* Posts by doublelayer

9378 publicly visible posts • joined 22 Feb 2018

National Crime Agency says Brit teen accused of Twitter hack has not been arrested

doublelayer Silver badge

Re: Victim shaming

Your concerns are valid and they are often taken into account during extradition hearings. In many cases, if country A does not think the event was a crime, they will refuse to extradite. If country B's punishment for the crime exceeds country A's, it is common that country A will only agree to extradite under some conditions including a limit on punishment. These considerations are often seen in such cases, and there have been cases where country B decided not to meet country A's requirements and country A refused to extradite and charged the suspect themselves.

As for your discussion on where Twitter is located, that is somewhat clear. The company is located in the United States. They may own other entities, but the entity which controls the servers which were broken into is the main company based in the United States. The crime that is mostly being discussed here is accessing those servers, meaning that the locations of the people impersonated is not at issue. The location of the people used during the attack is similarly unimportant. In this case, the U.K. and U.S. both have jurisdiction over this particular suspect, so the U.S. may request to have the suspect tried there. If they do, the U.K. will be free to refuse that request and they will consider points such as yours when they do. It is worth keeping in mind that, should the U.S. make a request, it is not only legal but very standard for cases such as these.

doublelayer Silver badge

Re: Victim shaming

"Then again why should Mason Sheppard be tried in the US, British citizen in UK when it happened, surely subject to UK law."

Crimes can be tried either in the country where the perpetrator resides or the country where the crime took place (for digital crimes, this means the country of the victim). For this reason, it's rather normal that there would be the potential for this crime to be tried in the U.S. and extradition requested. The U.K. of course has the option to refuse extradition and try separately. The U.S. might want to extradite to the U.S. rather than wait for the U.K. to try the suspect in the hopes that information from all suspects might lead to more effective trials; for instance, if the same investigators get to question all suspects, they are more likely to get information against others involved.

Call of duty, modem warfare: Taiwanese Qualcomm rival MediaTek teams up with Intel for first stab at 5G laptop chipset

doublelayer Silver badge

Cellular laptops really that useful?

I wonder whether others find cellular connectivity much of a factor when thinking about laptops? I tend not to. Although I can get some utility from having the connection available and I'm sure there are people who work outdoors more often for whom this is even more useful, I've always used my phone's connection for that instead. The primary reason for that is that, in my experience, mobile providers don't really care about people who want a connection that will stay down most of the time. They all seem to charge an amount that is required just to keep the line in service, either a fee explicitly for that or a bill for a data allowance that didn't get used. So if I need the laptop's connection only occasionally, I end up paying an extra service fee even when I don't use it. Meanwhile, my phone already has service and I don't have to pay any more to use its connection for tethering. So is it just me or is this feature one manufacturers have cared about for many years while users mostly don't?

USA decides to cleanse local networks of anything Chinese under new five-point national data security plan

doublelayer Silver badge

Re: Human Rights

"Does China have greater surveillance of its citizens than the USA? I very much doubt that it does overall."

You may think this, but that is incorrect. China really cares about surveillance, and they have it in spades. They have software to track communications over phone or internet. Software to monitor movements using vehicles, and increasingly pervasive camera surveillance with some of the best facial recognition technology. But these only cover the cities, right? Wrong. They cover a lot of the area, and they link people based on any metrics they need. When they decided to repress a group that was annoying them, they rapidly expanded their surveillance to cover the Xinjiang province and areas near it in other provinces. But you had another point to make:

"Far more Chinese citizens live in extremely rural areas where there is no CCTV, just for starters."

Nope. Those areas are indeed poor, without many of the nice conveniences for life which also make surveillance easier. Want to know what they still have? They have cameras. There's another reason for this. China has had a long history of trying to keep tabs on their population. Going back to the 1950s, it was critical to know who was doing what. Back then, cameras weren't really an option, but a strict hierarchy of power and responsibility was. China built that. Now, they can use technology to support it, but they still have that hierarchy. Part of that is responsibility to watch people for certain activities and know things about them. It's inefficient, but it works.

Countries like ours are dangerously willing to surveil us. They have powers that we need to curtail. They have been taking advantage of anything they can think of to increase their capacity. But we can still do things that China has prevented. A lot of the reason for that is that our countries don't use their surveillance powers against us very often. China is better at it because they use it all the time, while our countries may have the capability but by leaving it unused they don't have as much ongoing data.

Our governments may be interested in ideas like a social credit score, automatic checkpoints requiring constant confirmation of a person's identity and status, or elimination of encryption, but it is China that has already successfully implemented them.

Ever wonder how a pentest turns into felony charges? Coalfire duo explain Iowa courthouse arrest debacle

doublelayer Silver badge

Re: There's more..

