* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Googler demolishes one of Apple's monopoly defenses – that web apps are just as good as native iOS software

doublelayer Silver badge

Re: Web apps are not as good as native apps and never will be

No, that's wrong. The sandbox is a security layer, but the code is native, I.E. compiled to bytecode which is run directly. The interface code for Android is likely running in a JVM, but the stuff that has to run fast is compiled to ARM machine code. There will be binaries in there. That's what native is. Javascript or even WASM is a lot less native.

doublelayer Silver badge

Re: "Safari's lack of compatibility with web standards... "

It doesn't differ. It was really annoying in the Internet Explorer days. I can't say I noticed anything when classic Edge was going on, but then again I wasn't using it often (at all mostly). And now they use Chromium so it's very much dead now. Google doing the same is still the same tactic and therefore annoying. Microsoft has stopped, Google has continued, so my annoyance on this score has shifted to Google.

doublelayer Silver badge

Re: Many APIs are undesirable

I can only sort of agree to this. Google has spent a lot of time on development, but some of the things they developed during that time are horrific. They have been shoving all sorts of OS stuff into the browser and most of the time, it's only useful to tracking or outright malware. The idea of a method for a site to find and control USB devices, for example. The OS already handles IO devices and drives. A website should not be capable of sending arbitrary commands to them when it will detect my key presses and receive a file the same way those things have always worked.

Bitcoin is ‘disgusting and contrary to the interests of civilization’ says famed investor Charlie Munger

doublelayer Silver badge

Re: What's the point of BTC?

It's deflationary so far in dollars (and everything except maybe Venezuelan bolivares). Since it is limited, that's likely to remain a factor of it. Just like lots of other limited things frequently used to invest. Gold is a great example. Usually deflationary though not as volatile since it's much older.

There are people who will tell you that investing in gold is an example of investors being fools. There are people who will say the same of cryptocurrencies. Those people are sometimes correct and sometimes not, but at least make sure you know why they're saying what they are. If it's a simple "don't trust" without details, from either side, they likely don't understand what they're talking about.

Also, it's frequent that things will be cited in dollars. Bitcoin is quoted in dollars. Euros are quoted in dollars. Oil is quoted in dollars. Australian dollars are quoted in dollars [U.S. kind]. This isn't something unusual about bitcoin. There are just a lot of dollars and it's currently used by default when talking about global prices of things. You can use pounds or Korean won or any other currency you like instead just by changing the setting at the bottom of any price page.

doublelayer Silver badge

Re: Money is based on work

"Cash allows me to convert my work to a universal token recognised in all shops. What has crypto currency got to do with any of that?"

You already know that. Cryptocurrency is a suggested replacement to cash. It would be a token. If people agreed to accept it and you agreed to receive it from your employer, then that's the token. Or maybe one of those happens and you agree to convert between two tokens for different purposes. If you like the pound, then that's your token. If you decided you prefer the yen, then that becomes your token. If you want to use slivers of valuable metals, then those become your token (there are people who do this despite the inconvenience of trying it). You have choices and it is one. Whether it's a good one is another question, but you didn't ask that so I'll stop here.

doublelayer Silver badge

"Serious question - are there any published cases of a company using ordinary bank transfer to payoff ransomware? If $crypto were not an option, would ransomware be severely crimped?"

That is going to depend on how technical we want to be. Yes, there have been bank-based ransomware attacks, mostly in the past. The first noted case of ransomware was in 1989 and requested a bank transfer. If we're using that example though, the malware didn't work very well and the perpetrator was arrested.

In principle, it's not very difficult to use a bank-based system to operate ransomware businesses. Note here that I'm not referring to using anonymous payments in cash, which would also work. There are scams that use the banking system against someone to steal their money, and criminals frequently operate those scams alone. It wouldn't be difficult to use them in conjunction with ransomware. A simple such scam is sending someone a counterfeit transfer which the bank initially acknowledges then requesting the recipient to transfer cash to the criminal. The second payment succeeds, the first fails, and thus the criminal has stolen money. If the criminals can do that, it's not difficult to imagine they just use the same transfer system to receive payments for encryption keys.

Cryptocurrency is more often used today for that extra level of anonymity, but it is not in any way required. If it wasn't available, most of the organized groups would find a new way to accept payment. For example, if targeting relatively wealthy businesses, they could reduce the ransom from $currency 150000 to $currency 147000 and someone to fly somewhere safer with cash. It would make things harder for individuals, but others would figure it out.

doublelayer Silver badge

Re: Insert meme here

"Nope. Gold has always and will always have a relatively high value because [...]"

I disagree. It will continue to hold value because it is rare and that's it. Most of the gold currently available is stored in vaults where it can be bought or sold without ever leaving the vault. Most which does leave the vault goes to another one. The amount of gold in use for electronics or jewelry is dwarfed by that held in reserve by central banks and private investors. Also, some of the jewelry using gold has included more or purer forms of gold just so they are worth more financially, usually so the jeweler can charge a higher profit margin on the piece.

If a magic switch were thrown and all those using gold to store value decided it was worthless for that purpose, the price of gold would drop precipitously. It would continue to hold value, just as many other metals hold value, for its industrial and artistic uses, but that would be significantly lower. It would, for example, be a long time before gold mines started up again if ever. It is of course possible that, with gold being cheap enough to use a lot of it in industrial areas, new use cases would be developed causing more demand for it, but that cannot be guaranteed.

House of pain: If YAML makes you swear, shout louder – the agony is there for a reason

doublelayer Silver badge

Re: YAML...

"I don't now, and never have, understood why these things have to be text files in the first place."

Because, as annoying as the formats can be, it is significantly more annoying to go to configure a program only to find that its configuration file contains large chunks of nonprintable characters interspersed with strings that look significant. Of course some programs can get around this by having a full-featured configuration system in their GUI, but there will be programs which don't, especially those core system components which don't live inside a window on the user's desktop. This is a lot more important if there is ever more than one of them. If the user needs to change configuration options or debug something breaking, a text-based format for inputs is going to make a lot more sense to someone willing to go to the effort than a binary replacement.

Streaming mad: EC charges Apple with abuse of dominance, distorting competition in Spotify case

doublelayer Silver badge

Re: No, no store allows it

"People complain that Apple sees someone have success with an app like Spotify and then "copy" it with their own app (as if music streaming was some sort of amazing invention that should have been patentable or something)"

I don't, at least. I complain that Apple used a monopoly power to advantage their service over competitors. It's not at all innovative and they can copy at will, but using such tactics to advantage it is illegal for a reason.

"If "selling products on Apple's platform" is an Apple "monopoly" in some people's minds, then how "selling products inside of Walmart stores / on Walmart's web site" not also a Walmart "monopoly"?"

Not yet. At the moment, if you don't like Walmart's offer, you can go sell it in a different store. Apple doesn't have that option. If, at some point, Walmart were to buy most of the competing stores, then they would have a monopoly or oligopoly position and would be similarly subject to regulation. For example, Amazon's large position in online shopping is already leading to it having antitrust investigations. It can happen there too.

doublelayer Silver badge

Re: “Monopoly” is a stretch

"Monopoly of what? iPhone users?"

Yes, that's right.

"Does Ford have a monopoly over Ford drivers?"

Excellent parallel. No, they don't. If you buy a Ford car, you can install equipment made by other manufacturers. You can put any brand of tires on it as long as they fit. You can put anything you want into the car. They don't have exclusivity deals by which they charge people for the right to use items with the car.

doublelayer Silver badge

Re: "they get nothing from them to defray the cost of providing downloads/updates"

"And it still allows Spotify et al a free ride on the iOS platform Apple has spend untold billions of dollars developing."

No it doesn't. People paid for that, by buying IOS devices. In fact, Spotify has increased the value of IOS by being available on it, which means people who want Spotify won't leave. The developers of apps don't care about and don't benefit from a lot of the stuff Apple writes for IOS. The users do, and the users are the ones who pay the money for it.

Brit MPs and campaigners come together to oppose COVID status certificates as 'divisive and discriminatory'

doublelayer Silver badge

Re: Not "divisive and discriminatory", but essential

I agree that IDs are needed at times. I think, however, that there are many cases where they are not needed where governments would nonetheless like to have them. Two factors are relevant here. First, private ID should not be the same as government ID. My employer requires me to use a card they issued to enter areas with their equipment in them. That makes sense, but it would make less sense to use a government-issued ID for the same thing.

Second, the number of times where government ID is required should be minimized. For example, I don't think it's good for a compulsory ID check to purchase mobile phone service, which many countries mandate. Basically, I think an ID should only be needed when they have to actively certify something, such as my having crossed an international border. Not as a policing measure.

doublelayer Silver badge

You are the one with the logic problems. The conversation into which you've inserted your comment surrounds a particular quote. You might have seen it in the original post as well as quoted in most replies. For all I know, you might have written it. It has a similar tone to the rest of your writing, though you're both ACs. Here it is, in case you didn't:

"And just how long will I be refused entry to locations because I don't want to get vaccinated?"

The key words are "don't want to get vaccinated". That's quite different to "got vaccinated and have privacy concerns". So do I. It doesn't change the fact that people who don't want to get vaccinated are putting others at risk. Your response doesn't even try to argue against that. So, I see three options:

1. You wrote the original quote, but you don't have any good arguments for it so you've switched your argument from "don't want" to "privacy concerns".

2. You didn't write the original quote, but you wanted to support it but don't have any good arguments for it, etc.

3. You didn't read the quote, decided to argue against a point without paying attention to what they said or what the person who they're arguing with said, and ended up out of context.

doublelayer Silver badge

Re: Not "divisive and discriminatory", but essential

"I genuinely do not understand the opposition to being able to prove that you've had the vaccination."

I don't oppose that. What I oppose is a centrally-controlled register of identification to which data can be added. If they produced a card which had my picture and said I was vaccinated, and people looked at it and thought it was probably me, then handed it back, that would be ... well not great but we could talk. They're more likely to have a card with some codes on it which get scanned by a device which promptly uploads it to the internet where a server records where I've been. Why does the government care where I've been enough to store a history of it? They probably have no reason to want it. They probably won't do anything malicious with it. They'll let the person who breaks in and steals the data figure out the malicious use for it. Unless there's someone specific with access who wants to be malicious to a specific person, in which case they now can.

Meanwhile, having that card as a requirement to enter places has problems other than privacy. It makes any type of interaction less efficient while people scan the cards. It means that, should someone lose the card or forget to take it with them, they can't do anything. And perhaps most importantly, it isn't very useful right now. Just taking the time to issue cards to all those with a vaccination will take a long time. Eventually, the vaccination rates will increase such that pretty much everyone has one. If time B is less than time A, then the entire project is a waste of resources. Even if it's the other way around, it's not really that valuable when we already have a mechanism to protect ourselves when in public. When you also consider that the resources being spent on the massive checkpoint database could be spent on getting vaccinations to people faster, that seems like the better use of the resources.

Working from a countryside plot nestled in a not-spot? Consultation opens on new rural mobile planning laws for bigger masts, wider coverage

doublelayer Silver badge

Re: Did we have this problem with telegraph poles?

It's Intercity Express, a series of trains operating in Germany which includes the infrastructure needed to run them, hence the overhead utilities.

doublelayer Silver badge

Re: Who Has Dark Communications Spots?

"A Baofeng UV-5r hand-held is quite adequate for free bi-directional multi-channel Satellite Communications."

Really? Because I just looked that up and it doesn't seem like it does that. It's a terrestrial radio which can transmit on two or three bands using a relatively low power limit. Assuming you have the proper license to use it, you should be able to communicate over a few kilometers to people using radios on the same frequencies. Satellites, not so much. There are a few satellites used by hobbyists which receive such signals, but they aren't permanently available--the site I found that discussed them told people to look up the availability times--and they don't relay your signal elsewhere, so no internet. I also doubt that it's easy to send your signal to such satellites with such a weak transmission. Am I wrong, or is this a completely different device with completely different use cases?

FreedomFi's 5G gateways will mine HNT cryptocurrency for owners who dole out coverage to passing users, IoT devices

doublelayer Silver badge

I may be stupid, but what?

I read the headline and assumed this would be an access point which allows devices to connect, then uses them to mine crypto. I had my "That's a security disaster and nobody will use it" comment all ready to go. Then I read the article. Now I have no clue what the device actually does.

It still sounds like the number of devices connected is important to how much crypto you mine, given that the article says "We expect that people living in highly trafficked, urban areas (like cities) should be able to make about 50 cents for every 1Gb of cellular data they transfer." Given that mining efficiency is based on processing power, this implies that having connections means you are using some of theirs. In which case, it's a security disaster and nobody will use it.

Except the article never expressly says that the client devices do the mining. It does say "FreedomFi yesterday announced it has buddied up with Helium Network to mine the latter's native crypto-coin on Magma-based 5G gateway devices in return for dispensing signal." Also, I'm not even sure how they would plan to make the clients mine for them unless they had previously installed software, which would dramatically limit the number of clients available. But in that case, why does it matter how many clients you have--the CPU in the access point can mine as fast as before.

So maybe I'm just not reading this right. If what is going on is obvious, I didn't get enough sleep and I'll stick to that story.

Words to strike fear into admins' hearts: One in five workers consider themselves 'digital experts' these days

doublelayer Silver badge

Re: Buried the lede

"Imagine what computers would be like if "ease of ownership" had kept pace with memory, CPU power, or network bandwidth."

It did. However, computers also gained extra functionality. You can have a really simple computer if you only want it to do a few things. If you're interested in it doing lots of different ones, things get more complicated. Just like you can have a car which is easy to drive, but if they made one that could also fly and sail on water, you'd expect some more buttons on the dashboard and items sticking out the sides.

"Of course, if that happened, we wouldn't have "dumb users" to kick around, and where would the fun be in that? And I know all you IT admins, jealously hoarding your hard-won knowledge like dragons sitting on your treasure,"

Now really? I'm not in IT (programmer), but I have done my share of admin and support and I don't want to guard my knowledge. If people stopped coming to me and asking me to fix their broken stuff, that would be great. If there was a miraculous way to never have problems so I could just write my code, I would really like that. There isn't. There won't ever be, because when people try too hard to get it, they break things silently and then the users come to the technical to fix it. For example, Apple really likes hiding information from users to make things easier. This meant that, when they changed the filesystem they wanted to use and their computers didn't complete the change correctly, the users had no clue what had happened or why. They brought them all to me for me to fix the partition disaster and perform reinstallations as needed. By the way, I would be very happy if Apple didn't make any mistakes and I didn't have to do that.

"ultimately wouldn't you rather live in a world where you didn't have to deal with all that crap and could focus on challenging, interesting, and high-value stuff instead (or just have a lot more free time for play, whatever)?"

Yes, I would. And when you have a way to get there, let me know. Until you have that though, there will be a need to keep users from making security holes or operating critical activities on unreliable systems.

OK so what's going with these millions of Pentagon-owned IPv4 addresses lighting up all of a sudden?

doublelayer Silver badge

Re: 1/4 per cent sounds like a class A block of addresses

11.0.0.0/8 was the first announced block. Others have followed though.

GCHQ boss warns China can rewrite 'the global operating system' in its own authoritarian image

doublelayer Silver badge

Re: Who are they addressing?

"It would be our fault for failing to implement a viable alternative to IPv4 over a decade after its limitations started hobbling the Internet."

Wrong. The Chinese proposal doesn't supplant IPV4. Also, we have a replacement for that: IPV6. Despite some issues with backward compatibility due to more IPV4 design mistakes, it's gaining usage. China's proposal replaces TCP, not IPV4. Try again.

Does the boss want those 2 hours of your free time back? A study says fighting through crowds to office each day hurts productivity

doublelayer Silver badge

Re: No company ever forced its staff to do 90 minute commutes...

"The big commute is something we've done to ourselves. For excellent and well founded reasons no doubt, but still fundamentally self inflicted."

No, it wasn't. I say this as someone who has a short commute, but still. The big commute is a result of companies putting the offices in a place where people can't live nearby. The companies have their reasons, that they want to have lots of possible workers and clients in close proximity. The people who live far away have their reasons, usually that they can't afford to live closer. If you don't have in-demand skills that make your wages relatively high, then you will have to choose a place to live where you can afford it. That's unlikely to be in the big city.

Meanwhile, the company is the one making most of these decisions. It's not exactly their fault, because they also have to do that in order to work well. If a company requires a hundred workers with a certain skill to come to the office, they're unlikely to put that office in a small town where they would have trouble finding those hundred or replacing someone who leaves. Still, they're choosing the predictable expense of expensive real estate rather than the unpredictable one of having trouble finding workers, meaning the workers have to choose the long commute. Rarely is it the employee's choice.

Scam victims find same fraudulent ads lurking on Facebook and Google even after flagging them up

doublelayer Silver badge

They are right

"Which? said: The biggest reason for not reporting adverts that caused a scam to Facebook was that victims didn't think the platform would do anything about it or take it down – this was the response from nearly a third (31 per cent) of victims."

Most online platforms don't bother doing much about fraud or abuse on their platform, to the extent that it's basically pointless trying to point out problems. Take a recent attempt I made to take down a phishing site. It used an obviously malicious domain name purchased from a registrar and also hosted the server on resources from that registrar. I sent a message to their abuse system notifying them of this. After two days of silence, I received a message informing me that the server they hosted with the registrar redirected the link to a server run elsewhere, so they could do nothing. Yes, the company which could revoke the domain name and thus disable all links going to it or revoke the server doing the redirection and obtain the same outcome could do nothing. If they don't want to do anything to save their income stream, why do they bother spending money on people to come up with excuses for why they're not going to take down fraudulent things? A bot which just says "We reviewed and think it is legitimate" is much cheaper.

Starlink creates risk of internet investment doom cycle, says APNIC researcher

doublelayer Silver badge

That helps, but it isn't sufficient to make the astronomers concede that it's fine now. Everyone has a different opinion as to how they value each group who wants to do something. You could easily argue that you don't care about the astronomers' complaints. Arguing that the astronomers have dropped their complaints, however, is not going to work.

doublelayer Silver badge

Re: So which is it?

The article was pretty clear about the predictions. It will be better at first, soon degrading. You don't seem to like this, but perhaps you can argue why it's wrong. It easily could be wrong, but I'm not going to argue that for you.

But can it run Avid? The Reg hands shiny new M1 MacBook to video production pro, who beats it with Blender, Handbrake, and ... Hypercard?

doublelayer Silver badge

Re: Incredible

"The M1 has a dedicated x86 interpretation chip, so the performance should be pretty much there except for higher-end applications which are utilising the more powerful assembler instruction sets for x86/64 chips."

Misleading or wrong. The M1 has extra functionality to improve the process, but it doesn't have a separate chip for X64 operations. That would essentially be a dual-processor system. It doesn't have that.

"Unsure what you mean by the Samsung A11 comment, Samsung do not make CPUs."

Now here I'm torn. I also don't know what they mean, but you're wrong here. Samsung do make CPUs. The Exynos range of ARM SoCs. They aren't the fastest out there, but they're still making them. So probably the original comment about them "throwing in the towel" is wrong too unless it was referring to something minor I don't know about.

doublelayer Silver badge

Re: slim

I generally agree, but I suppose we all have different requirements. For example, I don't want an optical drive. I'm not sure what you're doing that requires one so often, but I have only used one occasionally and the cheap USB one I have is sufficient for the task. I don't find disks around so often these days. I would like some USB-A ports for flash drives, but I'm sure there are people who rarely use those too. I'm entirely with you on the desire for a large and replaceable battery.

UK.gov wants mobile makers to declare death dates for their new devices from launch

doublelayer Silver badge

Re: Guarantees?

"Customers would know when a new product was going to be announced because a successful product would be nearing its mandated end of life, so would hold off buying the latest version of fondleslablet* knowing that a new release would basically have to be around by a certain date."

I don't think that's a problem. If the guaranteed support lifespan was five years, that's already much longer than the typical cycle. IPhones are good examples of this--they already have about 5-7 years of support, yet they make a new one every year. People tend to buy new ones for the features or because their previous one broke. Most people either buy one when they decide it's good enough or keep their old one until it doesn't work anymore. They do tend to wait until October to see whether the new one is interesting, but they won't wait the full five if they're considering a purchase already.

doublelayer Silver badge

Re: Default Passwords

This is exactly correct. It's a deliberate antitheft measure. Sure, it can be annoying if you don't know the details to unlock something, but I think most nontechnical and some technical people would prefer the +-

protection against theft given that someone with the proper details can erase and reuse the device. Android with Google's services does the same thing.

doublelayer Silver badge

Re: Default Passwords

The law shouldn't ban publishing the default passwords. It should ban having a default password. Out of the box, it has no password. When someone wants to use it, they have to set the password. If they forget the password, they use the physical reset and it loads the factory firmware, allowing the user to set the password and reconfigure.

Now for things given to less technical people, this can be annoying. I know for a fact that my family does not know the passwords to their internet equipment because I set it up. However, they need to balance the risk of annoyance for people who have to set a device up from scratch versus the security nightmare of having lots of things with default passwords. If the default password is "password", "admin", or the product name, not publishing that is not going to stop people figuring it out.

doublelayer Silver badge

Re: Force open source instead

Not really. Sometimes that's a problem, but most of the time, the stumbling block to third-party support is that the manufacturer has locked down all the things that you need. Custom versions of Android can run on phones with most kinds of SOCs. Certain ones are harder, for example because Mediatek doesn't release information about some of their chips, but the developers can get around some of that. Manufacturers have even less excuse, because they have access to documentation that we don't. They could update things but choose not to. Third-party developers can too as long as they have access.

Microsoft revokes MVP status of developer who tweeted complaint about request to promote SQL-on-Azure

doublelayer Silver badge

Re: Bloody Azure

"I’ve worked for organisations with “secure facilities” in rural areas miles off main roads and have procured diverse data circuits along with diverse power to ensure their ongoing operations,"

Very nice. Not very useful though. You can do lots of things to improve a network connection. All are expensive and in this case, none are needed. The server concerned is required for operations inside the building. It is not required for operations outside the building. Why should they spend on lots of network links just to show they can put the machine outside the building anyway?

If you want, you can buy a refrigerated vehicle and hire a full-time driver for it, just so they can go retrieve chilled food and bring it back to you. Or, you can have a refrigerator in the kitchen. If the only person eating the food is you, it's a lot cheaper and faster to chill the food in the kitchen. That doesn't make the vehicle idea bad in all cases--you might operate a business where you have to bring chilled food to lots of different people. Still, you probably don't own such a vehicle and you have a good reason not to.

doublelayer Silver badge

Re: Cancel culture

"If big tech or media doesn't like your message - there is no debate of ideas, you just get canceled."

Not true in most cases, and not true this time either.

He was being paid (in Azure credits evidently) to post advertising about Azure. I don't know why; it doesn't seem like a good business decision in the first place. He didn't like that. I'm with him--I would only be willing to post approving comments had I actually compared two options and thought one was significantly better. While I wouldn't mind getting money from the better one for the post, I would probably not take it because it would weaken my credibility by implying I was biased toward them. He complained about the program he was in. Is it that surprising that the people running the program figured he wasn't a good person to have in it? He didn't want to do what they wanted him to do.

doublelayer Silver badge

Re: Bloody Azure

"you could just add more internet connections."

Oh come on. The stated use case is about as clear a don't-use-cloud situation as you could imagine short of an airgapped environment. It's not cheap to run extra internet connections which you intend to be redundant. Cable connections may use common infrastructure, so you either have to pay for installation of alternate paths or hope that an issue with one won't bring down the other. Fixed wireless connections may not be available depending on the size of the factory, are prone to congestion, and may use common infrastructure as well. Satellite might be the best alternative to avoid those problems, but that also depends on the weather and available satellites. Meanwhile, from the sound of it, the server doesn't do anything for people outside the factory, so it's a lot more important that it is available to the other things in the factory than to the outside world.

There are at times advantages, sometimes significant ones, to using the cloud. However, even if the cloud providers manage to improve their uptime to 100% and reduce their prices by an order of magnitude, there will be some cases where it's still not the right decision. A situation where the users and the cloud are separated by unreliable or limited network connections is one of those.

University duo thought it would be cool to sneak bad code into Linux as an experiment. Of course, it absolutely backfired

doublelayer Silver badge

Re: Phew, glad they caught them.

Exactly. The question is not detecting a single malicious commit, but instead identifying how bugs happen. Whether deliberate or accidental, the goal is not to have them. So look at how they came to be and see what patterns there are. Is there a type of bug that doesn't get caught often? If so, can testing or review be improved to detect it? Is there something that reviewers consistently fail to catch? What is it and can something be done to draw their attention to it? That's real effective research.

doublelayer Silver badge

Re: This All Falls Under The Category Of...

"Isn't there now a risk of a Streisand effect, where lots of other people will try & sneak code in 'for fun", since it's been proved to be possible."

I doubt it. It's not very easy to introduce something just for fun. Submitting a basic patch allows people to say they did something and not have someone angry at them.

"Might have been better for the kernel folks to have just had a quiet word with the Uni, while improving the processes which allowed this to happen."

Oh no it wouldn't. If people were going to tamper with the code, the research paper itself made that idea public. Keeping this quiet would have left that paper as the last word. What the Linux kernel community has done now is to demonstrate that maybe you can insert useless or dangerous code into the kernel, but if you get caught, they will target you with all the power they have. They have established a deterrent to people contemplating pulling the same kind of stunt.

doublelayer Silver badge

Re: Place your bets...

It works all the time. If you're going to penetration test someone who asked for it, you coordinate with the person who hired you that you're going to do it. You don't tell them all the details, but they need to know who you are and at least a range of time you might do the penetration. That's so that, if you fail to penetrate and end up in the security office or the police station, they know to vouch for you.

doublelayer Silver badge

Re: Place your bets...

I think that comment is missing the point.

"Still, one should question whether the policy of "Don't probe possible vulnerabilities because it might upset us" is such a great idea in today's infosec security targeting world."

Probing vulnerabilities in the code is important, and the Linux community doesn't have a problem with people doing that. Nor is there a problem looking at the ways people operate and suggesting that such ways lead to security problems. The key is that observation of others is good and probing of your own systems running others' code is good. Probing others' systems without permission is a very different story.

Consider a parallel. Penetration testing is important to ensure that security procedures are sufficient and followed. Hiring a penetration tester is a good idea. However, being a penetration tester of someone who didn't agree to it is not. At best, you have people angry at you though fixing problems you've demonstrated. At worst, you end up in jail. If these researchers had gained the agreement of someone in authority on the team that they would run the experiment, the community would probably be reacting very differently. They didn't even try to get permission.

10 years later, Chrome OS starts to look like a proper OS with hardware diagnostics and the ability to scan documents

doublelayer Silver badge

Re: Er, why?

Because collectors are weird. They will find something you can possess and that there aren't many of, and they will decide that it holds a ton of value. Because there are multiple people doing this, they end up looking sort of right as they exchange their useless items with each other and sometimes make money doing it. Meanwhile, I, and probably you, look at them and think their items are nearly worthless. Especially true when the items concerned have some purpose because the collectors will frequently not use them to preserve the condition.

What we should do is look through our junk and see if there's anything in there which has now become rare. For example, I have a sort of PDA thing that's about twelve years old. It was pretty rare even when it was manufactured, the company made a small batch, they went out of business in 2012, and the internet doesn't even find anything about it unless you really know what to search for. Of course the device isn't very useful now--it's got an ancient Linux kernel and no package manager. The update server is long dead, and the OpenSSL library doesn't support very much so it can't do much with the browser or email client. That's a great thing--that means most of the people who bought one have probably thrown it away by now where I just put it in the closet. So all collectors, call out offers.

We seem to have materialized in a universe in which Barney the Purple Dinosaur is designing iPhones for Apple

doublelayer Silver badge

Re: Ooh, Shiny

The hardware designers certainly do attempt to construct the phones well. They want it to not bend, not overheat, and be thin and stylish. They don't spend so much time on not gaining scratches, not shattering, and being easy to hold. I have never broken a phone screen, but I know people who have. I also know that the glass on the back is easier to shatter than the glass on the screen, which makes things worse. They have also managed to reduce the phone's friction coefficient so low that they are almost ready for first-level physics class. The result is that people put them in cases so they are less likely to be dropped and more likely to survive if that does happen.

doublelayer Silver badge

They released those a few months ago. There's not much they could do for a new range so soon. Designing the M2 will take longer.

To have one floppy failure is unlucky. To have 20 implies evil magic or a very silly user

doublelayer Silver badge

Re: if it works...

Connecting an Arduino to WiFi is a pain. It can control the light bulb or whatever other thing you want automated, but if you want to control that thing remotely, you need some communication mechanism. WiFi or Bluetooth are commonly available, but neither runs on an Arduino unless you attach something else to do it for you. That's another set of chips you have to buy, power, and maintain just so the original controller can be contacted. What's even more pathetic is that the controller for the communication is usually an order of magnitude more powerful than the controller the main task is running on. If you don't want remote access to the device, then an Arduino is probably fine. If you do, it makes sense to use the processor which does that communication to do the automation task as well. Unless you can't work out the low-power modes or you need custom control pins the comms chip doesn't have, that will be the simpler and more efficient solution.

Brit authorities could legally do an FBI and scrub malware from compromised boxen without your knowledge

doublelayer Silver badge

Re: Works both ways

I think it might be possible to allow interventions like this, where the systems themselves aren't directly entered but the malware's control system is compromised. The major restrictions that are needed are A) they shouldn't be allowed to extract data from the system including telemetry about their removal, B) they must not push any binaries or scripts other than a removal, and C) they must publicize what they have done. If those restrictions were clear, I wouldn't mind actions to cauterize malware by invoking its self-destruct mechanisms.

If the organizations concerned intend to spy on the operators of infected servers, they already know how to do it and they won't ask permission. This is a separate issue, but just banning something like this won't fix the problem because those agencies have already made it clear they're willing to break the laws. Meanwhile, if the agencies are investigating the operators for crimes, they can get legal warrants allowing them to collect information. So what is made possible by allowing this which wasn't already possible and frequently used?

It was Russia wot did it: SolarWinds hack was done by Kremlin's APT29 crew, say UK and US

doublelayer Silver badge

Re: I love

Really, why not? Each of those countries, though small and economically troubled, has managed to set up the resources to build nuclear weapons. That's expensive and difficult, but they wanted it badly enough that they have done it (well, giving Iran a bit more credit given we don't know how far along they are). Building a few teams of smart people capable of breaking into stuff isn't that expensive in comparison; you need some computers, some smart people, and for those people not to have great alternatives like working for a tech company. Why couldn't North Korea or Iran manage those requirements?

doublelayer Silver badge

"(yet, my instincts tell me that there is more to this - how far down DOES that rabbit hole go?)"

Then go digging. You have the freedom to do it. Just don't complain if you find the security researchers know more about it, having researched it for months, than you can find out. I've seen nothing which suggests Russia couldn't or wouldn't have done it. Nor do I find any major flaws in what I've read so far attributing it to them. The opportunity's always there if you can prove them wrong.

Zorin OS 16 beta claims largest built-in app library 'of any open source desktop ever'

doublelayer Silver badge

But that's not trying to mimic Windows. MATE may have similarities to Windows, but it wasn't designed to make transferring people easier. The desktop environments which were designed to look as much like Windows as possible are just getting tiny details the same while ignoring the large chunks which won't be. MATE clearly isn't Windows but uses enough of the same concepts that people can figure it out quickly.

Ever wondered what it's like working for Microsoft? Leaked survey shines a light on how those at the code coalface feel

doublelayer Silver badge

Re: what was NOT said

"I would be VERY interested in seeing what the political spectrum of Micros~1 employees are, how many voted for Trump in 2020, how many are registered Republicans, and so on. Was THIS (or anything related to it) in the survey?"

As you can imagine, a survey about what the employees think about the corporation doesn't include extra useless questions like that. A good thing too. If my employer ever asked me something like that, they would get A) no answer to that question, B) no answers to most of the following questions because my focus is no longer on their survey, C) a cold statement that the question serves no purpose and is inappropriate if the survey contains an "anything you'd like to comment on" question, and D) reduced performance from me while I consider whether that's actually where I want to work.

Last chance to grab an iPhone Mini as savvy analyst reckons Apple will scrap it next year

doublelayer Silver badge

Re: Cannibalism

Not just that--the second SE is half the price of the mini. If we assume that people who want small phones don't need 5G and are fine with recently-the-fastest-but-now-the-second-fastest processor, it makes a lot of sense that they wouldn't really see those improvements as deserving a doubling of the price. I hope there is a market for small phones as I am certainly in it, but my needs are small. I don't need a large screen, and I don't need a fast processor, many cameras, or 5G (though I don't mind that one). I am not interested in a small flagship phone. I'm interested in a small low-to-mid range phone.

What the FLoC? Browser makers queue up to decry Google's latest ad-targeting initiative as invasive tracking

doublelayer Silver badge

They won't. If they ever look at it. Just like they won't like what Google currently does, just they haven't gotten around to checking what Google's doing. It's been busy. They've only had three years of GDPR to spend investigating those things.

Key Perl Core developer quits, says he was bullied for daring to suggest programming language contained 'cruft'

doublelayer Silver badge

Re: Long Live PERL

"I also wish people would stop calling GNU\Linux background drivers daemons. That REALLY bothers me. Please stop it."

Why? Daemon is a term that's been used to describe exactly that sort of thing for a while. In fact, not only do I have no problem with daemon, I wouldn't like to call them "background drivers". I view drivers as controlling something else, especially hardware, for a separate process or the OS as a whole. Lots of daemons or whatever they are don't do that. So I'm going to prefer daemon for that type of program unless you have an argument for it.

Also, what's wrong with Python as a name for a language? Language names are pretty much all arbitrary words or letters. You don't seem to have a problem with Perl as the name of a language, and that's not even spelled right (it was going to be named Pearl, but there already was something called that, so they just chopped out the A and went with it). Why is Perl fine and Python not?

A keyboard? How quaint: Logitech and Baidu link arms to make an AI-enabled, voice-transcribing mouse

doublelayer Silver badge

Re: Really?

That is possible. The traditional ways to type in Chinese are drawing the character or typing a romanized equivalent and selecting the correct option from a list. Each spoken character is pretty fast. Depending on the user's speed at handwriting, speech recognition could be very helpful if it's effective.