* Posts by doublelayer

10585 publicly visible posts • joined 22 Feb 2018

The climate is turning against owning our own compute hardware. Cloud is good for you and your customers

doublelayer Silver badge

So what hardware is this debate about

Today's article focused quite narrowly. It only talked about the climate benefits of renting hardware, and it only talked about servers. That makes some sense as the servers are equipment where the renting option is likely to have a climate benefit, but the previous debate article mostly talked about desktops and finance. So what hardware are we going to rent or buy here? Is it just everything the IT department ever sees?

This is an important issue in the functioning of this debate. If we're actually talking about desktops, even as part of the argument, then we can't jump to a "be green, rent" solution. Rented desktops don't use less power than purchased ones, they don't use less materials in construction, they are likely to be transported more, and they may be replaced more often than an owned one which increases the pace of waste electronics. This environmental argument could therefore be twisted to represent the opposite side of the debate. In a good debate, the debaters understand what they disagree about and they make this clear to the audience.

doublelayer Silver badge

Re: Not just that

Please tell me what disability means you can't press a button, but you can still load cups and pods into a device the button is on. If the device had an automatic loader so they could advance it without touching it, then you might have a point (though in any case you still have to have a method for them to retrieve their coffee when it's done), but it sounds like this doesn't have an industrial new cup supply belt.

Disability is a good example of the usefulness of a lot of this tech that's often mocked, but it doesn't always apply.

Microsoft adds Buy Now, Pay Later financing option to Edge – and everyone hates it

doublelayer Silver badge

Kill it now

This is going to annoy anyone using Edge. If they wanted to erode the set of users still using that browser, this is an effective way to do it. I also can't imagine why they thought this was a good idea. A lot of sites already bother people about these useless payment systems, so they're already facing a lot of competition.

Renting IT hardware on a subscription basis is bad for customers

doublelayer Silver badge

Re: Debate scope is vague

Exactly. It really changes the point of the debate what hardware is included in this. For example, renting some infrastructure, such as servers in a cloud provider's DC, can make sense because it's easy to change how much you have. If you need more servers today, you start renting them then, and when you don't need them tomorrow, you shut them down and stop paying immediately. The article, however, seems to focus on desktops. Those are less likely to have such a spiky profile and renting could come with a variety of complications. If you have a rented desktop, who puts in a new disk if the original fails, who images it when it changes hands, and who decides when it's old and will be replaced? I could see it working somewhere maybe, but there are so many ways I can see it failing badly that I would be very cautious.

BOFH: What if International Bad Actors designed the vaccine to make us watch more Steven Seagal movies?

doublelayer Silver badge

Re: Disappointing

I disagree. Look at the article. Yes, it's fiction, but the person was not dissuaded by logical questions. That happens in real conversations too, although often in a different way. They don't see how illogical it is to assume every doctor is secretly on board with an evil plot, so asking them why they do it, what the goals are, how they possibly manage the logistics, all lead you into a loop. Worse, if someone else is watching the conversation, the idiot is stating all nature of lies to bolster their point, and I'm not allowed to point out the inaccuracies because it makes me too smug, then the observer sees a knowledgeable person with all these anecdotes and the stupid supporter who can do nothing but ask for details. The liar is happy to keep providing those; their original anecdote was a lie, so they won't mind piling on some more.

Take your own example. If Galileo had decided to counter the prevailing theory only by asking questions about it, he would have gotten answers. The geocentric model wasn't only supported by stories from religious books. It also had a lot of work put into understanding it. For centuries, people had been observing objects' movements and making models to explain those movements using a really complex series of geometric orbital paths around the planet. Those models could correctly predict the movements of the objects quite well, until they couldn't, when they would be changed to account for the problem.

Had Galileo asked questions, he and any observers would have been presented with thousands of pages of rigorous, precise, meticulous, and mathematically accurate calculations showing how everything circled the earth. The only problem is that all that correct mathematics didn't work with the real physics going on. It would have been one questioner against centuries of provable effort and he would have been ignored with ease. He had to say "This model is wrong, I can prove that it's wrong, and I can prove a replacement". Doing that meant that others could verify that the inaccuracies he found were real and that they could similarly verify what he thought. That is what he needed to do and he did it.

doublelayer Silver badge

Re: Disappointing

Be careful what you wish for, because they have struck here before on serious articles. It might seem beneficial to correct them, and it might seem fun to troll them, but it doesn't take very many of them ignoring your correct points and not caring about your jokes while making it clear that they are putting others at risk to make the exercise a lot more frustrating.

In addition, I have identified a pattern of argument among those who argue against the vaccine. When they think they have an advantage, they'll use all these stupid arguments in the hopes of convincing others. When they know they're talking to someone who is smart enough to recognize those as the rubbish they are, they go into defensive mode. That means they will use a lot of vague arguments that you can't immediately dismiss (the vaccine has reported side effects which can be dangerous, and you have to acknowledge that it's technically true while most of the ones they're talking about never happened). They'll also do the very specific lie, the kind that takes thirty seconds to make up but takes you fifteen minutes to research in order to disprove. This tactic isn't limited to vaccines, but it is popular with that group.

Crypto for cryptographers! Infosec types revolt against use of ancient abbreviation by Bitcoin and NFT devotees

doublelayer Silver badge

Re: how about "Cryptography means Cryptography"?

The cryptography is both integral to the concept (not bolted on as with many other systems) and differentiates it from the previous currencies. This was an intentional design decision in the initial cryptocurrencies to make it impossible to have a central authority, and the initial designs and arguments for it indicated how important this feature was to the concept. It's really quite different than some other system that uses SSL for security of communications.

doublelayer Silver badge

Re: aguynearphilly - If I'm not mistaking

It doesn't encrypt, but nobody said it did. SHA256 is in a category called "cryptographic hashes", as opposed to hashes that can be used for storing and retrieving data but are weak on uses for security-sensitive operations, and therefore it still counts. Cryptographers decided this.

doublelayer Silver badge

Re: @Paul Hovnanian - But it is crypto

The difference in this case is that cryptocurrencies use cryptography as the only verification step and have no central control. Your communication with your bank uses cryptography to throw off a listener, but it doesn't use a cryptographic key to establish your identity and it doesn't use a cryptographic system to ensure your money is only controlled by you (for example, if you pay your bank fees, they'll remove them without you having to authorize it).

The same distinction applies to email. Normal email uses cryptography only between you and the servers involved. Cryptographic email, not usually called cryptomail but you can if you want, uses something like PGP to secure and authenticate the messages themselves, and it really is a different thing.

That doesn't mean that you have to call cryptocurrency that, or if you do that you have to accept the "crypto" abbreviation as applying to it, but there is a reason the word was used that is valid.

doublelayer Silver badge

Re: how about "Cryptography means Cryptography"?

They might not think of them as digital, but they are. If we decide on a name because some people don't understand one thing, and by doing so we're inaccurate about the thing we've renamed, we're doing two things wrong. Hence why it isn't a proper use of digital.

The things called cryptocurrencies really do have distinct features from all currencies issued by central banks and from purely digital currencies that didn't have the same goals in mind. It is not unreasonable to use a different term to limit discussion to that type of currency. If we used "digital currency", we would constantly have to add qualifiers to our statements to ensure we weren't talking about someone's SQL database with account numbers and amounts in it. As such, "cryptocurrency" is easier to say and understand than "digital currency, specifically a decentralized one using a distributed blockchain and cryptographic access mechanisms" so nobody will use it. If we dislike "cryptocurrency" as a term, it's a good idea for our replacement to have similar exactness and simplicity as the term we want to replace.

doublelayer Silver badge

Re: how about "Cryptography means Cryptography"?

"Shirley a simple 'Digital Currency' more than covers it?"

No, it doesn't. Any of our currencies are digital currencies, as are tokens stored in one company's database like the virtual currencies used in videogames. Cryptocurrency or blockchain currency, I think either works, is quite distinct because it is decentralized by use of a blockchain and secure by use of public key cryptography (hence why it can use crypto in its name in my opinion). I think from the suggestions that blockchain currency is probably a better name for it, but digital currency is insufficient.

Apple sues 'amoral 21st century mercenaries' NSO for infecting iPhones with Pegasus spyware

doublelayer Silver badge

Re: I sense this is not going to be a popular opinion...

If you're still uncomfortable based on your points from the first comment, then your discomfort is based on a misunderstanding. Apple never said what you think they did. Maybe you will also dislike the argument they did make, but you do have to understand the argument they're making so you don't assume they have exerted an ownership or control right that they haven't done. When they have implied that elsewhere, most recently in their App Store monopoly case, I have agreed with you and opposed them. That's not what's happening this time.

doublelayer Silver badge

Re: A bit Streisand...

You don't need a lot of technical knowledge to realize that the marketing on more security doesn't mean perfect security, and that you'll never get perfect security. All Apple's marketing means is that you get the security updates they make faster than their competitors (no waiting for device manufacturer and possibly a carrier reseller to release the patch as some Android devices do). They're also happy to praise their App Store review which keeps out more malware (though not all), but as NSO didn't post theirs to the App Store, it's irrelevant in this case. You are asking Apple to produce effectively bugless code and claiming that, when they don't do so, it invalidates every security claim they've made. It doesn't work that way.

And whatever your insurance contract may say, if I walk through your unlocked front door and take your stuff, I've still committed a crime and can go to prison for it. NSO didn't attack a device with no protections; they had to break some protections to get what they wanted, but even if they didn't, it would still have been illegal for them to do it.

doublelayer Silver badge

"the very fact that they allowed this software to be installed means that they are jointly responsible and should compensate their customers."

They did not allow it to be installed. They didn't know, so didn't allow or deny. They do not have the responsibility to police everything you do on your device, and when they take a few steps toward even thinking they have the right to do that, we complain about them and they get sued for limiting user choice, actions I emphatically support.

doublelayer Silver badge

"OK mate so what you're saying here is that Apple phones are vulnerable to malware installation? Something that Apple keep on denying."

No, they don't. They call out security fixes in literally every IOS update. That indicates that IOS was in need of security fixes then, and they've never said it would now be perfect.

"You're also effectively admitting that you can't do anything to prevent this without resorting to legal action?"

No, he didn't. He said that the abuse of security holes was illegal, so they were justified in bringing legal action. He did not say that was the only method available to him, and Apple's patching of NSO's exploits proves that it is not.

doublelayer Silver badge

Re: I sense this is not going to be a popular opinion...

Please read the article. They didn't say that they're entitled to damages because "You ran code on devices we made and those are ours". They said that NSO used Apple's services, the ones that run on Apple's servers, that you have to agree to a contract to use, and that you can choose not to use, and that NSO broke the contract in their malicious use of those services. Entirely different.

You have objected to an argument they never used, and your conclusions are entirely built on your failure to follow their claims.

doublelayer Silver badge

Re: A bit Streisand...

Ah, yet another call for perfect code. I like this site as a news source because most articles assume a degree of technical knowledge, and most participants on the forum seem to have that. Sadly, not always. If I come to your house and determine that I can break in without you knowing, it's still a crime if I do it. You should know this.

Theranos' Holmes admits she slapped Big Pharma logos on lab reports to boost her biz

doublelayer Silver badge

Re: modified COTs equipment

"So if the testing requires less blood wouldn't this be mentioned to the operators, if not then it's just more blood being flushed out at the end of the cycle."

That's what they were going to be selling. Unfortunately for them, it turns out the original machines used more blood for a reason, and their attempts at diluting it made the results unreliable and worthless. They didn't like that, so they lied to pretend it worked anyway.

"Admitting in court that secret changes were made will likely bring the FDA into play with whole new set of charges"

They never got FDA approval. The FDA kept telling them they needed proof, and never got it. More lies were told about that though.

Apple's Pegasus lawsuit a 'declaration of war' against offensive software developers, says Kaspersky director

doublelayer Silver badge

Re: There is a big difference...

I am observing the legal concerns of the half of the problem this discussion is about. The malware affected user's devices, not data in transit. If you want to discuss something unrelated to this discussion, maybe here's not the right place.

doublelayer Silver badge

Re: Apple & C. want the information control - and power to decide who is under surveillance or not.

They may not have been, but I will. Yes, those are courts I include on the list, which is why I take a dim view of NSO and companies like them facilitating the penetration of technical defenses. The U.S. may not be using them; I have not seen them on any of the lists of NSO clients that have been released so far. However, the U.S. develops similar exploits and I want them to stop. I want everyone doing such things to stop committing these crimes, and if NSO is the low hanging fruit on the issue, then start there.

doublelayer Silver badge

Re: There is a big difference...

Rubbish. I'll make it simple: search for exploit, allowed. Have exploit: allowed. Use exploit to invade a device you don't own: not allowed. That's all this would do, and that's what the laws currently say anyway. If you think the only way that security researchers can make money is selling their findings to malware creators, you're wrong. If existing security researchers do that, they've committed a crime.

doublelayer Silver badge

Re: Offensive Researchers

No, it couldn't, because you already have all the legal rights you need to sue the U.S. over Stuxnet. The problem is that they will deny that they did it, and it's hard to provide sufficient proof otherwise. You would also have to prove that you were damaged by Stuxnet in order to have standing. If you can do both of those things, you don't need a new legal precedent for it. If you can't do both of those things, you still don't need one but you're likely wasting your efforts.

China trying to export its Great Firewall and governance model

doublelayer Silver badge

No, they wouldn't be. Most standards do not have the weight of law, so holding an election for the technical expert who will cast your country's vote is just stupid. Even for standards that do have a connection to laws, the local country should make those on its own--we allow each country to decide what it will view as crimes rather than letting the biggest countries decide it for everyone. Nobody is arguing that China should be excluded from making standards but instead that it should be done with caution because some of the attempts are organized for reasons other than technical superiority.

Should be easy to win the rights to .tv when you're name-checked in the contract's tech reqs – right, Afilias?

doublelayer Silver badge

Re: Questionable value for money?

People generally don't choose whether to follow a link based on its TLD, but when they're selecting the domain they're going to use for their project or organization, they try to get a memorable one. We all do this when setting up our own domain names--we want something easy to remember, relevant to the service, easy to type, etc. .tv is popular for doing that for video services, and often because a lot of .coms are taken by squatters. The people using the TLD would care if they knew, and given that .tv accounts for a healthy chunk of Tuvalu's GDP, their population should also care.

Alleged Brit SIM-swapper will kill himself if extradited to US for trial, London court told

doublelayer Silver badge

Re: Keep him please.

Point 3 is classic victim blaming. People don't know that SIM swapping is so risky. Maybe the technical systems should be changed so it's safer, so it's not their fault. Maybe we need to tell more people about it. As for keeping millions that way, it added up to millions, but you don't know who they stole from. In order to get there, you can bet that they were taking large amounts from each victim, likely most or all of what they could. So it really is the same as "Cf. a doddery pensioner being bilked out of their meager life savings through phone fraud."

Point 2 is irrelevant. This crime stole cryptocurrency. If there wasn't any, they would have attacked other investments or bank accounts. SIM swapping attacks go after those all the time, using similar methods, with similar effects, cryptocurrency absent.

doublelayer Silver badge

Re: No excuse

"It just puzzles me they all are subject to extradition proceedings, what they did is criminal under English law and that’s where they (allegedly) committed their crimes."

Extradition usually applies when the victims are in another country. The UK can of course turn down that request, but it's not unusual to be asked when American victims are involved. For the same reason, if someone steals your money from Russia* and you're in the UK, the UK has the right to charge the criminal, may request extradition from Russia, and may request extradition from somewhere else should the criminal travel there. The U.S. is doing the same in this case.

*Russia used as an example of a country that rarely extradites.

Just because you can do it doesn't mean you should: Install Linux on NTFS – on the same partition as Windows

doublelayer Silver badge

Re: Boot … reboot … dual boot …. FFS what year is this?

"conceivably with multi-cores, SOC’s etc. the BIOS could be written to allow 2 OSes to run at the same time accessing different SSD’s on the same machine flicking from one to the other with a keystroke."

They could, but that's basically putting a hypervisor in firmware. You could just run a VM platform on a normal OS and then you have less hardware worries since it has the resources of the host OS to use. It's done quite often on servers at the moment. You could boot natively to your main OS and run your others from VMs on that, or you could run something lighter as the host and run all your OSes on that.

doublelayer Silver badge

Yes, it could do that. And it could do that already. If you let your Windows image see the partitions your existing Linux is on, they have the access they need to modify them. The malware concerned would need to have some extra code in it to write to the unfamiliar filesystem, but any malware sufficiently advanced to detect your Linux and inject a Linux service could bring Ext4 with it. Most malware isn't going to bother doing that, but if you want it prevented, you'll have to do more than just not having the OSes sharing a partition.

Munich mk2? Germany's Schleswig-Holstein plans to switch 25,000 PCs to LibreOffice

doublelayer Silver badge

Re: Not saving money?

"Lock in" means that you are in some way forced to use it, or at least that changing to something else is painful. If, for example, you use Microsoft's cloud services, you very well might be locked in because their database config can't just be immediately shifted onto your own equipment (if you only use their infrastructure, then you don't have that problem). Nothing of that nature exists with Office.

If you have an IT department that likes Office, and that's your reason for not switching, then that's not at all Microsoft lock in. They are using it because they like it and want to. If you have a problem with that, tell them not to or replace them. Microsoft didn't put them there and do not have any mechanism to force you to listen to them.

doublelayer Silver badge

Re: Not saving money?

"And that getting ready would involve a lot of running around in blue-arsed fly mode. Far better to be there ahead of time."

I didn't say they shouldn't, just that there's no lock in mechanism available to Microsoft. Microsoft benefits by having lots of subscription customers. I wouldn't be surprised that they try to get everyone to use that licensing method, but an inflation rate that ends up forcing customers out is stupid and they have enough people to recognize this. Lots of organizations have shifted to using Google services including Docs even though it's painful, so Microsoft should be well aware that their dominance in office software is fragile.

doublelayer Silver badge

Re: Not saving money?

"Potentially, MS could increase their subscription fees by 35% a year every year for 20 years, and those users who are locked in would have no choice other than to pay up."

How do you plan for that to happen? Let's assume for the moment that Microsoft would want to do something that stupid. They currently have standalone licenses, so I'm assuming this requires that they stop selling those first. With subscriptions, they do have a method of cutting people off if they stop paying, but they don't have a method of locking them in. The customers could choose to stop buying a subscription as soon as they were ready to use something else, and Microsoft wouldn't have any leverage over them. The data would still be available, in an open format, and can be downloaded off Microsoft's cloud storage if they put it up there in the first place which is unlikely for government documents. LibreOffice supports the current and older formats used by MS Office, so it can be dropped in for most users.

If Microsoft did use the license inflation algorithm you suggested, people would switch somewhat quickly-. By ten years in, the licenses would cost twenty times as much, and that would be all the price shock a lot of users would need, many of them having jumped ship long before that.

SSL keys, sFTP passwords and more exposed after someone broke into GoDaddy Managed WordPress using 'compromised password'

doublelayer Silver badge

Re: Why are they even holding "passwords"?

Specifically how the passwords were stored. The article and their statement does not make it clear whether they hashed the passwords or not. Hence, they could be doing it wrong, but there is a chance that they did that part correctly.

Their broader security though, that they're definitely doing wrong.

doublelayer Silver badge

Re: Why are they even holding "passwords"?

They could be doing it wrong, but they might just mean that the properly hashed passwords were exposed. However, if I remember correctly, Word Press uses MD5 without salting for the passwords. That's a lot better than plain text, but not good enough.

Do not try this at home: Man spends $5,000 on a 48TB Raspberry Pi storage server

doublelayer Silver badge

Re: Not surprised

I have lots of Pis here, recommend them to others, and think they're great. I don't think I hid that fact, and I'm not sure it makes me "inherently negative". I was simply making the same point you did: "Nobody expects it to do everything, it's £35 FFS."

While you object to my pointing out the negatives, I don't think they're incorrect. You've pointed out that you can plug in something else to do your ML experimentation faster, which you can also do to anything else. And you can also use the Pi to control an external server running your real computation, but the end result is that you are using some other device to do the heavy lifting. Nor did I say that you couldn't do any ML; something small can definitely be run. However, the larger models one might want to experiment with do often require more processing than the Pi can perform in a reasonable length of time. This isn't a problem; the Pi wasn't designed for lots of raw computation. I think that's important to acknowledge when people point out they have difficulties because it doesn't have enough performance.

"The original dream wasn't for a low maintenance desktop in schools. That's BS. The idea is for a device where you can switch out an SD card. It is totally successful at that."

Yes, switching out the SD card, thus easier to maintain. And they really did intend them for schools. If you look at the projects the Pi foundation was excited about in 2012, you can see the kind of thing they had in mind, and they also stated it outright. They didn't create the Pi to run digital signage, nor really for us to use it as a cheap platform for automation. Their goal was use in education, with others' benefits being a bonus. That's still their goal, and the Pi 4 is a lot more capable of the task than a Pi 1B was. Just not every educational use you could consider.

doublelayer Silver badge

Re: Not surprised

Educational/experimental could mean a lot of different things. For example, educational system could mean the Pi foundation's original dream of a desktop used in a school for ease of maintenance. The original Pi was almost entirely incapable of that, and the newer Pi, while it can do most of the tasks you might expect of a school computer, isn't always capable (running some bloated online learning platform which is a memory hog on a 4B 1GB, for instance). Experimental system is even more vague, as you can experiment with a lot of different things. Experimentation with administering a system, using a lot of server-style software, etc.: a Pi is great for that. Experimenting with machine learning where the instructions recommend a minimum spec for the GPU: think again. Therefore, it still depends on the use case, and a quite detailed one.

doublelayer Silver badge

Re: Not surprised

"It's as strong as it needs to be for an educational/experimental system, and that's pretty strong."

This depends heavily on the goals you have in mind. If, as the original post suggests, it is meant to represent the power that Linux brings, there are several places where it really isn't there, especially for a nontechnical user. For example, put any nontechnical user in front of a Pi running a desktop environment and they'll quickly notice a few problems. For example, they might try to watch a video online using Firefox, something the cheapest of machines can do easily, and the Pi won't handle it. We as technical users familiar with the Pi understand that Firefox doesn't have hardware video acceleration support enabled by default, it doesn't work that well when turned on anyway, and that, if you want to use it, you have to use Chromium. The average user doesn't already know this and might well ask why that problem hasn't been fixed.

The Raspberry Pi is a great machine, and in comparison to the original comment's old processor, it is much more efficient. It must however be acknowledged that while what it does is more efficient, it also does less. Someone who used the resources of a desktop processor may find that the Pi's IoT-class SoC is not sufficient for their needs. Nobody expects to make an urgent cross-continent trip on a bicycle, and nobody expects to use a Pi for something processing-heavy.

Web trust dies in darkness: Hidden Certificate Authorities undermine public crypto infrastructure

doublelayer Silver badge

Re: self-signed CA

As it's not one vulnerability, the answers to your questions can vary.

"What can actually happen to me or my system and how?"

The standard risk is that a certificate that your system trusts can be used to impersonate something else, either breaking encryption on a connection of yours or diverting that traffic. This requires that the attacker has malware on your system or controls a link in your network. Malware is the more likely option here, though it must be noted that local malware could do nasty things to ongoing connections anyway. Such certificates could also theoretically be used to make your system trust a binary that isn't signed with a key your OS provider normally would trust, although the paper is talking mostly about network certificates here so that's probably not the risk they have in mind.

"How can I protect against such 'bad' events?"

You could analyze a lot of your typical traffic and see if anything unexpected happens, but that will likely take a long time. Since the primary risk is malware, scan your system frequently to eliminate it should it become known.

"How can I check my systems to see if they are vulnerable and/or compromised already?"

Most things that have root certificates stored somewhere will allow you to view and edit the list. You could go into your network configuration (search for the instructions for your OS) and start auditing your certificates. The problem here is that, when you find something in there that doesn't appear on a list of trusted certs, you may not know where that came from. You could look for some of the red flags discussed in the article such as long cert lifetimes or you could delete the cert (keeping a backup copy) and see if things break. This takes a lot of time and effort and may not be needed in many cases.

Apple is beginning to undo decades of Intel, x86 dominance in PC market

doublelayer Silver badge

Re: Speedbump

That is the point that started the thread. The person has a Mac from 2011, which is fast enough to run modern XCode but for OS reasons cannot, and they think that speaks ill of Apple because they can run modern tools on Windows or Linux on a machine of the same age. They are saying that Apple's support lifetimes are shorter than everyone else's, and you decided to respond by denying the truth of that.

You've admitted it now. In order to run the latest developer tools, your Mac needs to be from 2015 (proviso about the Mac Pro excepted). We agree on the facts. Would you like to provide a reason they shouldn't care, because so far, you haven't.

doublelayer Silver badge

Re: Speedbump

No, you couldn't rebut the point because you have ignored the one I used. I said outright that this user had the ability to update to Catalina and hadn't yet used it. However, there are OS releases where some hardware is cut off, and XCode doesn't keep compatibility with the old release then either. Whenever OS releases stop for some hardware, XCode releases stop too. In other words, exactly what the original complaint said: some hardware still works but can no longer run the latest XCode.

You can easily argue that this doesn't matter. You could argue that the support lifetime for feature updates (which is what you need for the latest dev tools) is long enough. You chose to argue that they were wrong. They weren't wrong.

doublelayer Silver badge

Re: Speedbump

"Google for Xcode MacOS compatibility."

Why not? Let's see what pops up. I'll start with DuckDuckGo, though, using your suggested search term.

First result is a person who can't compile for IOS 14.2 because the XCode that can do that requires Catalina and they're on Mojave. I.E. a required Mac OS update in order to support something which is entirely ordinary for a different platform. True, in this case, they can update, but they could have the same situation and be unable. Your score: 0/1.

Second result doesn't really mention it, so we'll call that a draw.

Third result is a user who doesn't understand how this works, and the answer to their question includes this statement: "Basically, there is no current Xcode that will work on your mac and know what to do with your phone." Sorry, 0/2.

Fourth result is the Wikipedia page for XCode. It has this sentence in it: "the latest stable release is version 13.1, released on October 25, 2021, and is available via the Mac App Store free of charge for macOS Monterey users." This means that non-Monterey users can't install it. 0/3.

Do we really have to continue? Apple cuts support for XCode to their latest OS, and that is required to compile for modern mobile devices. They don't want the support costs; I get it. However, it does allow them to be compared unfavorably with Android, which doesn't do that.

doublelayer Silver badge

Re: Speedbump

"I don't think it's feasible to develop anything Apple related on gear older than 4 years"

Oh come on. A lot of these developers are building apps for IOS or Mac OS which do one thing and are smaller. They're not building the kernel. If they were, something five years old would be slower, but they could wait that out. However, they're probably building something which can be fully compiled in a matter of minutes and their changes can be compiled and linked for testing in seconds. The newest machines could perhaps do that in fewer minutes and fewer seconds, but it would still be the same order of magnitude.

doublelayer Silver badge

Re: Opening up the M1

You're correct that Apple won't give others the designs for the M1, but why should they? The original point is that the ISA executed by the M1 is known, so other manufacturers have the choice to design and manufacture a chip of similar specification and therefore similar performance. Apple doesn't have to give up all their work for ARM to be open. Some work on a standard bootloader would be appreciated, but I wouldn't expect them to do that either.

"Apple only uses ARM ISA (which ARM has developed for Apple specifically),"

I'm not sure if I'm understanding this phrase correctly, but if it's what I think it is, no they didn't. ARM designed it in many steps, some of which were before Apple was using it, and they designed it for licensees including many who compete against Apple.

doublelayer Silver badge

Re: Speedbump

You are missing or misconstruing a few of their points and drawing incorrect conclusions from them.

Them: "Which contains workarounds for at least some of the bugs in its processors."

You: "So having "some" workarounds is supported or not supported?"

The thing here is that the OS provider, Microsoft, is not the processor provider, Intel. Microsoft made some fixes to Intel's problems, but they cannot make Intel change the firmware. Intel has done that in hardware back to the sandy bridge models. Microsoft has used software to deal with those Intel chose not to do.

Them: "Even Windows 11 installs fine on older PCs (the oldest one I have it running is from 2012, and that's only because I have no PC that is older to try) without any hacks."

You: "So if it installs but does not meet ms minimum requirements, and MS says they do not support it, is it supported or not?"

Good question, and it's subjective. I would say it is not supported. However, it's not supported under Windows 11. It almost certainly is supported under Windows 10 (yes, the latest version of it), so it counts until 2025.

Them: "Pretty much everything starting from Sandy Bridge and later has seen fixes for these issues"

You: "Sandy bridge is 10 years old, so older processors are thus not supported. This is from your statement. This means the oldest supported PC would have to be *at most* 10 years. [And Apple has ten years also]"

Wrong. Intel has fixed a security vulnerability in their hardware for ten-year-old chips. Microsoft has patched it in software for older machines, thus supporting them. If we say that support must include fixing hardware security vulnerabilities, then Apple has a zero-year support lifetime because they have not made any effort to fix their T2 security problems. And that chip, they made themselves. Blaming Microsoft for a thing they had to work around because Intel chose not to fix it is a very different proposal and much less reasonable, most particularly because Microsoft's fixed theirs and Apple's done nothing. In addition, you have AMD chips which didn't have Intel's problems, and they're also supported.

You: "Intel themselves declare EoL for their products well before 10 years.. [reference link] So how is your PC "supported" after Intel has declared EOL?"

The OS is supported because it can run and it provides security fixes for OS problems. The same reason I don't automatically count an Apple machine as unsupported when they say they won't fix some problem as long as they do continue to provide updates.

You: "What you really are saying is that on PC you can run newer OS even if you end up with a buggy/insecure system that has actively exploited and publicised vulnerabilities. This I agree, it is more difficult with a mac, as Apple clearly state that they do not support the HW, as for eg, Intel has stopped support. You as a mac user are informed of the EoL and can choose to run older HW, with awareness, rather than the PC world through ignorance."

Rubbish. If I run the latest Windows on insecure hardware, I have my hardware's security problems, which I can look up, but I don't have the security problems fixed recently by MS. If I was forced to use an older version of Windows, I would still have my hardware problems but now I'd have the OS bugs too. That is the difference. Apple does continue supporting the OS, but not as long as Microsoft does.

doublelayer Silver badge

Re: Speedbump

There are some systems that stall on Windows updates for some hardware reason, but that's really not that many. Until Microsoft decided to change their policy with Windows 11, you could try to run the latest Windows 10 on basically anything, and most of the time, it would work. In order to prove that, people have been bypassing the system checks on Windows 11 and showing it running on really ancient things. While some computers from 2014 have had drivers dropped, there are a lot of machines from 2008 which indeed can run 21h1 Windows 10 (21h2 is Windows 11) and are being used that way right now. Those will continue to get security updates until 2025.

