* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Apple extends live-at-work to at least January 2022

doublelayer Silver badge

Re: Back in your box

"But your comment rules out the possibility that the employer sees value in office presence (or co-located working in a general sense)? How are you ruling this out? How do you know, for a fact, that there is absolutely no value that should be attributed to office or colocated presence?"

A good question, but there is a way. Let us assume a company which allows workers to choose to work remotely or not. If a worker chooses to be remote, but to remain in the same expensive location, how much will the company pay them? Any reduction in value they expect merely because they work remotely should be factored into that value. Therefore, if the company would not reduce that person's pay, but would for others further away, they are not paying for the value they receive.

doublelayer Silver badge

Re: Shop Stores and iCovid

Yes, but they've decided that they still want to be operating. You can move people out of an office and have them still work, but you can't move the store staff out and still get anything from them. They want to reduce the risk, but they don't want to lose money while doing so.

Having trouble getting your mitts on that Raspberry Pi? You aren't alone

doublelayer Silver badge

"And people use it once or twice, find out it is much slower than their PC and it lands in the drawer never to be found again."

That's a lot less noticeable now than with previous generations, but I grant the significant speed difference. When the Pi was new and I saw several people setting up labs with Pis as the computers running a full GUI, it didn't make much sense. However, there are lots of useful things to do with these which will eventually come to mind. Running servers of various types on it is, in my experience, a great educational activity. It teaches the child about the command line, databases and webservers, and anything they choose to use those servers for. It's also a use case where the Pi is well-suited (the server stays up where the laptop's server wouldn't, it doesn't use much power or generate background noise, etc.). And once they've mastered that, they will find new ways to make use of the hardware.

doublelayer Silver badge

It depends what the product is. I've seen a couple display control systems using the Pi as a controller because they need a full stack and reasonable display speed which the Pi's GPU is good at. I've heard that these aren't unique though I wouldn't know. There are several types of products where the Pi's peripherals and power are already sufficient for the task and the manufacturer doesn't need much additional hardware so they don't see the benefit of a custom board.

Using 'AI-based software like Proctorio and ProctorU' to monitor online exams is a really bad idea, says uni panel

doublelayer Silver badge

Re: In other news.. .

In the article, did we see anybody arguing against it who previously made their living as a professional student-watcher? The students themselves are complaining. Professors, who probably would really like not to have to monitor students because it's extra boring work are complaining about it. Those groups do not stand to lose their jobs, so maybe they have real reasons to complain.

doublelayer Silver badge

Re: Online exams do not seem like a good idea in general

In many cases, not having to memorize everything in the textbook. If, for example, I'm writing a program and I've forgotten all the possible magic numbers for a system call, I can find out those options from that call's documentation. I shouldn't have to memorize every system call and every option on every different operating system just to do that, because the information is available conveniently. The textbook can serve two purposes. First, it teaches the theory and provides useful techniques which the student will remember and apply later. Second, it provides reference information which the student can look up later. A good student will remember the former because they use it frequently, and can memorize those details which they use most often, using the book to recall those rarer examples.

doublelayer Silver badge

Re: Its not really AI, is it?

And the preprocessing done to the training data, the preprocessing done to the production data, the specific model or models in use, the output type of those models, the thresholds for consideration of those results, the algorithm to deal with conflicting results from different models, and changes made to all of those since last time it was clearly broken. They don't want to tell people details about any of those.

doublelayer Silver badge

Re: They never should've used it in the first place.

"What you are proposing would result in a deluge of technicians and engineers who hold little knowledge in their supposed area of expertise, thus diluting the value of a real certification."

In my opinion, if that is true, it means the certification wasn't much good in the first place. The easy methods of cheating are where you look up answers online. That's kind of normal now for most jobs, because if you've forgotten something, it's better to just refer to the docs and therefore not make mistakes. If you're analyzing someone's experience with technical skills, then it makes sense to let them access those reference materials, because if they can successfully obtain the goal in the time limit, then that proves they know enough to find the information they needed and apply it properly. If they know very little, then they will most likely not be able to find the answer or tailor it to the situation in time, so they'll still fail. A test based on rote memorization isn't much use when you need quick analytical or problem solving.

