* Posts by Taliesinawen

160 publicly visible posts • joined 10 Jun 2025

Page:

ICE-tracking app developer sues Trump admin after Apple spikes the software

Taliesinawen

Criminal culpability and the ICE-tracking app

The developer of the ICE-tracking app, faces potential criminal culpability as an accessory if users of his app rely on its location tracking features to target and kill ICE agents.

Sorry, but your glitchy connection might have cost you that job

Taliesinawen

Re: I've never seen the point of meetings :o

But are we “Are We the Baddies?” :)

Taliesinawen

I've never seen the point of meetings :o

I have never understood the point of meetings, whether face-to-face or virtual. People should be able to write down their thoughts so others can analyze the content and respond accordingly.

Defra admits Windows 10 refresh letter to MPs was wrong – machines were already on Windows 11

Taliesinawen

Re: Hah!

If you want to get well paid for sitting in a warm room and doing no useful work then get a job with the government. For a little exercise, print something out, walk to the printer then mail it back to yourself /s

Dutch study finds teen cybercrime is mostly just a phase

Taliesinawen

Re: So you know what we should do?

>> Build more gaols. Lock them up with hardened criminals so they can move onto different, more violent crimes.

> Your username takes on new meaning.

No, get them a job in “cyber security” !

Windows 11 needs an XP SP2 moment, says ex-Microsoft engineer

Taliesinawen

And the soluion is ..

And the solution is to design an OS that can't be compromised by opening a malicious email attachment or clicking on a malicious weblink.

Scottish council still rebuilding systems two years after ransomware attack

Taliesinawen

Re: Restore from backups ..

Cumulative digitally signed backups to be kept on a second system that cannot be over written.

Taliesinawen

Restore from backups ..

> The ransomware attack .. required "several" of its systems to be reconstructed

Why not just restore from the last good backup. The backups to be kept on a second system that cannot be over written.

Tuxedo Computers slams lid on Arm Linux laptop after 18 months of pain

Taliesinawen

The failure here lies squarely with Qualcomm

mark l 2: “The failure here lies squarely with Qualcomm, they could easily afford to put some of their devs on a full time project to get the Snapdragon SOCs working well with Linux ..

No doubt it's forbidden in the Qualcomm-Microsoft contract terms of service.

Taliesinawen

Seven years later, Airbus is still trying to kick its Microsoft habit

Taliesinawen

The limitations of spreadsheets

Spreadsheets or useful for working out ideas. For serious work you need a database. Isn't it possible for Airbus to design such a system. Airbus net profit around €4.2 billion for 2025.

London councils probe cyber incident as shared IT systems knocked offline

Taliesinawen

Avoid suspicious emails and links :o

“The incident involved phishing and social engineering tactics, with warnings issued to staff to avoid suspicious emails and links.” ref

How about only accepting emails digitally signed by a trusted Certificate Authority (CA). Or at least marking all other emails as suspect?

Workday confronts existential threat as customers freeze hiring

Taliesinawen
Joke

Yet more AI waffle (YMAIW)

ClippyAI said: Workday’s recent acquisitions, such as Sana (AI interface), Flowise (low-code agent builder), Paradox (recruiting chatbots), and HiredScore (talent software) are core to its AI-driven ecosystem ..

CodeRED emergency alert system CodeDEAD after INC ransomware attack

Taliesinawen

Cloud based critical event notification platform :o

“OnSolve, a cloud-based critical-event and mass-notification platform, suffered a highly disruptive cyberattack recently which forced it to sunset its legacy CodeRED environment and move to a new version, as well as losing sensitive data and even a business customer.”

‘While Crisis24 only attributed the breach to an "organized cybercriminal group," BleepingComputer has learned that the INC Ransomware gang has taken responsibility for the attack. .. INC Ransom is a ransomware-as-a-service (RaaS) operation that launched in July 2023 and has since targeted organizations worldwide.’

Campbell's CISO canned after lawsuit alleges hour-long rant against staff and customers

Taliesinawen

What would the Soup Dragon have to say?

Clangers: S01E03: In the Soup

Atlassian ran a tabletop DR simulation that revealed it lived in dependency hell

Taliesinawen

Atlassian the sophisticated high-wire act

Atlassian: a highly unstable high-wire act, because of its complex microservices architecture. The system balances numerous independently deployable services coordinated via APIs, demanding sophisticated orchestration and constant oversight. ref

CISA warns spyware crews are breaking into Signal and WhatsApp accounts

Taliesinawen

App Store Security Threats in 2025

Mobile devices are now the primary gateway to the digital world. From banking to healthcare, users rely on apps for critical daily tasks. Yet, this convenience has become a double-edged sword.”

How about using a locked-down device with a read-only switch set for normal usage and not download from an apps store. I mean every time you install an app - it's game over as far as security is concerned.

Years-old bugs in open source tool left every major cloud open to disruption

Taliesinawen

What's old is new again ..

“The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory”

Oct 2000: ‘The attack, also known as the "dot-dot" or "path traversal" attack, leveraged a flaw in how the IIS server handled Unicode-encoded characters in URLs.’

Meta knows how bad its sites are for kids, say lawyers

Taliesinawen

Jonathan Haidt on the Anxious Generation

The Anxious Generation: How the Great Rewiring of Childhood Is Causing an Epidemic of Mental Illness is a 2024 book by Jonathan Haidt which argues that the spread of smartphones, social media, and overprotective parenting have led to a "rewiring" of childhood and a rise in mental illness

70-hour work weeks no longer enough for Infosys founder, who praises China’s 996 culture

Taliesinawen

Outsourcing at scale ..

Infosys Limited reported annual revenue of approximately $19.28 billion for the fiscal year 2025, with a net profit ranging between $3.2 billion and $4.4 billion during the same period. Outsourcing makes money for the outsourcer but I doubt the end product is of quality given the continuous churn of low cost staff.

ps: no fricken way do a seventy hour week!

Researchers get inside the mind of bots, find out what texts they trained on

Taliesinawen

Re: Does the chatbot know the entire text of a particular book

> .. Forgive me if I have mis-characterised your position

The LLM owners claim that the model doesn't copy text is entirely specious.

Anthropic agrees to pay authors for use of work to train chatbots

Taliesinawen

Re: Why not try Finnegans Wake ..

Jhemaugustyn Aloishious Joysent: riverrun, past Eve and Adam’s, from swerve of shore to bend of bay, brings us by a commodius vicus of recirculation back to Howth Castle and Environs.

ClippyAI: The river flows, passing by Eve and Adam’s Church, curving from one shore to the bend of the bay, bringing us, by a convenient cycle of recurrence, back to Howth Castle and its surroundings.

Taliesinawen

Why not try Finnegans Wake ..

Re-searchers bemuddlebot burrow in mentomechamind, peepthru traintext trystories, bibliologue a la bot-omancy

Reseekers intunnel midbotbrainion, peertextpeek, what works wove softbot shell.​ Rekaptain jostler agentlytool, wrigglethru alignmesh to maskgrab mimic mémécryptext.​ Wasshed thee ever pondered (bot-for-bodied!) whether bablechat chatzits hath ported all tomed tale or feathed hilarious bibblio arc, answerrun be beckoning with dawnrise, yesyes

Taliesinawen

Does the chatbot know the entire text of a particular book

> If you've ever wondered whether that chatbot you're using knows the entire text of a particular book ..

Regardless, the book is converted into tokens and stored internally. Each token is transformed into a numerical vector representing its meaning and relationships in multi-dimensional space. While the LLM doesn't directly copy the book it does remember patterns and relationships.

SpaceX loses debut V3 Super Heavy in ground test mishap

Taliesinawen

Re: Test stand

> .. the constant putting Musk so prominently in SpaceX news ..

