Re: Honey pot
https://encrochat.us/ looks interesting.
I do not know if it is connected to the Dutch company.
21 publicly visible posts • joined 22 Apr 2015
The A64 instruction set is used when executing in the AArch64 Execution state. It is a fixed-length 32-bit instruction set. The ‘64’ in the name refers to the use of this instruction by the AArch64 Execution state. It does not refer to the size of the instructions in memory.
from https://developer.arm.com/architectures/learn-the-architecture/armv8-a-instruction-set-architecture/instruction-sets-in-the-armv8-a
The ONLY way to make companies change their ways is to hold their feet to the fire and hold C-level management individually accountable for their actions.
Sometimes I think that Burgess had it right in 'A Clockwork Orange'. I think that these executives should be made to watch the live streams of the self-harm for a day a week to see the effects of their largesse of their products upon society?
Surely the government can propose a bill to ban prime numbers?
Forbid any number (especially large ones) from being divisible only by themselves and 1. And if they persist in being undivisible, just jail them and miss them out when counting.
Thinking more, it is just the odd numbers which cause problems, so just ban all odd numbers?
That would put a stop to this strong encryption malarkey.
As our antipodean cousins are wont to say, "What could possible go wrong"?
Even if they can't decode it, if they can just detect it in a world where unsanctioned encryption and/or steganography is outlawed
It would be possible to hide the data - all data is just a stream of ones and zeros. The interpretation of said data stream is done by the application.
Do you really think that we have the resources to scan all data streams in real time?
If steganography were outlawed, I do not imagine for a second that bad actors would actually obey this law.
I'm not keen on a mass scrapage of XP-controlled devices just because IT departments don't know how to manage them.
I wonder if it would be possible to :
1. Attach an external drive and image the hard drive to the external.
2. Install linux and VirtualBox on the hard drive.
3. Create a VM and copy the data from the external drive to the VM
4. Set the machine to run VirtualBox fullscreen at boot.
Result would be a machine that looks the same to the user, but which has a linux interface to the external world - much more easily secured than unsupported Windows, and the users will not need re-training?
"Labour truly do want to take the country to the 1970's so anyone crying brexit was about being backward couldnt possibly vote for the magic money tree nutters."
http://www.taxresearch.org.uk/Blog/2016/03/13/the-conservatives-have-been-the-biggest-borrowers-over-the-last-70-years/
The "magic money tree nutters" are the Tories?