In other classes, there's a better case for such restrictions. A student doing a math test shouldn't be able to just type the questions into a calculator. If you have an environment where the person really can't access the reference materials, then you might want a memorization test as well (but really, that's not many places). Most tests, however, aren't so basic.

Another big year for tape as ... oops. 2020 sales dropped 8% thanks to 'global shutdowns'

doublelayer Silver badge

Re: Ransomware

A disk which stores 4 TB versus a tape which stores 6 TB. If they're fast at installing new drives, that can take the storage capacity up to 9 TB per tape. They could also start using larger disks. That's not a major difference.

The reason large companies often use tapes instead of disks for cold backups is that it's cheaper once you use enough storage to cover the costs of readers. It's also generally thought better for long-term archives. For cold backups for short-term periods, disk works well too and the hardware exists for it.

doublelayer Silver badge

Re: Ransomware

"Except ransomware can "hit some of those" in a way that they will still verify and restore and run just fine... right up until you hit a certain date when the self encryption locks down."

I'm no expert, but I'd imagine that's rather harder to do with basic tapes or disks. Unless you can reprogram the firmware on a tape reader or disk controller, then it can't encrypt itself on a schedule. The closest I can think is that they would bother to deploy something to the restore system just to hide that the individual tape was encrypted, but that's a large risk because that would have to include the decryption key which they don't want the user to recover. Also, it's a lot of extra effort. Your prevention suggestions are good.

doublelayer Silver badge

Re: Ransomware

Not as effective because the attacker might attack the backup server during the backup rather than trying afterward. If they're the type who waits around watching things before they launch their assault, they could figure out that it's only online some of the time.

doublelayer Silver badge

Re: Ransomware

That's just an argument for cold backups. Whether disk or tape, as long as you don't have it online, it can't be encrypted after the fact. Also a good argument for frequently testing such things, as a ransomware operator who recognizes that you have cold backups might hit some of those first so they're unavailable when you go to restore. If you can catch it when your most recent cold backup is encrypted, then you might be able to cut off the attack on the hot systems which are targeted later.

Apple didn't engage with the infosec world on CSAM scanning – so get used to a slow drip feed of revelations

doublelayer Silver badge

Re: It didn't win the prize for creepy idea of the day

Yes, I awarded the full title which you edited and I stand by it. The rest of that comment raises real problems about the practicality of the system. When I said you couldn't do it with video and you couldn't solve the ostensible problem without covering video, that was, in my view, a serious flaw which would prevent a system as described from ever being implemented. There were many more. None were jokes.

By the way, that's only a list of the technical flaws which came to mind immediately. There are other technical flaws including the systems required for maintaining image history metadata with integrity checking. There are also administrative problems getting the world to accept a single standard for this which would work at all and getting all the software developers to only ever process images with that check in place, despite the fact that manipulation of visual data is so easy it's a frequent homework assignment in introductory computer programming classes. A full summary of the fatal flaws I see in it would be quite long.

When I call something useless, it means I think it would either be infeasible to implement or would fail to achieve the goals. In this case, I think both apply. That is without at all covering the ethics of such a suggestion, which is the basis for the "creepy" label which you appear to accept. You may take offense at the flaws I suggest, but I have seen nothing to demonstrate that I am incorrect about their existence.

doublelayer Silver badge

Re: Apple are hypocrites

The difference is that this technology could be removed, and then it can't be abused. It still exists as a possibility as it always has, but it doesn't exist as an available exploit. If the code is not on people's devices, an abusive government cannot make use of it, and the user is therefore safe from this avenue. That is why it should be removed.

doublelayer Silver badge

Re: creepy idea of the day

"We could get to the situation in the future where having a JPG on your pc is a hot potato."

