* Posts by Charles 9

16605 publicly visible posts • joined 10 Jun 2009

HTC: Shipping Android updates is harder than you think – here's why

Charles 9

"its clear that if HTC buy a million of X component, will make sure have access to the driver source code."

But typically under NDAs; the chipmakers aren't stupid. It's one thing for a chip manufacturer to share trade secrets with a major partner, but implying this should cause the code to be released before all and sundry is too far of a stretch.

Charles 9

Re: It's Linux. It's Open Sores Software. Write Your Own Fucking Upgrade.

The manufacturers DON'T WANT open interfaces. For them, it's vendor lock-in, and since the phone market relies heavily on integration (SoCs, etc.), the "roll your own" element that helps drive open standards isn't there. So the manufacturers will jealously guard their trade secrets, much as nVidia and AMD keep their cutting-edge GPU driver code in blobs (so as to prevent sneaking peeks).

Charles 9

Re: HTC is not in a business of updates

And how pray tell do they do that when NONE of the other handset makers maintain an exclusive app market? It's the App Market that allows Apple to milk since even old phones need apps, and every app the old phones buy means they take a cut.

Charles 9

Re: HTC is not in a business of updates

"Even within the Android ecosystem manufacturers can create brand loyalty. Samsung owners will buy newer Samsung devices if they think they will get better support than HTC and vice versa. It's harder to do, but it still worth the effort."

Not when brand loyalty is too mercurial. Put it this way. One bad story and plenty of once-loyal customers will jump ship. Then there are people like me who have NO brand loyalty. I jumped from HTC to Samsung,but only on a consideration of features at the time. Should I need a new phone, the process will repeat. Since Google provides the common ground for Android, there's little need to stick with a particular brand unless you REALLY like their specific offerings (and no, I don't--I junked TouchWiz and installed a custom ROM pretty quick).

At least Apple has the closest we have to a captive market. If you wanna keep your apps and so on, you MUST stick with Apple. Plus since Apple controls BOTH the hardware AND the software, they can afford to milk their older phones with the app revenues. Since (IMBW) none of the handset makers run their own app markets, milking isn't an option.

Snowden leak journo leaks next leak: NSA, GCHQ dying to snoop on your gadgets mid-flight

Charles 9

Re: I don't get it

And THAT'S exactly what they want to tap into if you read the article.

Snowden to warn Brits on Xmas telly: Your children will NEVER have privacy

Charles 9

Re: Definition required

"Well sure, unknowns can kill you, but until it has presented itself it is a mere possibility, not an actual threat. You can't prepare, or even begin to prepare, for possibilities, for unknowns, you simply don't know how. By attempting the impossible you are reducing the effect of your defensive resources."

Two words: contingency planning. Learn to expect the unexpected.

"The other type of existential threat is the kind on which you have no input or control. In your Cold War example there was precisely zero you could do about that. Nothing."

That's assuming helplessness, but we can't think that way. Because, while the threat exists, it's hard to tell whether or not we CAN or CANNOT influence the threat. Indeed, in the Cold War, many times the actions of each side caused reactions on the OTHER side, giving concrete evidence of having an influence.

Charles 9

Re: Definition required

Ever heard the phrase, "What you DON'T know can kill you"? Just because you don't know of a threat doesn't remove it as a threat. A snake in the grass, a hidden hole in the ground, a sniper on the roof. If it can hurt or kill you, it's a threat regardless of your knowledge of it. And think about how the Cold War played out: two superpowers each staring at an existential threat in the opponent. Existential threats trip human instinct and there's basically no way we know to defuse that.

Charles 9

Re: Definition required

"You defend against the known and maintain agility and extra capacity to deal with unknowns. Defending against and unknown is the height of folly, cause it's unknown you know..."

The trouble is, what if every threat against you, known AND unknown, is EXISTENTIAL? The one threat that's no holds barred is the existential threat: deal with it or die, no exceptions.