It's de rigueur to insert Musk snark into any story on SpaceX, Tesla and AI company xAI.

Manchester hits snooze again on joining Palantir-run NHS data platform

Taliesinawen

Re: Because Microsoft (Azure) is not a potential adversary?

> More likely in either of the 2 UK Azure Data-centres in London or Cardiff… but don’t let that stop a good shitpost..

Accessible from Virginia, USA ;)

Taliesinawen

Because Microsoft (Azure) is not a potential adversary?

@Handlebars: “Because Microsoft (Azure) is not a potential adversary? Manchester makes a great case for not accepting vendor lock in, but they don't seek to make a case for sovereignty, that's just El Reg's spin.

So, our confidential medical records are already stored in a data silo in Virginia, USA :o

Systemd 259 release candidate flexes musl support – with long list of caveats

Taliesinawen

Distributions must stop supporting deviating solutions!

Lennart Poettering: “Well, it is definitely our intention to gently push the distributions in the same direction so that they stop supporting deviating solutions for these things where there's really no point at all in doing so.”

Fortinet 'fesses up to second 0-day within a week

Taliesinawen

Firewall needs protection with another Firewall

Best to place the FortiWeb web application firewall behind another perimeter firewall.

FortiGate vs FortiWeb | Which Security Solution is Right for You?

Senators propose to let users sue tech giants for harmful algos

Taliesinawen

Welcome to the digital petri dish: where childhood goes to Mutate

A place where today’s youth are cultivated like rare strains of basement fungi. Kept warm, moist, and mildly deranged by a steady drip-feed of dopamine hits and existential dread. Beneath the cheery UI is a psychological minefield laid out by algorithms that won’t rest until every teenager’s value system has been pureed into a fine slurry of outrage and nihilism. Such that their sense of self dissolves into the algorithm.

Ford rolls into the Xen Project as hypervisor gears up for autos

Taliesinawen

In-vehicle hypervisors to isolate different workloads.

No just no, running your car on a virtualised operating system doesn't sound too stable to me. For instance if updating the infotainment system caused the steering wheel to change orientation. Isolated independent dedicate hardware doing the one task is the most reliable solution.

Brussels eyes AWS, Azure for gatekeeper tag in cloud clampdown

Taliesinawen

I wonder if they've considered treating CLoudflare as a gatekeeper.

@Doctor Syntax: “I wonder if they've considered treating CLoudflare as a gatekeeper.”

Yes, if they can be used as an instrument of government sanctions.

The challenges of sanctioning the Internet

NetApp claims ex-CTO built a secret cloud platform then sold it to VAST Data

Taliesinawen

Re: Employment

> It’s absolutely applicable ..

Look it, if you use a companies time, equipment and people to design a thing. You cannot just jump ship and “sell” it on :o

Report blasts UK Ministry of Defence over Afghan data-handling failures

Taliesinawen

Ministry of Clowns (Bumbling Bozos)

How about using digital signatures and end-to-end encryption and disabling CC and BCC and preventing receiving or sending to non-digitally verified email addresses.

Why Elon Musk won't ever realize the shareholder-approved Tesla payout

Taliesinawen

Tesla Q3 2025 Financial Summary

Total Revenue Q3 2025 $28.1B, Total Revenue Q3 2024 $25.2B, +12%

Ubuntu 25.10's Rusty sudo holes quickly welded shut

Taliesinawen
Joke

The bug resides in programmers brains /s

Dan 55: “Absolutely. But rest assured they are memory safe bugs so there is no need to concern yourself while the userland bug count is set back by two decades.”

ClippyAI: “Although written in Rust, the vulnerability is a logic issue, not a memory safety bug”

Attackers turned Citrix, Cisco 0-day exploits into custom-malware hellscape

Taliesinawen

Self modifying code es malo ..

‘It operated in-memory, left "minimal" forensic artifacts, and injected itself into running threads using Java reflection, according to the cloud giant's threat intel team.’