No, we couldn't. There are so many images used by programs and websites that there's no way of figuring out which of the thousands of images you care about. No, they're not going to make an expensive, likely cryptographic, format for your desktop icons and video game assets. Oh, and video frames too, because if you don't stamp each of those, people will put their pictures in one and have users run it like a slideshow. That adds complexity and size to anything that reads or writes image data. You might as well ask for mandatory KYC on all text, which isn't going to happen either given how often you use the same text as other people.

"Think how much easier that is to detect by outsiders"

It's really hard to detect. You have several existing formats to detect, which requires a full scan of the user's disk, which the user is likely to dislike. When you've done that, people will immediately invent new formats to get around that. It is a 2D array and disks are big--it's not hard. You're now playing whack-a-mole with format designers. That's without considering pictures embedded into programs which display it when run (if you just set pixels, it will look like text). Then steganography to hide it in something else. Then programs to retrieve the correct bit pattern from another file which isn't signed.

In order to reach step one, you already need something a lot more invasive than has ever been tried. It's not practical. In your title, you left out two words. It didn't win the prize for creepy idea of the day--Apple's got a monopoly on that whenever they open their mouth lately. It won for creepy and useless idea of the day.

doublelayer Silver badge

Re: Image Container Licensing

I think this wins a prize for simultaneously useless and creepy idea of the day. Congratulations.

But really, was this meant to be a joke? Is my sarcasm detector not working today? That's an honest question. If it was serious, do you know that wouldn't do anything for this scenario--if there's an untracked format for images, which there is, then people can continue to use that when providing images of crimes. They're already using Tor hidden services a lot. They can figure out how to download an old version of a program so they can open the formats, and they would only have to do that if the new format was actually made mandatory.

doublelayer Silver badge

Re: Notice how quite Samsung is?

So they decided not to run their own cloud. That's not a surprise to me--I've purchased phones from many companies who didn't run their own cloud service. That doesn't make them responsible for Microsoft because they gave people choices including not using the cloud at all.

doublelayer Silver badge

Re: Banning is effectively meaningless

I agree, but looking at the globe, I can't think of anywhere which will do it. Every dictatorship will be thinking of the potential uses for them. A lot of democracies may be thinking the same and haven't stopped privacy violations before. Those few democracies which tend to be forceful about protecting their residents' rights might think about it, but they don't want to be described as "those people who defended child abusers" so they will probably let it slide.

doublelayer Silver badge

A useful analysis of Apple's announcements

Since this issue has deservedly earned a lot of attention from these forums, I think a few blog posts I've read will be of interest to others here. A security expert who runs an image analysis system and therefore already deals with CSAM reporting analyzed the statements made by Apple. A blog post from ten days ago reviews the technical details Apple released and how this compares to his own reporting mechanisms (spoiler, probably badly but they won't provide enough detail). A second post from this Monday reviews their announcements ever since (further spoiler, lots of contradictions but little new information). I found these informative, especially with the additional experience the author brings to the analysis.

For those who prefer cleartext URLs, the posts are published on the blog at https://hackerfactor.com/blog and are the two most recent posts at the time of writing. You probably want to read them in chronological order.

Apple's bright idea for CSAM scanning could start 'persecution on a global basis' – 90+ civil rights groups

doublelayer Silver badge

You are incorrect. They are encrypted after being uploaded with Apple's key. Apple can decrypt them and has done so repeatedly to comply with warrants from law enforcement. Apple has not announced any plans to change this. If they do, which again they have not, it would not justify on-device scanning.

doublelayer Silver badge

Many would disagree with you. Existing police investigations with limited warranted surveillance have a higher approval rating than this does. Hence, a different method which works and isn't by its nature evil.

doublelayer Silver badge

That's an option, so for lots of people, yes. Another option is to automatically backup the system to iCloud, so that's another way it could happen automatically. Both probably have to be disabled to prevent it.

doublelayer Silver badge

"So the situation is. Do nothing about the problem of child sexual abuse because whatever you do will be wrong."

No, the situation is do something else about the problem of child sexual abuse because what you're currently doing is wrong. False dichotomy rejected.

Trust Facebook to find a way to make video conferencing more miserable and tedious

doublelayer Silver badge

Re: Who is the target market for this?

"do kids still say that?"

Whenever someone asks that question, you can virtually guarantee that the answer is "no, not for decades"*. So in this case, no, not for decades.

*Common variations are linked with slight modifications:

"do kids still use that [tech platform?" -> "No, not for years."

"do kids still think that [insert straw philosophy]?" -> "No, if they ever did."

"do kids still do that?" -> "Yes, of course."

OK, so you stole $600m-plus from us, how about you be our Chief Security Advisor, Poly Network asks thief

doublelayer Silver badge

Re: Mr White Hat ?

That was on my list of options too, but it really doesn't make sense. They've nicely publicized that they could be hacked and all the cash stolen. Some people might assume that it's better to employ someone who at least detected and prevented the attack, but others will decide that working with someone who has already been hacked once is a bad sign. In which case the publicity isn't very useful.

Apple says its CSAM scan code can be verified by researchers. Corellium starts throwing out dollar bills

doublelayer Silver badge

Re: Tank Man

It gives them a list of people who have the image. That likely includes the person who took it (sort by date uploaded, pick the first). However, even if it doesn't, they'll be happy to target those who received it as well, who could, under questioning, disclose the person who sent it to them. If the source of the image is their primary target, it's just traversing a tree. Since those who received the image are probably also targets, it's traversing a graph. Even if the source evades discovery, there are lots of others who won't.

doublelayer Silver badge

Re: Tank Man

No problem. If the group finds a thousand images which have been widely shared, that gives them thousands of targets who took the pictures or stored them. Let's say they only succeed in finding a hundred of them. That's enough people to achieve several goals:

1. At least a hundred people who took pictures and shared them is a hundred dissidents who can be removed.

2. Those hundred can be questioned to find more. Some will comply with questioning.

3. A hundred is large enough that people will notice that the government was able to track them down. That's a good advertisement that protesting can end badly for you.

Even if there are more pictures, that gives them quite a large head start. If there are, they can add them to the filter later when they are found.

doublelayer Silver badge

Re: Look, Squirrel!

"Can you come up with a scenario where what you suggest would be harmful?"

A repressive country, the Democratic Republic of Tyranny, has a protest. People take pictures during the protest and share them with those in other areas. People in those other areas see that they are not alone in their displeasure with the government, and the government feels that protests are likely to occur there. The DRT government tasks a group with collecting those images wherever they have been shared. It tries to block those images in their censorship system, but at least it can't track down those who have it. Enter Apple's system. The DRT government sends the hashes of those images to Apple and gets a report including the identities of all people whose devices contain that image. That would include the person who originally took it (was at protest, definitely guilty of high treason), the people who sent it to others (promulgated information contrary to the government, also high treason), and anyone who received a copy and retained it by choice or chance (just normal treason).

The DRT would have several ways to add this into Apple's system. The easiest would be to call them up and tell them they had to put in the image. If they called the wrong number and got someone who would complain or, it's imaginable, refuse, they threaten to confiscate Apple's assets and cut its business; Apple quickly caves. However, there is an easier method. The country likely has some police system which investigates child abuse, or at least a police organization which can pretend to investigate it. They submit the hashes saying that it is abuse material. If Apple includes it, the DRT gets what it wants. If Apple doesn't include it, the country can go out in public and accuse Apple of being biased and failing to protect children when given information to track; Apple quickly caves.

Asahi Linux progress: Apple Silicon OS works – though it's 'rough around the edges' and has no GUI acceleration

doublelayer Silver badge

Re: Warantless

Yeah, you've just discovered what a rootkit is. Apple could write a rootkit. So could anyone else. There could be one on your computer right now. The manufacturer could have hidden it on a firmware chip or the processor manufacturer could have it in microcode. Better smash it up to be on the safe side.