Charles 9

Re: An Alien XSSXXXX Concept or SMARTR App .... for Clouds Hosting Advanced Operating Systems*

""Insanity: doing the same thing over and over again and expecting different results."

Thing is, when you do the same thing over and over and ACTUALLY GET a different result, you're praised for your persistence.

Charles 9

Re: Definition required

But the firewalls were all relative and based on a level of trust. What happens when no one trusts each other anymore because everyone has a chip on someone else?

Charles 9

Re: Definition required

"You kept up with everyone else, so there was a balance. You also knew who could be trusted with sensitive information and who could be relied on to gossip to anyone who would listen. You had a reasonable expectation of privacy."

But when the community is small enough or connected enough, then it's hard to hide things from ANYONE because SOMEONE with loose lips will notice and spread the word. The very FACT you were trying to cover things up DREW attention to you. Before it was the rumor mill, then it was the tabloids, now it's the Internet.

Charles 9

Re: Definition required

"Privacy is the most fundamental protection an individual has. Without it all other protections, rights and freedoms are as good as worthless."

Well, what happened back in the old days when there was basically no expectation of privacy because everyone in the community kept up with you?

Charles 9

Re: Kids DON'T WANT privacy

I don't know. What happened back in the old village days when everyone pretty much knew what everyone else was doing because there were enough eyes and gossip to go around?

Ubuntu desktop is so 2013... All hail 2014 Ubuntu mobile

Charles 9

Re: Monitors and Paint

Not necessarily. A dock that can connect a phone to an HDTV can just as easily hook you up to a mouse and keyboard. That's how laptop docks work, and with a little polish, the same can be done with smartphones. The main obstacle is a standardized way of doing this breakout, as most phones only have the one USB port, and AFAIK you can't do MHL, USB OTG, AND recharging simultaneously on the one port, so an alternative is needed. Perhaps using wireless display casting and Bluetooth for the mouse and keyboard, leaving the port free for charging (perhaps use that as a triggering mechanism), and this is just one idea.

Charles 9

Re: Why?

I think the article was hinting at a Janus approach: phone in your hand, computer in a dock (and the dock would provide the necessary breakouts for attaching mice, keyboards, etc.). The phone and the dock tech isn't mature enough just yet, but it's tantalizingly close.

Charles 9

Re: I've given up on complaining about Ubuntu....

For me, the escape has been Xubuntu. For its spate of quirks, XFCE for me provides a nice middle ground: functional but not too demanding.

Charles 9

Re: Mint and Mageia bypassed Ubuntu as the most used Linux desktop distros

"To be crystal clear about my point - no one in the world give a slightest damn about Linux desktops, let alone their sandpit wars. Get over it and buy a Mac if you can't stand Windows."

And if I hate Windows AND Mac AND routinely work in graphics so need a GUI no matter what?

Charles 9

Re: Microsoft's failure is Canonical's failure.

Didn't the article mention docks as a possible way for mobile devices to bridge the gap and become PCs (complete with mice and keyboards) one they become powerful enough (almost there IMO--more and more full-fat retail games are appearing on Android).

Charles 9

Re: Microsoft's failure is Canonical's failure.

But unlike Microsoft, Linux desktop users may be a dying breed. Seems to me like this is a leap of faith with nothing else left to lose (either they get thrown under the bus or they fall to attrition in any event).

We don't need no STEENKIN' exploit brokers: Let's FLATTEN all bug bounties

Charles 9

Re: "Free" market prices

So that brings up a new problem: How does one encourage people to turn in bugs like a white-hat when the opposition is a type for whom money is no object?

Silk Road 2.0 busted! At least two arrests as federal crackdown begins

Charles 9

Re: It's all good

"As for coke and meths well they should be marketed like champagne and vodka. Cocaine is very popular in the USA and certain British politicians."

The trouble is these some of these drugs can have side effects: FATAL ones. Cocaine can cause fatal heart attack and certain opiates like heroin can cause your heart to stop. In ONE controlled dose. I think even Ecstasy can do that in one pill. Drugs that can kill when used as directed MUST be controlled for the same reason we control uses of strong acids and the like: they're life-threatening.

