* Posts by gnasher729

2111 publicly visible posts • joined 13 Oct 2014

IT sent the intern to sort out the nasty VP who was too important to bother with backups

gnasher729 Silver badge

Re: Can't stand IT

As a student, I wrote an application for a customer, which included a customer database. I was not.very good at hi back then, and the UI for adding and editing a customer address were very similar.

Every time they added a new customer an old customer disappeared. I assumed that they edited a customer instead of adding without realising. The solution: Display a counter showing the number of customers. So when they added a customer the counter would go up. Editing by mistake the counter stayed unchanged. So they figured out when they got it wrong.

In OPs case, if the escape key beeped and displayed “email deleted” she would have figured it out herself.

User read the manual, followed instructions, still couldn't make 'Excel' work

gnasher729 Silver badge

Alice

The first Macs came with a game called “Alice” to teach people how to use a mouse. Very simple, you got points by clicking on things on a chessboard as quick as possible.

Except there was a menu that let you change the mouse direction. You move the mouse to the right, the cursor moves to the left. And you can change up and down. At this point it’s hard. And then you turn on auto movement where the cursor moves by itself and it gets devilishly difficult.

How to give Windows Hello the finger and login as someone on their stolen laptop

gnasher729 Silver badge

Re: No system is 100% secure

Macs/iPhones usually have no back doors. If the customer forgets their passcode, tough to be you. If you want your heirs to inherit your iPhone, put the passcode in your will. Because if you can’t get in, apple can’t either.

gnasher729 Silver badge

Re: fingerprint works <25% of time

To be fair again, this doesn’t seem to be about the quality of the sensor. It’s about someone completely different logging in. (I remember ages ok someone used a fingerprint scanner that would recognise about one in 20 random fingers, so a thief and his three mates would have a ninety percent chance of getting in).

But I’m quite sure that on iOS you need the device passcode to add a fingerprint, at the time it is added. So if I leave my phone lying around logged in, you can use it, but not add a fingerprint or faceID.

IBM pauses advertising on X after ads show up next to antisemitic content

gnasher729 Silver badge

Re: maybe he is a genius

Say apple and Google decide to buy it up for four bn each. Then get rid of the rubbish. Could be well worth it. Obviously they wouldn’t want to pay the banks _all_ their money. Just enough to be the highest bidder.

gnasher729 Silver badge

Re: maybe he is a genius

44 billion. 27 from Musk, about 12 banks, 5 billion large US and Saudi investors. So about 3bn vs 12bn.

gnasher729 Silver badge

Re: That's rich.

I think IBM doesn’t have the slightest responsibility to act the same way today as they did 80 years ago.

gnasher729 Silver badge

Re: maybe he is a genius

The problem is that these right wingers won’t buy what decent people advertise, so anyone trying to give them a home doesn’t get the ad revenue.

gnasher729 Silver badge

Re: maybe he is a genius

The banks gave Twitter a loan, so they can expect interest but not their money back. As long as Twitter pays its interest. Or musk pays for twitter, there’s nothing they can do. If interest isn’t paid they can force bankruptcy and a sale of Twitter to the highest bidder.

UK signals legal changes to self-driving vehicle liabilities

gnasher729 Silver badge

Re: only the driver – be it the vehicle or person – is accountable

Insurance should just be handled by the insurance companies, same as now. They will have data eventually how much damage was caused by a million self driving cars in a year. And that may be more or less than the damage caused by a million drivers. So the insurance premium will be higher or lower.

GPS leading your phone astray? We can just fix that in code, startup claims

gnasher729 Silver badge

Re: And I need this why?

Personally I think a self driving car should use GPS only the same way as I use it. It should be able to drive safely along any road without any GPS like we did for many years. Or if an inaccurate GPS or map data tells it “you are 12 meters left of the road” then it should look at its cameras and say “no, I’m right on the road” just like I would.

Signal shoots down zero-day rumors, finds 'no evidence' of device takeover

gnasher729 Silver badge

Re: “turn off features that you aren't using”?

You could get an iPhone. Switch it to report a fake IP address and fake email address, and a deliberately inaccurate location, and switch on “lockdown” to remove lots of features that are in any way dangerous.

Excel recruitment time bomb makes top trainee doctors 'unappointable'

gnasher729 Silver badge

Ai

If instead of AI (artificial idiocy) they had created AI (artificial intelligence), you could have handed that spreadsheet to an AI, told it “see what you think of this”, and it would have said “looks like all those from wales have ridiculously low scores, and what’s really weird is that their scores are 24 numbers from 1 to 24, so something looks messed up here”.

