* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Think your phone is snooping on you? Hold my beer, says basic physics

doublelayer Silver badge

Re: Laptop electrical noise

Yes, because that's one of your buses operating at its typical speed. Other parts change their frequency a lot so their signal moves around and is less noticeable to humans or is at too low a frequency to be detected by the common equipment. An active transfer usually means that at least one and more often two buses are communicating as fast as data becomes available, and if your disk is fast enough, that would be almost all the time. That's a simpler wave. Your connection to the TV may also be leaky. I remember this being a problem with 2.4 GHz WiFi on unshielded devices using HDMI because one of the HDMI standards was using a frequency that interfered with it unless either the cable or device was protected from it.

Apple beat Epic Games 9-1 in court. Now it's appealed the one point it lost

doublelayer Silver badge

Re: Freemium game model

Really? Ask yourself these questions, because they have answers.

"Who created the marketing and distribution infrastructure,"

Epic. They have marketing for their game, which Apple doesn't provide, and they do all the heavy lifting for distributing accounts except for downloading binaries. Their part is significantly bigger, and they would be happy to take over that binary bit as well except Apple won't allow them.

"including the store itself?"

Which doesn't market for developers, so you're mischaracterizing what it's for.

"Who maintains and curates it?"

Apple, but the developers don't particularly care that Apple pays someone to redesign the front page all the time. If Apple didn't do that, the developers could still write their software and the user could still run it.

"Who pays for and maintains the cloud storage backend?."

Apple, although just for the app download. Epic would probably be quite happy to do that and stop paying Apple a price significantly higher than servers and CDNs cost.

doublelayer Silver badge

Re: Is it going to matter ?

"Let's say that the transaction is $1 and the cost to process the transaction (bank fees, etc) is $.25. That leaves $.05. Many upgrades and in-app purchases are small."

You made the number up and it's completely wrong; no payment method alone has a transaction fee of 25%. As such, the rest of your comment is defending a worthless argument. If we assume that all the fee Apple charges goes to someone else, it's very excusable. It doesn't. They don't claim it does. It would help convince people if you stuck to that clear fact and tried to argue about the massive profit actually being made.

doublelayer Silver badge

Re: Dear Apple...

"Personally I really don't understand why someone who hates Apple and wouldn't buy one of their devices if it was the last thing on the planet can get so hot under the collar about this stuff."

I can explain that, but for the record I have bought Apple products and still use them. But first, the people you describe: you remember the extreme hatred GNU, Linux, BSD people had for Microsoft in the 1990s? You've seen those people who still have that hatred today, even when they don't always seem to know why? It's like that. Someone who sees an abuse of dominance can find that problematic whether they're paying for that themselves.

As for people like me who use Apple products but aren't tied to them, it does somewhat affect me, although Apple doesn't make much from my App Store habits. In fact, my objections are also quite related to the lack of ethics the policy involves and to the rent seeking that the behavior is. I don't like anyone doing that, and when it worsens what I otherwise think is a pretty good platform, it's something I'd quite like to see corrected.

Microsoft called out as big malware hoster – thanks to OneDrive and Office 365 abuse

doublelayer Silver badge

Re: Users need to know that

You will note a few things in my post and the article. One thing you will notice is that I mentioned Microsoft first, and started by talking about their and Google's drive services. I referred to both of them for a specific reason: the article compared those and found problems in both. Google was faster at removal but stored more malware in aggregate, or didn't you read it? As for the translate links, I believe an attacker could use Microsoft's translation service to the same effect, but I have not seen it used yet. I have seen Google's used in that way, and it is a similar method to cloak the real source of content online.

Whataboutism is a method of distracting from a point. I did not distract from the problem of malware in Microsoft's cloud, and in fact the only other place I mentioned was the one the article used as a comparison.

doublelayer Silver badge

Users need to know that

Even if Microsoft and Google speed up their resolution of these things, someone is still going to put malware on anything which can distribute data. When I train users, which fortunately I just do informally, this is one of the things I try to get across. Links to a storage service are links to unknown content and no more trustworthy than a link to an unknown website. It's also worth knowing that people will use other tricks to make their content appear to come from a site users trust. I have seen a few attempts using Google Translate so the domain appears to be google.com but contains another domain in the query parameters which the web app will kindly render for the victim. Not all spam is obvious.

Apple arms high-end MacBook Pro notebooks with M1 Pro, M1 Max processors

doublelayer Silver badge

You can if you can convince Apple that you're not the only one who likes that strip. I haven't bought a Mac with that on it, but having played around a bit, it seems inconvenient and distracting, and I have not heard anyone who finds it better (observed opinions range from don't use it to sort of dislike it, but that's basically all). That will probably also compress the trackpad a little because they'd have to move the keyboard down to accommodate the extra row.

There are 875 million good reasons why the paperless office won't happen soon

doublelayer Silver badge

Re: A fundamental problem

Try using ffmpeg on them. Usually, if there's something unusual about the file or the player, ffmpeg can turn the file into something the player can understand. Unless it just got corrupted. It doesn't work on everything, so if it used a very proprietary codec somewhere it might fail, but most ones were identified and implemented there at some point.

German Pirate Party member claims EU plans for a GDPR-compliant Whois v2 will lead to 'doxxing and death lists'

doublelayer Silver badge

Re: "doesn't make piracy much easier."

"It's far more difficult to shutdown domain names when they can be created automatically using fake credentials and being unable to identify who's behind"

If you're in law enforcement, it's not that difficult to shut down the accounts and go after their payment method, which is a lot harder to fake. Most of the time when they're not shut down, it's because nobody investigated them, not because they were just too good.

"Did you give a look to the spam your receive? Phishing websites? Botnet and ransomware delivery and C&C?"

Let's consider those then. Phishing is mostly coming from spoofed addresses, meaning they don't need to buy a domain name. Botnets almost never have domain names. Nodes in them may not even have dedicated IP addresses. C&C: domain names are more common here, but they're not either. If the malware writers put in an IP address, they can still route their C&C traffic there.

"It's not possible to allow online what is not allowed in the physical world."

It's very possible and often desirable.

"Can you open a shop wtihout being registered in many different "books"?"

Legally? Not exactly, but sort of. You could have an unofficial shop which doesn't operate as a business, doesn't have financial accounts, and doesn't own or rent property. So long as you tell the tax authorities about the money you make, that's fine. It gets more complex if you want to be bigger, but that small approach is entirely possible.

"Can you publish something physically without registering your publication and identifying who's responsible for it?"

Yes, without difficulty. 1) Buy a printer, 2) print a document several times, 3) distribute the paper however you like. Entirely legal. You are not required to register any publication, and you can still copyright it without having done so. The only places which require registration are authoritarian nightmares, and the method still works there too.

"copyright violation is the smallest issue. There are far worse ones. Just, most people are OK with the worse ones as long as they can get their pirated contents for free... a very myopic and selfish attitude."

Which I have stated that I don't support, and yet you seem to have such a low opinion of me. Your examples of worse ones were above, and they didn't use domain names, so you're not convincing me yet.

"Sure, it won't solve completely the issue, but why let crooks be able to hide very easily when there's little reason to allow that?"

Because anonymity is useful, and because despite what you've claimed, there is little reason to expect that removing it will prevent any crime. Meanwhile, I think domain names are so core to the functioning of the internet that people shouldn't have to be publicly identifiable to host one.

"A whistleblower or activists in danger registers their own domain to publish what they need? C'mon...."

They do, you know. If you're afraid that something will be removed if you publish it on a service, whether because it's illegal or just unpopular, then hosting it yourself works pretty well. If it is really illegal, law enforcement can have the domain name and hosting cut.

doublelayer Silver badge

Re: "He appears not to have read draft article 23"

"But I guess many will agree on the call centre issue, but won't on domains because they are driven by greed,"

Not my reasoning. For one thing, call centers will spoof IDs until the laws against that are enforced or the protocol is updated to prevent it. Requiring an ID to operate a phone number won't get either done.

Having a domain name without an identity connected to it doesn't make piracy much easier. The governments still have the ability to shut down the domain name and collect information such as the payment method used to register it. If you view IDs on items used to pirate media as a justified response, you would have to collect them for lots of other things. Internet connections, including temporary ones on a public network, for example. Also the equipment you use at the end of those lines, meaning all computers. You'd also want to identify any user of an online service which could share information, because they could put copyrighted information up there or identify the system on which it's found. You could make a case for registering each IP address and each general-purpose computer as a measure against copyright violation. I think that, if you did, it's a terrible idea and has several worrying risks, and I think they apply similarly with domain names.

In my opinion, there are few items dangerous enough that their purchase should be recorded for the use of law enforcement. Any item added to that list needs a lot of justification, and so far I haven't been convinced by any argument about domain names being that dangerous.

doublelayer Silver badge

Re: WHOIS not alone

I don't support anonymous companies, though I can see a case for companies that a member of the general public can't identify, leaving that to law enforcement. But I'm not going to argue that point right now; we can proceed with the idea that the public should have instant access to the identities creating any company. In which case, a unique number is much better than birth month and year. If two John Smiths born in May 1981 open companies, you could confuse them. If John Smith 1285939 and John Smith 1287561 open companies, you can't mistake them for one another. And in order to find all the companies with the former, you just search for that director number.

doublelayer Silver badge

Re: Checking at least some details?

It's not hard to set up a front organization in a country you think you trust. The organizations who sell anonymization services or did so before GDPR made that generally applicable were located all over the place. I remember several based in Canada, the U.S., France, and Denmark. Would you trust any of those countries? If not, I wonder what your list is and whether you really checked sites for presence on it.

doublelayer Silver badge

Re: WHOIS not alone

And why might you need to narrow down the company director without the extra access, and if you do, why is it birth month and year that you should use as a key? That is not a very good key, as people could share that data as well and it is of use to scammers. Eliminate those issues by instead having a company director number, which is randomly assigned to a unique person so you can immediately see any other companies they have registered but you can't use it to pose as them. Risk of collision: zero, so it's a better tool for your use case. Risk of abuse: significantly lower.

doublelayer Silver badge

Re: WHOIS not alone

Birth month and year is bad enough, especially as I see no reason the public needs to know that when investigating a company. As for the address, that's great for a company that has its own premises somewhere, but if it's a small one where all the workers work from home or it exists for a freelance person to organize contracting work, then they won't have one. Should they be obliged to rent some external address to receive post just so their real address where they can already receive post won't be publicized?

Bank manager tricked into handing $35m to scammers using fake 'deep voice' tech

doublelayer Silver badge

Usually when I've seen these, they make you say something that they've just come up with so you can't use a recording. That would require them to have a pretty good model for sounding like you because they could have left out an accent trick which the bank's model has remembered. However, it's hard to test and easy for an attacker to play with, so I would recommend that nobody enable that if they have a choice to use a less convenient but more secure method.

doublelayer Silver badge

Re: Of all the scams in all the world -

From the sound of it, they also had fake documents and emails to start the scam, with the voice call only as a second factor. The bank certainly should alter their policies so one person, even completely convinced, cannot lose them that much money without oversight.

Everyone who wants a smartphone for Chrimbo will get one, but in the real world things are somewhat different

doublelayer Silver badge

Re: "The chipset famine has truly arrived"

They're unlikely to admit that, but it's not compatible with the current situation anyway. The problem now is that people are trying to buy more tech than the manufacturers can produce and ship, so demand isn't that low. It would help if people didn't want to buy more phones, because then the related items would be manufactured and shipped more quickly. Well it would help me at any rate. The phone manufacturers have a different view.

Client-side content scanning is an unworkable, insecure disaster for democracy

doublelayer Silver badge

Re: Apple has its own agenda

I agree, and yet think you're wrong about the others. I would rather have Google and Facebook comb through my data on their servers than Apple comb through my data on their devices, because I go to lengths not to put any data on Facebook or Google's servers. For that matter, I also put very little data on Apple's servers. That's where I can exert my control, by not allowing things on other people's servers. If they run it on things I own and use, they have much more access to the place where my data really is, and I have less ability to know what is available to be analyzed and what will happen to it. It's not like they were going to offer a "Do you want all your stuff scanned" switch.

doublelayer Silver badge

Ah, you're back. I thought you left.

Standard problems with your repeated comments apply: not text under consideration, these are images. Also of no relevance as we're not talking about advertising and the problem is privacy.

Judge rejects claims Cloudflare should be held responsible for customers' copyright infringement

doublelayer Silver badge

Re: knowledge and the law

Many crimes do in fact require that the person doing them must know that they are committing a crime. It doesn't always apply, for instance the author who committed the plagiarism doesn't have to know that it's illegal, but someone who binds the book does not know of its contents and would not be charged because they didn't commit a crime. Usually, it's the accessory or aiding charges that require knowledge, and that's the charge that would be leveled against most of the people on the "might" list.

Missouri governor demands prosecution of reporter for 'decoding HTML source code' and reporting a data breach

doublelayer Silver badge

Re: Dare I admit to the govenor ...

Sadly, there are some people who would see those as worrying criminal tools. I know if I'm ever investigated for some crime, I'm going to get a lot of blame for having a tool called Wireshark installed on my computer. It's even got that scary name and talks about packet capture, so I must be evil. Wget doesn't have the same cool name credential, but by not being a full word, they'll give it extra points for ubertechnical hacking tool so we're probably even. Unless they have a forensic investigator review my hard drive and find that I've got wget too. Then we will be assumed to be acting in concert, which will be very fun if we're in different countries so we can be called "an international cybercrime organization".

LAN traffic can be wirelessly sniffed from cables with $30 setup, says researcher

doublelayer Silver badge

Re: I thought LAN cables were shielded

If by "one of those plastic tags" you mean a label on the cable, then they've managed some very compact designs. A listener needs not only an antenna of sufficient length to receive the signal, but also a processor to decode the signals, a mechanism to send that data to the attacker, likely wireless if this mechanism is useful, and a power source to run all of those. That's going to make for a very thick tag.

doublelayer Silver badge

A serious adversary with what access? Because if they control your endpoint or if you're sent to HTTPS through plain HTTP, you're right. A lot of adversaries don't have that on either end though, so HTTPS and HSTS policies are pretty good.

doublelayer Silver badge

Re: New? Bwahaha!

Oh no, they knew exactly where their risk was, namely the capture of codebooks. They just didn't find out when the allies succeeded in getting some. They didn't know about the computer research either, but without the codebook theft, it would have taken a lot longer.

doublelayer Silver badge

If that wire goes to something else, it probably logs traffic and would notice UDP packets going to a closed port or address that isn't routable. This counts on the receiving machine just dropping the unusual UDP packets, which is what most consumer-level equipment would probably do, but if you're using two airgapped machines with a wire connecting them, you probably want to inspect traffic for an attack and give warnings about unusual packets coming along.

doublelayer Silver badge

Re: I thought LAN cables were shielded

Putting electronics around a cable would be detectable to someone walking in and going "What's that", though. What could work is to take the original cable, add the compromised cable, but only plug in one end and ensure the other is slightly disconnected. When someone notices that the device isn't connected, they connect it themselves or ask you to do it.

Google's VirusTotal reports that 95% of ransomware spotted targets Windows

doublelayer Silver badge

Re: The hubris of Apple (oops I meant Google)

Windows has lots of problems. I would never deny that. Your demonization of it, however, is hyperbolic and therefore inaccurate. Your comparative idolization of alternatives is likewise flawed. Windows is attacked very often for one very important reason: that's where the users and data are found. Getting a user to execute a binary is a great insertion mechanism. Despite your assertions, you can block them from doing so and you can restrict what that binary can do, but many administrators do not. Since most users are on Windows, the attackers go against Windows. The problem with comparing them is that you can also mail a Linux user a binary. They can also run it unless the administrators have restricted their actions. It can do similar things if you do run it. Bugs allowing privilege escalation have been found in both systems, for example. Exactly how the various things are done will differ between platforms, but both can be attacked in similar ways.

doublelayer Silver badge

Re: The hubris of Apple (oops I meant Google)

It seems to me that the "Linux | FreeBSD | UNIX | Chrome ..." whataboutism" is mostly coming from you. Albeit the reverse of what you're claiming to see, but still. You assume that Windows is being attacked because it's "the easiest of all to attack successfully" without much evidence. And it's basically wrong. Nothing stops ransomware working on Linux. It would work pretty well, since there isn't much difference in disk protection between Windows and Linux. Mac OS does have stronger disk sandboxing inside user accounts, and that could help if it wasn't broken by Apple's mistakes, but neither Linux nor Windows have that.

A properly-run Windows network will be good at blocking or recovering from an infection just like a well-run Linux network. The OSes have differences in security, and I generally prefer Linux's model, but it doesn't make it immune or even distinctly better. An attacker who wants to hit you and knows you have a Linux setup can take on that challenge. To claim otherwise is likely to lead to problems.

doublelayer Silver badge

Re: Why this Obsession with Ransomware?

It's a combination of the damage caused and the frequency with which it happens. Both of those operate in multiple ways.

First, the damage. If your database is cracked and someone makes off with your customer data, that's bad. However, people won't notice, some won't understand the risk, and once you close that barn door, your customers bear the cost while your business goes on. A responsible company will handle that differently, but many don't fear that as much as they should. Ransomware is a much more direct hit on a business, making it hard for them to act, even if they do pay the ransom. Whether they pay the ransom or for people to do a full restore, the money comes out of their wallets in one big transaction, so it's very noticeable.

Second, a frequency event. The effect of ransomware is a lot like the effect of a fire in the office building, which is why you need off-site backups even if you don't have an ethical objection to paying ransoms. However, companies don't often hear about someone having their office burn down, so it seems remote to them. Ransomware is popular enough that it happens to people a lot and new enough that it gets news coverage when it happens, so people feel like it's a more likely event. That's why ransomware gets attention. It is a real threat, and it is both frequent and understandable for the nontechnical.

Apple warns sideloading iOS apps will ruin everything

doublelayer Silver badge

Re: Right Hand/Left Hand

You are correct about signing in general. This is an Apple policy with IOS, where they cycle through certs and block apps that have outdated ones from newer versions of the operating system. That's why they update. It has no effect on the security of the users' data. I can think of a few reasons they might do this, which range from acceptable to sneaky, but in no case does it help other security situations.

doublelayer Silver badge

Re: Right Hand/Left Hand

Most of that is wrong.

"It's a way of forcing security compliance."

No, it's changing a certificate so things don't break. The new certificate isn't more secure than the old certificate, and it doesn't do something to change the action of the code. It's there because the old certificate is going to expire and Apple doesn't want users complaining about the apps no longer working.

"If the app developer can't be bothered to update the app to keep it secure, Apple will update the infrastructure around it - thereby depriving the lazy sod of income until they step up and do what needs to be done."

The app developer isn't doing anything, and Apple isn't taking on their role or depriving them of income--in fact, by this point, the developer has probably stopped supporting the app altogether.

doublelayer Silver badge

Re: that aren't from an official source, such as the Microsoft store

The structure of the phrase only allows for the store to be listed as an official source, although the comma isn't required for it. Even with it split out as a separate clause, it can't mean that it's non-official because the only thing the "such as" can apply to is "official source". It can't refer to "aren't from an official source" because that isn't a noun, and it can't refer to "apps" because the store is a source for apps, not an app of its own (in functional rather than technical terms).n I bet the comma was put there without considering this, so it's very good it didn't read like this:"Sideloading apps is when you install apps that aren't from an official source, such as from the Microsoft store." That could apply to the verb, so it would reverse their meaning. English grammar has so many little traps like that.

doublelayer Silver badge

I could make that argument about a lot of things, but it's always fallacious. The general public makes plenty of mistakes with tech, just as we probably make plenty of mistakes with those things we know less about. However, we don't take away our own rights to make decisions, nor should they be taken away from someone else who knows less than we do. Everyone makes a mistake from time to time, and that's no reason to treat them unfairly.

For that matter, I recently made a mistake with technology (a computer stopped booting to Windows and gave me an automatic restore screen instead, and I foolishly thought starting the restore would run a fsck and restart, but it instead chose to do a wipe and reinstall, destroying all the data). Should my right to make system decisions be revoked, even though I knew enough to boot to Linux and do some command-line investigation to find out that this had happened and cleanly reinstall? If we're to decide what rights others have because we know more than they do about the tech, I don't think we want to know all of the rights someone else would take from us on the same basis.

doublelayer Silver badge

Re: Law of unintended consequences

The difference, if there is one, is the amount of competition. If you can, for example, buy a game on a disk and Sony doesn't get paid, then there's a lot more competition than Apple has. If there are lots of game systems available, then each one has less market dominance and therefore has less ability to cause harm. I don't use consoles myself, but if they're doing the same Apple thing, I wouldn't mind making them open up a bit too.

doublelayer Silver badge

Re: Tesco

Not really, as they've just increased the key space. You can spoof with anything you like, but if you do, you probably can't spend any of the theorized points you would have earned because each spoof has been distributing them across fake addresses. They won't mind.

FTC carpet bombs industry with letters warning that fake reviews will be punished

doublelayer Silver badge

If it's related to inflation, it wouldn't be round. There are a few different calculations for inflation, but 1.76% in 2019 and 1.18% in 2020 sounds kind of right. The CPI rate was 1.371% in 2020 and 1.711% in 2019, which isn't the same but close. If so, this year's increase should be quite a bit larger.

Sharing medical records with researchers: Assumed consent works in theory – just not yet in practice

doublelayer Silver badge

Re: Category mistake

They seem to have redefined collectivist as the level of people protesting or disobeying public health recommendations. That has a lot to do with the person leading the country and the politicians supporting them, as well as the trust in government. The combination of those factors is really what made the difference in how badly the pandemic was, also factoring in local problems which made adherence to the public health recommendations harder. While calling concern for others "collectivism" sounds alright, it's not what it really means, so the author has ended up with an incorrect phrase.

How Windows NTFS finally made it into Linux

doublelayer Silver badge

Re: Am I missing something?

It depends. Maybe you're using something I don't know about, as I try not to write to NTFS very often, but if you're using the traditional methods, you'll either get something which works but slowly or something which balks when presented with unusual drives. Another restriction on both is that they often can't deal with a NTFS disk that wasn't cleanly written and unmounted, which used to be normal when Windows shut down, but now doesn't happen by default unless the user either restarts or changes a relatively hidden setting. Supposedly, this version should run fast and support that, so while I don't need it now, I'll welcome it.

Schools email marketing company told us to go away when we told them of exposed database creds, say infoseccers

doublelayer Silver badge

They wanted it fixed. Because not having it fixed meant potential problems for the people whose data was in there.

Don't get me wrong, if the company decided to reward them for their warning, I'm certain they would have taken that gladly. They still wanted the issue fixed though.

doublelayer Silver badge

Come on. The second and third emails mentioned almost certainly looked like this:

First: "You have a problem with your database credentials being shown here ..."

Second: "Sorry if you didn't get our last email, but you have a problem with your database credentials being shown here ..."

Third: "You've got some seriously confidential data in your database, and it's a crime to leak it or not report a breech, and your credentials are right here. You need to fix it."

Then the response. The article notes that the credentials were fixed after the press got involved, not beforehand. You have decided based on no evidence at all that the researchers wanted money, but as the problem they found wasn't fixed, they could easily have just wanted it fixed. Like many other researchers, if someone won't fix their problem which is actively affecting others, they go public. For a similar reason, if you were periodically firing a projectile from your house onto the street, I'd try to make you stop and if you didn't immediately do it, I'd report you to protect pedestrians. No money involved.

Australian PM and Deputy threaten Facebook and Twitter with defamation liability for users' posts

doublelayer Silver badge

"You post something on your website and idjits uses the comments to make a malicious remark... not your fault. Your ENTIRE BUSINESS is premised on people posting remarks, then I'm sorry but you ARE responsible for what people post. IT'S LITERALLY YOUR BUSINESS."

First, that's incorrect; the laws generally say that it's not even if your business relies on people posting. But more importantly, most suggested changes to the law, and in fact almost all of the possible ways of implementing it, would not get you to that state. It is quite hard to define whether a company's business is related to users posting content, and people could make arguments either way. You could argue, for example, that this site has such a business model; although they look like a newspaper, they also have a community of commentors, topics unconnected to the news articles, and make advertising attracting people with those things. Even more so for a site where you post things for free and allow comments. Usually, the suggested changes to laws end up saying that everybody is responsible for something their server sends, with no distinction attempting to target things like Facebook. You can try to make a third law which draws a line down the middle, but know that you aren't joining many others who favor a much more black and white approach to either side.

doublelayer Silver badge

Re: Printer's Imprint

Ah, the classic "abolish anonymity" response from someone who doesn't mind using it themselves. It's a terrible idea and any government that attempts it is intensely worrying.

doublelayer Silver badge

Then this forum too should be shut down immediately. I have no sympathy for Facebook, and if the law could just kill them, I'd like the results. However, it applies to a lot of places and they too have a moderation problem. We've seen posts here which could offend somebody. The moderators get to some of the egregious ones eventually, but not within seconds which is all it takes. There are others which stay up. If they could be sued for anything I or you said, they probably wouldn't be able to justify the risk they're taking on by having this forum in which we can do so.

User locked out of Microsoft account by MFA bug, complains of customer-hostile support

doublelayer Silver badge

Re: Lowest Common Denominator

I certainly don't envy their support requests. When billions of nontechnical people use something, the support traffic must be nearly endless and mostly useless information. Open source operating systems get around this by not having billions of users and not offering general support, but if Microsoft decided not to support Windows anymore and everybody moved to a Linux of some sort, there would be a related wave of requests from new Linux users that I for one would want to run away from very fast.

That doesn't mean Microsoft's level of support is acceptable, as they have plenty of money to spend on improving it. I just don't want to be anywhere near that attempt. I support only close friends and family, and that's hard enough to do over the phone to a nontechnical user.

doublelayer Silver badge

Please list any services you run so I know to avoid them. I'm guessing you do store sensitive information on that service, or you wouldn't have the account, and you have other security problems involving more important accounts. I'd like to make sure the information that gets leaked isn't mine.

doublelayer Silver badge

"Clicked on" in this case probably means copied the URL, inspected the URL, verified that it did in fact go to a Microsoft-owned domain which it did, verified that it was an expected domain name which it was, and one that a standard user couldn't edit which it wasn't, and then put it in a browser. Like we do all the time because people do send legitimate URLs in emails. They don't need to pad out that part of the description when it wasn't a malicious link, do they? Your assumption and the conclusion you imply, despite that conclusion having nothing to do with the problem reported, is not useful.

The planet survived six hours without Facebook. Let's make it longer next time

doublelayer Silver badge

Re: Without Facebook...

Your argument is suffering from this second post.

"Ok, you try being separated from your family for four years."

I'm sure that was terrible. I don't wish that on my enemies. But it's not a cogent response to there being alternatives to WhatsApp.

"Telegram and Signal weren't a thing when we needed WA."

Possible, as WhatsApp started in 2009, Telegram in 2013, and Signal in 2014. So perhaps you do mean the period between 2009 and 2013. However, there were many things like it at that time. Here's one: email. Email is low on data usage, has clients for everything, works internationally, etc. You could easily have used that instead. It's not the only thing out there. Sending text over the internet wasn't invented by WhatsApp.

"Ideological purity is all very well, but matters not a shit when real life intervenes in all its many nasty ways."

I don't begrudge you your WhatsApp use. In fact, if the time period is as discussed, it wasn't even Facebook's at the time so I would have been using it too. In the very limited discussion of whether it does something otherwise unavailable, the answer was no then and remains no nowadays.

doublelayer Silver badge

Re: It will take a while

That solves the first named problem (data integrity) while making two other named problems worse (storage requirement and operation cost) and doing nothing at all about the rest of them. Try again?

Patients must know how their health records are used – and approve any sharing for research

doublelayer Silver badge

Re: This will be an unpopular opinion

I am not happy to give it up. I am quite happy to keep it alive and to feed it with my data. I only ask that my data and those of others be treated with respect, which isn't happening. Respect includes telling the people what is happening to their data and what it is. Given the risks the loss of the data can have, people have several good reasons to want to keep it sufficiently anonymous, and some people may have sufficient reasons to deny its inclusion.

Those last sentences may sound a lot like opt out, and I think most people should be happy including their data in a system which respects those aspects. However, the systems as they exist do not, and I have never seen an opt out mechanism that nonetheless maintains rigorous methods of informing the subjects what's happening and allowing them the control needed to opt out. If they can create one and prove its effectiveness, maybe it can be considered, but until that point, opt in is the only way to ensure sufficient information is provided. Opt out incentivizes people to hide the information and opt out path from the subjects because if they don't find out, they don't stop you. Opt in incentivizes information and control, because the more people who agree to what you're doing, the more valuable data you get.

doublelayer Silver badge

Re: I have a big problem with the way this debate is run

I agree with most of these, but they are improving. This time, they have a clear statement about what we're debating:

This week’s motion is: Assumed consent is the right approach for sharing healthcare patients’ data, beyond their direct care. Or to put it another way: patient records should be shared with medical researchers on an opt-out basis.

Which helps clarify what for/against mean. Last time, the motion was vague and the debaters didn't really help.

There's also something to be said for debating tactics where the debaters respond to one another after their statements. I realize that's harder to do in a written medium, but I think that would help. The summary article posted once our votes have been counted goes through our comments for illustrative statements, and they could have the debaters respond to the more common of those and to points made by the opponents. That means the debaters actually have to acknowledge the deficits in their arguments rather than just taking one aspect that works for them and ignoring the rest.