Charles 9

Re: It's all good

"All drugs should be controlled. I believe we should have stronger controls on alcohol as one of the most dangerous, addictive and socially harmful drugs available."

But also SO ingrained in many cultures that people would sooner declare war on their countries than declare war on their vices. Look at America's Prohibition era. If people want something badly enough, they'll get it in spite of God, Man, or the Devil. That's why the US hasn't even tried anything serious with tobacco: it's in the same boat.

Proposed California law demands anti-theft 'kill switch' in all smartphones

Charles 9

Re: Except it doesn't deter theft

Then explain the people who rob, mug, even KILL...JUST for the phone. Taking the phone to prevent them calling 911 because you've robbed everything else on them is one thing, but mugging them and taking JUST the phone smacks of a targeted mugging.

Charles 9

Re: Bricked trying to organize a protest...

"the crowd sourced gatherings that we have seen in the mid-east, just might have to resort to 60's style communications to get a decent protest into action. And no one will be able to video it... when the authorities brick all the phones in the area !!"

You forget. THEY control the NETWORK. The most common tactic they use in such a case is blackouts. What's to say they also don't OTA updates with spyware built into them?

Charles 9

Re: Duuh!

Because you can defeat the tracking the same way you can defeat the killswitch: with a faraday bag. Inside, it's invisible to the network, and as long as it's invisible to the network, there's no way they can get to the phone.

Charles 9

Re: Can you think of any other consumer good @ Alan Denman

Yes, my WALLET. And since it's UNpowered, there's sod all that can be done to "killswitch" a wallet.

Besides, what's to stop thieves from carrying faraday bags to block any killswitch signals? Then they can switch it to airplane mode through the bag or take it to a faraday cage to download all the stuff at their leisure, flash a new firmware that doesn't respond to the killswitch (and probably includes malware backdoors so they can double-dip), and THEN fence it, confident it won't brick.

Picture this: Data-wrangling boffins say they have made JPEGs OBSOLETE

Charles 9

Re: Browser support (JPEG2000)

"Yes, but JPEG2000 is required for PDF 1.5"

Maybe that's why I typically see PDFs at v1.4 instead.

Charles 9

Re: Who cares about saving space over jpeg?

"Even if it could store megapixel images in a single byte it would never displace jpeg, because saving space or bandwidth for images is a problem that no longer exists in today's world. The inevitable patents, and even if made freely available, inevitable patent trolls who will claim patents on various things it does, make switching from jpeg to something new not worth whatever storage/bandwidth could be saved."

Thing is, if you ALREADY have patents for the tech when the trolls come knocking, you can use them as a defense and threaten a patent war. That's what Google did against MPEG-LA concerning VP8 tech. With defensive patents, you can threaten to invalidate the troll patents, and if your primary mode of business isn't patent-related, you have more lenient winning conditions than the trolls: all you have to do is not lose, giving you an advantage if the fight goes to court as a mutual nullification doesn't hurt you.

I think that's one reason PNG was accepted over GIF--when the LZW codec used by GIF was enforced, sentiment swung towards PNG which used the more-lenient Deflation (trading off animation for RGB color support).

Charles 9

Re: In a world where selfie and cat videos rule the web

Actually, compression is what allows YouTube to thrive.

Without the ability to deliver these videos (and the attached ADS) over narrow mobile pipes, where would YouTube be now?

Charles 9

Re: Browser support

Which was why I mentioned Google. They're in a unique position to be able to (a) simultaneously saturate both the browser and mobile markets with the tech thanks to Chrome and Android, respectively, and (b) not really the type to patent troll: only using patents defensively and getting their revenues in other ways.

Charles 9

Re: Will it matter?

Probably because any patents related to JPEG have expired by that point, forcing the tech into the public domain.

Code-busters lift RSA keys simply by listening to the noises a computer makes

Charles 9

Re: Congratulations - excellent work!

