* Posts by doublelayer

10237 publicly visible posts • joined 22 Feb 2018

Arm CPU ran on electricity generated by algae for over six months

doublelayer Silver badge

Re: I, for one, welcome our power spewing* algal overlords...

Two problems. First, at-home generation is great, except the methods available tend to be inefficient. You can have your own generator without spending too much money, but you'll be wasting a lot of fuel that generates power you don't need right now. There's a reason they tend to be used only in emergencies. The really big ones tend to be a lot more efficient. Solar panels are a bit better, but storage systems so you can use power at night less so. Again, it's out there and can well be used, but there's a reason many with home solar setups put excess power into the grid during the day and power on something else at night.

Now for the less important problem: "Apart from large hadron colliders, football stadiums and cryptocurrency mining, who needs massive amounts of electricity on a daily basis ?"

Server farms. Factories. Industrial kitchens. Hospitals. Airports. Skyscrapers. Any place with a lot of people. Any place with a lot of machines. My home usage is tiny, but there are a lot of nonresidential users out there.

How ICE became a $2.8b domestic surveillance agency

doublelayer Silver badge

Re: Fixing the civil registry would have costed less...

"Data are already there, but mismanaged so badly they become useless. If that's what you want because you "fear the State", you don't understand that you are the State, so you're actually fearing yourself."

Let's get the most wrong part done first: I am not the state. I am a member of a state, which one is not important right now. The state can still abuse one of its members, and many have been known to do so in violation of the laws agreed upon by the state and me as a member. Thus, I wish to avoid those abuses. If I was the state, then I would have the power of the state and I would eliminate those abuses (though making me a dictator is probably not the best way to fix things, I at least promise to be a better one than usually seen).

The whole point of privacy isn't to eliminate the existence of data. It is to avoid the misuse of that data, including collection by people who should not possess it. Disorganization is basically the goal. I'm in favor of avoiding organizing data when it is not warranted and approved. My ISP does know my name and payment details, but they did not need my identity paperwork to plug in a wire. I think it is possible to pay some of the utilities in cash, so if I wanted to avoid giving them my name, I could do that with extra effort (it's not worth bothering, but it's possible). Facebook probably does know a lot about me, and this is exactly the problem I want solved, so pointing out that it's true is not going to change my mind. A record of property ownership is not the same as a centralized repository of every utility connected to every resident. If I'm renting, my landlord can know who I am and collect documents to prove it if they want without having to record this for government usage which has already been specified to be illegal.

doublelayer Silver badge

Re: Trying not to contribute to those tax dollars

"It was quite interesting that the Canadian government was able to block the exchange of bitcoins that US citizens donated to the Freedom Convoy truckers."

Why does that surprise you? When it was available to the people that Canada didn't want to have it, it was in Canada. Where it started wasn't very related since it got there. Also, I only saw cryptocurrency being frozen at exchanges, so a direct transfer would probably have worked. I'm curious what part you found interesting, as both aspects seem predictable and ordinary to me.

doublelayer Silver badge

Re: Fixing the civil registry would have costed less...

Some of that's been done, and other parts of that I don't want done.

"In other countries getting a driving license without the required stay permit is not so easy."

In the U.S. as well, which is why they had to branch out. Various methods are available for proving identity, but obtaining a license, especially a federally-approved one, requires documents people who immigrated illegally won't have.

"Even utility bills could be an issue (of course people renting houses illegally can still have bills in their names or using front people)."

I don't want to have to prove my identity to connect utilities. I disapprove of a tracking system that can easily link my identity to my ISP connection. It is unnecessary for anyone following the laws, and for any criminal investigation that needs the data, it can be collected in a limited way during the investigation instead of collected indiscriminately and retrieved from that cache. An updated system does not need to collect that data.

Open-source leaders' reputations as jerks is undeserved

doublelayer Silver badge

Re: Offensive and poorlt thought through

I'm not sure about that. Both groups have different ways of being annoying. I think your descriptions are accurate, which leads to the following interactions:

I know everything guy: Argues with you for a long time before you prove what needs to be done. Embarrassed that they don't actually know everything, they will eventually back down before they get extra proof. Next time, they will do what you showed them so they don't need to ask for help.

I don't know how to use computers guy: Much more humble, asks for help, you show them what to do, and everything seems fine. Tomorrow, they're back asking you how to do the same thing, or something similarly easy. They can also get less humble later on if they think that not learning is an appropriate course of action. This can end up taking a lot longer and giving them the impression that it's fine to waste your time with basic questions because you're always happy to help so why should they figure it out?

Neither kind is good, and depending on the specifics of the situation, either kind can end up being much worse.

doublelayer Silver badge

Re: How People Use Software

I don't know the system, but both of your statements could well be incorrect.

"First, I'll note the customer got the same info, whether the computer was used as intended by the software designer, or whether the manual shortcut was taken."

You don't know that. What else was on the dispatch note? Maybe it was just a copy of the list with serial numbers, but maybe it included extra information. The description we have doesn't indicate this. I'll also note that the computer might have done other things with that information, such as tracking who has each serial number for tracking product defects or allowing the customer to look it up later.

"Second, I'll ask: was it faster for product-pickers to write down the serial numbers by hand than it was to work the computer as intended? If the answer is "yes," then the program design is at fault."

Or the product picking process was. Either way, it sounds like they had to note the numbers and come back to copy them in, so by definition it was faster. Unless they could take the computer with them and write them at the point of picking, the computer approach is probably slower. This is acceptable if there is a benefit to doing it. We don't know if there was.

doublelayer Silver badge

Re: Offensive and poorly thought through

We're not hiding this stuff. You can go online or to the library and find clear, no-knowledge-required explanations of how all of those things work and how to fix them. That is how most of us who understand them came to do so. I didn't start programming when someone taught me. I started when I found a book on HTML, which didn't teach me about programming, but let me see how a relatively basic computer concept worked. Then I wanted to learn how more complex ones worked and I found those instructions. Only later did I seek out a person to teach me in a more direct manner, and even that didn't stop my undirected experimentation.

The only alternative is to deliberately make things harder for users to use. For example, don't do anything automatic and make people go through network configuration and limited interfaces to get online. This doesn't help, because someone will see that as a problem, which it is, and fix it so that a user doesn't need a lot of knowledge to do something easy. I would prefer to set my microwave by pushing buttons rather than manually setting the configuration of the magnetron, because I don't know how to directly control that but it's not necessary for me to know to make use of it. I can still go find out how the components work if I need to later on.

doublelayer Silver badge

Re: Giving nvidia the finger

While they're often wrong about stuff like this, in this case, the point being made against them wasn't proven at all. The allegation is that Nvidia GPUs are not used in consoles because there's some problem with source access, but nobody's proven anything like that. All we know is that AMD's been used, not why. The companies that make these things don't give out source themselves and probably could get proprietary and NDA-covered access to extra information from Nvidia if they wanted to. In addition, while it's been a while, since only a few console manufacturers are out there, it's been a small number of designs that have had the chance to use Nvidia and didn't. It could be that AMD is more accommodating with making custom designs, have had better products for the use case at design time, or had a better pricing contract. If it was one or more of those options, the manufacturer would probably never tell us about it. From what we know, the manufacturers could have had many other reasons to go with AMD.

Implying it's all about open source when those manufacturers haven't been adherents themselves may be incorrect and is certainly unproven, which doesn't help make a case.

Ransomware the final nail in coffin for small university

doublelayer Silver badge

Re: The Real Problem

You have two problems, both large.

"Why isn't Windows secure? That is the question we should be asking."

Why do you assume it's Windows? You can run programs on everything else as well. Those programs can read, write, and delete files which is all you need for ransomware.

"It shouild not have been possible for any unauthorized programs to install themselves without seeking permission from the user."

Why do you assume it did? Maybe it got permission from a user who didn't understand what it was. This is quite frequently the mode of initial infection. Alternatively, it could exploit a hole left by a user, such as an open SSH or RDP port with insecure authentication. Do you assume that every infection requires an OS vulnerability to succeed? That happens, certainly, but it's far from the majority.

doublelayer Silver badge

Re: Having backups

True, but in order to have usable backups, you have to test them. You should also have cold backups that are kept offline. If you did either of these, the chances are good that you can use them with some work. If you did both of these, you probably have functional backups in that case. You can't encrypt a backup after it's been written to a tape and is sitting on a shelf, and if you encrypted it before it was written, a test will demonstrate this.

doublelayer Silver badge

Re: Just saying

This page indicates no CVEs for Z/os. It doesn't indicate that Z/os doesn't have security issues. If it didn't, there would be little use for the portal IBM has for announcing them:

IBM Z offers a Security Portal that allows clients to stay informed about patch data, associated Common Vulnerability Scoring System (CVSS) ratings for new APARs and Security Notices to address highly publicized security concerns.

It's possible that IBM doesn't particularly want the publicity of announcing detected vulnerabilities. I cannot see anything important on this portal because I am not a registered customer.

In addition, a CVE is not needed for ransomware to work. I can log into an account to which I have access and run a program to encrypt stuff. The only vulnerability involved is whatever gave me access to that account, which could be in the user who gave out the credentials, the authentication mechanism that was easier to crack, or the administration process that made obtaining privileges simpler. So if your implication was that this couldn't happen if they used Z/os, you're wrong. It couldn't happen in exactly the way it did as the attackers probably weren't trying for it, but it would have been possible.

doublelayer Silver badge

A lot of universities that came early to computing knew a lot about administration because they couldn't buy in management of all the equipment. This is why most universities I know about have two essentially disconnected networks: the main one with all the university web apps, campus workstations, and student emails, and the one run by the computer science department, which does all the same things but only for those students and occasionally other important systems. For example, I've seen where the CS admins maintain the HPC systems, even though it's mostly the other sciences using it. There are a few exceptions where, when the universities needed administration, they expanded what they already had, but most appear to have taken a more basic approach.

doublelayer Silver badge

Re: Having backups

That is a risk, but there are methods to disinfect the backups before restoring them. It doesn't guarantee success, but it's still more likely to work than paying for decryption. This works better when the encrypter in use has been analyzed and can be detected on a filesystem.

Appeals court unleashes Texas's anti-Big-Tech content-no-moderation law

doublelayer Silver badge

Re: Not an easy area of law

No, the constitutional argument is clear. I have the freedom to decide whether you can say things when you're using my property to do so, as in I can tell you to leave if you're doing something I don't like. That freedom applies to the people who own the company, thus the company can exercise it if those people choose to let it. This is not a new argument and has been used successfully. It also happens that, if that law continued to exist, there would be negative consequences, but even if there wouldn't be, it would still be invalid in the U.S.

doublelayer Silver badge

Re: Companies have rights?

Two problems. First, the concept of corporate personhood in the law is more complicated than you state and was set up for a different reason. You have the misconception that "companies gained "person" status to make political donations". This is not true; the existing status as persons allowed that. The concept is common throughout the world, allowing a corporation to have some of the rights and responsibilities to act in a legal way, for example to sign a contract as a company instead as its owner (this is necessary so the company is still responsible for the contract after the owner at the time of signing dies or sells the company). The court case that established the concept in the U.S. wasn't about donations either; it was about the difference in tax laws between individuals and specific kinds of corporations, a problem that was solved by making different tax forms.

Now that we've defined terms, there's a reason corporations should have rights. They need to be able to do some of the things that people do. A company needs to be able to have responsibilities and the freedom to take actions. It's an instrument for carrying out the goals of its owners, who are all people with those rights, and those people can be held accountable if it breaks the law. This argument may be a bit abstract. I'll provide an example to make it a bit more definite:

1. If I run a website in my personal capacity, I think we can agree that I don't have to publish your comments if I don't want to.

2. If I run it with a friend so that both of us have admin access, we still don't have to publish your comments.

3. If I run the site with donations that come to me personally, I still don't have to publish your comments.

4. If I set up a company so that the site's income can be divided or invested in its operations, it's still being run by the same people and still making money for those people. Why should I have to publish comments now?

The gap between points 3 and 4 doesn't change what the service is. It just simplifies the tax forms and makes it easier to share ownership. The people still have the rights they had before. Thus, the corporation they are using should have the ability for them to exercise those rights. This doesn't prevent having different regulations for corporations than for individuals, as the act of forming a corporation can activate laws that apply only to them.

Microsoft adds unscheduled breaks to most certification exams

doublelayer Silver badge

Re: Exam technique ruined?

Yes. It's worse with some interview-related tests I've had, where there is a time limit for all questions but the system will not allow you to see any future questions or go back to ones. You have to judge when to stop working on question 1 and hope you've left enough time for questions 2 and 3. If you did and you'd like to improve your answer to question 1 in the time remaining, too bad for you. I've seen this too many times, given that not all interviewers even have take-home timed tests.

Big Tech shrank the internet while growing its own power

doublelayer Silver badge

Muddled reasoning

In general, we do have a lot of negative effects of big tech on our infrastructure and standards. This article appears to be hitting that drum, but from a drummer who just whacks the thing with a stick at random, only landing on the right surface by chance. This starts right from the beginning. The first example to be used to demonstrate that we have a control problem is Apple's Private Relay. This is a VPN. A completely normal VPN. It works like the VPNs we have had. It's also completely within our control, as a user can turn it on and off at will (and it's turned off by default). It takes some information away from the local ISP, which is in fact probably a good thing given what some ISPs like to do with those records. I don't use it because I'm using my own VPN, set up and managed with standards and software that I have complete access to and denying exactly the same information to the ISP. This is not an issue of over-control by big tech.

The same is true of the caching. The article correctly points out all the performance and efficiency benefits of using local caching, then somehow paints it as bad anyway. No, it's not. Once again, it's a thing that can be circumvented if you want extra latency. The systems that implement a CDN are almost always using open standards and quite frequently open source. I can rent someone else's or set up my own. The existence of those networks does not create a barrier to entry. If I choose not to have one, the internet still routes people to my systems. No company locks me out of using or refusing to use CDNs. Once again, this fails to demonstrate any control by big tech.

The sad part of this is that there are a lot of areas where tech companies have major and deleterious effects on important standards and this article had the opportunity to cover many of them. Tech companies have cornered the markets for browsers, mobile OSes, software distribution (in many cases), and membership on a lot of standards bodies. Any of those could have gotten a few paragraphs of legitimate complaint. None of that is something I can opt out of. As this stands, the best example in the article is the complaint about IPV6 which, while accurate, is not the most concerning problem out there.

Apple to replace future iPhone Lightning port with USB-C next year, this guy claims

doublelayer Silver badge

"I think we need new battery tech before that becomes reasonable."

You're correct, we need it not to kill batteries in no time. Unfortunately, we don't need new tech for it to sort of work, so it's being sold by many phone manufacturers right now. The selling point is that it can charge your phone in twenty minutes if you forgot to do so. That you have to buy a new battery (or phone) when doing that renders it unreliable is somewhere between not their problem and one of their goals.

The end of the iPod – last model available 'while supplies last'

doublelayer Silver badge

Re: Ol' (mostly) reliable

On the only device I had with RAM as the primary storage (though a PDA rather than a music player), you didn't. You recharged the battery in the device, and if that battery was in need of replacement, you hoped it would work while you copied anything you weren't planning to lose over to a computer. There was a reason I stuck with devices with flash, even if it was removable flash, after that.

Jeffrey Snover claims Microsoft demoted him for inventing PowerShell

doublelayer Silver badge

Re: powershell command missing

"Excellent example thank you. The brevity and elegance of Bash shines."

No, it doesn't. What shines in the bash example is the power of the du command. Delete that from /bin and try making bash do it for you. The result will be a lot longer and uglier than the PS commands written above.

There is also an alternative in PS: get the source for du, compile it, and put it on your path. You can use the one that Git for Windows has. Cygwin probably has a usable one too. Then all you have to do is pipe its output to a sorter of your choice. The thing that gives you all the power, clarity, and brevity is a platform-independent executable designed for the task. Bash does not deserve the credit for that.

doublelayer Silver badge

Re: At the risk of being downvoted to hell

I hate that comment structure on principle. I've seen some languages intended for education that take a real language, usually C, C++, or a derivative, and bolt on a compiler that does something based on comments. I won't name those languages to avoid drawing undeserved attention to that monstrosity. Every language must have at least one comment syntax that is guaranteed not to be treated as code and should be as clear as possible.

Email out, Slack and Teams in for business communications

doublelayer Silver badge

Re: Messaging > Email

It's called read receipts and there's a reason I turn it off. If this is critical to you and you have the authority, you can make people enable it for anything. If you don't and some people are like me, then they won't turn it on because it is unreliable and annoying.

I scan over your mail and see that it exists, mentally adding it to my list of things to deal with. Since you only see that I have seen your message but you don't see that I have twenty other ones on that list, you might expect a quick response that you're not going to get. Alternatively, I scroll over it quickly enough that I've still registered its existence but I haven't triggered the threshold that informs you, so you think I have ignored it. Either of these can lead to people (probably not you, but they do exist) being angry that I'm ignoring them and complaining about how I choose to do my work. Those who complain, in my experience, never care what else I might be doing or why I do it that way. They complain less when I don't give them extra unreliable data and their first communication from me is either a reply to their request or an automatic response that I've deliberately created for requests such as theirs.

An international incident or just some finger trouble at the console?

doublelayer Silver badge

Re: Typing is not a good idea.

The password would be vulnerable in the buffer, but malware that is scraping that can use various other tactics to scrape it as it's typed as well. If you have malware that can read your input, then that's the larger problem and needs sorting first.

As for password managers, they allow you to have much longer and truly random passwords when you have lots of services to log into, which is often the case. When the choice is between a password manager with a single, good, long encryption password and using the same password on everything, the password manager is better. Remembering unique random passwords would be superior, but I know a lot of people who don't have the memory or patience for that approach.

It costs just $7 to rent DCRat to backdoor your network

doublelayer Silver badge

Re: It costs just $7 to rent DCRat to backdoor your Windows network

In this case, yes, but that's just the target the author of this tool has written for. Unless your saying that it's not possible to write and deploy a similar program on a non-Windows network, the statement doesn't contain much meaning. I know that's not what you're saying because that would be wrong; RATs for Mac OS, Linux, BSD, and less-often used OSes have been written and deployed with ease and are also available for purchase.

Only Microsoft can give open source the gift of NTFS. Only Microsoft needs to

doublelayer Silver badge

Re: What??

Microsoft likes Linux as a developer and server platform, mostly from their Azure people, but they're not going to put all their effort into it, not when some people still pay for Windows and products that run on it. Teams on Linux might not be great, but I have a secret to tell you: Teams on Windows is ... also not great. Their developer-focused stuff is generally better, though it is still young compared to tools that started with Linux as a target.

Microsoft is never going to decide to be Red Hat. They'll do some of the things that Red Hat has done, but they'll do it when it suits their business. Stuff that makes Linux VMs in Azure more popular will get done. Stuff that attracts developers to coding that will also work well on Windows will get done. Writing software that runs on servers so that it can also be used by the millions of people using Linux servers will get done. Writing Office from scratch so it runs on Linux, when they already have a web version that will run and they know most Linux users are perfectly happy using LibreOffice instead, won't get done. This doesn't make them an adversary.

doublelayer Silver badge

One additional use that has already been mentioned here is multiplatform storage. I would like this, too. I have machines running a variety of OSes to which I'd like to attach a storage device. Connecting all of them to a central server and doing all the file access over the network is slow and requires configuration, whereas connecting a USB cable to a hard drive is much easier. A filesystem that can be reliably read and written no matter what system it's being used on would be useful. It's not just technical users; even the nontechnical users tend to have Linux running on embedded devices of various kinds to which they attach portable storage. I know this because they've frequently called me for help when those devices failed to recognize the storage they attached and I had to talk them through backing up the data and changing the filesystem in use so the device would accept it.

Unfortunately, the one that you can pretty much count on being supported is FAT32, which despite its ubiquity, is not a very good file system. A lot of things still use it because of its wide support, which results in file size limits, reformatting devices when it's the only option, etc. The system to replace it doesn't have to be NTFS, but it has to be at least a little like it and for now, NTFS has read support nearly everywhere so it's further along.

doublelayer Silver badge

"Is there any use case for ntfs support in Linux apart from system rescue CDs?"

Of course not. Nobody needs more than one filesystem anyway. Looking at my /proc/filesystems, I see 42 supported ones in here. Let's drop 41 of them. Surely nobody will notice, right?

There are a lot of systems using a lot of weird configs. You can't find a single solution to them all. The list I've brought up is from a server with a basic config and where I haven't added any additional filesystem modules, and some of the systems in there have never been used (I don't create firmware images on it, so the squashfs support is not needed here). It is still used by many, including me on other systems, so it stays in. When something doesn't get maintained, it will eventually be cut from the kernel. There's a reason that, far from dropping the NTFS support previously present, they've added a better version. People have a use for it.

doublelayer Silver badge

If they're going to add it in, it has to be tested first. It's a new addition, just as the read/write NTFS support is new in Linux. It's going through the same system they always use for releasing new features. Why is it so bad that it isn't released yet? I'm having trouble identifying what you would want instead, as if they simply sent it out from dev to full release, I bet you would have several (correct) complaints about adequate testing.

China wants its youth to stop giving livestreamers money

doublelayer Silver badge

Re: Good is good

"That's what the question should be - would my country be better off with such a law?"

I'll analyze that, probably too much, in the next paragraph. Before I do, I must first state that you have to ask one additional question: "would my country be better off with the ability to create and enforce such a law?". There are things we'd all like done, but some of those that haven't been done have been left without legislation because there is too much risk of abuse should the required powers be granted. That also needs to be asked.

Let's turn our attention to this specific law, though. I have a dim view of "influencers", and I don't particularly care when they don't have success at influencing. If they all decided tomorrow to quit and do something else, I would consider it a positive. Let's see what this law does to restrict them. The first thing is that it tries to stop them asking for money, one of the more annoying things they do. Yet why should this be a problem? I know, for example, various projects where the creators ask for donations, from podcasts to open source software. If I don't like them enough, I don't give them money. Why should it be illegal to ask for or receive money for something any user can avoid at will?

Next up is making the services liable for refunds when a child uses an adult's credit card to pay. This makes perfect sense, except it's in the wrong place. It's always an issue when a child uses money that isn't theirs to buy something, no matter what they bought. Parents can deal with this themselves by not giving their children access to payment methods or by having rules about their use. For instance, they could do what my parents did: I knew how to spend their money, but if I did it, I would have to explain what, why, and how, so I only did so when it was necessary. I don't have a problem creating a regulation that clarifies what happens when a child spends the parents' money without permission, but the important thing is the payment, not the payee. If a child takes the parents' credit card and pays a streamer, it's the same problem as if they chose to buy a ticket or donate to the Linux foundation; it still wasn't their money to spend. As such, putting this regulation in a law that's targeted only at streamers is doing this the wrong way.

One more aspect to discuss is the curfew on watching this stuff. They're right that children can stay up too late and have negative results, but that's not really a thing they should legislate to fix (and also not something they can). Children can stay up late doing any number of things. In my childhood, it would be reading books. If the government had tried to pass a law banning me from reading books at night, even if it would have made me more alert, it would have been a bad idea. The right approach is for parents to decide what restrictions to place on their children or to let the children make some of these decisions. In my case, I simply noticed how I felt when I had read too late and decided I'd have to change my schedule to not have that happen next time. I also noticed that, sometimes, my teachers would assign homework all at once and I'd have to stay up late to complete it all, but somehow I'm guessing China doesn't consider that cause of late nights to be a problem.

So to answer your question, I do not think my country would be better off with such a law. It has one useful element that's misused to target one group when it should be generic and it has two aspects that give the government power over something it has nothing to do with. I can say this without liking the targeted group. I can say this while agreeing that, if I had children, I would prefer them not to pay streamers, stay up late to watch them, or use my money for it. I can even say this knowing that, if I had children, I'd set rules to prevent them from doing some of that. That's a decision for parents to make, not government leaders.

India's ongoing outrage over Pegasus malware tells a bigger story about privacy law problems

doublelayer Silver badge

Re: Root cause

The known holes have been patched in IOS and Android, but NSO makes money by selling this exploit kit to some very wealthy people (governments, only governments and dictators, definitely believe them). With that kind of incentive, the company really doesn't want to lose access to that income stream and pays well for more zero days. We will never get a mobile OS and mobile apps* that never have bugs, so there will always be a way for someone sufficiently motivated to launch an attack.

That said, there are things that the OS providers haven't done that would help. Some vulnerabilities exploited by NSO have been patched in Android, but because it's Android, there are a lot of phones out there that never got the patches and remain vulnerable. Google could have prevented this. The OEMs could have prevented this. On that matter, I think recrimination is entirely justified. IOS has had a better record as Apple went back to OS versions to patch devices that couldn't update (and because they maintain software support for longer).

*Some of the ways that NSO's malware has been known to infect devices have used vulnerabilities in third-party apps, most often WhatsApp. That target was so often used that Facebook has sued NSO directly, the first and likely only time I support Facebook. In some cases, the vulnerability didn't even let them out of WhatsApp's sandbox. That's a problem the OS writer can't do anything about.

FBI: Cyber-scams cost victims $6.9b-plus worldwide in 2021

doublelayer Silver badge

Re: 6.9bn

There was an "at least" in there. The real number is probably higher. Some cybercrime won't have been accounted by the FBI, which mostly starts caring when a U.S. entity is involved as scammer or scammee. Some won't have been reported to any law enforcement. Some won't have been counted as cybercrime and counts as a different kind of fraud.

But even if it's the right number, that's a big number. Individuals can face losses in the thousands and companies in the millions. That's enough to cause lots of problems. If we decided that Amazon could pay for all the losses due to crime, we'd be fine, but since we can't, individuals have to deal with the cost. Consider how a $10k (or local equivalent) loss would affect you. If you have savings for that now, consider how it would have affected you when you didn't. It's a problem for those people.

Google cancels bi-annual performance reviews, shifts to GRAD system

doublelayer Silver badge

Is that the only context that rings a bell? I first think of graduation or graduate. Then of gradians. Then grades. Then of gradation. Then of Russian city names (other countries also use it, but the Russian ones are the ones that I think of). Only then do I not really know what comes next meaning we can be charitable and call the rocket the sixth thing that comes to mind. Somehow I don't think Google was picking an unusually insensitive acronym.

Samsung unveils hardened SD card that can last 16 years if you treat it right

doublelayer Silver badge

Re: 16 years ago

"When was the last time that you saw either a floppy or an optical drive on a new laptop?"

Floppy: it's been a long time. Optical: last year. A few large laptops still include them. I avoided those models as it's a lot of weight for a feature I'll use once a year. I understand that there are people who use them more often, but for the rate I use them, a USB one is fine. I'd prefer another drive bay, larger battery, or just a smaller laptop.

doublelayer Silver badge

Re: capable of surviving a five-meter fall

For a good manufacturer, this would mean that it survives the thing it's in falling five meters, where it doesn't get to have any air resistance and has a lot more momentum conserved through it. I'm guessing that's not what they meant, especially as calculating exactly how much stress the card took is tricky because every device will have a different impact.

John Deere tractors 'bricked' after Russia steals machinery from Ukraine

doublelayer Silver badge

Re: If I owned a piece of equipment?

No, I'm afraid it is you who is not listening. I have specifically acknowledged that JD have not implemented the feature in the way I recommended and I have also specifically said I don't like it that way. The post to which I responded spoke of remote bricking features in general being antithetical to the right to repair or the right to real ownership. I disagreed and provided methods. I've stated in my original comment that it was a possibility, not already granted. I stated in my previous reply to you that it was general. I stated in this one a method by which it could be accomplished, using words like "could" to indicate that it wasn't present.

doublelayer Silver badge

Re: If I owned a piece of equipment?

It could, but there's another option. Run a service on the local computer that does what the current bricking one does. Only allow a user to interfere with this service if they can authenticate themselves. Provide the user an authentication method when they buy it. A user who wants the bricking option completely disabled logs in as admin and disables the service. I don't expect a full admin interface on the device, but that method can be used for a remote brick option with complete user choice, just as it does with my laptop which won't let you do much unless you happen to know the encryption key it asks for when you turn it on.

doublelayer Silver badge

Re: If I owned a piece of equipment?

I didn't say they had. I said you could. Or more explicitly, that the existence of a remote brick feature is compatible with the right to repair, which I support in all cases including with this equipment, having argued for it elsewhere.

doublelayer Silver badge

Re: If I owned a piece of equipment?

Simple solution: make it optional and then they can't. If the owner, in this case the dealership, has it enabled and wants the option, then it can be remotely bricked. They are clearly on board with this. If you buy it and don't want that, you can obtain access and disable the feature, but then you can't use it yourself. Problem solved without limiting any user rights.

Spanish PM, defense minister latest Pegasus spyware victims

doublelayer Silver badge

Re: Defence

Here are instructions for using the tool developed by Amnesty International's forensic people. I cannot promise that it produces perfect results or that you can't do something wrong and create a problem, but it looks straightforward enough for the technical user.

https://docs.mvt.re/en/latest/index.html

doublelayer Silver badge

Re: Does Pegasus need a phone number to infect a device?

I think they can also use iMessage on IOS devices, which can use an Apple ID instead of a phone number. You can of course simply refrain from turning on iMessage as you could choose not to use WhatsApp. The question is how many features you want to turn off to increase your chances of not getting infected but not guarantee anything.

doublelayer Silver badge

Re: more questions than answers

A few places have built diagnostics for it. Amnesty International did some of the initial investigations and has a tool for scanning device backups for infection. Apple has identified some of the things that indicate an attack, patched some of them, and informed targets. They have only given us details on a few of these.

There may be other companies who also create methods to detect infections. It wouldn't surprise me that such things are in demand now that NSO's malware is as pervasive as it's turned out to be. There are probably more diagnostic methods that haven't been released as NSO can't be expected to go into hiding or get shut down by law enforcement, so it has to be treated as an active and adaptable threat.

Apple to bin apps that go three years without updates

doublelayer Silver badge

Re: So you wrote it, and it works

Yes, recompile the code, reconstruct the package, presumably change at least a couple pieces of metadata so it's not byte-for-byte identical to the last package, and republish. This has done nothing for your users. It may have taken you some time to do. Now it has to go through Apple's verification system and all your users will have to download this app that's no different than the last one. If you fail to do it, new users won't be able to use your thing anymore. Why is this needed, again?

doublelayer Silver badge

Re: Monopoly

"So if you could side load apps, these apps would be magically updated?"

That's not what they meant or said and you know it perfectly well. What they meant was that, if you could sideload apps, they would object less to Apple's choices. Strawmen aren't helpful.

doublelayer Silver badge

Re: So you wrote it, and it works

And those security updates would be? Yes, your app might use dependencies that have fixed security vulnerabilities, but it also might not. If you wrote all your functionality yourself, then there might not be any vulnerabilities you know about. In addition, Apple didn't say they were scanning for library usage and removing apps based on that, so it looks like you could change the version number in your about screen, make a new package, and publish that update to meet this time requirement.

Don’t expect to get your data back from the Onyx ransomware group

doublelayer Silver badge

Re: There is an argument

The UK military has hired people for computer-related jobs, including offensive operations. They're predictably not keen on telling us how many people are working on offense rather than defense and exactly what they're doing, but they exist. Other parts of the UK government have had offensive uses for computers for quite a while. If a country used cyberattacks to cause significant damage, they also have conventional weapons available to them. The UK and many other countries already have what you're asking for and have announced plans to expand.

Your software doesn't work when my PC is in 'O' mode

doublelayer Silver badge

Re: How friggin' tough could it be to just print the words?

I don't think this is a country thing. If it is, my country's system is to do it at random. Admittedly more often with up being on, but I can find examples of both in a lot of houses, and of course any circuit that has two or more switches will do both. I've seen a few left/right switches, but they're less common and usually control something other than lights. For example, I've worked in a lab where the safety circuits had left/right switches, probably so they'd look different from the lights and hopefully have fewer accidental flips.

Worried about being replaced by a robot? Become a physicist

doublelayer Silver badge

Re: Doing my bit for the little guy(gal)

This is exactly what I was saying. The benefits to society of the new tech are usually greater than the costs to the person who was automated, so even if society has to fully pay for one of them, it's better to help the workers than artificially keep automatable jobs around. In addition, the automated worker can decide to do something they like to do more, which means even more reason to go with that option.

doublelayer Silver badge

Re: Doing my bit for the little guy(gal)

What I propose is that they switch to a different job that fits their skills or consider getting new skills, both approaches having worked well before. For the intervening time, we have systems to make it easier for them to do those things so they don't suffer while making the change. We already have some methods to encourage people to gain some in-demand skills and for protecting people whose jobs have just been lost, so in most cases, we can rely on those. Depending on the specific situation, we may need to expand one of these.

If you're referring to my last statement, that was only what would happen if we eliminated all unskilled work. I'm not sure that's feasible, but if we somehow managed it, our society would be very different. If we can eliminate the need for all unskilled work, we will also have eliminated a lot of skilled work and a lot of necessities would have decreased in cost. A basic income would, at those costs, be significantly easier to pay. Please don't misunderstand this statement; I am not proposing this for our current world. Only under a relatively utopian circumstance which I've already stated I don't think will happen do I think this solution would be needed.

doublelayer Silver badge

Re: Doing my bit for the little guy(gal)

"If we automate unskilled jobs out of existence, what will unskillable people do?"

That's always been and will always be a problem, but lots of jobs have been automated without causing massive problems and providing benefits to society, including those who had to switch jobs. We should definitely do what we can to ease the process, but it shouldn't stop us from improving our tech. If we truly eliminate all the things that unskilled people can do, we'll have created a drastically different world. In that case, it should be pretty easy to let those people do what they want instead of artificially keeping around jobs for wasting their time.

Apple must fix its self-service repair program, say critics

doublelayer Silver badge

Re: We live in a free market economy

"Instead, companies rely on the government, via mechanisms such as patent and copyright, to prohibit people from doing what they want with their private property."

In this case, that's not what's happening. If we eliminated every copyright and patent that Apple owns today, the problem of repair is exactly the same tomorrow. Apple's serial locking code and whatever keys they use to make it work aren't out there, so it doesn't much matter that it would be illegal to copy them. Eliminating protections on IP doesn't help you when they can get what they want by not releasing information. The only ways you could prevent them from doing it are forbidding it outright, increasing the cost to them so they choose not to do it anymore, or forcibly breaking into their systems, finding the internal code, leaking it, and continuing to do that every time they update it.