But in order to make that decision, we have to ask why those professions get those privacy benefits. Lawyers make sense, since they are ostensibly the protection layer between people and their accusers. How about doctors? Why do they get that protection? According to this article on the subject, it's designed to ensure that patients tell medical professionals enough information that they are treated properly. On that basis, you can make an argument that security testing is similar to medical--they are also ensuring that the person or organization who is using their services is healthy, and you can draw coherent though tenuous connections between tasks performed by security testers and doctors. The argument isn't the easiest to make, but in my opinion the argument for medical privilege isn't particularly convincing either.

doublelayer Silver badge

"Just because someone has been arrested and then released without charge if the case is still open do you delete everything"

In this case, charges were dropped. This basically means that the case isn't open. It's possible for someone to decide to file new charges, but unless that happens, the people concerned are not subjects of any charges and not arrested. The case is effectively closed, not open.

"do you delete everything e.g. the interview. Do you delete everything when the case is closed and say someone else is convicted. Surely you still have to keep the info just in case there has been a miscarriage of justice."

You can keep that if you need to. The point under dispute is whether you keep a public record of an arrest. You can keep the interviews and evidence in private without allowing the names of the people who were released without charges to be inextricably linked to something that is now viewed as not criminal.

"Personal information like photo/mugshot finger prints dna should be deleted."

I agree, but when they don't do so, they will use the same argument you have just made.

"Of course there is bugger all you can do if it is reported in the press."

Well, you can do some things. In Europe, this is where the right to be forgotten might be used. People will argue about that, but we can skip it for now since this is in America. Still, a newspaper story making clear what happened offers more context than a record that simply says "arrested on felony charge, no trial occurred". Someone doing a background check who reads the article and understands the context is more likely to make a reasonable decision than an automatic system that looks for felony charges in a database and counts people out on that basis.

We Kana believe it! Raspberry Pi Foundation launches Japanese keyboard

doublelayer Silver badge

Re: Why make keyboards

If you're looking for somewhere where it's really hard to find electronics and the road is a day's walk away, Japan might not be it. Japanese is spoken elsewhere, but not so much that you'd expect to stock many Japanese keyboards for the general public there. If they want to create keyboards for languages that aren't well represented at the moment, maybe they should focus on those which haven't been well-established in computing for five decades. There are languages covering millions that fit that bill.

Google to pull plug on Play Music, its streaming service that couldn't beat Spotify, in favour of YouTube Music

doublelayer Silver badge

Re: Disabled person

Are you willing to build the system yourself? There are a few things you can do to get that working. Various projects exist allowing a Raspberry Pi to relay audio to such a service, so you just have to replace the recognition on their servers with recognition running locally (CMU Sphinx has proven to be an effective library for me). Of course, you then have to provide your own list of commands and actions to take when commands are heard, so it's not labor-free.

There are also some open voice assistants that run using local software. I've seen types that use a Pi as the brain, which are more open and configurable but sometimes less powerful. This one is probably the most famous, but I have never used it and I don't know whether it's capable of everything you want. I've seen others that use an Android device to power them because by doing so they can use Google's dictation function (requires an additional download but then can recognize offline) instead of building that themselves. That would also work, but initial configuration or recovery should the host device shut down isn't as straightforward as with a Pi. If you want to investigate those options, try searching for voice assistants on FDroid or Github. If you set up either option with a speaker of high enough quality, this should work.

NSA warns that mobile device location services constantly compromise snoops and soldiers

doublelayer Silver badge

"My God, if they're spooks then they ought to be about paranoid enough to only use a crappy little GSM type phone while at work."

Antiespionage report, section 12: mobile device usage among clearance candidates

Most candidates for this position are using off-the-shelf smartphones. They will be treated with normal scrutiny. Four candidates are using phones without smartphone capability. Two of these are old and are using old devices. While it will be assumed that these people dislike smartphones, these candidates will still be treated with elevated scrutiny. The remaining two are using newer devices without that functionality and will be treated with severe scrutiny. Two candidates are using atypical smartphones, namely candidate 280 is running a Linux-based mobile OS on a device from Pine64, a known provider of secure devices for technical users and candidate 393 is using Lineage OS, a variant of Android with additional privacy features. Candidate 393 will be subject to severe scrutiny. Candidate 280 will be denied clearance and will be further investigated for potential criminal tendencies.

Sometimes, if you want to blend in, you have to do things that everyone else is doing even when you don't want to or they're dangerous for your attempt.

doublelayer Silver badge

Re: How terrifying

Well, most states have proven that they have and like that tech. There are also cases where someone was operating it, but the police never found out exactly who it was. Most of those I've seen were presumed to be state actors, but since we can't prove that, it's always possible that it was someone else. Since the hardware can be built by a nonstate person, it's not that surprising that some people have done this. It doesn't have to be a concerted effort for some new concerted effort to pick up the practice.

doublelayer Silver badge

Re: Talyrand: they forgot nothing and learned nothing!

Your biggest problem isn't 5-7, it's just 5. Spies can always place calls from public areas without CCTV, well not very easily but we'll come back to that, but where will their recipients be? The person receiving the call won't know they need to receive a call, so they'll be wherever they were before, which is potentially exposing. They will have to keep their burner phone turned on to receive said calls, meaning it will be able to track their location if someone ever identifies that phone as a device of interest. If you were planning that the conversations are always preplanned, so both ends can go to a public place, how does spy A indicate to spy B that spy A has urgent information that spy B needs to know when they don't have a scheduled meeting for several days?

Now, a public place to make a call without surveillance cameras. I really hope no spies ever go to London or most cities really. There are cameras everywhere. If you find a place without cameras, someone could check feeds for the cameras near the place to find the person who spent the right amount of time in that place before leaving. The other problem is that, if you make a call in public, you have to say all your secret stuff in public. People can hear your conversation which either includes incriminating things or cryptic things, which might cause your listener to report you or listen in.

doublelayer Silver badge

"does not mean that it is impossible to prevent tracking."

But in effect, it's really hard. To demonstrate this, let's see if your ideas work (not as well as we'd like).

"As the most obvious way, just prohibit people from bringing phones into the area."

This assumes we are talking about a specific secure area, but we can go with that assumption. Other comments have already explained the dangers of collection outside secure areas, so I'll limit myself to the secure ones. If you make people leave their phones outside the secure area, then a tracker can do several things. If they don't know where the secure area is, it's that place where lots of phones suddenly go offline when people put them into those isolation lockers. If no lockers, it's that place where a bunch of phones go to not move at all--if you have your phone on you, even if you're just moving around a room, the signal will change slightly. Not as much if it just sits on a table. Assuming they already know where the secure area is, they know now who goes there and when. They may not know what they do once inside, but they can track the phones as people travel to the secure area. This means you know when the area's personnel are away from their homes so you can search them, or when the area has most of its people so you can attack it for maximum destruction, or when the area is sparsely populated for some other type of activity like trying to plant bugs.

"Another way would be for the people running the secure area to set up their own base station which is made secure so that nobody can get location data from that base station."

So the area has its base station, and the data can't be intercepted. This doesn't necessarily mean that phones will switch to said station or that they won't also contact others. A lot of tower data comes from towers other than the primary one, which mostly comes from phones verifying that they're still on the best one. What happens if the station is on one side of the area while an attacker drives by the other side with a more powerful malicious station. They could easily convince several phones on that side to trust them instead. Of course, by that point, you may not have such a need for location information, but it could at least tell the attacker who works on that side of the area rather than the other side. If they have floor plans of the area, that data might be useful.

Apple re-arms the iMac with 10th-gen Intel Core silicon

doublelayer Silver badge

The Pro iMacs have Xeons. All of them are Xeons. The article says this.

doublelayer Silver badge

"So, one would expect the Osbourne Effect to be rarer these days."

There are three main reasons why it's not. First, people fear obsolescence of older devices, not because they're actually obsolete, but because the manufacturer drops support. The more locked the device is, the higher the fear. I have little fear with a standard computer because I have confidence I can find drivers and boot other things. I have less confidence with an ARM-based computer because their drivers have proven to be a nightmare. I definitely feel this with phones, because the chances that someone will find a way to break the bootloader and give me extra software is rather low.

Second, pricing is a little crazy. I may not have a problem buying older hardware, but if the manufacturer is releasing an update, I may wait for them to do that before I go to buy the older version. I'm hoping the prices will get brought down, which is mostly true because when it was the current model it was ridiculously expensive. If you do intend to buy computers or phones from well-known manufacturers, expect the quoted prices to be inexplicable and the sale prices heavily discounted and yet still a lot more expensive than you would have expected from a few years ago.

Finally, there's exactly the point you brought up. In the 1980s, people waited so they'd get a better product. Now, they wait because they can't get a better product. If my phone is a little annoying and I'm considering a replacement, I might buy something now. But if someone says that there will be a better model in a few months, I can wait; I'm not losing out much. For example, someone I know who likes iPhones and small phones was looking to replace their device early this year. I advised them to wait because there were these rumors of a smaller iPhone to be released. They put up with their old device for longer based on that recommendation.

Google reveals washable phone case, plus the new midrange Pixel 4a that goes inside it

doublelayer Silver badge

Not voting on either comment, but in my case, I don't want that. My case protects the screen, but it doesn't cover it. It protects it by going over the sides, so if the phone falls onto its screen, the case keeps the screen from touching the ground. That combined with a cheap protector over the screen and not dropping it very hard has served me well so far. The case also goes around to cover other sides so it can absorb some shocks from a fall in any direction.

Meanwhile, a case that does cover the screen either makes me use the device with an annoying hanging component or causes me to remove the device more often to avoid the cover element getting in the way. I may want to hold the phone to my ear or have it positioned in various ways in front of me, and something that doubles its area doesn't help in those cases.

China requires gamers to reveal real names and map them to frag-tastic IDs

doublelayer Silver badge

Re: Good move

Not as many as you think. For one thing, family names are common but there are still a lot of options for given names to increase the numbers. For another thing, this just plugs in on top of the existing tracking of IP addresses, meaning you don't care how many people with a certain name are in China, but how many people with that name live in each building. If you can track people by their address when they set up their account, you can do two things with that information. First, you can track them even if they move because you know for certain who it was who set up the account. Second, people aren't very original when thinking up usernames, so you can possibly identify people by names on other things that haven't complied with this policy.

Amazon gets green-light to blow $10bn on 3,000+ internet satellites. All so Americans can shop more on Amazon

doublelayer Silver badge

Re: Global Internet

"Having assets in the EU is what gives the EU power. If they were not there and yet they could still provide services without the need for an EU ISP would it be as clear cut?"

The only way that would work is if they offered free internet as long as you get the hardware yourself. If they sell you the hardware, they operate in the EU. If they sell service, they likewise do so. To have the ability to do things like that means they would have to have at least some assets in that area, if only a warehouse full of satellite dishes and the account that people pay into before it's routed to the main account elsewhere. The EU could cease those resources if they needed to. The companies can do only so much to have nothing there, and if they do, there's less and less benefit they get from it.

doublelayer Silver badge

Re: Educate me

Neither the ITU nor the FCC is dealing with the elements mentioned by the original post. Each concerns itself with telecommunications and radio frequencies, which are important, but not the original point. It's easy to turn off the radios when the satellite isn't orbiting over the right place. FCC happy, ITU happy enough, other countries' regulations not violated. Problem solved.

The problem mentioned, however, namely whether there's any controls on who can put what above us, is not solved. Neither organization has any stated goal of keeping space usage feasible let alone caring about what someone else should be allowed to do. And every other country with a space program similarly has no restrictions. If some country decides that it is useful for them to send up millions of satellites despite clear risks, they can do so without any restrictions. This could be a problem, especially as large countries aren't well-known for caring much about what happens to people in other ones. Then again, should a better space treaty include that provision, it probably would get ignored if needed; nobody's really sticking to the "no destroying other people's stuff and keep others in mind" parts.

All the way to Reno: Oppo's latest mid-ranger going global but lacks 5G compared to similarly specced models

doublelayer Silver badge

We have different expectations

"If you're going to spend nearly £400 on a new phone that'll last you for the next two years, you might as well get one that works with the latest high-speed networks, right?"

At least for me, not right. If I'm buying a phone and expecting it to last for two years, I don't expect 5G to be generally available for most of that time, so I don't care. But also, I wouldn't be spending that much. If I buy a phone at a similar price, I expect much more than two years out of it. I upgrade my technology under two conditions. Either the one I was using before is now broken or the new one offers new features that I want. New phones haven't offered new features I care about very much for eight years or so, so I replace phones when they're broken. This means that I care more about longterm software updates and price and less about most other things.

First rule of Ransomware Club is do not pay the ransom, but it looks like Carlson Wagonlit Travel didn't get the memo

doublelayer Silver badge

Re: In re tracing cash...

True, but there can be logs of which serial numbers were placed into the ATM before they were printed. Especially when using newly manufactured banknotes, the stacks are consecutively numbered. This is useful to catch people working for the bank who see a large stack of cash and think of the potential to pick it up and run. Going in is another question. I don't think they OCR those bills most of the time, but there is a facility to do so elsewhere and it is done on occasion. Having never worked in that area, I don't know how the scanning is done when it is deemed necessary or how routine it is.

doublelayer Silver badge

Re: In re tracing cash...

Sure, that can be done, and it is done to detect known theft of bills with sequential serial numbers because such lists can easily be passed around. However, it doesn't provide you the same kind of information that bitcoin does. Cash can be spent several times before it ends up in a bank, and so even if you know that a criminal obtained such a banknote and it returned to a bank via a deposit from a retail store, you don't know that a criminal was the one spending it at the store. If the criminal doesn't steal it from the bank, but instead steals it from somewhere else which probably doesn't catalog serial numbers, then even when it ends up in a bank, you don't know that it was ever connected to a crime. Meanwhile, we may not know who spends each bitcoin, but we can track an individual one through every transaction short of just giving the wallet key over to someone else.

Infosec bod: I've found zero-day flaws in Tor's bridge relay defenses. Tor Project: Only the zero part is right

doublelayer Silver badge

Re: The problems continue

"Pedantically, for something to be a "zero-day" it has to be actively exploited in the wild, before researchers discover it, or the provider is informed."

Even more pedantically, that's not it. The zero-day doesn't start counting up until there is a solution--something we know about and it's being used but there is no patch is still a zero-day. Now you may be correct about requiring an active exploit; the researcher claims that a zero-day exploit can be something that could be used but isn't yet known to be, while something that is known to be used is a zero-day attack. I'm not sure I buy that logic. Either way, if he is correct about these being exploitable and someone starts to exploit them while the Tor project hasn't accepted and patched them, they would become zero-days.

doublelayer Silver badge

Re: The problems continue

Which is what the researcher is claiming. Whether they already do so isn't known, but he alleges that it is feasible. Given the level of expense the Chinese government has already taken to provide censorship, they clearly believe it is useful to perform such scans. My guess is that they either already are taking actions to block or identify Tor usage or they believe few of their citizens use it. I'm not sure which it is, but the former makes more sense to me.

doublelayer Silver badge

The problems continue

This researcher has started to demonstrate various problems in Tor, including the ones mentioned here. While the Tor project may have a pedantic way to argue that these aren't zero-days, they aren't doing very much to describe why they aren't problems. For example, I notice that they spent a lot of time stating that the researcher read a paper wrong, but don't spend very much at all showing why the algorithm he provides for detecting traffic doesn't work. They've provided a few arguments for why it might not work at scale, but they have neither disproven his methods nor proven their defense.

It's worth reading the full blog entry, linked from the article, to see the details on detection. I also found a previous entry covering problems in the browser and direct connections to be enlightening. I don't always agree with the severity of things this researcher says--for example, in the previous entry he describes how to detect direct Tor traffic as very problematic when there's already a much easier way to do that, but it also has caused me to be more skeptical of things the Tor project says.

'I'm telling you, I haven't got an iPad!' – Sent from my iPad

doublelayer Silver badge

It may be, but unless there's someone else doing the real work on it to make sure it stays working, some of the students might get caught in the trap while it's still in operation. An environment through which students must submit work is a very important thing in education, and when it breaks there can be large problems.

I am young enough that I've used such systems during my own schooling, and two events of problematic failures come readily to mind. First, there was the time when the system simply refused to accept uploaded documents. Every week, starting around 10:00 in the morning and ending at midnight or possibly later. The homework was due at midnight. I don't know how many students were thrown by this, but I had to email my professor with the documents and promise to try again later and that the files would be identical (fortunately this was accepted). The second time concerned a system for automatically detecting plagiarism which reported, on our class's final papers, nearly universal plagiarism. In fact, we had all committed exactly the crimes of which it was accusing us, namely we had copied, with only slight modifications, large chunks of other documents. Those other documents were our drafts for the same paper, which also got submitted into this system's big database. Worryingly, it seemed we had also plagiarized smaller sections from certain works which all seemed to be between quotation marks. Funnily enough, I don't remember that system being used for many other courses.

Humble-bragging ServiceNow CEO tells anyone who listens: 'Our destiny is to become the defining enterprise software biz of 21st century'

doublelayer Silver badge

Bill, you may need my help

“[W]e're humble and we're taking nothing for granted. We’re on the move to our destiny to become the defining enterprise software company of the 21st century.”

Oh, Bill. Here are definitions for humble, take for granted, and destiny. Read each of these and get back to me. You have one or more of them wrong and we need to make sure you have a good understanding of them if you're ever planning to use them again.

If you own one of these 45 Netgear devices, replace it: Kit maker won't patch vulnerable gear despite live proof-of-concept code

doublelayer Silver badge

From the reports, it sounds like it's only LAN-accessible unless the user has done something really stupid. Still, there are too many ways of getting LAN access and too many worrisome ways of exploiting root access to the network device, so it's still important.

Reply-All storm flares as email announcing privacy policy puts 500 addresses in the 'To' field, not 'BCC'

doublelayer Silver badge

Re: Flash is dying, why not e-mail?

That is true, but unfortunately most of those things are worse. Email may have too many security problems to count, but you can pretty much guarantee that an email sent from one place will get to another one, and if it doesn't there are only a few reasons for it. More modern communication apps require a lot more configuration. Ones designed for companies often make it hard to communicate out of the company. Those designed by big companies require sending unencrypted data through their centralized system. Those designed by hardware manufacturers lock you in. And some others require phone numbers or email addresses and essentially provide an overlay; while the features are good, you still need the other mechanism for that one to work. Email and to a lesser extent phone calls and SMS are global and compatible. Most other things aren't.

Huawei claims its alternative ecosystem to Google Mobile Services has 1.6 million devs, 73 million Euro users

doublelayer Silver badge

Re: I'm a bit confused by this.

Because the code is developed in the U.S., meaning that they're not allowed to supply it, even indirectly, through any entities they control or which control them, or through an independent entity which they know will be used to violate the sanctions. If they do, they can be penalized by the American government for trying to break their regulations, which is investigated on a when-they-want-to basis. This means that Google would be handing ammunition to cause them problems to any U.S. administration which has some reason not to like them.

Google allowed to remember search results to news articles it was asked to forget. Good

doublelayer Silver badge

Re: Why I love the Right to be Forgotten

Google is not allowed to collect and store such information from other parts of the law. The fact that the right to be forgotten had to be enacted as a separate section, rather than coming organically from other sections, clearly indicates that it is a separate thing. Among some of the details that make this different is the fact that Google's database does not specifically say any of this; it simply knows that a certain page happens to contain those words; the entry for a page stating "Person X declared bankruptcy", "Person X presided over a hearing for declared bankruptcy", and "Person X fought against creditors who declared bankruptcy" look rather similar. In addition, if they are required to remove access to the page, they are not required to remove it from the database. In fact, they are required to put it in another database so they know not to link to it. The parts of GDPR regulating personal information would have required deletion, which this does not.

doublelayer Silver badge

Re: Why I love the Right to be Forgotten

You're misstating the points you're replying to.

"This is not about the US Constitution or American law. This is exclusively for the other side of the pond. In cases such as this the database entries must only be removed for EU territory, Google can still legally show them in other jurisdictions."

Not only was the U.S. not mentioned, but this is a comparison. Countries in Europe do it this way, other countries do it a different way. The comment you replied to was contrasting these approaches and stating opinions based on this comparison.

"This is not a government forcing anyone to unpublish anything."

Wrong. You seem to have two parts to this argument. Let's look at each:

"Firstly, this is a purely private case between a private citizen and a private company."

No, this is a case between a private citizen, a private company, and a national government using a national law which is interpreted by a national court. The law decides what that private citizen is allowed to demand. The law allows the government to penalize the company if it doesn't comply. It is that law, and the government that created, interprets, and enforces it which makes this a governmental matter. It is true that the government isn't making unilateral demands, and in this case they refused to support the citizen's demands, but the law gives them power and it is that power which we are talking about here.

"Secondly, the RTBF is not about publishing. It can not be used to remove articles or force corrections. It is limited to the storing of personal information in the databases of search engines."

Wrong again. It is not about the storing of personal information in their databases. It is about storing of impersonal data, namely specific links. Which they are going to publish if it's in their database in the search results area. Which this law would make it illegal to publish. Your second phrase is wrong, and your first phrase is only technically right based on a limited definition of "publish". We have had many an argument in this forum about whether deciding and sending search results is publishing, and some of us think it is. Even if it isn't, it limits what Google is allowed to write to their search results pages. Not about personal information.

You can argue against the point in many ways. I would agree with some possible arguments. The points stated in that comment are exaggerated and not well-argued. There are lots of legitimate avenues for dispute. You did not choose to take any of them.

Google extends homeworking until this time next year – as Microsoft finds WFH is terrific... for Microsoft

doublelayer Silver badge

And there you have the problem. If you know you will always be working from home, you would probably enjoy doing exactly that. If you knew you would be coming back in six months, you could try to liberate yourself from your agreement to rent and find somewhere nicer to be for those six months. If your workplace might bring people back, but nobody knows when or whether, then you don't have as much freedom. And the worst possible outcome: your workplace might bring people back and hasn't committed to a specific time by which you have to return. Google has done a good thing here just by giving a date well into the future. People can actually make some decisions based on this without fearing that they'll have to cancel plans at short notice.

doublelayer Silver badge

Re: Anecdotally

I think your attitude towards shifting from office to home work depends a lot on what your office and home are like. I preferred the office, but that's mostly because the office for me was rather nice. We had separate offices, meaning little sound pollution or barriers to impromptu meetings, and my commute was a relatively short walk which I quite liked unless it was raining particularly heavily. I wouldn't be surprised to hear that people like home working a lot more when their office is in a really expensive place to live, meaning long commutes, or where the office involves a lot of distractions or is in some other way hampering productivity and enjoyment. Similarly, I'd expect working from home to be less popular for those who live with others who are frequently disruptive or for those who have other things to do in the area around their office.

Chinese tat bazaar Xiaomi to light a fire under Amazon's Kindle with new e-book reader

doublelayer Silver badge

Re: Bazaar?

Yes, but given that the sentiment, phrasing, and timing was so similar between the posts, I figured it was likely. Especially as the idea was both wrong and rather unrelated--after all, Apple doesn't make devices like this, so they're not that relevant to the discussion.

doublelayer Silver badge

Re: Bazaar?

You really had to post that sentiment twice? And by the way, it's not really true. Apple designs all their equipment, then subcontracts the manufacturing. Xiaomi does some of that, but a lot of their stuff isn't done that way. For example, they are somewhat well-known for their wearable fitness trackers, and they don't design any fitness trackers. Instead, the company called Huami does that, both for their own brands and for Xiaomi. Neither of these models of doing business is necessarily bad; whether it's Xiaomi or Huami making the trackers, people seem to like them, but they're not the same strategy.

Companies toiling away the most on LibreOffice code complain ecosystem is 'beyond utterly broken'

doublelayer Silver badge

Re: "Slapping a "Personal Edition" label on a product implies..."

"Sorry, there are sentences like "Slapping a "Personal Edition" label on a product implies you can only use it for personal use, which would be against the license." which are utterly wrong."

Maybe you would accept it if rearranged. Here's what I think it is trying to say:

If a project said that you can only use it for personal use, that would be against the license. Slapping a "Personal Edition" label on a product implies but does not really mean that.

The sentence occurring immediately after the one you quoted makes it clear that they understand that the implication is not true. They are not claiming license violations. They are claiming user confusion.

Raytheon techie who took home radar secrets gets 18 months in the clink in surprise time fraud probe twist

doublelayer Silver badge

Re: Did he not

Comment was written somewhat tongue-in-cheek, hence things like claiming he knew what he was doing and recommending that criminals pay attention to environmental considerations. However, it is good security practice to erase disks even when discarding the hardware, so I only had to joke about what his intentions were, not what is a good idea.

doublelayer Silver badge

Re: Did he not

It looks like he wanted to follow good security practice. Even if you're going to toss the machine, erase the disk first. If you don't, an attacker can get the computer out of the bin and extract the data. Of course, if you're planning to discard the hardware entirely, secure erasing the disk is more easily done by using a hammer, but remember to still do it.

The instructions above are meant for example purposes only. If you truly are planning to erase your disk to avoid legal prosecution, at least you hope, you should not bin your machine. It is more environmentally friendly to have the diskless shell brought to an electronics recycler.

doublelayer Silver badge

Re: Editing

I really don't mind the typos. It happens to all of us. My suggestion would be to turn the tips and corrections feature into a form rather than an email--sometimes I'm on a machine without email configured or with accounts I don't want to use, so I try to remember to send a message later and likely fail. I'm guessing it was done this way to deal with spam, but you already have our logins so you can associate reports with those for blocking purposes.

doublelayer Silver badge

Re: Did he not

The article described him as a systens engineer and a techy, but they didn't provide extra context on that. It's possible that he built electronics or worked on the physics of the radar, rather than dealing with computers. While many electrical engineers and physicists have had lots of experience with the low level of computers, many haven't. I wouldn't be that surprised to hear that they don't automatically know about the device nodes and how to find the right one.

doublelayer Silver badge

Re: "he had downloaded documents to an external drive against company policy"

You are very right to think that. It is critical that audits be done about copying data to external media if employees are meant not to do so. This company is very fortunate that all this guy wanted to do was take work home without permission. Had he taken a copy and showed up at a prearranged consulate, he could be happily living in another country with the data handed over before the company even knew there was a problem.

Russia tested satellite-to-satellite shooter, say UK and USA

doublelayer Silver badge

Re: Sitting Ducks

Exactly. If you can have enough weapons to be able to take out satellites with a 12-24 hour lead time, that's pretty good. Preparing a ground-based attack might be able to go faster if you rush things, but it's not markedly so. Also, if you attack a satellite from something near it, you can do so in such a way that relatively little damage is caused to other things. If you have to fire your offensive weapon from the surface, you don't have as many options--either you launch what is effectively what you could launch already, or you go for a blast it to pieces approach. If you do blast it to pieces, there's always the chance you might damage something you didn't intend to damage, either causing problems for you or angering someone who was formerly neutral. Even if you still think surface-based attacks are useful, it doesn't hurt to have both options available. If you can stand to wait a few hours, use your orbiting disassemblers. If you can't, bring out the big laser.

Butterfingers who don't bother with phone cases, rejoice: New Gorilla Glass 'Victus' tipped to survive 6ft drops

doublelayer Silver badge

Re: Is dropping your phone common?

I've dropped mine a couple times, onto wooden floors, onto concrete, and onto a cat. The phone never seems to mind these drops, but mine is older and has a case on it to be careful. The case isn't designed to provide massive levels of protection, but I've seen other people with cracked screens, so I figure it's not hard to use the basic protection option. So far, this combination has resulted in no problems save for a short meow and a contemptuous look.

What evil lurks within the data centre, and why is it DDoS-ing the ever-loving pants off us?

doublelayer Silver badge

Re: Why is the IT manager deploying HA Proxy?

The culture of having managers and nonmanagers, where managers are defined as people who don't know how to do any of the things that need doing but direct people to do so is harmful. A good manager understands what the people they're managing do, and they understand how to do those things in a pinch. The team members themselves may be better at doing it, but if the manager doesn't know, they're not competent. In addition, the word manager can be applied to people who manage things other than people; it's pretty generic.

doublelayer Silver badge

Re: Football team web site throttles business

"need to take it up with the idiot users who leave pages open when they're not doing anything with them."

That's not a good approach. Why shouldn't most pages be left on? They're documents. Mostly static documents. If I want to have them open, it should do little harm other than using some memory. Same thing is true of most nonstatic pages, because if they need to update, they probably don't need to thrash the CPU for it. After all, there are tons of other apps and applets whose entire job is to remain in the background and update information so it's always available; they seem fine at it. A few pages may do something else, like livestreaming video, but even those should be coded to stop streaming when they're not in focus. Leaving a properly-written livestreaming page open in another tab is simply a better way of returning to it when needed. None of these things are unusual, and users shouldn't be blamed for not knowing that a bad developer has made a site that wastes CPU time or network bandwidth.

Bill Gates debunks 'coronavirus vaccine is my 5G mind control microchip implant' conspiracy theory

doublelayer Silver badge

Re: Choice, not Charity

So, your suggestion is? If your suggestion is "you should have taxed him more a while ago", well, it didn't happen. If your suggestion is "take away his resources now", don't expect that to happen either. If your suggestion is that he should donate his money to a fund controlled by the government rather than a fund he controls, don't expect that to happen either, because he and probably various others will have more confidence in his determination rather than any national government.

In addition, there are different goals between philanthropists and governments. Do you think the public would be very interested in curing a disease that never affects them, in an area far away with which that country doesn't interact very much? Would a government that is beholden to its voters, lobbyists, and businesses but not to people on another continent spend a ton of money on a comparatively small project to help the least powerful there? It sometimes happens--there is foreign aid--but it's not their primary concern and arguably shouldn't be (I wouldn't argue that but I've heard enough people do so that it does have an effect). It is his choice to spend his money on people outside his country, in a way that might not be the priority of the people who would get the vote on it if he had to turn the resources over. Unless the people decide that, for some reason, he needs to have his money taken away, that is his choice to make.

doublelayer Silver badge

Re: Bill Gates ... saving millions of lives across the globe

His employees? Do you mean the Gates foundation employees? Or Microsoft employees (he hasn't run that for over a decade and a half)? Do you have reason to believe either set of employees are being paid badly? It's not like Amazon, which does have a massive workforce at the lowest end that can be mistreated for massive profits. Both his organizations have much different organizational charts. I'm sure you can find some problems, but I don't think you'd find them to be large or systemic ones.

New Google rules mandate Android 'Poundland' Edition, Go, for sub-2GB RAM phones once Android 11 is out

doublelayer Silver badge

No, they didn't. The claim is that apps expanding to fit the available memory is good. The reply states why having free memory is good. If the apps expanded to fill the memory, then there is no free memory, and the benefits listed there are lost. If a system can run in a gigabyte but has two, you have a gigabyte for caching. If it can't run in one and needs two, then you have less or zero for caching.

Suspected armed robber’s privacy was not infringed by cops’ specific cellphone tower data slurp, US judge rules

doublelayer Silver badge

"I'd prefer not to be tracked all the time, obviously, but I've never worried that so being would fit me up for a crime I didn't commit. Does anyone here really worry about that? If so please can you explain why in rational terms?"

Here's one short but good reason. It has already happened. Look at arrests based on facial recognition. There have been several in the U.K. and U.S. In many cases, the person arrested doesn't look like the person identified; the cameras got it wrong. And yet, those people have been in police custody for far too long before they were released. They do get released at some point, with no charges, but do you think they get any recompense for spending some time in jail? Any way of proving to people whose meetings they missed that yes, the police did arrest them, but that they didn't do anything wrong nor was there any reason to suspect they did? Similarly, some police organizations have been known to treat some people without regard for justice. It hasn't affected me. It might not be in my area of residence. If it affects others, it's still bad and it is part of my responsibility as a citizen of a democracy to ensure there are protections for those people. One of the most useful protections is requiring warrants for accessing potentially abusable information. It has been done for decades in many countries; it can keep happening.

Don't strain yourself, Zuck, only democracy at stake... Facebook makes half-hearted effort to flag election lies by President Trump

doublelayer Silver badge

Re: why aren't postal votes considered a fraud risk in the US?

"For the benefit of us folks in the UK could you please explain what a hanging chad is and why it matters."

This applies only to the 2000 election. Chads are small round pieces of paper that are meant to be punched out of a paper ballot. The voter selects the choice, the corresponding hole is punched, the chad falls away, and the ballot with its hole can be counted automatically. The problem occurred because some machines failed to completely punch through the paper, meaning that the selected hole was not fully opened. The chad remained partially attached to the ballot, hanging there. This caused problems because the counting machines sometimes failed to count those ballots correctly.