Re: There appears to be an assumption
"I see a tiny point of failure there"
How dare you! I'm assured it's a perfectly reasonable size!
6738 publicly visible posts • joined 23 Feb 2010
Well ISPs in the US already get a subsidy to pay for them rolling out broadband to less well off areas. This whole article is about how they'd like to reduce the definition of 'broadband' to make it easier (and cheaper) for themselves.
So your society has already deemed that everyone should get internet access, but the ISPs are trying to change the rules so that they don't have to spend as much money.
"Poor people only get to live 58/100ths of their life ???"
As per this study covering 1980-2014, there's a 25% difference in expected lifespan between the most and least well off counties.
So poor people in the US get to live a whole 75% as long as the rich, that's loads better than 58% right?
"Isn't that one of those documents that HR holds close to the vest and makes sure the last people that have access to it are the employees?"
No, it's the one where they insist that you sign a bit of paper saying you've read it (in the three minutes allotted), and then make fifteen revisions to before the ink is dry on your signature.
It's worse than that, they were being asked by a security firm (ie this was a PR exercise) if they had any staff who'd had 'security training'.
So apart from the fact that this is only being reported on because a company's marketing department saw a good way to get attention, it also begs the question, exactly what kind of 'security training' would be useful? All the people I'd trust to secure a system have exactly zero formal training. From my own experience of IT training, although I did learn stuff, the actual certification just showed that you could complete and exam, not that you had any aptitude for the subject.
So, perhaps the NHS has no competent security staff, or perhaps it has lots who've never had the budget to be sent on an overpriced training course just so they can put a line on their CV saying "security trained". This PR piece doesn't really give us the information to decide.
"something that could in parts be older than the solar system"
If you go up to the asteroid display in the Natural History Museum in London they have a tiny bit of dust from the interstellar medium, which likely pre-dates the rest of our solar system. You can see it with your own eyes (but not touch it obviously).
There was telemetry collection at least as far back as XP. That's what the "Send Error Report" button on the "X has encountered a problem and needs to close" dialogue meant (eg).
Because of people occasionally hitting the send button, they realised that crappy drivers were causing a huge proportion of crashes in Windows, which is why they moved to the new driver model in Vista, and presumably also got the taste for using user telemetry to diagnose widespread problems.
What's always impressed me about DOOM is just how far the engine has been pushed.
It's been run on everything from graphing calculators to a spectrum analyser. The engine itself has been ported and expanded to the point where people are still making mods for DOOM, but they look like this.
"Thermal system cannot be more than 50% efficient and more like 40% whereas lithium ion systems are going towards 70%."
Relevant line from TFA:
"Lithium-ion costs run about $300 to $400 per kWh-e, he said, while a molten silicon system looks like it can operate at $30 to $40 per kWh-e"
It's (potentially) ten times cheaper, and that means it can be nine times less efficient and still be worth it.
I'd always assumed before today that it was a generic name rather than a trademark. It does betray a certain lack of imagination;
"We're going to sell vacuum cleaners for people to use in their workshops, what shall we name our company?"
"How about Shop-vac?"
"Brilliant! Trebles all round!"
"So for some people in power, the War on Drugs has worked out quite well."
Exactly, the War on Drugs hasn't failed, it's succeeded in all the ways it was ever intended to.
It's made money for 'defence' contractors. It's made money for prison owners. It's got votes for hardline politicians, and not coincidentally, it's locked up a lot of black people.
"They offered him a deal where he won't face the music in the US"
To be fair, they might have made that sound like a new special deal they'd made up just for him, but that's standard UK policy. We don't have the death penalty, and so we won't extradite anyone to a country where they are likely to get the death penalty.
Nothing stopping them from either extraditing him to Sweden or Australia where they might be more willing, or asking the US to pinky swear that the worst he'll get is life imprisonment, which is all it would take to get past the "no death penalty" requirement.
Either way he's still got to serve six months in HMP for bail jumping before he goes anywhere else.
"why don't they go for full monty and just clip the wings and affix proper wheels to an SR-71 or Saturn V or whatever is available?"
Even aircraft that are quite capable of breaking the speed of sound, don't/can't do it at an altitude of 0m. The increased air density, and the reflection of the shockwaves off the ground would basically destroy a wingless aircraft. Instead all the aerodynamics have to be designed with 1000mph at 0m as a requirement.
"They can update the app, but egress traffic from each participant cannot be avoided without fundamentally changing the protocol."
AFAIK if you were traffic sniffing your phone, all you'd see is encrypted packets going to/from Whatsapp's servers, so there'd be no way to tell there.
As for "ignoring the keys", I mean that currently if someone is added to a group chat, you would normally get a notification along the lines of "J BLoggs has been added to this chat". They could add a client side update such that when GCHQ is added to a group chat, it did not notify the user.
This wouldn't be possible with an open protocol like PGP, but when the only way of using Whatsapp is a closed source program, there's no way of telling what's happening to your conversations other than trusting them.
"If they tried to push an invite out to 5eyes, then each device could notice that the administrator has pushed an invitation to a new member."
Unless they update the app to silently ignore when certain keys are added to the conversation. When they control the client as well as everything in between, they can add eavesdropping in a way that would be invisible to the end user.
Of course, once they have the capability to do that, you have to wonder what processes are in place to prevent (eg) someone bribing a Whatsapp staffer to give them access to a private conversation.
"why the f*** would I move the mouse between the two clicks?"
Reading between the lines in what trydk said, the user had some kind of impairment/disability that made clicking difficult, and because of that they were unable to keep the mouse stationary whilst clicking.
In that situation you could try turning down the mouse sensitivity, or possibly moving the user to a trackball (if possible).
When somebody does not understand, then it was not explained well enough.
It depends on how 'advanced' your users are. I once very carefully explained that I wanted someone to turn a computer off, and specified that I didn't mean the screen, I meant the separate box with flashing lights on it.
Cue five minutes of me getting more confused about a lack of progress, until I realised that contrary to what I'd said, the user was pressing the power button on the monitor.
Not only do you have to explain things well enough that even the least technically-savvy can understand, they also have to f**king listen to what you say.
Still, at least he tried, I've had other calls when I've asked the user to do something simple, only to be told "sorry, I don't do computers, you'll have to wait until my manager is back in next week".
"If my (non-Amazon) warehouse manager had a nickle for every time some dumbass ran over a can of paint or something like that with a forklift, he'd have the money to train them and buy decent forklifts."
Perhaps your fellow workers just need to watch a film about forklift safety?
"This is how we do technology development in the 21st century - incremental delivery."
Except when they're being "disruptive".
Australian Government: Put backdoors in everything.
Also the Australian Government: Don't use Huawei kit, it's got backdoors.
I'm sure they'll be able to use legislation to stop bad people from using the backdoors. That's bound to work, right?
"I do not see why this service would be considered 'unethical'"
For me, it's not that he's acting as a middleman, that's something I can see me having to do if a friend came to me with a ransomware problem. It's that he's pretending that he's cracking the encryption himself, and then he's putting a massive price hike on top. If he was being up front with his customers then I personally wouldn't have a problem with it.
The trouble is, those flat Earth types will just tell you that your picture is a fake, or possibly it's spherical aberration caused by the camera lens, or {insert pseudo-scientific bullshit here}. There's nothing you could show them that would change their mind.
Twenty years ago the majority of flat Earthers were just trolls (and there's definitely crossover with elReg comentards there), but these days there seems to be more people who actually believe that nonsense.
But if you mention the word "wireless" most people will just think of how they 'get the internet on their laptop'.
I've had people tell me "I have wireless internet", meaning ADSL+802.11. The precise and technical language that we might use is nothing more than words to the average person.
"with the final system likely over budget and behind schedule."
Not that these aren't possibilities, but I'd be expecting something technically audacious, which ends up being wildly over-ambitious and ends up being cancelled, with any leftover hardware ending up in a museum somewhere.
See also: Black Arrow, TSR-2, Rotodyne, HOTOL etc. etc.
Still, at least Britain's aerospace museums will be great.
"They can't crack high-quality encryption. Well, they can"
If anyone has even a theoretical attack on, say, PGP, I'd be interested to hear about it.
Certainly there are still systems that use out-dated and cracked encryption (eg A5/1 used in GSM phones), but your average SSH session is so close to being unbreakable that hacking into one of the endpoints is the easy/only option.