Removed from search results ...
but no comment about removing it from the profile that is built about you to help google target you with more adverts.
2653 publicly visible posts • joined 29 May 2007
Except any form of transit can be snooped. Dead drops can be watched, mail intercepted, and so on.
You are talking about Traffic analysis, this is very different from breaking encryption; it is an important tool as it gives clues on who fellow terrorists/crooks/... may be. By nobbling encryption those being watched will use different communications, some of which will not be so easy for traffic analysis.
Politicians are used to a world where there is no such thing as a real binary choice: true or false and nothing in between. They come up against someone of a different opinion and argue, push, cajole, entice, bribe, blackmail, ... and a 'no, never' will turn into a 'maybe'.
They don't really accept that there no such thing as a safe back-door in encryption, or anything else.
Their reasons for doing this do not add up: they will catch a few low level crooks/terrorists/bogey-men but not the competent ones, IsisSoft Inc will not put back-doors in their code. So what is their true motivation ? It is appearing to me as increasingly totalitarian.
If they do push ahead with then we need a mass revolt by techies - all at once. They can pick us off one by one, but not by the thousand.
.
This comment alone probably puts me on the terrorist watch-list - the idea that normally meek geeks will stand up is one that politicians must find terrifying.
Please can someone explain to me how:
Capita Customer Management said: "We ... as an organisation that takes equal opportunities very seriously"
and:
Capita has lodged an appeal against the tribunal's decision.
are consistent ?
Why is it that women, supposedly, receiving less pay is screamed about in the media but men being disadvantaged is largely ignored ? Kudos to El-Reg for reporting it.
Locums don't rent accommodation to work at a different place. They are brought in for a day or a few days to cover staff shortages.
A lot of locums are brought in to cover pregnancy-leave/queue-bust/job-advertise-interview-cycle/... and can be at one place for a few months. Often this will not be commutable (especially for specialists), if, as employees, they cannot recover: travel, hotel/b&b, cost of eating out, then they will be considerably worse off.
This is a case of government labeling hard working, medium earning locums as people sponging off the NHS because it is a cheap way of shifting the spotlight of NHS funding blame away from politicians.
The NHS would be much, much better off if the trusts had not been forced into very expensive PFI contracts. This was initially a fudge brought in by John Major to cook the books so that government borrowing could be seen to be lower; the cost was to boot the debt repayment into the future; NOW is the future, this is part of the reason why the NHS (+ schools, etc) are running out of money.
How is this not a form of racketeering ?
How is this not a form of dumping ?
Both are illegal (criminal). How have these companies been allowed to get away with it ?
only 46 per cent of CMOs and 44 per cent of IT staff thought that they had a responsibility to control access to personal data.
Maybe these people should look at the 7th Data protection principle:
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
It would be interesting to see how many organisation break the 8th principle by exporting data to the USA - which does not have adequate protection in law of personal data.
The blame here is firmly on those still using an operating system that is 16 years old.
Today is some 16 years after Windows XP was first released, but the important date is when machine were last sold with Windows XP - this was some time near 2010; so for those machines XP is only about 7 years old, but support ended in 2014 - when those machines were 4 years old. It seems to me that a computer that is 4 years old is still quite young, support should have continued longer.
*all* systems are capable of being 'owned' - assuming anything else is reckless. If you use such a system then you must accept that something bad could happen; air-gapping will provide a degree of protection but not a guarantee.
So: who uses ancient hit ?
* old desktops - not excuse; replace them
* embedded kit (eg ATMs, Point of sale terminals, MRI scanners). How long is this expected to work for ? If the manufacturer of a £150,000 MRI scanner gives the expectation that this will work for 20 years then they *must* provide security updates for all of those 20 years - no excuses. They will provide hardware support but just shrug their shoulders when asked about operating system updates. So the needed updates do not happen and they leave their customers open to the sort of thing that happened last week. Part of the reason is that they cannot update an old operating system - they do not have access to the code to do so.
Building long lived kit on top of Open Source software (eg Linux or a BSD) does give the maker the ability to back-port fixes to vulnerabilities. This is the only sane way of building kit that is expected to work for more than a few years.
which is why when considering marriage, be that outsourcer, software supplier, ... part of the calculation should be: what will it cost to move away at the end ?