"Of course, they then took this further, realising that, as the source of information was seemingly voltage regulation, there should be ways to measure this more directly. In one of their experiments they get the same information from connecting a voltage probe to a CAT5 cable connected to a switch - at the switch end."

That's an interesting feat, given that CAT5 cables are UNshileded (being a UTP cable).

Macbook webcams CAN spy on you - and you simply CAN'T TELL

Charles 9

If the camera can see infrared (which can pass through the tape), maybe.

Charles 9

Re: I'm more worring about hacked "Smartphones"

"I think perhaps you need to realise there are other phones on the market other than ones made by Apple and a good number of them do indeed have normal removable batteries."

I think perhaps you need to realise that companies OTHER than Apple are building phones with permanent batteries. Recent phones from the likes of HTC and Motorola spring to mind. Indeed, due to a demand for more battery life (and, if you're paranoid, a desire to steal control away from users), more phone manufacturers are doing this. I personally don't trust this (I insist on being able to yank a battery in case of a sleeplock or wakelock), but consumers aren't the only voice in the matter, and the consumer doesn't always win in this market.

Don't listen to Snowden ... Intel: We've switched on CPU crypto for Hadoop

Charles 9

Re: Bah!

(JOKE RIPOSTE) I think that's the plan. If it's so transparent the hackers see THROUGH it, they can't see the cipher data meaning they don't know where to hack. Encryption where my data becomes invisible would be rather nice IMO (END)

But seriously, the easiest way to get data encrypted on a widespread basis is to make the process turnkey simple, and a transparent (automatic on-the-fly) process can be a step in the right direction if done properly.

As for the paranoia, you might wanna just wring your hands of the whole affair. Let's face it; few things have as much resources as a state, and if ONE state hasn't subverted half the programmers and coders in the world, then the Russians, Chinese, and Arabs have probably polished off the rest. Which basically makes it a case of "Don't Trust Anyone," which means nothing gets done anymore.

Steelie Neelie: EU biz can use YOUR private data WITHOUT PERMISSION

Charles 9

Because the tool that can hide you from the government can also be used to subvert and destroy it. That's always been the dilemma of governments that give some sort of liberties: those very liberties can be turned against the government, so the government is basically underpinned on trust. Which becomes more complicated in a country like the United States which was founded on DIStrust of government.

Charles 9

So someone needs to tell as many people as possible that, due to the business models involved (where just ONE trace is all it takes), anonymity has become black-and-white. Either data is untraceably anonymous or it's not anonymous at all: nothing in between.

Makes me think to the general polarization of society in general, to the point that I can't help but think the ultimate outcome will either be NO anonymity (resulting in a police state) or TOTAL anonymity (resulting in anarchy).

French gov used fake Google certificate to read its workers' traffic

Charles 9

Re: Techie question.... @Jamie

Even so, if your client has been pwned without your knowledge (due to a drive-by, for example), they could disguise the fact they stole your key by replacing any DISPLAYS of their key with your original one (false facades are common in malware now). In that event, how would you be able to tell that the key you see is the key you're actually using?

No anon pr0n for you: BT's network-level 'smut' filters will catch proxy servers too

Charles 9

Re: if the sites which host the workarounds are blocked...

That would just be considered a site hosting a workaround that gets blocked, too. Put it this way. A workaround for a workaround is still a workaround.

Frankly, I think all the tail-chasing is just an exercise to build evidence for whitelisting, which can deny by default.

Charles 9

Re: this will end in disaster

What about a whitelist? Then it's deny-by-default.

Charles 9

Re: Change the DNS server...

So even if you poll DNS directly from your PC, it'll still change the DNS request to BT? What about an obfuscated or off-default DNS request?

Charles 9

Re: Who cares!!!

"all am going to say is look at chinas firewall and your see why filters will not work"

IIRC China's system doesn't outlaw all encrypted traffic and doesn't work on a whitelist system (meaning you can ONLY go to those sites they've vetted, meaning new sites are blocked by default). Without this "deny by default, deny when in doubt" attitude, things will still be able to slip through.