Zoom incompatible with GDPR, claims data protection watchdog for the German city of Hamburg

doublelayer Silver badge

Re: Great Data Purging Revolution

I didn't, because the text above the video was so ridiculously false. My reply was based on that. I was planning to eventually watch the video at some later point, but it could be someone else with real information or something equally bad, so it wasn't high on my list of actions. It may describe real downsides of the GDPR, of which there are several, but if the text above is any summary, it isn't.

doublelayer Silver badge

Re: Great Data Purging Revolution

He's certainly useful in this, but he doesn't get to fine the large companies who violate GDPR all the time. The organizations which have that power seem to take a very long time to do anything. It's certainly better than before when they had no power, but it could be even better if they started using their authority often.

doublelayer Silver badge

Re: Great Data Purging Revolution

Really? That's crap logic.

"If you noticed people accept GDPR terms without reading which gives companies who use that data legal protection."

If you noticed, they did that before. The companies have no more protection now than they used to, and now there are terms which they can't legally put in there.

"Then one of requirements was data portability which forced many companies into implementing data export facilities. This means they can more easily pull the data from the system and sell it, even companies who didn't think about that."

Yeah, so? They had the ability to sell the data at any time, but now, it's illegal for them to do it. How did GDPR help here? Just like the last one, this law gave them no new rights and restricted a few they used to have.

Internet Explorer 3.0 turns 25. One of its devs recalls how it ended marriages – and launched amazing careers

doublelayer Silver badge

Re: Sadly, there were divorces and broken families and bad things

Yes, it's always possible. I don't know what the engineers were thinking when they were doing the work at that level. However, the attitude of the manager is not good. If it were me, I probably wouldn't ascribe the divorces to that project specifically, but he thinks it was the cause. If something really causes two divorces that wouldn't have otherwise happened, that's a rather big negative consequence. He doesn't seem to view it that way; the statement has a lot more nostalgia to it. And the upside, that part after the but which makes it better in hindsight? That you can get a hundred people to work "like their lives depended on it". Because that's critical in this situation.

doublelayer Silver badge

Re: Sadly, there were divorces and broken families and bad things

In this case, that's rubbish. Had Microsoft not written a browser, their OS would have been fine for at least several years while people used someone else's browser. Only if their competition had all decided to include browsers would there be much of a risk, and their competition was very weak at the time. So if they had spent a few more months completing their browser, there wouldn't have been any negatives from it.

Some places have that need for survival, but even then, there are many reasons not to mistreat the workers. Getting something done with unmotivated workers is hard, but getting something done when your workers quit because you're making them work all hours is impossible. Your company's survival, even if that's at stake, is not what the workers most care about. They're focused on their own survival, so it would help you if you tie the two together. If they benefit as you do, meaning that neither group is completely ignoring what is best for both sides, then you'll get a better result.

doublelayer Silver badge

And tell me, where would someone have learned how to do that and obtained a command line browser that ran on Windows 95? Perhaps by connecting to one of the online systems?

US watchdog opens probe into Tesla's Autopilot driver assist system after spate of crashes

doublelayer Silver badge

Re: A solution looking for a problem

"Is having Autopilot make an error and injure or kill an innocent third party acceptable?"

The problem with this logic is that it works equally well for literally anything else. Is having a human driver of a large vehicle at high speeds make an error and injure or kill an innocent third party acceptable? On that basis, we could well ban or at least significantly restrict all driving because it carries with it some risk. The better question is what we do when that happens, which must include both having a method to blame the supplier for real problems in their software and not automatically blaming them if something doesn't work. I am more optimistic than you are on that front as there are bodies specifically set up to investigate and penalize companies for exactly that kind of event. The one investigating Tesla here is one of them and most countries have something like it. The software will never be perfect, and it will at times crash. It is the responsibility of our governments to investigate that for safety, but we also need to recognize that we don't need a perfect safety record for it to be acceptable, and in fact we can get a rate of accidents significantly higher than zero before it's even worse than the status quo.

doublelayer Silver badge

Re: A solution looking for a problem

"All autopilot does is take a flawed driver, and add in the technical flaws created by flawed software/hardware designers to get the worst of both worlds."