Now if you handed that spreadsheet to someone with real intelligence the same would have happened.

Three dozen plaintiffs join Apple AirTag tracking lawsuit in amended complaint

gnasher729 Silver badge

Re: Apple FindMy Network

It uses the kind of technology that is used for push notifications. It runs below the level that is used for voice or mobile data, it’s the kind of thing you can only do with direct access to the phone hardware. Reading this post costs more bandwidth than ten years of these notifications.

And disabling mobile data makes no difference. It doesn’t use mobile data. You’d have to complete disable the phone hardware. Airplane mode does that, I think. And in the end, if I can’t find my lost phone because you refused to help, can I sue you?

Apple pays $500K to make sales bods' complaint about wage theft go away

gnasher729 Silver badge

Re: Thank you

So how many minutes of quarterly profits did Apple not pay them?

Human knocks down woman in hit-and-run. Then driverless Cruise car parks on top of her

gnasher729 Silver badge

Re: Interesting that the police

If it doesn't react quicker than a human today, there would be hope that hardware in two years time _would_ react quicker. I would very much hope that it reacts in comparable speed.

Epic cut: Fortnite games maker culls 16% of staff

gnasher729 Silver badge

Would Apple have to allow epic on its store?

Apple and epic are surely not best friends, so if all the court cases are over, and Apple has no interest to let epic on its stores (very understandable), could anyone force them to do business with epic?

iPhone 12 deemed too hot to handle for France's radiation standards

gnasher729 Silver badge

Do you hold your laptop to your ear usually?

Apple races to patch the latest zero-day iPhone exploit

gnasher729 Silver badge

Re: The intentionally incompatible iMessage yet again?

Many, many years ago there was NVIR. Which infected Mac apps running on an infected computer. Being nice, we added a bit of code that detected if our app was infected and showed an alert.

Our boss demonstrated the app at a major bank. It got infected instantly and showed an alert.

I'll see your data loss and raise you a security policy violation

gnasher729 Silver badge

Re: Happens more often than you think...

Just saying: On MacOS X if I remember correctly the “temp” folder is excluded from time machine backups, and files inside can be deleted by the os if storage is needed. On the other hand, it’s a bit hard to access by the average user.

gnasher729 Silver badge

Re: It can get worse...

What about a request to the OS makers: Just besides the “Trash” icon, put another icon “Later”. Just as unremovable. So stuff that people want to do later goes in the “later” folder and not the “Trash” folder.

Even better: Add a “Sooner” and a “Later” icon for everything you need to do sooner or later.

Apple security boss faces iPads-for-gun-permits bribery charge... again

gnasher729 Silver badge

Except a conspiracy requires that you do _something_ to further the goal of the conspiracy. Did he ask anyone at Apple how to get 200 iPads? I mean even at Apple headquarters, I assume that they don't just have palettes loaded with iPads sitting around for self service. So telling the ex-police officer "Ok, I'll get you 200 iPads" is NOT a conspiracy yet.

In addition, it is doubtful that a crime that requires two people by its very nature, like bribery, would be a conspiracy.

gnasher729 Silver badge

It seems the guy wanted some “concealed carry” licenses, with a legitimate reason. The sheriff said “no problem but you’ll have to pay me”, and he’s in jail now because that wasn’t the first time.

The guy was willing to pay by handing over 200 iPads but changed his mind at the last second when he heard the sheriff was in trouble.

So he was kind of forced to offer a bribe, he promised a bribe, but never actually bribed him. Because he changed his mind when he knew this would be found out. So did he commit a crime? Don’t know.

Apple's defense against apps vandalizing other apps still broken, developer claims

gnasher729 Silver badge

Re: File Permissions?

"Shouldn’t this be addressed with proper file permissions?"

That shouldn't be necessary; there is supposed to be a global permission "an app cannot modify other apps", with some exceptions, like any two Microsoft apps could do things to each other that a Microsoft and an Adobe app wouldn't be allowed to do. The problem is that TextEdit does exactly what it is supposed to do, it edits text files, including configuration files. If you are the user of the app and want to edit its configuration, that is exactly what you would do.

