"Sounds like Craig is unprofessional and was trying to score points."
Sounds to me as if Craig had a good idea of what was likely to happen and was covering himself.
40471 publicly visible posts • joined 16 Jun 2014
"The Egyptians beat Pythagoras to it; they used 3:4:5 for land surveying. Heck, I used it a lot when building my home 14 years ago."
When we moved into our home some years ago after my parents had dies I wondered what became of the 3:4:5 wooden triangle my dad made to set out the walls when he built the house. A year or so ago I found it propped up against a boundary wall when I was cutting back a holly. The joints attaching the hypotenuse had rotted but I still have the right angle.
"Thought that was why there was 60 seconds / minutes in a hour."
I think that's also derived from the Babylonians as do the divisions of a circle. But, of course, it was they who had the wit to use a number base that was convenient for integer division rather than an inconvenient one based simply on counting their fingers.
"why has the modern world moved so far towards pure binary (and powers of 2 in specific contexts)?"
Imperial measurement made considerable use of binary. Weights from pounds down to drachms were binary as were volumes from gallons down to gills. In general they seem to have been based on measures which were a convenient size for some purpose with a strong inclination to subdivide on a binary basis. It's a natural thing to do. If you have a standard of weight, for instance, you can weigh out that amount of sand, flour or whatever on scales and then, using the same scales, divide that into two equal portions and subdivide further.
The problem arises when two different scales of measurement overlap and we end up with a stone of 14 pounds. Other stones were available - I've seen reference to a stone of 15lbs in the C18th - but I suppose a atone of 16lbs would have required too much adjustment to reconcile with the larger scales in use for other purposes.
"What I'd like is some reliable, long-term (archival) storage for home users. Something with a vast amount of capacity that I can write, lose in the back of a desk drawer for 20-30 years and reliably read afterwards, without (like a tape drive) needing a rather expensive bit of kit to read and write it."
The problem with this is that not only do you have to provide the equipment for 20-30 years but you also have to be able to understand it. So even if you resort to writing QR codes to microfilm you then have to hope that whatever OS you're using in 20-30 years has a library for decoding QR codes, even if the data is just plain old ASCII text that you could have streamed off a tape providing you had a tape drive.
There are no easy solutions for long term data storage except active curation: copying from the old medium and format to the latest one whilst the old is still physically and logically accessible.
"Lots of storage will be freed up as people die."
There's a very long term storage format available: ink on parchment. A lot of that must have been freed up when people died. If you're an historian that's one of the central problems of your professional life.
OTOH I think present day rates of data accumulation will also be a problem for future historians.
"Then what happens when you're told you just lost a big deal because of your paranoia"
And what happens to you when your lack of paranoia has let in malware that's closed down your IT network for a few days or allowed access that's enabled a few million of your favoured currency units to be looted?
"You can't steal an identity. They are permanently attached to people and impossible to remove."
That's a debatable point.
For the purposes of identifying oneself for an increasing proportion of transactions "identity" consists of a few pieces of data. Given those - or maybe a subset and a bit of social engineering of the service provider - then a criminal could start to get control of of other aspects. An instance would be getting a bank to send out a replacement credit card to a different address. Another would be getting a password reset to something the criminal controls.
We're used to having to remind people writing of "copyright theft" that it doesn't meet the ingredients of theft. But this is different. If the criminal takes control of various aspects of the individual's identity, at least within this meaning of identity, then the individual has indeed lost something and the criminal has gained it. It wasn't permanently attached and it's certainly arguable that it's been stolen.
"Crime recording standards generally only allow crimes to be reported by the victim or an officer."
Clearly things have changed. Back in my day I took part in quite a few murder investigations and I don't think all the victims lived long enough to dial 999 or was stumbled over by an officer who nobody else could call because they weren't the victim.
@Timmy B
It depends on whether your use of the product depends on an ongoing arrangement with the vendor. If it doesn't then you don't need to worry. If it does then you should realise that pretty well anything could go wrong. Even the most stringent T&Cs aren't proof against the vendor going out of business. If it's simply some item you can live without - a sound system for instance - you could just be prepared to write off your investment in hardware. If it's something that's looking after your personal media collection then you need backups or, again be prepared to write it off. But if it's something your livelihood or business depends on then you do need to think seriously about what could happen if things go wrong.
Risk involves both the probabilities and what you stand to lose.
"Cloud providers (as vendors) can be threatened by large customers to either fix their s[censored]t or customers will go elsewhere."
Threaten, yes; but to make good on that threat they need staff able to move the services and data elsewhere.
And they no longer have any.
"IT Security has three balanced priorities: Confidentiality, Integrity of data, and Availability.
IT and developers and CIO's also have three priorities: Availability, Availability and Availability."
Presumably you've never been a DBA. If you had you should have been aware that integrity of data was your first priority.
You're spot-on about bonus level managers, however.
"Would this be just as effective?"
Let's see.
Marketing department decides it's perfectly OK to spam customers irrespective of whether they wanted to be spammed or not. Hands over customer list to "digital marketing company" AKA professional spammer. Together they concoct email which is infested with links except web site managers refuse to host them so the spammer does that as well. Ends up training customers to be phished with customer list in hands of spammer to be re-used for other clients, sold on or both. Do we expect marketing departments to have security functions to make sure this is done properly?
"the fact that the crime was committed in the US (allegedly)."
Only in the sense of the US's extraterritorial extension of its criminal justice system. If he lived and worked in the UK it's likely that if he wrote Kronos (& see my response to Gumby) then he would have done so in the UK. However, the CPS would have required something like a proper prima facie case that they could present to a committal hearing. So far we've heard of nothing like that in this instance other than that he wrote an explanation of a technique which wasn't original, posted the code on Github and then, maybe naively, suggested that it had been the source of similar code in Kronos.
TL;DR In the UK it'd have been laughed out of court had it got there.
"The real question is why does the FBI think this is their guy?"
They need a guy so anyone will do?
Oh, look, here's a bit of code he posted publicly that he then says was incorporated in Kronos. That'll do.
Incidentally the author of this analysis https://blog.malwarebytes.com/cybercrime/2017/08/inside-kronos-malware/ suggests that the actual code has a longer pedigree than Hutchins publication and that the implementation is more sophisticated concluding "The level of precision lead us to the hypothesis, that Kronos is the work of a mature developer, rather than an experimenting youngster."
"In your laptops, get rid of the rubbery chiclet keyboard and use proper keyboards instead"
I have a little MSI I use when I don;t want to take my regular laptop with me. It has a chiclet keyboard and I don't give the difference a moment's thought. Press key and character appears on screen. That's what matters.