No, it doesn't. What it does is to substitute the flaws in the software for the flaws in the humans. Depending on the quality of the software, this could be worse or better. In existing tests, it's often better.

Consider a human who is paid to calculate mathematical answers. They are going to make some mistakes. Now add in a computer which solves the same problems. Every once in a while, something will break and the computer will mess up, but it will get a lot of right answers first. Is it the case that substituting the computer will worsen accuracy because you've combined the worst of both approaches? No, because the human is no longer doing the calculations and thus doesn't make their mistakes anymore. The software running vehicles is more complex and has more problems, but it doesn't stop the human's fallibility being removed from the situation.

It may be that the software is too flawed to allow, though existing tests are not showing that. Even if that's the case, your argument still isn't the problem.

doublelayer Silver badge

Re: A solution looking for a problem

"You know why they don’t let Mars explorers go bombing full-tilt around the Martian surface without human oversight at key points?"

Because it's really hard to teach a dumb computer how to decide on its own what you find interesting when all the robot sees is a bunch of rocks? If I were there, I'd need remote control too; I'm no geologist.

Remote code execution flaws lurk in countless routers, IoT gear, cameras using Realtek Wi-Fi module SDKs

doublelayer Silver badge

Re: Iot the way forward...

"My guess is arond 10% of affected devices will be updated."

I admire your optimism. My guess would probably be at least two orders of magnitude lower because it sounds like most devices using this chip are consumer-level. Many people don't recognize networking equipment as needing the same level of attention to detail as their computers. Manufacturers in turn seem to think that it should have maybe two years of support life, if I'm optimistic, despite the fact that lots of decade-old networking kit works just as well if security isn't factored in.

I was offered $500k as a thank-you bounty for pilfering $600m from Poly Network, says crypto-thief

doublelayer Silver badge

Re: Really, now?

"Real coins have value because the bank 'promises to pay the bearer on demand...'"

No, it doesn't. We left the gold standard a long time ago. If you go to a bank bearing currency, they will invite you to make a deposit, but otherwise they won't have anything else for you. You can't get anything of objective value in exchange, because the thing holding value is the currency you brought there. It has value because the central bank hasn't printed too much of it yet. This isn't necessarily a problem, but the days are gone when the currency represented some other asset.

doublelayer Silver badge

Re: Really, now?

No interest. It's supposed to be like gold. You store it then spend it. I have not seen any exchanges offering loans, so they're acting more like brokers or storage than like banks.

doublelayer Silver badge

Re: Is that $500k in cryptocurrency, or hard cash?

"If it is that easy to steal, it isn't worth $600m."

No, that's not it. If it's that easy to steal, then the holder isn't worth your trust. For example, if it turns out that your bank holds your savings in one place without security, then you shouldn't entrust them with the job, but your savings aren't worth any less.

doublelayer Silver badge

Re: Really, now?

It can take some time to transact in cryptocurrency, especially if the original thief wants to ensure they're returned safely. Merely reversing the original theft could mean putting the tokens back into a system which is now known vulnerable, and so someone else could steal it soon afterward. So, assuming the thief is honest about their desire to return the funds, that could explain it. That is a very big assumption though, and there are other options available which are less favorable to the intent of the thief.

Apple's iPhone computer vision has the potential to preserve privacy but also break it completely

doublelayer Silver badge

Re: What has apple NOT seen?

"George O. would have never, even in his wildest dystopian nightmare, ever thought that the proles would be convinced to spend their own hard-earned money to purchase their own telescreens."

No, he did. In one scene, a person says that no telescreen was installed because it didn't seem worth the expense. Now it turns out that guy was lying, but it does imply that the telescreens were purchased.

doublelayer Silver badge

Re: Capability

"BUT (and this is where I'm probably being somewhat naive and too optimistic), if they can present a mechanism that satisfies the feds and gets them to back down from pressuring the law makers into weakening encryption... then that's a win, no?"

