Re: Try harder
The sad truth is that any outfit that points fingers at another, these days, is most often projecting rather than informing.
325 publicly visible posts • joined 10 Nov 2015
I disagree for the most part - because the driver behind this bubble is not the retail consumer or the retail investor.
It is big 5 tech company CEOs faced with either accepting declining P/E ratios hence falling stock prices hence massively devalued compensation packages, or creating the biggest round tripping scam ever.
Scam it is!
All 3 comparisons are far too generous.
Even comparison to the massive fiber optic overbuild of the 1990s is too generous; the 2% utilization today of all that excess fiber built back then, at least theoretically can be of use in the future.
Another comparison would be the trans-continental railroad buildout of the late 1800s - which led to literally financial crashes every 10 or so year until the creation of the Federal Reserve. But while those investments were shit for literally 2 generations, at least we are still using them today.
In comparison: $500 billion of AI datacenters will wind up being hundreds of billions of writeoffs, because there is no way on God's Green Earth that LLMs are going to create enough value to even pay for the annual upkeep of these data centers, much less the capital opportunity cost fo the $500B. I believe Harris Kupperman noted that every $30 billion of data center now is generating $1 billion of revenue. Because these GPUs are going to be economically viable for 5 years at most - because the cryptomining space shows that lifetimes for GPU based hardware is significantly less than 5 years.
I had thought Uber and WeWork were going to be the peak Rube Goldberg garbage of Silicon Valley - but I was wrong.
It is "AI" ie LLMs.
What is the point of plastic transistors that you print? You do understand that it is tens of millions to billions of transistors, organized by a design team, that constitute a CPU right? Having a few hundred or a few thousand does you no good whatsoever...even if they performed at the gigaHertz rates of the real transistors.
As for the supposed whale or whatever comms: until the whales start talking back, it is turtles all the way down.
The Hoover institute had a "Challenges Facing the US Economy" one day conference, a few weeks ago. For those not familiar: Hoover is neocon central - being chaired by Condoleeza Rice, for example.
One of the 4 sessions was on AI.
Summary of the presentations by the panelists: AI Uber Alles. AI will save the US economy and the world.
I asked a question of the economist and the policy expert:
Can you comment, from an economic and also a policy standpoint, what the impact of the systemic abuse of public copyrighted data by the AI industry might be?
The policy guy gave an excellent overview of the copyright problem, but said that AI is too important for this to be a barrier.
The economist actually pushed back a bit - saying that the sanctity of private property is a cornerstone of capitalism but concluded that "clarity" was needed.
My takeaway is that the fix is in: the commons of copyright information will be sacrificed for the enclosures (model training) underpinning AI.
My last 2 cars were 8 series Audis - they had all around parking sensors.
Literally no other car I have ever driven since then, do. As I don't keep a car now - I rent dozens every year.
Only the very highest end cars have these parking sensor setups all around.
Many/most lower end cars have rear parking sensors these days if you count the rear facing camera. Not clear at all to me if these cars have actual physical ultrasonic sensors as my Audis did; you can analyze the rear facing camera and its "borders" to detect walls or other cars.
Cute but wrong comment.
Bitcoin mining is getting something out - the unallocated millions of bitcoin still in limbo. We all know where this bitcoin is and mining is how you get it.
Nor is "useful", the least bit convincing. Gold has very little societal use - its value rests almost entirely on belief of its value. The same can be said for gemstones, art, stamps or any other collectible.
The cryptocurrencies aren't unique or limited - the 5000+ crypto in existence, with one coming out pretty much every week or several days, if proof of that. Nor am I the least bit convinced that even bitcoin has much of a future given its enormous electricity overhead.
But most importantly - there is a basic premise wrong with any attempts to talk about fiat vs. crypto: the law.
Fiat is mandated by law as payment for any debts, public or private. Crypto is not.
Fiat - particularly bank accounts - have all manner of regulatory apparatus around them. Crypto does not.
But, some of this can change and a little has changed already. The existence of CUSIP accounts at major financial institutions to hold bitcoin is one prominent example. CUSIP are custodial protected accounts - traditionally used for stocks and bonds but now expanded to include crypto.
Un-nuanced views on crypto are all wrong. I still think of crypto as nerd art - and bitcoin as (relatively) Rembrandt vs. shitcoins as street corner portraits, but that's just a personal view.