On iOS there is much stronger protection. That's why x% of users love iOS and 100-x percent hate it. The first say "wonderful, it's a walled garden, exactly what I want" and the others say "godawful, it's a walled garden, I can't do what I want. "

There's a good chance your VPN is vulnerable to privacy-menacing TunnelCrack attack

gnasher729 Silver badge

Re: Network routing working as intended

If I use a VPN, and someone can observe my network traffic, then they can easily identify that all my traffic gets sent to the VPN, and all my traffic is received from the VPN. So the fact that everything uses the same IP address, and everything is encrypted, gives the VPN's IP address away.

Judge denies HP's plea to throw out all-in-one printer lockdown lawsuit

gnasher729 Silver badge

Re: I ditched HP printers

Bloody Amazon door camera. Insisted on sending my door pictures to Amazon. I have WiFi and hundred of gigabytes of free storage at home. Why should I pay Amazon gor that?

Say hello to Downfall, another data-leaking security hole in several years of Intel chips

gnasher729 Silver badge

Re: Planned Obsolescence

The problem is not out of order execution at all. The problem is branch prediction and speculative execution. During speculative execution the old contents of registers that get modified must be stored _and protected against overwriting_ so that speculative execution can be undone. And that’s what both AMD with Zenbleed and now zingelt got wrong.

Lock-in to legacy code is a thing. Being locked in by legacy code is another thing entirely

gnasher729 Silver badge

A harmless variation

I worked in one office where you needed a card to enter through doors, but no card to exit through doors.

The building had a trap: One little part that you could enter through two doors but not leave. So if you forgot your card and entered there you were stuck. I managed it once and had to wait five minutes for someone to open a door. If you were the last person to leave the office , forgot your card, and took the wrong route, you were stuck.

Cops cuff pregnant woman for carjacking after facial recog gets it wrong, again

gnasher729 Silver badge

An experiment

Take 100 random people, let them walk past a CCTV camera, and let your “facial recognition” software recognise them. Then show us the results. For extra points, add two photos of Joe Biden and Donald Trump and see if they are recognised.

Scientists strangely unable to follow recipe for holy grail room-temp superconductor

gnasher729 Silver badge

It might if you think of new applications. Say transmitting power over very long distances which is impossible now and not done because of huge losses, say 90% over a few thousand miles changing to 10%. Or transmitting energy from A to B back to A which might be useful but a huge waste today.

AMD Zenbleed chip bug leaks secrets fast and easy

gnasher729 Silver badge

Re: Dumb Questions

There are two points of view: It is both a bug and an exploit.

In “bug” mode, a vzeroupper in your code shouldn’t be executed, but is actually executed by branch misprediction. When this misprediction is fixed, data from any process that happened to write to an xmm register may have overwritten your register. That’s obviously a bug. But it seems this is rare: I have the impression another process must write to a rename register just between the CPU mispredicting a branch around a vzeroupper instruction and fixing the misprediction, so only a handful of cycles.

In “exploit” mode the malware does exactly the same, but intentionally, and actually hopes that it’s data gets overwritten- because it knows some other process had written that data.

The reason why this doesn’t happen with ordinary registers is that they are protected from being written to while a predicted branch is running, and for some reason this doesn’t happen for vzeroupper.

gnasher729 Silver badge

Re: Parsing the data

Finding the length of a string in code points is slightly more difficult with utf8 (you need to find a zero byte and not count bytes of the form 10xx xxxx). Finding the length in characters is difficult. But most of the time you just want the number of bytes.

Bad news: Another data-leaking CPU flaw. Good news: It's utterly impractical

gnasher729 Silver badge

It sounds like the CPU itself can provide information about power usage, so you don’t need to be in control of the physical computer.

Fed-up Torvalds suggests disabling AMD’s 'stupid' performance-killing fTPM RNG

gnasher729 Silver badge

Re: If Torvalds says so

“ "If Linus Torvalds told you to jump of a cliff would you?" (imagine this in your mum's voice)”

I would listen to him. If there was a fire behind me and a five meter drop into water in front, I’d jump off the cliff.

gnasher729 Silver badge

“and all subject to bias output, not true rng.”

All you need is entropy. Once you have n bits of entropy, you can turn it into an unbiased n bit random number. Throw a dice and write down whether each throw showed a six or not. Less than one bit of entropy per throw (I think) but easy to turn into an unbiased random number.

gnasher729 Silver badge

This doesn’t make sense.

You want one entropy source that is entirely physically unpredictable. That’s what this thing should provide. And that kind of thing is known to be expensive.

