or NK. Like all US government computers for example ?

The U.S. is pulling some interesting global rules out of their a$$.

Why US Feds and g-men kick up a stink about a growing smartphone encryption trend


End to end encryption changes nothing.

The FUZZ can still go to a court and get a warrant to tap a specific phone by getting silent updates pushed to the handsets by either the telco operators or the OS vendors. Encryption will help stop blanket across the board tapping without court orders. This just means that the FUZZ, will be prevented from breaking the law.

A signed module between the hardware and the applications, means that it is still possible to legally intercept everything. They just can't tap anywhere along the route of the call anymore, if end-to-end encryption is implemented. They can still track all handsets using Multilateration within about 3 feet of their physical location with the quality of call information collected at all base stations. And then there is all the meta-data it's collection remains totally unchanged.

Raspberry Pi B+: PHWOAR, get a load of those pins


CPU - same

RAM - same

USB throughput with a 5 port hub (4 external + 1 internal USB Ethernet) - tiny fraction lower

[Model B has a 3 port hub (2 ext + 1 int USB Ethernet) - slightly faster but not by very much really]

SD card - bye bye standard, hello micro.

It is basically a mobile phone without a screen, baseband processor, antenna, battery and camera, although you can buy that optional these days for what 20ish.

If they stick to this CPU, the only easy upgrade path left to them is to add more RAM. I think that the chip can support 2GB and it will probably happen when they can no longer source 512MB cheaper 1GB/2GB. At some stage in electronics old components ends up costing more than new.

Beware WarKitteh, the connected cat that sniffs your Wi-Fi privates


spy cat

Still cheaper than the CIA's attempt at using cats to spy:


Amazon 'adware' laden Ubuntu passes ICO's data smell test


near vs far away

I search for a filename on my local disk and the query is sent across the Internet to be stored forever on Ubuntu's servers (a bit like google, only more invasive). No that does not sound like it is an invasion of privacy at all.

BAD VIBES: High-speed video camera records your voice from trash


Re: Er....

The real question is, now that this is public what did the spy agencies just invent that's so much better?

You mean like some kind of exotic Acoustic Vector Sensor that can record all conversations whispered or shouted within a 25 meters radius ?


HUMAN RACE PERIL: Not nukes, it'll be AI that kills us off, warns Musk


design to fail.

First gen, designed, built and maintained by humans that will be safe and very fragile in many ways.

It is the 2nd and future gens designed, built and maintained by the first gen AI's that will be problematic.

So as long as we keep humans and their superior stupidity in the loop, everything will be fine. Battery powered or mains powered - battery. Radiation hardened Diamond based IC's encased in Faraday cages or unprotected EMP sensitive silicon - cheaper is better :).

NASA tests crazytech flying saucer thruster, could reach Mars in days


I like it, but I just don't trust it (yet)

I'm wondering if this has been tested in a vacuum. Ideally inside of a Helmholtz coil to cancel out any possible influence of the earth's magnetic field. And even then the effect may still be dependent on the distance from the Sun.

But even if it this only works for LEO (Low Earth Orbit) to GEO (Geostationary Earth Orbit), it is still a very useful technology that should be pursued to reduce the cost of getting mass into space.

Google Maps community competition falls foul of Indian regulations


map out, money in

OS maps of U.S..- paid for by the tax payers, raw data downloadable from .gov websites.

OS maps of U.K. - paid for by the tax payers, sold to the public in small sections ideally on paper.

Most colonies/ex-colonies of the U.K. do what the U.K. does it is easy money to hold onto that monopoly.

HDMI, thy end is near: Qualcomm's Wilocity gobble will let mobes, tabs beam 4K vid to TVs


Huh ?

Standing back and looking at this:

1> Use more electricity to generate/receive RF

2> To transfer data at a maximum of 7Gbit/sec

3> Over a maximum range of 10 meters.

4> I'm sure that the interference will be dire, "No dear, don't do the vacuuming now, you know how the TV goes all freaky when you do"

Instead of using one cable and less electricity ? Using more electricity is fine, but when you scale this by 100 million to 10 billion TV's every watt/hour wasted makes a difference. It is not like the stupid encryption in HDCP is not wasting enough already.

Still if movies are transferred across this you can bet your last dollar that the security will be better than military spec, but this probably is not very good these days anyhow.

EXPOSED: Massive mobile malware network used by cops globally


Re: Nokia 3310

Guess what even non smart phones can remotely have their firmware upgraded by telcos.

The telcos know where you are (triangulation with three base stations has your location within a nanosecond of the distance traveled by radio waves - so about a foot). The location is updated about 24 time a second when you are on a call and about 24 times a minute when you are not.

And statically they know when you are sleeping and when you are awake. In the telco industry 2am to 4am on a Sunday night/Monday morning is known as dead time that they can do what they like with their network, and almost no phone user would notice any downtime.

There are many time windows available to remotely upgrade the handset firmware and for the spyware install to go totally unnoticed by owner.

The FBI in 2006 have used this technique to have some criminals carry around bugs (mic on). And pressing the power off button just runs some code which turn off any blinking lights and powers down the display, the phone is still running the spyware code. Search for "FBI taps cell phone mic as eavesdropping tool"

AWS breaks silence over Truecrypt's role in data import/export


you scratch my back and I'll spend tax payers money on you.

TrueCrypt may be totally secure, even today. But the real issue is that the OS's are the weak point. The keys are stored in the OS's RAM, and data must transfer through the OS to be stored or accessed. The data may be in Fort Knox, but the keys are sitting on the mantlepiece under a painting of George Orwell.

Apple and Microsoft are both US companies, even RedHat, so there would be no problem to add legal intercept to the OSes with a secret request. Amazon is in exactly the same boat, US as well, hell they have even started to get U.S. government work. Sounds like a bit of back scratching to me.

Ubuntu is in the UK, so GCHQ can give them secret requests to add legal intercept.

No spinning rust here: Supermicro's cold data fridge is FROZEN


Re: DVD? ( I have mixed views)

>>> By the way, I wonder about the wisdom of storing non-spinning hard drives. After a long inactivity, don't they develop "sticktion" that prevents them from spinning up ?

Ramps have fixed that issue since 1995.


TrueCrypt considered HARMFUL – downloads, website meddled to warn: 'It's not secure'


Re: Replacement?

You forgot about making your own keyboard. From your brain to your hands is where the trust begins and ends.


Re: 7.1a still okay

Does TrueCrypt talk directly to the ALL hardware not using any OS API's is the question you should be asking. Do you trust the firmware for the harddisks processors are safe (all U.S. companies) ? If not, then it it like trying to build a skyscraper in a swamp with no foundation. It may look good today, but I wouldn't like to live there. The real problem is trust, and with secret gag orders, it is hard to trust anything connected with the US (or UK) in any way.

Congress divorces NIST and NSA


R.I.P. NIST outside of the US.

America is stuck with it, but the rest of the world if free to move on to better standards. And the US can adopt global security standards if they are allowed to by their Government, but they will probably not, for the sake of national security - In the land of the free to be spied on by the eternal eyes, or is that England ?

Big data hitting the fan? Nyquist-Shannon TOOL SAMPLE can save you


Re: Slight case of subject drift

That would require intelligence at each sensor to push the data to a central location when an event/change occurs. But if the sensor fails nothing will ever be logged again. So then you need the central location to periodically poll the intelligent sensors, "You still alive and working", to check for faults. Also you need a network to queue events in case two sensors push data at the exact same instance in time. The more complexity that is added the more possible failure points that are also added. There are many advantages to K.I.S.S. https://en.wikipedia.org/wiki/KISS_principle

Google's self-driving car breakthrough: Stop sign no longer a problem


sub optimal conditions AKA real life outside of America.

I wonder how well it can handle pot holes and cars parked on both sides of a road narrow enough for one car but traffic is allowed to drive both ways.

It's spade sellers who REALLY make a killing in a gold rush: It's OVER for graphics card mining


almost dead hardware

Would you buy a high-end graphics card of Ebay for cheap, that has been running 24/7 for a year plus solid. Probably over clocked a hell of a lot as well. The paste between the GPU and the cooling fins would probably have been running at 85 °C must be flaking away at this stage. These cards will be at deaths door sooner rather than later.

Quantum Key Distribution proven to work over everyday fibre


Re: Schrodinger's spy

They always use Polonium as the radiation source. And since it is both poison and radiation source, there is no need to collapse the wave function, we all know the outcome of the spy already.

That's right, MICROSOFT is an ANDROID vendor after Nokia gobble


history is always repeated.

Hotmail was UNIX only at the back-end before M$ bought it. Then they replaced each UNIX server with 10-20 windows servers to try and handle the load. They had to roll back a few times, the same thing will happen with Nokia's Android phones. Leave things as they are for now, but within 5 years time there will no no such thing as an Nokia Android phone, they will all be Microsoft windows phones sold under the M$ sub-brand name of Nokia for now. But in time that will migrate to Microsoft.

They want to be Apple, and they think that being in peoples pockets and being a brand that they see many times a day will help move them to this position.

RIP net neutrality? FCC mulls FAST LANES for info superhighway


Very short sighted of the FCC

Who is to say that in 10 years time that http and https do not go the way of gopher and archie. Possibly over a more security, non NSA friendly, replacement protocol. Allowing extra money to be charged for port 80 and 443 seems downright silly to me. Spell bribes.

OpenBSD founder wants to bin buggy OpenSSL library, launches fork


Re: It's easy to rubbish OpenSSL now.

>>> What will libressl look like in 15 years, once an untold number of other developers have each had their hand at extending the functionality? What vulnerabilities might lie below the layers of functionality by then? Unless some regular auditing takes place from either libressl or an OpenSSL 2.0. We'll be re-visiting this situation sooner, or later.

You literately must have never heard of OpenBSD to say that.

Read "Audit Process" @ http://www.openbsd.org/security.html


Security first, everything else second.

OpenNTP look at their code and compare it to the ntp source. It is not perfect, but all the really scary syntax, from a security perspective, is gone. I'm sure that the same will happen with their LibreSSL implementation.

If the foundation of your security is in a swamp, or sitting on the top of an active volcano it is time to move house. And you have to respect the OpenBSD team for doing just that. Will their solution be perfect, probably not, will it be secure, as close as you will get without spending billions.

Kill dodgy RNG says NIST


NIST may have done nothing wrong, but trust in them has been reduced worldwide. I can see a new non-US, non-UK based institution taking over from them over the next several years as more and more privacy guarding equipment is sold worldwide.

Chrome makes new password grab in version 34


If you must use chrome, I'd go with Iron - less "features"

No unique Installation-ID sent to Google

No Suggestions (remote logging of everything you type to google)

No Alternate Error Pages

Spooks vs boffins: MIT bods say they've created PRISM-proof encryption


Re: ...ruined by a key logger,

>> But they have to get the key logger on every device to cover the internet.

So they file a secret order for Microsoft and Apple to issue a patch with a default key logger into their OS's, they are US companies after all. Actually most "windows" receive key and mouse events anyhow, so not much to add it actually since it is there already by design.

US govt: You, ICANN. YOU can run the internet. We quit


multi-roots ?

One root can easily be replaced by several isolated intersecting/non-overlapping root's and this is at a guess why this change is happening. To try and prevent an EU root, an Asian root,. a .... If the US government is not seen to remove itself from the affairs of the Global Internet, then fragmentation will happen. I'm personally amazed that we have had one root DNS for so long.

NASA's 2015 budget plea: Jobs, pork, small business – OK, science


easy solution

Half the black budget (CIA+NSA), and then give that $26 billion to NASA and there will be humans on Mars by the end of the decade :)

Traditional RAID is outdated and dying on its feet


You can squeeze blood from a stone if you squeeze really hard - use fingers or it will not work :)

The price of the license to enable the filesystem under AIX may be cheaper but I'm guessing that the cost of the many IBM branded servers to implement it will not be. Oh and the training for disaster recovery just for when something unexpected goes wrong like a data center loosing a few dual power circuits to few racks of data servers (the unthinkable). Oh and don't forget about the ongoing platinum hardware/software/patch/security support contract(s) for when something does go wrong at 4am on Sunday morning, Total ongoing cost of ownership is the key, cheaper initial outlay (to get the toe in the door) and then higher ongoing/upgrade costs - Beware Greeks bearing gifts (or Beware of Trojans, they're complete smegheads!).

It's a BLOCKBUSTER: Minecraft heads to the silver screen


Re: money in same old .... out

>>> And not, say, because they were trying to use his company's intellectual property without asking permission or signing a licence agreement.

Trademark, not intellectual property, no such thing as intellectual property in a court of law..

It can not be copyright, because that would be a script by notch. Although maybe copyright depending on the country the film was based in, there is software copyright in the US and a look and feel court case could be brought. Could have been a very interesting litigation.

It can not be a patent, as far as I know there is no patent for minecraft, if there was it may be related to ultrasound/CT/MRI scanners (voxel) and notch would need to be paying it.

Anyhow the KS film is dead - makes no odds now.


money in same old .... out

I suspect that the one that was shutdown would have been better. Chop three zeroes off the budget and you need some really smart creative people to make things work. Add three zeroes and you will have the same old crap that Hollowood always produces because they can not afford to take risks.

At least now it is obvious why Notch shot the kickstarter project dead in utero.

Q&A: Schneier on trust, NSA spying and the end of US internet hegemony


Re: Why all the fear?

What gives one person the right to spy on a private communication between two other people. Me personally I feel terrorized by governments who have given themselves this right.

New radio tech could HALVE mobe operators' bandwidth needs


legal intercept ?

"Kuma envisages a model where 5G phones act as relays for signals – a mesh network"

A Mesh network would be harder to tap with legal intercept. Think pre and post Microsoft Skype (or the original bomb proof mesh Internet and the current star/tree design). So for this reason alone it will not happen as envisioned.

Don't get me wrong I think the idea is great,

Software needs meaty cores, not thin, stringy ARMs, says Intel


way way way way more cores please

I personally think that things will start to get interesting when you have a million cores on a piece of silicon. Clocked at a low enough frequency of about 2 MHz. A bit of RAM each, a few registers, a not so complex ALU, maybe even integer only.

If each core could simulate a neuron this would be comparable to a human brain's 85,000,000,000 neurons clocked, allowing for the speed of a signal pulsed about the brain, at about 24Hz. OK you are missing all the interconnections between the neurons, But I still think that there would be interesting things to see. Me I don't care if it is Intel or ARM who get there first, I just want to be around to see what happens next.

Saving private spying: IETF Draft reveals crypto-busting proxy proposal


Re: Informed consent

Well Mozilla Firefox or Microsoft IE trust (directly or indirectly) about 650 organizations that function as Certificate Authorities. And none of these will prompt for permission. All of these organizations can sign any certificate for any domain and be fully trusted by all browsers. This is how insecure the CA system is by design. You have to trust that all 650 CA's are not evil, even though some are run by governments, some are private companies and I'm sure a few fake front companies for three letter acronym agencies.

That little padlock really means "yea, you are probably safe, what is it you are doing again ?"

Microsoft asks pals to help KILL UK gov's Open Document Format dream


> In what world does this make sense exactly?

Brown paper envelope world.



Biting the hand that feeds IT © 1998–2019