I'm sorry to say but your search history is already turned over.
The only question is to how many.
The browsers do it. The forwarding links do it. The ISPs do it. Even the web sites do it.
If I can tell your search history just by forensically analyzing your computer, it means the OS can do it too. Ditto any other software or web app which operates on the same computer.
A greater compilation of idiocy, I have not seen in some time.
We already have an enormous ecosystem of advertising fraud based on bots. These bots build their user profiles precisely through mimicking "good" customer profiles via prime web site visits in order to parlay themselves into good advertising subjects - then go on to harvest ads.
These numbskulls in the IMF are proposing to use DoubleClick/Facebook Pixel type data gathering so that these same fraud gangs can now directly open credit cards and bank accounts.
-10 points for blatantly repurposing an existing business practice as "original research"
-20 points for failing to consider the myriad ways by which their already plagiarized proposal can be abused
Harris Kupperman at adventuresincapitalism.com called this bubble and even spelled out how it progresses.
Financial arbitrage of the Grayscale Trust, now we're into FOMO by institutions and consumer plus institutional pumping and dumping.
Bitcoin in 2017 was all about Ponzi/pyramid/consumer pumping and dumping.
Yet another example of the utter bollocks of "sophisticated, patient nation-state spies" - as opposed to the reality of semi- and in-competent IT setups.
What is abundantly clear is not that the "bad guys" are skilled, it is that their targets are not.
This is pure "security by obscurity" gone bad...
The proposal seems like nonsense because it wouldn't universally accomplish what it wants to:
Major email providers certainly log and have other forms of metadata on their email users. The effect of publishing keys thus only muddies the ownership waters for external entities (primarily individuals) but not for governments or the email providers themselves, or for lawyers via legal discovery requests.
As earlier commentators noted: temperature and extra wear due to log files are certainly a factor.
I would bet, however, that the real cause is the fact that Tesla can (and does) access various cameras on the vehicle to fill its self driving data lakes. There is likely both a standard and "pull" type requests from the manufacturer for this data.
Writing and reading pics is a lot more wear than text files...
At the moment, this is true.
In reality, the storage doesn't require a big VM to mimic. In theory, you can do it with micro.
In addition - if we're talking law enforcement, there are many other ways to crack the nut.
For example: serve an order to the telco. You can protect the phone all you want, but the telco ultimately has 100% access...
Somewhat misleading article.
Here's the reality: a relatively new (~2 years or less) android or iPhone can not be cracked by the tools except via pin brute forcing or via the "services" - basically the companies using 0-days and cracks. And while $1950 isn't a lot for some people - it is a lot for a police department to spend and generally won't be done unless there is a strong need.
Secondly, the report doesn't mention how often the subjects give up their pin. A lot of people will when asked.
For a person who has installed 2FA and also enabled the full security features on the phone, security is going to be good.
To be clear: there is no way to protect anything electronic from an attacker with time and money. The phones can be disassembled and their SSD memories copied - at which point all you need is to know the software architecture and you can run parallel attacks on the cloud against virtual copies.
"reasonable and proportionate"
Interesting that you use these terms when it can be argued that this action is what prompted everyone to "take the gloves off".
Again, I don't say Russia is pure as the driven snow.
The operative statement is: "Let he who is without sin, cast the first stone".
I would suggest everyone read the full indictment.
A number of items are odd: [On or about December 11, 2017, the Conspirators created a malicious "Seoul Bus Tracker" mobile application and registered the mobile application with a mobile application store approximately 1 hour later.] with multiple other apps created and attempted distribution in a very short time frame. Pretty fast work. There is also mention of 15000 web sites defaced in late 2019 - they must be incredibly productive...
Attribution is also interesting: is the "creation date" from just looking at file time stamps? Probably from the app application process?
Then there's the attribution of "creation of components" for NetPetya, Olympic Destroyer etc. The actual charges relate to spearphishing and transmission - there is nothing in the indictment indicating the creation other than the allegation.
The indictment does say that the NotPetya transmission component was via redirecting the web address target for the MEDocs software - makes a lot of sense.
Overall: if you just look at the behavior, it looks like a ransomware gang: spearphishing, network traversal, bitcoin payment for infrastructure etc.
I look forward to see how specific attribution to these 6 people was performed.
The point of a real backup is that you preserve the entire environment, not just data. A full disk image does that.
Secondly, a full external image is completely undetectable in-system whereas an attacker can poison your system backup if they’re in.
Some real world notes here:
T2 doesn't just "make the Mac secure" - it also prevents any type of external backup service outside of Apple's walled garden.
For example: a normal computer - you can boot up on Linux and capture a full dd image. This has its uses - for example, this image preserves all of the OS and installed software, as well as data, should something happen to the source computer. A disk failure can be remedied by putting in a new disk and slapping the image on. A computer failure can be replaced with an identical model computer and said image (really, it is the bios/motherboard).
With T2 and FDE - you can't do this. The Mac/Linux file system won't work without the T2 present, so virtual images are right out.
You can mount the image with a "recovery key" a la Bitlocker, but you have to do this ahead of time. Yes, the system is set up so that you can literally not access your own image without going through a specific sequence of events: FDE on, generate recovery key, capture image. Yes, out of order doesn't work (!)
Wrong.
Excel is powerful because Ajax allows it to reach out and access/do all manner of things.
I've created an Excel spreadsheet that would update, from a web page, the prices of my mother's 300 stocks, because her online brokerage account was so crap to understand.
How else would you do something like that? Particularly 20 years ago...
Yes, you can hire a programmer to slap together something custom - but what a waste of time and money.
Sure, it is easier to work with data these days particularly if there is an XML or similar type feed - but businesses existed before this and the Excel pages are an IT artifact just like the XP laptops fronting 15 year old Xray machines.
The problem is that Microsoft's Excel programmers did a really amazing job of integrating all manner of extra capabilities into Excel.
You can query web pages. You can move data back and forth between sheets and even documents. You can bend, fold, spindle and mutilate cells and their contents.
That's the real problem: if there isn't a 100% perfect program to do something, it is easier to do it in Excel than to do "real" programming to create something custom.
So the real complaint is about Microsoft Excel/Ajax programmers being too good at what they do.
The OP is angry at Excel.
The OP apparently would prefer everyone use some specialized tool or language where the operations are utterly opaque.
Excel - you can see and trace everything going on. Not so for "modern" platforms.
Yes, it isn't scalable for Big Data or even medium Data - but it never pretended to be.
Being angry at something which can do so much, well enough, that it is pushed to the limits and beyond is silly since this applies to literally everything in IT.
Totally wrong.
Regular bank account customers are hacked all the time.
The difference is that retail customers in the US (and in many other countries) are protected by laws from absorbing most of the losses, much as retail customers in the US are protected against credit card number theft.
The lack of cryptocurrency exchange regulation - said exchanges being a combination of bank and security exchange/stock exchange - throws out this vitally important protection for the consumer along with all the "red tape" and what not.
Apple's app store rake isn't "somewhat greedy".
1) If it is payments and fraud protection: the credit card companies do that for 2% to 3%.
2) If it is costs: I looked at Apple's financials for 2015. The app store revenues were higher than Apple's entire personnel cost structure - which includes Apple store leases, Apple store employees, Apple developers for the entire company, Apple's entire sales and marketing people, etc.
The 30% is egregiously more than anything to do with costs - it has everything to do with monopoly access to Apple customers.
The worst thing is: Apple's iPhone business model is identical to the "razors and razor blade" model Gillette uses - except the razor is the apps/OS/email/software while the blades are the phones themselves.
The apps developers put on the app store are a significant part of the hook by which Apple can sell its immensely profitable hardware. To squeeze them is ridiculous.
Thank you for your recreational drug promo.
Legalizing marijuana has not dropped the price; the legal stuff is a lot more expensive than the illegal stuff.
Nor has it reduced usage - illegal marijuana is still 80% of the market.
Reality is that legalization generates revenue for states. Period end stop.
The OP is ignorant.
PowerPC systems still underlie many of the core capabilities in big companies because of its hot swap capability. VMs exist in this case but still cannot replicate the hot swap nor can they replace the big iron original basis.
However, the lack of MacOS VMs is 100% Apple patent trolling.
MacOS is a flavor of Linux - there is absolutely nothing preventing virtualization besides Apple's lawyers.
Turning on Secure Boot also makes it a lot more complicated for offline backups.
So - would you prefer defending against the largely mythical nation state attacker (if you are not in the defense industry/intel agency/government official space) or improving business continuity interruption protection against the very virulent ransomware gangs?