Apple has entirely earned praise on software support for their mobile devices, as they have supported their devices much longer than any competitor, even as some Android manufacturers have been extending theirs. They do not have the same credentials when it comes to desktops. They support their desktops for a moderate time, less than Windows is supported (unless MS's Windows 11 policy continues to obsolete more things, in which case they could pass them in the race). This is entirely without considering Linux which leaves both well behind. Apple still has a large edge over Chromebooks, but unfortunately, they have not earned the praise you are giving them.

US states' antitrust lawsuit against Google's advertising business keeps growing

doublelayer Silver badge

The Oracle-Google spat is settled. They've had their last hearing. Oracle does have copyright rights over APIs but Google's use is permitted. It's done now. They'll find new things to fight about but it's not that.

Tech bro CEOs claim their crowns because they fix problems. Why shirk the biggest one?

doublelayer Silver badge

"Are you serious about Android phones need to be replaced often?"

Yes, very much so, and you seem to misunderstand why, including getting some facts wrong.

"I am using Samsung S7 Edge from 2016 that is more than five years. Works perfectly fine. Survived several "drop tests"."

And 2016 is really not that old for competing devices. A laptop from 2016 still works, yeah, most of them do. When Microsoft denied the Windows 11 updates to computers of that age, we called it terrible (and it is), but MS still plans to update Windows 10 until 2025. Does your old phone still get Android updates? From a search online, it looks like the latest update was Android 8 (we're on 12) and security patch of December 2019. That is far far worse than any other type of product, including Windows. And including Apple, but that's another of your sentences.

"It is the iPhone that needs to be replaced every other year for more or less the "same" iPhone with a bumped up iOS version number."

Wrong. IPhones from 2015 are running IOS 15. If an Android device from 2015 runs Android 12 (fine, I'll give you credit if you find one running 11), it's because someone has painstakingly broken through the locks and compiled it. You won't even find many such devices available. Apple doesn't make that process difficult for their old devices. This is not secret and it's not news. Your claims here suggest you are lying to advance your point.

"And on top of it, Apple won't even allows recycling the old iPhones. They pay you the money only to have it dismantled, so that no body will be able to refurbish it."

They don't use refurbished parts from them, but others do. Until recently, nothing prevented you from sending your old phone to someone else who would use the parts. I do not like that they have started blocking this, and others don't like it to the extent that Apple's had to slightly back off.

What do you mean, 'Microsoft doesn't care about Windows on Arm'? Here's a cheap, underpowered test rig

doublelayer Silver badge

Re: Seems like an afterthought

"Didn't Apple buy those Dev Kits back so the users effectively had them at almost zero cost before the real M1 hardware came out?"

No. Not that this makes Microsoft better, but in fact, they said the devs would have them for a year, asked for them back several months earlier than that, offered a credit that paid for a quarter of the cheapest M1 Mac available, and timed the credit so it was released after many devs already bought one and would expire before they bought another one. This made the devs who rented the transition devices quite grumpy. Source article.

Microsoft admits Samsung phones under Intune mobile device management are dropping out of compliance

doublelayer Silver badge

Say what

"The company [Microsoft] faces stiff competition in the MDM arena, not least from Apple and Jamf, making the issue all the more awkward."

They do face competition, but neither of these companies are competing in a way that they avoided this problem. That's because both products only work on Apple devices. Jamf's is even partnered with Microsoft so they can be used together. Apple didn't have that many MDM functions until announcing some new ones recently, and even those only work on Apple products. In short, neither named competitor even runs on Android, where Microsoft's product has the problem. There are other MDM competitors who can operate on Android and therefore claim superiority on the basis of this bug. Why were Apple and Jamf called out here when they're unrelated to the issue?

Microsoft engineer fixes enterprise-level Chromium bug students could exploit to cheat in online tests

doublelayer Silver badge

Re: (sigh)

If you're joining your computer to an external management system, which you have to do for this to work, then you're giving up control over some aspects of your system. People have to understand what power they're giving administrators and whether they're comfortable doing so. If you do that, I think you have basically consented to having such a minor thing done.

The better response would be not to include the answers in the source, and then there wouldn't be a problem. They have to be checked in at some point anyway, so the place that stores the grades can also do the grading.

Workplace surveillance booming during pandemic, destroying trust in employers

doublelayer Silver badge

Re: As opposed to???

Yes, it's different. If someone was coming by, that was limited monitoring by someone who could at least determine whether what they saw was productive. Software has no way of knowing whether you're productive, but it generates so many numbers that people trust that they mean something. Therefore, the software's decisions are more arbitrary and likely to be wrong. At the same time, your boss coming by was certainly annoying, but it was only a few times per day and the state of your workspace that can be seen at a glance. The monitoring software is watching your activities all the time and accesses lower-level details like how you're typing, so it's more invasive.