Once you got that you want a cryptographically secure generator that creates a sequence of random numbers, that are unpredictable _based on your initial entropy source_. That’s mathematics. It is well-known mathematics. It’s not cheap, but not very expensive either. There is no reason at all to use the entropy source again. All you need to do is to keep the state of that random number generator secret, so nobody can copy the state and produce the same random numbers.

(And on top there are many situations where you want random numbers very fast without any requirement for cryptographic security).

So what they are doing only makes sense if they can’t keep the state of their cryptographic random number generator safe and have to destroy/recreate it repeatedly.

Nobody would ever work on the live server, right? Not intentionally, anyway

gnasher729 Silver badge

Live server has fault - switches to backup server - backup server is turned off - an obvious problem.

But if the order was backup server turned off - live server has fault - cannot switch to backup server. Wouldn’t that have the same effect?

Apple demands app makers explain use of sensitive APIs

gnasher729 Silver badge

Re: Well, at least the app developers...

There’s a thing called “contracts”. If they catch you actively lying they can close your developer account.

gnasher729 Silver badge

Re: The Uber-permission (on Android); Equivalent on iOS?

There’s the “Settings” application which can obviously change all settings, so that must have some special permission that others don’t have.

In the past, I have _wanted_ to turn WiFi on for users; in the past an ios app could open the “Settings” app and go straight to WiFi settings, I think nowadays you can only open the “Settings” app.

So if you have a situation that justifies it, you would show an alert saying “to do xyz, change abc in the settings app”, with two buttons “cancel” and “settings”.

Apple patches exploited bugs in iPhones plus other holes

gnasher729 Silver badge

Re: Its also the not-early adopters

There’s always the possibility that a bug in ios13-15 doesn’t actually exist or doesn’t work on ios12. Or that an exploit is not trivial and must be handcrafted for each target to be attacked, and no attack for ios12 was written.

Someone just blew over $190k on a 4GB first-gen iPhone

gnasher729 Silver badge

I remember buying a used iPhone to be used as a cheap iPod, and I couldn’t activate it until I took a card from another phone. Just for activation, after that it wasn’t needed.

On the record: Apple bags patent for iDevice to play LPs

gnasher729 Silver badge

Since ideas are cheap

... ideas are cheap and implementations are not: I remember people built contactless LP players using a laser to scan the LP and get alll the music out of it. Would a good phone camera be good enough to do that? So you hold your camera close to the LP, make sure you get a sharp image, move camera or record until the complete surface is covered, and then you can play the music, without any additional hardware?

The choice: Pay BT megabucks, or do something a bit illegal. OK, that’s no choice

gnasher729 Silver badge

Re: QWERTZ/QWERTY.

On my first ever day working on a programming job in the UK I entered a statement

if (i >+ 0)

Instead of >=. The same finger movements that enter >= on a German keyboard produce >+ on a British one. The worst thing was that it actually compiled and that it was almost but not quite correct.

What does Twitter's new logo really represent?

gnasher729 Silver badge

About 27bn of the purchase price is his money. Either directy his money, or a loan with his Tesla shares as security.

Post-Brexit tariffs on cross EU-UK electrical vehicle imports still going ahead

gnasher729 Silver badge

Re: Fuck business

There was the fishery industry, where the guy supposed to represent British interests participated in two of 33 meetings. His name was Nigel Farage.

Turning a computer off, then on again, never goes wrong. Right?

gnasher729 Silver badge

At two or three companies I managed to get a process for installing a development environment for new developers.

It started with a printed sheet of paper. The paper said “follow the instructions on this paper. If they don’t work, then ask for help, and change the instructions so they work”. That was needed because what’s on a brand new machine would change over time.

And one part of the instructions was where to find the instructions as an editable document so the new guy could update them.

Boss such a tyrant you need a job quitting agent? It works in Japan

gnasher729 Silver badge

And clearly you are not Japanese.

Quirky QWERTY killed a password in Paris

gnasher729 Silver badge

Re: All your QWERTY belong to us...

Excel has a setting to format numbers as “currency”. Before the euro I know a Dutch company that lost money because their documents with cost estimates showed Dutch guilders and their German customers read Deutsche Mark.

gnasher729 Silver badge

Re: All your QWERTY belong to us...

The niche case happened to me because I wanted a keyboard in front of every monitor, so I bought a ten pound keyboard in the supermarket. Yes, I can set up different languages per keyboard (say one French, one Italian) but the control key swap is global.

gnasher729 Silver badge

Re: All your QWERTY belong to us...

How is it hard to sort? Unless you are a numpty, you convert it to a date, and compare the dates.