Odd strategy
Hmm. Have appalling security so tens of millions of cards get stolen. Now prices for stolen cards are plummeting, so perhaps it won't be worth the time & effort to steal more.
12 publicly visible posts • joined 11 Dec 2007
The Faraday bag seems to assume that all of the evidence of interest is digitally contained inside the phone. What if there is something useful (trace chemicals, blood etc.) on the outside of the phone? Dropping it into one of these "reusable" bags will mess that up.
Yup. Linux kernel names are way more sensible. Looking at the current version:
$ grep NAME Makefile
NAME = Saber-toothed Squirrel
Hmm. That's odd. Let's look at some older ones ...
$ git checkout v3.1 -- Makefile ; grep NAME Makefile
NAME = "Divemaster Edition"
see - that's not silly (bizarely not connected to operating systems, but not silly)
$ git checkout v3.0 -- Makefile ; grep NAME Makefile
NAME = Sneaky Weasel
Oops - silly again
$ git checkout v2.6.39 -- Makefile ; grep NAME Makefile
NAME = Flesh-Eating Bats with Fangs
Hmmm - Ok - perhaps Linux kernel versions *are* silly.
It sounds like silk would disable any client ad-blocking software (since the cloud server will pick up all the pieces and render the page) - but on the flip side, it means that the advertising companies don't get direct access to the data on who is looking at a page (since all the fetches will come from Amazon's cloud). Now Amazon will most likely sell that data to anyone who writes them a cheque - but I wonder what this does to the business model of pay-per-view ad-supported sites. Probably all bad for them - while pay-per-click is still OK.
It's been shown that an MD5 hash value can be duplicated with different data (though I think that it is still not possible to do this and make the changed source file look like reasonable code - you need to include a lot of random looking gibberish).
Some weaknesses have been detected in SHA1 - but there are no known practical attacks. So your guess that "something has been submarined into the Linux code base, and the respective files have been tweaked to ensure that the SHA1 hash matches" is almost certainly wrong (more likely that I'll win the lottery by finding a winning ticket lying in the street on my way home).
If/When there is a credible attack on SHA-1, git can be fixed to use a new secure hash (at the cost of re-building any repository using the new hash).
Article says:
A "typical" 20 square metres of home solar panels might generate as much as four or five kWh each day.
That would depend where you live. Tesla motors is located just a few deka-miles from my house where I have 34.8 m^2 of solar panels which yielded 9180 kWh in their first year of operation (average 25 kWh/day) and 8403 kWh in their second (average 23 kWh/day ... reduced yield partly caused by a broken inverter for ~3 weeks in February, and also by the local wildfires filling the sky with smoke for many days in July and dropping a layer of ash on the panels).
Scaling down the crappy 2nd year figures to 20 m^2 still gives an average of 13.2 kWh/day
The fan in the power supply of my home desktop system started making some ugly noises just before Christmas. So I looked around for a new one with "efficient" and "quiet" as my two primary criteria. I bought a Seasonic S12 II SS-330. Since it has a honking great 120mm fan, I disconnected a case fan while I was installing the new PSU.
Result: at the wall A/C power consumption is down by 30%