I'm afraid your adjectives are quite correct in this case. If they put a spy on the endpoint, then the debate over encryption could get dropped. But that's because they won and we lost. If they can force all users of encryption to turn over the cleartext so they don't ever have to decrypt, then the result is the same: repressive countries do whatever they want, criminals have an attack vector to get the data, all of the reasons we want encryption are neatly circumvented. True, that wouldn't necessarily apply to everything, and a few people who already know why and how to encrypt could use open source software to do so, but if that ends up happening, they just start the encryption legislation again. If we lose 95% of our goal, that's a pretty clear loss already, especially as nothing in it prevents them from later taking the remainder.

doublelayer Silver badge

Re: Capability

"missing the point that the 'something more sinister' never required this step to happen first."

It did though. They could implement it at any time, but in order for the sinister consequences, they needed to. Before, they had the option to take that required step, then become sinister. They have now taken the step. Yes, they could have implemented this in secret years ago, but the fact remains that they did not.

China warns game devs not to mess with history

doublelayer Silver badge

Re: Factual Games

"I'm quite sure that here in the West, it's strongly advised against letting the youngest of children use screens, let alone play video games, and really sure that is not how we teach them."

Then you're mostly wrong, wrong, and wrong respectively. People are often advised to reduce their children's use of screens, not entirely eliminate it. We're also not talking about the "youngest of children", but rather children of many ages. Videogames are very popular with children and always have been, and as long as their parents maintain restrictions on how much they use them, it isn't automatically harmful.

As for not being a way to teach them, you may be unaware of the many educational games which exist. I've seen plenty of teaching tools redesigned to be more entertaining, trying to get the children to voluntarily learn mental math. In my childhood, I had an electronic dictionary which had several word games on it, which was useful in that it taught proper spelling and grammar and, if the computer opponent used a word you didn't know, you could easily look it up right there. Lots of other games may include less teachable content, but will be a little useful (for example, it should help quite a bit with familiarizing children with computer interfaces which they will use later). This doesn't make all videogames an educational experience, but there are some which are used to that effect.

Before I agree to let your app track me everywhere, I want something 'special' in return (winks)…

doublelayer Silver badge

Re: Why Bluetooth

It's only for devices which need a specific app to connect to them. Things like audio devices or keyboards which use the OS Bluetooth system will work fine. Something which an app controls, like a fitness tracker, object tracker, or custom equipment will require access to fine Bluetooth control, which is lumped in with precise location access so the app gets both.

doublelayer Silver badge

"Honestly do not understand how they [Google] make money."

By lying. If they collect thousands of datapoints, which they can prove, and hire a ton of machine learning experts, which they can also prove, then they must be able to use that to send ads to those who will most benefit from them, right? In the meantime, they just use the same crap algorithms based on browsing history and search term if applicable. Who knows what all the collected data is for, but eventually the guy who's responsible for thinking up the evil plan will come out and they'll do that.

This works for three reasons:

1. Google runs the ad system as a black box, so it is difficult for someone who pays for advertising to figure out who is really seeing the ads.

2. Companies are really bad at figuring out how useful their advertising budget is. Here's a good two-part summary of people who tried doing the research and all the problems they found, both in advertising itself and in advertisers' approach. It's a podcast but the pages contain transcripts for those who prefer to read text: Part 1 (mostly television advertising) Part 2 (online advertising)

3. Google has purchased almost all of their competition, and the others are either basically the same (Facebook) or didn't claim to be that smart in the first place (Bing ads). So you can't try out other advertising platforms to see if they can track better or don't need to, because you have no choices. Google's is biggest, so they get a lot of business.

BOFH: 'What's an NFT?' the Boss asks. In this case, 'not financially thoughtful'

doublelayer Silver badge

Re: I wonder...

I think it would as they often restrict the creation of convincing notes to avoid the risk--I.E. no, I didn't use it, but someone else found it and did. But if you're immediately destroying it, they wouldn't know you had.