Charles 9

Re: First they came for the DNS

If that were true, it wouldn't be able to block an encrypted connection because encrypted data, by definition, can't be sniffed. Has anyone been hit with a "Site Blocked" message while using HTTPS that's either direct to the IP or using a third-party DNS? If so, then IP checking must be in place at the least (how else would they catch a connection for which the only thing they know is the IP).

Bjork, 500+ novelist pals ask UN for 1 bill of digital rights to RULE 'EM ALL

Charles 9

Re: Why anonymous in concept for democracy is important

In other words, because the average person lacks the desire or capability to think in terms other than black and white, the inevitable outcome of society (ANY society) is polarization into either totalitarianism or anarchy: most likely the former as the latter will likely devolve into the former given time.

FreeBSD abandoning hardware randomness

Charles 9

Re: AVEGED

"Yes, but HAVEGE originates from a French institute (http://www.irisa.fr/caps/projects/hipsor/index.php) and so is likely to fart in your general direction, you son of silly persons."

It's not like it's being used directly. In Linux, it's used like most other HW generators are: shoveled into the kernel entropy pool where the kernel then does the scrubbing. In that context it's at worst harmless and at best quite useful.

And failing that I can go back to the webcam generator, since I've been monkeying with the code personally, I know what's going on. The original code did plenty of whitening, but in my tests using a cheap webcam with the lens taped over (and just to be sure, it's face-down) it couldn't pass FIPS 180-2 tests until after I gave it a further parity scrub. Beats waiting on an Entropy Key.

eBay head honcho: Amazon drone delivery plan is 'FANTASY'

Charles 9

Re: Collection points..

The whole business is a classic tradeoff between consolidation and turnaround time. Consolidated delivery centers provide the benefit of lower logistics costs, but now Amazon is seeing the other side of the coin: the fact that people will pay for instant gratification (thus why big boxers like Walmart still work; for some, there's nothing like walking out, goodies in hand, and they feel the added taxes and so on are worth it to get right blanking now), meaning having warehouses closer to the customer costs money but saves time.

Bring it on, stream biz Aereo tells TV barons – see you in Supreme Court

Charles 9

Re: Stream Your Own TV

To do that, you need a device with DLNA capability. And believe me, I check the specs carefully on those things. Trouble is, many of them have (a) spotty codec support, (b) lousy UIs, or (c) both. The closest thing I've found to a repurposed PC is the WD TV Live, but its video quality leaves plenty to be desired. And no, the Raspberry solution tends to be laggy at high resolutions.

Many "network-enabled" players don't really support DLNA but rather support the "usual suspects" like Pandora and YouTube.

Plus your TV capture cars only supports OTA programming. My programming tends to come through digital cable, requiring a box, so it's more complicated.

Google tells EFF: Android 4.3's privacy tool was a MISTAKE, we've yanked it

Charles 9

But I like to use ART, and Xposed and ART don't mix. Anyway, I have a build that includes a working Privacy Guard built-in. I've set it to default to blocking new apps that I install. That way it's hard to be caught off guard.

Charles 9

Re: I'll side with the Against but Sympathetic crowd

But you do. Controlling the acts that give your privacy away is HARD...because SO MANY things give hints as to your identity. It's like the skill needed to do some actual work on your car like changing the oil or swapping wheels: many people don't care about it and let the experts do it, but if you want to do it yourself, it's considered wise to read the manual first lest you break something.

US military's RAY-GUN truck BLASTS DRONES, mortars OUT OF THE SKY

Charles 9

Re: Ask The Physicist

"When polished metals reflect more than 95% of visible and longer wavelength light the only colour which can avoid almost trivial countermeasures is ultra violet."

I think the need to get it to at least 99%. Otherwise, the 5% that DOES get absorbed would deform and defeat the polish, allowing the other 95% back in again to finish it off.