Re: Its all binary
Pi is not proven to cover all possible number sequences.
236 posts • joined 26 May 2010
I was one of the initial group of people (number 7 if the allocated IP addresses were anything to go by) who had been following the tenner a month Usenet run by Cliff Stanford. I committed to spend the requisite tenner a month and got my first internet connection as part of the very first group. Prior to that I'd been using UUCP. It was a huge step forward for me and now I'm the CISO at an insurance company and I don't think my career would have progressed the way it did had it not been for my first internet connection provided by Demon.
RIP Demon internet, you were great.
Not a single person lost a single penny as a result of the unauthorised disclosure. There were no losses.
If this had been an action in tort, there would have been no question of damages as there has been no loss. The DPA includes provisions for claiming for distress, which is the basis on which this claim is being made.
Unlike the ICO, I have read the legal submissions. She isn't missing anything.
Again, this is factually and legally incorrect. See my comment above. Morrisons was found not to be at fault in the first trial and this verdict was neither appealed nor over-turned.
The finding of the first trial and appeal was that Morrisons was vicariously liable for the actions of its employee but was explicitly found not to be at fault.
This is legally and factually incorrect.
The first judgement (which I have read and you clearly have not read) made it absolutely clear that Morrisons had not breached its responsibilities under the Data Protection Act. In addition, the matter was fully investigated by the ICO which took no enforcement action nor required any remediation.
The issue is purely whether Morrisons is vicariously liable. Morrisons has been found not to be at fault and this verdict was not appealed.
I used to be a consultant at one of the Big 4 firms and one of my areas of specialism was asymmetric key cryptography, Public Key Infrastructures and Trusted Third Parties. It was a fascinating field. It was technically challenging, which I loved and there was a huge number of potential uses.
Fortunately, I went on to specialise in information security more generally because despite all the hype, PKI never took off in the way that many people (including me) hoped.
The issue with a lot of crypto technology is that the underlying principles are often elegant and reasonably easy to explain as long as you don't get into the maths. The same could not be said for the implementation. Cryptography is often extremely hard to implement in such a way as not to break anything. The implementation details mattered and in the long run, they were very often a major stumbling block when going from a simple POC to a full implementation.
Blockchain looks very similar to PKI from where I'm sitting.
You may not but it is my job to want to know what's in our staff's files (or at least anything they share).
You surely must have heard of the Data Protection Act and the General Data Protection Regulation. Companies are required to implement "appropriate technical and organisational measures". Doing nothing is not an appropriate technical or organisational measure.
The files to which you refer are the property of the company, not the individual. As the person responsible for protecting data belonging to our customers and to our staff, I have every right - both legal and moral - to examine what people share and that is a right I exercise.
I made sure when we introduced a similar policy that not only is all removable storage (which includes phones) banned from corporate devices, we installed a DLP agent on corporate laptops that blocks certain types of data being copied by any mechanism.
It's not foolproof but it would stop the vast majority of our staff doing anything I don't want them to do.
It's also worth pointing out that simply defeating the control is not sufficient to protect a malefactor. I have personal experience of several instances where controls were in place but were circumvented. In every case the culprit was identified as a result of a forensic investigation.
You have entirely missed the point.
No-one is suggesting that restricting the use of USB sticks will entirely mitigate the risk. I don't know where you work but setting up "a netcat transparent proxy" is something 99.9% of our staff would have no idea how to do. As long as the risk is limited to 0.1% of a company's staff, they have achieved a pretty impressive level of risk reduction.
I venture to suggest that you are not a CISO.
It's fine to say this in a business that employs 5 people. It makes no sense where I work - we employ well over 100,000 people. I know from personal experience that trusting everyone can backfire. I also know that the ICO does not regard simply trusting one's staff as "appropriate technical and organisational measures".
I am the CISO for a FTSE 100 company and we have had the same policy for more than two years.
If a technically competent person wants to steal data to which they are given any sort of access, they will likely succeed. However, implementing restrictions like this has two big benefits.
Firstly, it forces staff to use a more controllable and auditable approach to data transfer. When our staff share information on Google Drive, for example, they can retain a considerable degree of control over what is done with that data including revoking access and preventing further sharing. My team and also monitor transfers (including examining the content for personal information) and keep a forensic trail. This reduces the risk of mistakes and permits my team and me to examine the circumstances of mistakes.
Secondly, this limits the ability of less technically competent but malicious members of staff to harm our business.
Can I absolutely stop people stealing our data? Probably not. Can I reduce the risk that someone will do something stupid or malicious? I absolutely can and I have. The sky has not fallen in. In fact, no-one really cares.
Most of the time I've seen IT projects go spectacularly wrong (and I've seen a few in my time as a Big 4 consultant), they were big ones. I am no project manager but it appears to me that project difficulty grows exponentially with project size.
Government projects are usually big and have the additional drawback of being overseen by the Government.
Did you actually read anything about him? He isn't "kinky" he is dangerous. He has admitted enough that I'd be happy to see him incarcerated for what he has said.
This man will do something terrible sooner or later. I don't care about his freedom. People here are sticking up for him like he's some sort of Edward Snowden character. He isn't.
"People like who?"
How about people who admit that they are only sexually aroused when their partner (victim?) is scared, that's who. He has effectively admitted to being a dangerous and deviant individual so bollocks to his freedom. I don't know how many of the commentards here have a daughter (very few I'd guess) but I'd be interested to know whether those of you who do would be happy for her to be exposed to a man like this. Those of you who don't and are men are expressing a view on something that will never affect you.
A court of law is not the only way to establish whether someone is a danger to society.
Why would anyone want several data plans?
My phone (and presumably just about every recent Apple or Android phone) works very well as a wireless hotspot. Out of curiosity, I just got my phone out of my pocket and turned on the hotspot. It took me the grand total of 4 seconds. Why would I want dedicated hardware in my laptop?
I just returned from a family holiday in the UK where everyone used my phone for data while we were staying in the cottage and driving about. We got through > 20GB without a word of complaint from anyone and believe me, my children complain within approximately 1.5 seconds if there is any wifilessness.
This looks like a solution to a problem that we no longer have.
I'll tell you what, why don't you publish your real name and invite the sage users of ED to do the same to you and show us how you can just laugh it off.
I'm sick of pathetic lowlifes thinking they can be as obnoxious as they like simply because it's the internet. The more of these arseholes that get locked up or face large fines, the better.
My employer (FTSE 100 for which I am the CISO) is likely to roll out Google Desktop (particularly email, calendar, Drive) in the near future so I have been evaluating Chrome OS as part of the future road map.
It takes a bit of getting used to but Chrome OS has some real advantages in terms of OS verification at boot and simple management. I would be very disappointed if it were to be killed off.
Chrome OS use has ramped up slowly but it fits neatly with Google's cloudy strategy. Being able to run Android programs would be useful but killing it off entirely would be a shame.
This works but it has a very big drawback compared to an SD card in that you have a large cable sticking out of the bottom of your phone which, if knocked hard, may completely break your phone.
I bought a Nexus 6 despite the lack of an SD card slot. It's less of a shag than I expected but it's still a shag. 64GB isn't that much these days and I too have a very large music collection (a lot more than 64GB). I miss the SD card slot on my previous Galaxy S4.
I am considerably older than GUIs and I'm struggling to think of a UI feature that I have detested as much as the disappearing scroll bars. Who, in God's name, thought that it was a good idea hiding important GUI elements such that careful hovering in exactly the right place was required to reveal them.
When the article said that the scroll bars had changed, I foolishly hoped that they had gone back to being usable. Canonical, get your act together.
I've only had one sexual relationship in the last 32 years (I should point out that it has lasted 32 years - it wasn't a one night stand 32 years ago) and I have to say that I would regard that as a success. I also sit firmly in the middle of the BMI chart despite being tall.
One thing that this research does show is that being plump, while it may or may not result in short relationships, does not result in no relationships. However, in a country where almost everyone is overweight, people don't have much choice other than go thirsty.
...I did some work for as a consultant had a similar experience. There was a server running OS/2 (this was a few years ago but even then it was old) but no-one knew where it was. It ran a really specialised piece of software that had performed its function perfectly for years so it was left to its own devices.
Eventually we decided to find it for DR purposes and we had to work out which ethernet cable belonged to it and follow it back. This server was also in a wall void although it wasn't very dusty so it wasn't too filthy. We moved it and shortly afterwards, it was replaced. I wish we'd left it where it was and it could have been a sort of computing time capsule.
Men signed up and paid money in the hope of cheating on their wives. At least at a knocking shop men actually got what they paid for. Ashley Madison appears to be no more than a fraud perpetrated against men who were too sad and unattractive even to have an a successful relationship with their wives much less another woman.
I had been intending to buy a OnePlus One so I joined the forum (and the queue for invitations) and waited. And waited...
Eventually they sent me an invitation but because I didn't see the email for more than 24 hours, it was too late (they were only valid for 24 hours). At that point, I decided that any company that could bollock up something this badly was not to be trusted to provide reliable support so I fell into the arms of Google and I now own a Nexus 6.
The OPO was a well specced phone for the price and I dare say that the OPT will be as well but I don't trust a company that is prepared to piss so many people off.
I haven't worn a watch since I was seven. As a consequence, I am very good at estimating the time. It's unusual for me to be more than 5 minutes out and I can usually guess more accurately than that. I use my phone more often than I need to tell the time so having the time on my wrist is absolutely no use to me.
I bought my son a Lenovo laptop about 9 months ago. It took me at least two hours to clean up all the adware/spyware/malware it came with. I blamed Curry's (amazingly it was the cheapest place) for it. It now appears that it was all Lenovo's fault.
Fortunately, I am paranoid so I inspected all the software and certs I could find to see what it was and removed everything I wasn't familiar with (which was pretty much all the 3rd party software)but some of it was very difficult to remove and would probably have been beyond the ability of the average user.
I am not impressed.
Chutzpah is a Yiddish word that means barefaced cheek (a classic example is the man who murdered his parents and then threw himself at the mercy of the court because he was an orphan). You cannot wear a chutzpah.
I suspect you may have mean the skull cap known as the kippah in Hebrew or yarmulke in Yiddish.
I used to know someone who really talked like this. He has plenty of money so £10k on a pair of speaker cables wasn't that big a deal to him. I pointed out that measuring equipment was not able to discern any difference between his solid silver interconnects and £50 copper cables. He did indeed resort to the audiophile nonsense of talking about "warmth", which, according to him, couldn't be measured. He genuinely believed that there was a difference so, to him, the £10k was worth it.
Clearly, he was a fuckwit of the first order but he really thought his money was well-spent. Truly, high end (i.e. high price) audio equipment is the alchemy de nos jours.
Biting the hand that feeds IT © 1998–2020