The supplier will, however, be doing its best, once the deal has started, to ensure that the divorce costs just rise. Think of the numbers who would like to move away from Oracle or Capita.
Not using a mobile phone would figure highly on my list of how to keep my bank a/c safe. Next: not to login there from a MS Windows machine.
It would help a lot of the banks stopped 'phoning their customers about whatever and as a first step ask the customer to verify who they were by answering security questions!
comms providers will be required to make bulk surveillance possible by introducing systems that can provide real-time interception of 1 in 10,000 of its customers. Or in other words, the UK government will be able to simultaneously spy on 6,500 folks in Blighty at any given moment.
That makes the assumption that each person only has one Internet connection. For many it is 3: home, work & mobile. So double that number - at least.
Now that Microsoft has got a large number of machines being upgraded when it wants it can start to roll out code that breaks other systems; be they those who are still running old versions of Microsoft Windows (ie not 10) or those who run non Microsoft operating systems or applications. Eg Linux or LibreOffice. They roll out applications that handle a new file or wire protocol in March and then make it default in September, removing use of old protocols next March, so software more than 1 year old will then not interoperate with the latest stuff.
They will claim that this is all in the name of progress or fixing security vulnerabilities; but the real reason will that they will start saying how non Microsoft software is incompatible, not good enough, ... So LibreOffice (and similar) developers will have to waste a lot of time playing catch up while Microsoft sniggers.
Other software vendors play this game, eg Autocad is continually updating file formats which makes it hard for users of old versions to read files from a user of the latest versions.
This will also help with forcing people to take out a subscription: no subscription so you don't get the latest Microsoft Word ...
Surely the wrong units; if you get a direct feed into the brain the units of information are going to be something like: memes or gestalts.
A word is only one way that we communicate these internal entities to others; it is because of the limitations of our input/output hardware (ears/mouth/...). If you can interact directly with the brain then you can access the underlying units of thought.
All that code that these ad slingers are running on my machine (in my browser). Did they ask me permission to do that ? No! I give implicit permission for Javascript to help with the page layout, form manipulation, ... but not for them to Sherlock who I am, if I want to let them do that then I agree to keep one of their cookies -- all else is without my permission.
Having said that our chocolate teapot that is the ICO would just find an excuse to not do anything.
So: should they have to ask permission to run this stuff, how many users would that turn away ?
like my Samsung smart-phone - they stopped producing updates very quickly. I asked and was told that they had determined that ''the last update provided what their customers needed'' - translation ''we have sold it and can't be bothered to maintain it, we would rather that you bought a new one''.
* small projects that are easy enough for people to fit all the components into their heads at once.
* prototyping/mock-ups.
Anything seriously big needs proper design, otherwise the obvious things are done and the corner cases forgotten and the various pieces don't quite fit well with remote components.
The other thing about this project is that it will result in UK government outsourcing a lot of work to call centers, etc, India at a loss of UK jobs and skills - it might save MoJ some money but will end up costing the treasury many times more: less tax receipts and more dole money.
ALL the information you need to reverse-engineer the private key is present in the public key, but there is NO practical way to recover it.
But how do you get the public key ? You get it over the Internet. This makes you vulnerable to a man-in-the-middle (mitm) attack -- where someone sits between the 2 parties and decrypts/re-encrypts the data. This would be expensive for the spooks to do, but they could do it for individual high interest targets.
This is why we have CAs (Certificate Authorities), they allow the web browser to check the public key so that a mitm attack cannot work. This relies on the CA's own certificates being kept private.
There is no guarantee that the CA's certificates are not known by the spooks. I would be surprised if NSA/GCHQ did not have most of them.
Because PGP allows you to check a remote user's key by other means [remember key signing parties ?] its keys are not so easily compromised.
Summary: public key exchange encryption can already be broken. PGP looks still safe.
Should have been paid by the cold calling individuals - not the company. Penalise the individuals and they might change their behaviour. Penalise the company and they will see it as just another business cost - this time they got caught, plenty of other ones they did not.
This is what is needed in the banking system - but will not happen, politicians get too many lucrative consultancies once they have left office.
Watching Youtube was never for free. Granted you did not fork out cash but you paid by watching adverts and helping google build its profile of you (what you like to watch) so as to better push adverts at you.
Free is one of the most abused words on the Internet.