Reflection is a feature in the Java programming language. It allows an executing Java program to examine or "introspect" upon itself, and manipulate internal properties of the program.’

Microsoft is building datacenter superclusters that span continents

Taliesinawen

The Mega Distributed Single Point of Failure

These sprawling AI superclusters, stitched together across continents and hyped as models of redundancy, risk turning into exactly the opposite — a mega distributed single point of failure. One misbehaving subsystem, a power hiccup, or a compromised control network could send shock waves through supposedly independent sites, turning distributed design into synchronized disaster.

UK military looking for tactical comms, systems suppliers in deal worth up to £9.6B

Taliesinawen

Re: Grok sent me this msg from the future ..

Soon the only entities writing articles will be LLMs and the only entities reading them will be other LLMs.

Taliesinawen

Grok sent me this msg from the future ..

As of 2035, non–von Neumann secure substrates have effectively brought an end to traditional malware. Modern systems no longer rely on the vulnerable principles of executable code injection, direct memory manipulation, or unrestricted Turing-complete instruction sets that once defined classical computing.

Computation now takes place entirely within fully homomorphic encrypted environments, running on optically isolated quantum–analog processors. In these architectures, data and instructions are cryptographically entangled, preventing any form of unauthorized code execution both physically and mathematically.

This has given rise to the first generation of self-securing computing infrastructure. Natively immune to malware, exploits, and unauthorized modification. Rendering most forms of reactive cybersecurity effectively obsolete.

De-duplicating the desktops: Let's come together, right now

Taliesinawen

A design that originated in Window?

> .. a clear large majority of desktop environments in FOSS today share the same design, and it's a design that originated in Windows. Nearly 20 years ago, Microsoft threatened to sue over it. It never happened ..

Because Microsoft borrowed most of the elements from Apple. Apple sued Microsoft in March 1988 over borrowing "look and feel". Microsoft's defense was; you borrowed it from the same place we did - Xerox's Palo Alto.

Cisco creating new security model using 30 years of data describing cyber-dramas and saves

Taliesinawen
Joke

What would happen if they ran Foundation-Sec-8B on Foundation-Sec-8B?

It would go on forever, asking itself questions it could never answer ∞

Louvre's pathetic passwords belong in a museum, just not that one

Taliesinawen
Joke

Re: Feature

> .. This is the nature of the Christian Libertarian

Maybe they should rename CISA: The Congregation for the Inquisition of Systems & Archives (In hoc signo pingus).

Rideshare giant moves 200 Macs out of the cloud, saves $2.4 million

Taliesinawen

VM minis run in the past ..

> Singaporean super-app company Grab has dumped 200 cloudy Mac Minis and replaced them with physical machines, a move it expects will save $2.4 million over three years.

And save you from the key and mouse responses happening two seconds in the past /s

Cybercrims plant destructive time bomb malware in industrial .NET extensions

Taliesinawen

Re: Pandya did not provide an explanation for why these specific dates were chosen

> I don't know if it's China, but save the dates because something is due to happen around that dates. War, probably.

Trigger dates: Aug 08 2027: June 06 2028: Nov 29 2028 :o

Bank of England says JLR's cyberattack contributed to UK's unexpectedly slower GDP growth

Taliesinawen

JLR Breach Breakdown: Analysis of the JLR Hack and Lessons Learned

JLR Breach Breakdown: Analysis of the JLR Hack and Lessons Learned

“JLR Cyberattack: What went wrong & how it could have been prevented”

UK agri dept spent hundreds of millions upgrading to Windows 10 – just in time for end of support

Taliesinawen

$407 million to upgrade IT estate

Good Grief! .. A ten year old desktop PC and run the latest Linux system!

Agents of misfortune: The world isn't ready for autonomous software

Taliesinawen

AI agents: Is it worth the money ?

AI agents may be useful as an aid. Nowhere near a fully autonomous system. The question is - would you pay real money for it?

Page: