* Posts by Brian Scott

70 publicly visible posts • joined 13 Jun 2007

Page:

BMC's $1.6B victory over IBM is TKO on appeal

Brian Scott

Re: BMC still around?

My BMC bike is really nice. It would even be really fast if I was a lot fitter. Cadel Evans won the tour de france on a BMC riding for the BMC team.

I don't drive my old BMC Wolsely (15/60) anywhere near enough.

Oh, and I do have an old BMC software cap somewhere around here.

So yes, the initials are well and truly over-used.

BTW: The P76 was quite a good car in it's time. I really liked the V8, but most of them have wound up in speed boats. I could also sell you about a dozen P76s if you like but none of them are running any more.

ICANN proposes creating .INTERNAL domain to do the same job as 192.168.x.x

Brian Scott

Or the alternate version of history is that Microsoft recommended .local to try to shaft the effectiveness of mdns in corporate networks.

Timing is everything.

Apple swipes left on the last Touch Bar Mac, replaces it with a pricier 14″ model

Brian Scott

About time

A failing touch bar on my previous mac was the final reason it had to go. The thing strobed at me and caused the machine to randomly reboot.

Quoted price to have it fixed was about $1k because it involved a new case. Scratches on the case meant that it was my fault apparently?

One of my most used keys after the letters, numbers, return and space would have to be the escape key. To have an escape key that was only there when the lights were on was a absolute cockup. You sometimes needed to hit that spot twice (once to wake it up) unless you were unlucky. I think they moved to a physical escape key later on.

The other major problem (as others have mentioned) is that the last thing you want as a touch typist is having to watch the keyboard to see where the keys you want are located in this particular application.

All that now remains is to make sure that whoever approved the thing going into production never works in IT again.

Europe's Euclid telescope launches to figure out dark energy, the universe, and everything

Brian Scott

Re: Forty Two

spoiler!

Stanford sends 'hallucinating' Alpaca AI model out to pasture over safety, cost

Brian Scott

Not surprising

When a human learns, they will generally be guided by conversations with teachers, parents, and peers. This helps to create a model of what is good or truthful and what isn't.

The quality of the result depends on the quality of these extra inputs.

In the absence of any sort of guidance and mentoring, you could wind up with anything.

Beijing grants permit to 'flying car' that can handle 'roads and low altitude'

Brian Scott

Re: That looks pleasingly lethal

"I wonder how they detect people standing in the arc of the propellers?"

Blood spatters on the cockpit. Sure sign.

Well that escalated quickly: India demos homebrew mobile OS

Brian Scott

Re: Let's see images or code

I suspect this has been around for a while and isn't (much of) a rush job.

After the announcement a week ago, a company has put their hand up and said "we've already got one".

Odds are the thing is a variant of one of those systems you mention but the real question is how far have they moved already.

Device drivers exist for linux based on Google's work with Android so most people would start further up the stack in inventing anything. Also binary compatibility is worth a lot so that encourages a lot more copying.

There's still a lot of room to improve things without changing everything at once.

Multi-factor auth fatigue is real – and it's why you may be in the headlines next

Brian Scott

Location data

"..showing users what application they're signing into and the location of the device, based on its IP address, that is being used for signing in"

I think this can be counter productive. I'm often asked to verify that I'm logging in from Australia (a big place so not that helpful), or from Melbourne or Sydney (300km, 800km away respectively), Location by IP address is very hit or miss in Australia.

I understand this and can ignore the silly messages. I only verify when I'm sitting next to the computer and am causing the alert process.

Most computer users are at least a little less IT literate than me. Telling them they are being attacked by somebody 800km away will often not end well. In the end-user mind, telling somebody to ignore some details in a message is the same as telling them to just confirm every message. The topic of this article.

A further problem occurs when some installed software connects to the mothership at system start up, causing verification messages when the user isn't expecting them.

I like the idea of entering a code from the SMS message to complete the loop properly, even if I sometimes have to ring the guy who was previously in my job to get the verification code. His yacht is normally in range so this isn't much of a problem.

I don't think good reliable authentication is anywhere near a solved problem yet.

Firefox points the way to eradicating one of the rudest words online: PDF

Brian Scott

Re: I don't mind PDFs

Hmmm,

Sounds like I should be switching back to Firefox then.

SK hynix and Los Alamos Labs to demo key-value store accelerating SSD

Brian Scott

Just wait long enough...

It looks like IBM mainframe disks are back in fashion (maybe they never went out of fashion, I haven't used them for 20 years or so.).

Does this mean ISAM is new again and we'll all be using PDS's to store our source code and executables again?

I'm looking forward to someone studying how to store data records on small cardboard rectangles using holes punched through the cardboard.

It's 2021 and a printf format string in a wireless network's name can break iPhone Wi-Fi

Brian Scott
Trollface

Re: So what happens if...

Also, don't have a password so most of them will auto-join without asking.

Not that I'm giving technical advice or anything because no one would ever dream of doing such a thing.

Brian Scott

Re: In what world

probably a printf rather than a scanf (that we know about) but that is just quibbling about the degree of stupidity rather than the fact.

Otherwise, agree 100%

Deadline draws near to avoid auto-joining Amazon's mesh network Sidewalk

Brian Scott

Re: I wonder if...

Off by factor of ten issue here. At 1GHz the wavelength is 30cm.

1cm wavelength would be 30GHz.

All assuming the speed of light to be 3E8 m/s (300,000,000). YMMV.

We need a 20MW 20,000-GPU-strong machine-learning supercomputer to build EU's planned digital twin of Earth

Brian Scott

Re: Who needs this?

Ah, but what is the question?

Cisco intros desktop switches, one with USB-C to power your laptop

Brian Scott

Re: Pricing

If you need to know the price then you can't afford it.

Pretty much says it al about Cisco gear.

We'd rather go down in Down Under, says Google: Search biz threatens to quit Australia if forced to pay for news

Brian Scott

Facebook

Any chance facebook will threaten to leave Australia? Should I be lobbying my local member to push them harder? This could be really good.

Apple reportedly planning to revive the MagSafe charging standard with the next lot of MacBook Pros

Brian Scott

Hooray!

The Magsafe connector was very nice and I miss it greatly. The USB-C connector on my current machine seems like a step backwards but is much better than the much older barrel connectors and it does allow me to plug power into any of the USB-C connectors.

Possibly the biggest problem with the magsafe connector was that it was Apple-only. This meant that it was impossible to get 3rd party power supplies. Without competition, apple didn't need to innovate so there was never any development of airline or car power adapters.

The best news is consigning the touch bar to hell. It is only useful if you don't know which key you want to press and can deal with looking at the keyboard. For touch typists using the machine a lot it's the definition of crap. It's worse than a waste of space, it actually slows your workflow and promotes mistakes. The lack of any feedback when touching it means you also need to watch your hands lest you accidentally hit an unintended key.

My current Macbook pro also turns out to have the last of the stupid butterfly keyboards so this is all a bit of a raw nerve for me. My previous machine was a 2012 model macbook pro which finally died early 2020. I normally get a long life out of my Macbooks but if they can get the keyboard working properly without a touch bar then I may very well trade up quickly.

A magsafe connector would be a nice touch. Maybe they should allow powering via either magsafe or USB-C to allow some flexibility - nah, sorry forgot we were talking about Apple for a second there.

UK reveals new 'National Cyber Force', announces Space Command and mysterious AI agency

Brian Scott

Re: Policy-based evidence making

Upvoted for the title alone.

(the comment was good as well)

Has Apple abandoned CUPS, the Linux's world's widely used open-source printing system? Seems so

Brian Scott

Re: will drop PPD file support soon

Here was me thinking that dropping support for PPDs was Apple's way of telling the open source people to get stuffed. PPDs are very hackable. They are just text configuration files to tie the bits together for any printer.

The alternative is getting binary blob drivers from printer manufactures that agree with your choice of O/S and processor. Works well enough if you are Apple or Microsoft but stuffs the rest of us up.

Basing everything on all printers supporting IPP or some variation thereof is of course just a lie told to people who don't understand the industry.

LPRng? lpd and a couple of filters for me.

Linus Torvalds pines for header file fix but releases Linux 5.8 anyway

Brian Scott

I quite enjoyed programming in PL/I.

Can't seem to find a decent compiler anywhere for it though these days.

Bill Gates debunks 'coronavirus vaccine is my 5G mind control microchip implant' conspiracy theory

Brian Scott

Very good skeptoid podcast recently debunking this stuff

https://skeptoid.com/episodes/4735

Well worth a listen.

Astroboffins baffled as black hole at center of Milky Way suddenly a lot hungrier than before

Brian Scott

Re: "hungrier than it's ever been"

Going into a black hole isn't a problem. It's the getting out that requires faster than light speed for an escape velocity.

This is sort of the principle of black hole event horizons.

As I understand it, black holes gain weight whenever things fall in. They (very) slowly loose weight due to Hawking radiation.

Mozilla Firefox to begin slow rollout of DNS-over-HTTPS by default at the end of the month

Brian Scott

Re: Please explain?

Actually, in this case they do add the extra bloat of HTTP to the process. This isn't just DNS over TLS on it's own port, this is DNS over HTTP over TLS using port 443.

That is, it's every bit as bad a design as you could hope for (actually not quite, they could cook it all up as a SOAP transaction to get some real bloat going).

Microsoft's only gone and published the exFAT spec, now supports popping it in the Linux kernel

Brian Scott

Re: Microsoft part 2

Ext4 on removable devices is just as stupid as NTFS (or UFS). They are both designed for permanently mounted storage on a single device. Both contain security features that are just plain simply wrong for transport between devices (for a removable device, the best indicator of permission to read or modify a file is physical access, with encryption for actual content security). There is little point in having UIDs or GIDs and associated permissions or ACLs when the corresponding mapping to real users or groups is a very individual system thing.

Furthermore, the standard for Ext4 is simply 'whatever is currently in the linux kernel' and in true Linux style is a movable feast (exactly the same is true for NTFS of course).

Neither filesystem takes very kindly to being physically ejected without being unmounted first, I would have thought a fairly basic practical requirement for any portable filesystem.

FAT used to be the right sort of answer in the past but has problems with modern media and file sizes.

What we really need is something purpose designed for transporting data between different systems on modern media. This is what ExFAT was designed for.

The problem has been that Microsoft's licensing ($$ for each use) has made it impossible to use in open source since there is no easy concept for number of use's even if some organisation was happy to pay the money. Not being viable in open source effectively means it is dead in this day and age so this is effectively microsoft trying to save it's life.

Now if only someone would fix the performance of ExFAT on Macos with files in the TB size range.

X-ray specs: Signal whizz JMA Wireless claims to have solved indoor 5G, everyone

Brian Scott

Re: Dreaming of the future that could have happend years ago

Voice over TCP/IP will always remain a hack that I believe even skype only uses as a last resort. However Voice over UDP/IP using RTP is extremely common and becoming the standard means for fixed line phone calls around the world.

Support on actual fixed phones has been very slow taking off with most people going through a local gateway (Analog Telephone Adapter). Support from mobile devices is also a little hit and miss, generally using a customised app from your carrier of choice. Free VOIP apps tend to be difficult to configure and lacking in useful features although the situation is improving.

As for roaming between WiFi networks there are a lot more problems than the initial captive portal (a legal necessity as you seemed to party acknowledge) to solve. The change in IP address would be a much more difficult problem to solve.

Even within single organisations with handoff between WiFi cells with the same SSID (and therefore no new captive portal or IP address), the problem of dropped audio within a fraction of a second is still a problem that WiFi vendors are solving with incredible proprietary hacks. Add to that the fact that most WiFi devices resist handoff for as long as possible, degrading performance unnecessarily, don't look to WiFi in the near future to make this work.

The Great IoT Protocol War may have been won: Thread's 1.2 release aims at business

Brian Scott

Of course what we really need for IoT devices is for them not to need to talk to the mothership at Google, Amazon, Apple, or their chinese equivalents.

I bought an IoT power switch recently that would only work when used through the prescribed app. That app sent my requests of to a server in china which was also connected to the device. Coincidentally the app also insisted on knowing my GPS coordinates from the phone. This means that there exists, somewhere in the chinese part of the cloud, a database of devices and exactly where they are located in the world and the means to turn them off and on. Very scary. I wanted to name my switch 'nuclear reactor purge' but my wife wouldn't let me!

The problem is that most people don't have any sort of infrastructure at home that could happily manage this sort of thing in a well protected way (register readers excepted!). The easy answer for lazy manufacturers to get a product to market is to run a central server somewhere to manage things for everyone. It also allows them to think of ways to monetise all their connected customers sometime in the future.

The proper answer is for someone to build a suitably simple piece of hardware kit that everyone can have in their home that can manage their own devices without recourse to servers in some undefined part of the world. It would have to be based on open standards so there would be multiple compatible implementations from different vendors using different chipsets. Builders of IoT would need to support the same standards.

Wishful thinking I know. Standardised protocols are only the beginning of a very long path to enlightened happiness.

Still sniggering at that $999 monitor stand? Apple just got serious about the enterprise

Brian Scott

Re: Shiny, shiny

I thought Apple bought CUPS.

Ignore the noise about a scary hidden backdoor in Intel processors: It's a fascinating debug port

Brian Scott

Needing root is not the problem

It's easy to think of this as vulnerability but I don't think that's the point.

What it means that a bad guy™ can use the feature on their own equipment to investigate and develop new speculation attacks in the comfort of their own homes. When the attack has been properly developed, it can presumably be set loose on their targets without any further need for the debugging help this 'feature' has given them.

The only system that the attacker needs root access to is the one sitting on the desk in front of them.

This two-year-old X.org give-me-root hole is so trivial to exploit, you can fit it in a single tweet

Brian Scott

Just tested this on a very up-to-date FreeBSD install.

"The '-logfile' option cannot be used with elevated privileges."

% Xorg -version

X.Org X Server 1.18.4

Release Date: 2016-07-19

X Protocol Version 11, Revision 0

Build Operating System: FreeBSD 12.0-ALPHA8 arm64

...

Build Date: 07 October 2018 07:35:55AM

It pays to not be at the bleeding edge I guess. (The Xorg executable is setuid but obviously at this back-level version there are sufficient checks for dangerous options.)

It's the real Heart Bleed: Medtronic locks out vulnerable pacemaker programmer kit

Brian Scott

Why didn't they do this in the first place?

It seems to me that this is the sort of security that should have been baked into a product like this in the first place. All updates delivered personally by a verifiable representative of the company. The only extension might be a visual comparison of a locally produced secure hash and one published on the web to guard against rogue/compromised company reps. (a visual check because the device doing the updating shouldn't be capable of connecting to the net.)

Sometimes the internet isn't the right answer. This is one of those times.

If you haven't already patched your MikroTik router for vulns, then if you could go do that, that would be greeeeaat

Brian Scott

Re: Router OS?

MikroTik - I'm guessing it sounds a lot better in Latvian.

Brian Scott

Re: Would anyone...

Yup. I've got a bunch of them around the place.

The only one I have actually directly connected to the internet is regularly updated and has pretty minimal functionality enabled. The others are blocked by firewalls except when I'm updating them.

That being said, they are very nice flexible cheap little boxes.

Time to dump dual-stack networks and get on the IPv6 train – with LW4o6

Brian Scott

Re: Throw caution to the wind and it will fall upon someone else

eldakka:

You do realise that setting up normal IPv6 addressing is actually easier than DHCP. DHCP is the hard way that we get to leave behind with IPv6 except for the really unusual corner cases.

The router advertises the network prefix regularly on the wire (or when asked). The device picks a unique address on the local network (64 bits to play with and usually based on the MAC address) and away it goes. Easy. All your modern devices do this already. Windows has been doing it since XP but your router wasn't smart enough.

The only exception might be a few really stupid IoT devices that have been developed by a work experience student and shouldn't be allowed on a network anyway.

In non-startling news, EFF says STARTTLS email crypto is mostly done wrong

Brian Scott

Email transport is insecure

Get over it and move on.

The only secure way to communicate via email is with end to end encryption using something like pgp.

The fundamental problem with starttls is that if the certificate on the other end fails for some reason then it can 1) use it anyway, 2) downgrade to non-encrypted, or 3) bounce the email back to the sender. Number 3 is pretty unfriendly for the average user to work around. Number 2 is just stupid because the connection may be legitimate but with a self-signed certificate (or expired, wrong name, whatever) and the encryption would still defeat anyone listening to the connection. Alternative number 1 wins by default.

DANE is good (provided you can use DNSSEC to authenticate it) but support is crap. Also, because of the multi-hop nature of email it is still only protecting an individual hop (although that is probably enough for uncomplicated email these days). Fake headers could be added by anyone along the way claiming encryption when it isn't used (why you would is beyond me if you can fiddle the headers then you already have access to the content).

However, all this is solved if your email client encrypts the message in a way that it can't be decrypted until the destination email client decrypts it. The worst that an adversary can do is stop the email from being delivered. This is something that already happens regularly with over zealous spam checkers so is now an inherent problem with email anyway.

Not one, but 20,000 black holes hiding in Milky Way's heart

Brian Scott

"The researchers found 12 black holes with similar masses as the sun surrounding the supermassive black hole Sagittarius A* that lives in the galaxy’s center."

I don't claim to be an expert at this but I thought the mass of the sun was too low to form a black hole.

South Australia bins emergency alert app, contract

Brian Scott

Obligatory XKCD

https://xkcd.com/937/

Some 'security people are f*cking morons' says Linus Torvalds

Brian Scott

Linus Torvalds is a f*cking moron?

Security works by having multiple layers. It protects you against accidents and malicious attacks.

Subroutines should check their arguments. You can call this a security thing or you could call it just being careful of other code having bugs. Personally I don't care which but it's good coding practice. Now it is possible to just say fix all the buggy software and then you'll never need to validate arguments but I've never heard a competent programmer advocate that. Call it security in depth.

Now I will admit that you have a problem when it's the kernel checking it's own behaviour because things can get ugly when it shoots itself. These things need to be well thought out and tested. That doesn't mean it shouldn't be there.

It's lucky most projects don't have project managers like Linus Torvalds. This sort of behaviour is not how you get the best out of people. It is bullying behaviour that shouldn't be tolerated anywhere in this day and age.

systemd'oh! DNS lib underscore bug bites everyone's favorite init tool, blanks Netflix

Brian Scott

Underscore?

I thought underscores were illegal in DNS names. I know Microsoft had other ideas in the distant past but now even they frown on them. Why the hell are netflix using them?

Oh, and to echo everyone else: why is an init process doing DNS resolving? An init process should start things and possibly stop and/or monitor them. The tool to do DNS resolving is a DNS resolver. I would be very upset if my DNS (unbound and bind depending on system) resolver started starting processes. The reverse also applies. FFS.

Git fscked by SHA-1 collision? Not so fast, says Linus Torvalds

Brian Scott

Good software design

The key here isn't whether sha-1 should be used in git in the first place.

Good practice in designing security software should acknowledge that after some time all of these things become obsolete so you need to design in a framework that allows you to easily migrate to future algorithm when the need arises. Baking sha-1 into the design is a mistake if it is then too difficult to change.

Other than that,there is no particular reason to be worried about sha-1. It's just another warning shot to not use it in new products and to start looking at how to turn it off in existing software. This should be simple with well designed software.

Researcher reports XSS hole in Google France

Brian Scott

"Cupertino slings quick fix."

Isn't that another mob?

Having offended everyone else in the world, Linus Torvalds calls own lawyers a 'nasty festering disease'

Brian Scott

Re: Easy to get rid of the lawyers

I think that Linus thought the GPL was just like BSD. He now seems to defend the rights of business to use Linux any way they want, without interference from lawyers. That's the BSD model that he probably saw earlier in life.

Mind you, there are probably ways that you could move Linux to a BSD license if they really wanted to but why bother. There are plenty of good operating systems out there with a BSD license on them already.

If Linus really believed in the GPL (perpetually free software) he wouldn't be keeping the whole shooting match licensed under the very outdated and full of holes GPLv2. The GPLv3 does a much better job in the 21st century and other projects have easily migrated to it. Blame the contributors perhaps (contributions under GPLv2, blah, blah, blah)? No, I think that's just a nice scape-goat for keeping it all as BSD like as he can get it.

Remember that it was Linus (I presume) who dropped the 'and later versions' clause from the licensing clause on Linux and created the whole license mess that people are now fighting over. I can't help but think if he had talked to some good lawyers way back then, the world would be much simpler now.

IBM makes meek apology for Oz #CensusFail, offers no fail detail

Brian Scott

Re: Meh

Geo-blocking DNS? WTF? That's just being stupid.

I saw a lot of screen shots in the media that were actually DNS failures. That explains something I suppose.

Let's Encrypt in trademark drama

Brian Scott

Law vs. Ethics

I would have expected a Certification Authority to behave ethically as part of its business model.

For the CEO to claim that they were just operating within the law and that this is the cut-and-thrust of business shows that they have confused the two concepts of law and ethics. What they are doing may well be legal (I am not a lawyer, etc) but stealing a name from a non-profit is in absolutely no way ethical.

The list of trusted root authorities in our browsers represent the companies that we trust to a very high standard to make our decisions on the authenticity and legitimacy of domains on the Internet. I expect them to do this both within the bounds of law and with a very high degree of ethics.

A legitimate approach to this would be to remove Comodo from everyone's list of trusted certificate authorities since they clearly are not living up to the high standards demanded of them.

They would then go out business because internet sites could no longer choose to use their now untrusted certificates.

This is business comodo. Sorry to see you go. Don't slam the door.

Take that, Mom! Turns out Super Mario Bros was all about solving complex math problems

Brian Scott

This is like saying my dog can solve quadratic equations because it can catch a ball.

Apple assumes you'll toss the Watch after three years

Brian Scott

MacOS

It could just be my old, faulty memory but I thought MacOS was the predecessor of OS/X. This would put the last release (Mac OS/9) somewhere around the turn of the century. I'm too lazy to look it up exactly but that would mean it was all obsolete about 10 years ago.

I don't know anyone still running a pre-OS/X mac. I have one (Mac plus running OS/7) but I certainly don't fire it up and do work with it. It still works though.

Verisign warns new dot-word domains could make internet unstable

Brian Scott

Re: telling quote

I'm guessing that the available namespace for private networks is now reduced to rude words. This could go do well in some workplaces.

It's almost time for Australia's fibre fetishists to give up

Brian Scott

Fibre? Copper?

Wow. I'd very happy to have either copper or fibre.

My NBN future (guessing at least the next 10 years) will be wireless delivery. I'm really looking forward to that like a good toothache! Of course at the moment I'm stuck on ADSL 1 unless I switch over to BigPong so maybe I shouldn't complain too much. Friends who have ADSL2 in the region tell me that they are going to be moved off that to wireless in the long term.

A contact doing nbn installs suggests that they are really not very interested in anything other that wireless because it avoids playing in pits.

I'm not sure where they would be bothering to install this stuff. It might just be Malcom Turmbull's place.

Boffins brew TCP tuned to perform on lossy links like Wi-Fi networks

Brian Scott

Broadcast?

"As an example of how TCP congestion control can get in the way of network performance, the paper cites a broadcast of two packets to multiple receivers:"

I think I see a problem here... (hint for non-network people: TCP is very strictly point-to-point not broadcast).

In fairness I couldn't find the word broadcast in the original paper, on the story.

Google devs: Tearing Chrome away from OpenSSL not that easy

Brian Scott

"In response to the Heartbleed debacle, a group of NetBSD developers created an OpenSSL fork called LibreSSL."

Actually, that's OpenBSD not NetBSD. OpenBSD forked from NetBSD a long time ago. They have a bit of a history doing this.

Microsoft admits it's '18 months behind' with Windows 8 slabs

Brian Scott

"But UK director says 'iPad will become marginalised'"

He's right. Eventually the iPad will be marginalised.

Something else will be the next big thing and by then Microsoft might have a competitive tablet OS and no one will care.

If Microsoft wants to survive they need to work out what the next big market will be and start working towards that. They also need to shake the belief that the answer to everything is Windows. It may be that no one will want to buy Windows for Underpants.

The iPad really is crap in an enterprise environment and there may be a few bucks to be made building something better for that market. Unfortunately there wont be big money in it, just a few crumbs for the companies still hanging around in that space.

Page: