* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Techie with outdated documentation gets his step count in searching for non-existent cabinet

doublelayer Silver badge

Re: Sick companies self identify

Those are bad, but another style gives them a run for their most disorganized title, which is companies in which one person or group is responsible for each specific technical area, and no person or group is responsible for more than two of them. If a real technical problem exists, so much time is wasted by the group who got asked about it with the group that should be doing it and the group who knows necessary information to do it that nothing happens. Meanwhile, when one group tries to do something that may be somewhat connected to the things they should do, they run into situations known by a different team but not properly documented, or otherwise properly documented on one of these sheets of paper in the big filing cabinet, and break something. At least somewhat ironically, this structure is usually created under the idea that the systems people should be more organized into specific groups.

Google puts Chrome on a cookie diet (which just so happens to starve its rivals, cough, cough...)

doublelayer Silver badge

Re: Chromium next

They don't have to do that. They control the core, so they can keep adding things to it that are difficult to rip out of the code, and enforce their control that way. That means that some other browsers will, by using chromium, be forced to choose to stay with an old and insecure version, fork and reimplement all of that, or run Google code without protection.

doublelayer Silver badge

Re: doubleclick lives in my

That is true, but I have never seen a system elect to use 127.0.1.2 for an additional service, whatever that might be in this case, and almost every system only bothers to resolve 127.0.0.1 to the local machine unless specifically instructed otherwise. If the addresses were used for multiple internal interfaces, one would need 257 to reach 127.0.1.2. So I'm still not sure why that was suggested and I think I'll stick to 0.0.0.0 until I hear more.

doublelayer Silver badge

Re: doubleclick lives in my

Because 0.0.0.0 means unroutable, and the system won't try to do anything with it unless it has a bug. If I use 127.0.0.1, it will start trying to make connections to services on my machine. If I have a webserver running, that will add junk to my logs and return random 404s from that. Even if I don't have that, there will be some overhead as the browser/application initiates TCP connections that aren't going to work. Why bother? As for 127.0.1.2, I'm not sure why that was suggested. Yes, it's not localhost so it avoids the TCP overhead and local service problems, but it doesn't have any intrinsic benefits (as far as I know) over any other 127.* address, and is less likely to be checked than a proper unroutable 0.0.0.0.

Put a stop to these damn robocalls! Dozens of US state attorneys general fire rocket up FCC's ass

doublelayer Silver badge

Re: My 3 steps to avoiding robocalls.

No, what they should do is continue to allow a phone number to be sent as an identifier and a callback, but have that be a secondary one. Kind of like how an email can be sent from one account but have a reply to address for a different mailbox. Blocking would be done on the real number, which would always be sent. Caller ID would start with the real number, and if it wasn't found, continue on the stated number. That way:

If a company owns a block of numbers and sends the main one no matter who calls, the company name appears on caller ID, and the company can be blocked.

If I'm using a spoofing service to make a VOIP call from my number, it will show up as me, but clearly indicate that it's not my normal phone.

If someone else is making a call and spoofing my number, it will show up as me, but the number could still be blocked without blocking my real number, and it could also be tracked.

It is dangerous to allow impersonation of numbers without any detection.

doublelayer Silver badge

Re: Of course the FCC is doing nothing

I wonder if there are some numbers that robocallers avoid for some reason. Despite the fact that they've increased nearly everywhere and that a lot of my acquaintances complain that they receive them daily, I really don't. I've only received three types of unwanted calls on my phone, and two have ceased entirely. The first was people looking for the former owner of my phone number, but they all took "That guy doesn't have this number anymore" and left. The second was one specific robocaller with the same message and running a very primitive Eliza bot. One time when this called me, I had a discussion with a friend on how terrible the bot programming was, and forgot to hang up on it. I don't know if anyone listened to that, but they formerly called me about twice a week and they stopped after that occasion. So I probably get one robocall a month, usually the type telling me that I've won a prize. Somehow, the robocallers either decided not to call or don't know my number. I wonder if people making decisions are in that situation too. Having previously had a landline that received many more callers, that situation can be quite persuasive in the do-anything-to-shut-them-up category.

Google jumps the shark from search results to your camera: Nest Hub, Pixels, and more from ad giant's coder confab

doublelayer Silver badge

Re: I bought my Nest thermostat before Google bought them

I have used windows devices for years and never had malware on them. Because I installed a very small subset of applications and I trusted them all. I have the same track record with android, Mac OS, IOS, and Linux. That doesn't make all of these the same level of security. The question is not "Have I had malware that I know of?" but "Is it easy for malware to get onto the devices, whether owned by me or someone else?". On that, Windows and Android have a worse track record. Maybe because of market share. Maybe because of bad design choices. Maybe because of specific malware authors. But the data is there.

Airbnb host thrown in the clink after guest finds hidden camera inside Wi-Fi router

doublelayer Silver badge

Re: Isn't this "news" really an advert for the "security researcher" ?

Really? There are many security researchers, and they have to stay somewhere, especially if they're attending security conferences or going on holidays. If they do that enough, eventually one of them finds a camera. They're also more likely to look for one and have the skills to identify places where one could be. Why is it so unlikely in your mind?

doublelayer Silver badge

Re: Detecting hidden cameras?

One thing to do, and what I think was done in the Ireland case, is to run an NMap scan on the WiFi network and look at the list of devices. Those that are not obviously there could be dodgy. This is well and good, but it doesn't work against many things and is therefore limited. If the device is recording locally, it cannot be found by any network investigation. If the host is intelligent enough, a network-connected camera would be firewalled from any ability to scan for it, too. But at least the tool is there to catch a subset of available ways to install a camera. My guess is that the first time one finds a camera, one stops using that service for housing.

A real head-scratcher: Tech support called in because emails 'aren't showing timestamps'

doublelayer Silver badge

Re: Top-posting makes sense unless you're reading your emails weirdly

I think you've described it well. Top posting is great when you've read the older emails, because you see the only thing you need to read, and have the old material below if you need to refer to something. Bottom posting is great when you need to read all of the material, because the order makes sense.

I would still prefer that, instead of forwarding me a chain or at least in addition, the sender succinctly describes why I'm getting it and the information that is the most relevant. Often, when I'm forwarded a message chain of more than three messages, at least two of them will be developing a misunderstanding and then clarifying the real situation, which doesn't help me at all.

doublelayer Silver badge

Re: top-posting

I very much agree with you, but there can be problems with some types of contextual quoters as well. My favorite (in the sense of least favorite) are those who drop their comments into the original email train but don't bother to delete the unnecessary portions. In many cases, it would be more helpful for them to quote the relevant portion of the message in their reply, rather than making me search through someone else's email to find the things they wrote. The competition for the most annoying way to do this is currently tied between messages where I've already seen the older ones so I cannot possibly get any benefit from the old text in which their reply is placed, and ones that were not formerly connected to me and contain information I don't need to read, like this example:

---Original message---

From: Not the person whose name is on the message I'm reading

To: The person who forwarded this

CC: A bunch of people I don't care about

Subject: Normal subject

Dear [not me],

[Bunches of meaningless pleasantries that do not matter to me because they're not relevant to the situation.]

[Information about a situation that is not the one I'm supposed to deal with.]

> And, on another topic, the related [my project] project, [summary of my project which I already know], may be able to provide some useful functionality to our project if we can integrate things. Could you link them to us and see if they're interested in teaming up?

[Here's where the sender has placed information I need, like the summary of their project and ways for me to learn about it so I can actually decide this question]

[More information about something not related to me]

[...]

I would much prefer that they just tell me this in one unified message. They could get it across by saying "I'm on a project and we think your project has some useful components that could help us out. [Summary and link to their project]". If they really want, they can forward the original message along with this, but I will read those only if they've asked me to or it is clear that there is information in them I need, not in the hopes of finding more things they wanted to say to me.

A day in the life of London seen through spam and weak Wi-Fi

doublelayer Silver badge

How much of that do they have to do before you don't blame them? For example:

1. Them: I'd like to use WiFi. You: No. Their problem.

2. Them: You can run the software on your local machines, which would be a good test case. You: I'm not running unproven software on my machines. That's as bad as connecting your machine to our network. Still their problem?

3. Them: No problem, I have a cellular data connection. You: The building is a massive cell dead site. Have they got reasonable options left?

Yes, they should confirm this with you before they come, but they know you have a network, and they're there to demo something that needs it. They have some reason to expect that you will be able to see their demo. If they came without a machine and asked to borrow one of yours, that'd be very unreasonable. If they wanted you to give them access to an important network, that would also be unreasonable. If they just want an internet connection because the thing they're demoing needs one, it's kind of expected that you have the capacity to connect them and makes it pretty pointless to come do the demo if you won't agree to let them use a connection.

doublelayer Silver badge

Re: You've never tried a good Chinese hotpot then...

Well, I feel the need to tell you that the spleen can be removed safely if damaged without serious consequences, unlike many other organs. It's not like the appendix where it's removed whenever they've already opened the abdomen, but its purpose is not critical to life and can be served by other parts of the body if need be. So I'd suggest continuing to work at top capacity and never burst.

doublelayer Silver badge

I'm mostly on your side in that they should be better prepared, but offering a guest connection is common sense. Your external people might want to show you something that is online, or the online test of a system that runs over the network but not on their laptop. Would you similarly complain if they asked to plug their laptop in because the battery is dying? Yes, they should have charged it fully before they came but sometimes they forget, they're there long enough for the battery to run down, or their battery is old. It doesn't seem all that unreasonable for them to expect that you have the same general facilities as every other business and ask to use them when it would be useful.

doublelayer Silver badge

Re: Mobile data

That depends heavily on how good your mobile provider is and what details they have set for your bill. Unfortunately, while I can usually get access to signal in most places, my provider charges rather a lot for plans giving access to a lot of data, and another larger a lot for any data I consume over my low cap. I think this applies to providers in many places, unfortunately. The other issue is that, depending on where you are, you may enter an area where coverage is not good enough for standard internet tasks. It may be fine for SMS and voice calls, and it might even let you see your email, but have fun trying to look something up online.

Personality quiz for all you IT bods: Are you a chameleon or an outlaw? A diplomat or a high flier? Vote right here

doublelayer Silver badge

Re: Generations

I also think it depends a lot on the definition of "a new challenge". This sort of applies to me. Once I've reached a certain level of income, having even more, while useful, is not that important to me. If I am offered more for a job I will find deadly boring, I'll likely turn it down. However, that's not because I really want a bunch of new challenges thrown at me. I want to keep doing interesting things, with new challenges as applicable. I don't want this description to mark me as the person to whom all challenges should be brought just because I'll pay for lack of boredom. Maybe if they wrote these descriptions with actual words that have meanings, it might be more helpful*.

*Actually, it would still be junk. Carry on, then.

It's May 2. Know what that means? Yep, it's the PR orgy that is World Password Day... again

doublelayer Silver badge

Re: Use biometric authentication on mobile phone apps ?

There's a lot of discussion of when biometrics can be used, with the "use biometrics everywhere" crowd and the "biometrics is only ever a username" crowd. The truth lies somewhere in the middle. You have to decide where the threat landscape is. If you're afraid that someone will be physically present, such as when police/a criminal have you and your mobile phone, biometrics are risky. If you will be targeted by an advanced group, then biometrics are too easy to forge and should not be used except as an additional security measure. When it's authentication over a network that you're worried about, biometrics offers the ability to ensure that people are present at a scanner you know before they can get in. If you are not worried that someone will break in but you don't want to have the thing open to access from anyone (E.G., a phone that doesn't contain anything sensitive), then biometrics can be a time-saving measure. It all depends on who might break in and how they'd do it.

doublelayer Silver badge

Re: WTF does it matter?

"6. Don't user GMail or Hotmaill addresses. They look unprofessional, and Google and Microsoft are allegedly notorious for blocking the wrong domains and snooping on your content. You have an ISP. They often supply more than one email address, so use everything they can let you have for free."

No. A hundred times no. GMail and hotmail aren't great, but they have relatively good intrinsic security, stay up most of the time, and you can avoid at least some of their tracking. An ISP email is run on a system with completely untested security except sometimes when the security has been tested and it failed the test. Also, if you move or decide you don't like that ISP, your mailbox can be deleted or placed in a limbo state. Using an ISP-provided email is a security and usability disaster. Don't do that. If you really want security, set up your own email system, usually by getting a domain. If you don't want to run your own mailserver (and you would have many good reasons not to want to), you can use one of a number of domain registrars who will supply email accounts, usually at least one is included with your domain purchase. You can keep that account no matter where you are as long as your domain is still owned by you. If you must have a free account, use a service kept up by a company that does not have the ability to kill that account for other activity you do. Protonmail is a good one for this, but GMail is not that bad when compared to other options.

doublelayer Silver badge

Re: Honeytrap?

If you want to try this, make sure it can't send any email but instead just logs the message and copies it to the sent mailbox. As for things to populate, you could always create some dummy addresses that send messages from public sources. I don't know if people would run attachments, but you could always try.

doublelayer Silver badge

A few problems

I'm as irritated by bad passwords as the next security person, but let's revisit a few parts of this article:

"An employee is likely using the same password for your internal systems as they are for Instagram."

How am I supposed to know that? Yes, they'd be prevented from using "password", but when they've decided in their life that "F9zna/zv00w" passes all the tests for passwords and they'll just use that for everything, the only way I'd know is if I tried to log in with that and any usernames or addresses I can guess. That's not all that nice. Of course, they can be told not to reuse passwords, but that won't necessarily stop them.

"According to OneLogin, 63 per cent of network administrators don’t require special characters or minimum length passwords. Numbers? 71 per cent don't require it. Upper and lowercase? 72 per cent."

That's a good po... Interesting fig... Well, you just quo...

Sorry, I can't pretend. I have no idea what these numbers mean. You tell me that 63% of admins don't require certain rules, which already sounds kind of weird, but then your next sentence says that 71% don't require it. Is "it" the same thing as covered in the last sentence? Why are the percentages eight percentage points different? Is this from a different source? Who? And the 72% don't require multiple cases? Meaning that either 29% or 37% require special characters but only 28% require multiple cases? And earlier, you told me that 75% of admins "don’t check employee passwords against password complexity algorithms." This implies that they don't check at all, but, in that case, a maximum of 25%, not 28%, 29%, or 37%, could require special characters or multiple cases. So I must be making some really stupid mistake, right? Please tell me what it is.

"And an amazing 63 per cent have not put password rotation policies in place. What are you doing people?"

Holding back my astonishment that, by these and previous numbers, at least 12% of admins rotate passwords but don't check them against any complexity algorithms at all, we don't rotate passwords all that frequently because it means users will respond by decreasing the security of their passwords so frequent rememorization is easier. Yes, we have complexity rules here. But once you've met those limits, you can have a more secure or less secure password. If we make them choose a new one every month, the number of users using a very strong password approaches zero. This isn't new. This has been the recommendation of many security advisors for the past few years. It has been reported here. That's what we're doing.

For the record, my complexity recommendation is designed to maximize entropy. If you go for a short password (minimum length 10 characters or 12 if I'm nervous, the system's important, or the users are willing to be reasonable), you have to use all four types of characters. If you make the password longer, the requirement for different characters is removed as the length increases. And passwords are checked against password lists.

doublelayer Silver badge

That's the right way to do it, and I'm sure el reg has done that. However, if they wanted to know how many users used password, they could find out. They have the hashes and the salts. They could go through the list, put the salt on "password", and see if it matches the hash. This wouldn't tell them what your or my password is, but if anyone used "password", they could see. So the question is answerable though nobody would bother to answer it.

doublelayer Silver badge

Re: Can a grownup, please...?

Good points in theory, but you have to consider the whole set of possible passwords as well as a single user's set. If the length limit is set at 8, then the rainbow table generator can throw together a list of hashes of 8 and 9-character passwords. If the password length is longer but constructed of larger components, a person needs a good list of all of those components. If they're all single words found in a dictionary, that might be doable, but if a user makes any type of adjustment, as simple as switching an o with a 0 or putting an & before the last word, the generation of hashes from all the words in a dictionary won't uncover it. Similarly, if a word is included that isn't in a convenient list, E.G. one the user uses as an inside reference, a term from fiction, a word from another language, etc., it becomes nearly impossible.

I agree with you that the XKCD article isn't entirely correct, but I mainly think that the entropy of a shorter password is underestimated, making the four random words from a set of 2048 options thing look better than it really is. Still, I think that urging length is very helpful, because a password with lots of words and things that the user recognizes but others probably wouldn't makes a password much more secure.

Apple hits back at devs of axed kiddie screen-time apps

doublelayer Silver badge

Re: Do Apple

I'm not a downvoter, but I'll do a bit of education. MDM is an Apple feature. They built it. They almost by definition can't abuse it, because they set the rules for how it's used. Also, they don't use it. They built it for corporates, who do use it for internal devices. Apple doesn't make any apps that use MDM, and their OS doesn't need to because it already has such access. It's like saying "Does Google internally use their search engine to abuse users?", I.E. it's a crazy question that doesn't make any sense.

The other reason that you might be collecting downvotes is the typical charge that Apple is busy collecting user data. They don't collect that much data. They make a point of showing this to everyone, possibly because they like bragging. You can fault them for the bragging, but it is a bit annoying hearing people decry Apple for data harvesting when A) they don't do it all that much as large tech companies are concerned, B) you can turn a lot of their data collection stuff off and it stays off and you can prove it, and C) many of the alternatives are a lot worse on all these points. I don't know if that's what you're saying, or what people are thinking you are saying, but your post sounds a little like it might be.

Some guesses there, but this might be what's going on.

Microsoft: Yo dawg, we heard you liked Windows password expiry policies. So we expired your expiry policy

doublelayer Silver badge

Re: 20 years...

Thanks for the broad insult to everyone here. Let me enlighten you on a bit of user behavior.

Here's how passwords usually go when the security policy you mention is instated. Minimum 10 characters, at least one number, both cases, and a symbol. Password changes every month and the algorithm checks against old passwords so you can't duplicate and thoroughly checks against the last one so you can't just change it slightly.

New employee: Uses password anC9@mlzcQ)AX;1mbz

One month in: Changes password to fjZv83na.1/f8a

Two months in: Changes to E8zvhan3oz&

Three months in: Changes to Fnoazlh92*

Four months in: Changes to Thisisthe12thsystemI'vehadtochangethison!

Five months in: Changes to: Gottiredtyping2$

Six months in: Changes to Authenticate0^

Changing passwords can be useful, but forcing people to change them so frequently means that many will degrade the entropy of their password because why bother memorizing a long string of random characters when the information will be useless in a month? It will become obsolete faster for an attacker, but the attacker can gain access to systems and install back doors that do not need a password, so expiring credentials doesn't always help. Meanwhile, users use less random passwords that can be broken more easily, meaning you have a higher likelihood of getting an attacker. Also, the users are less happy.

doublelayer Silver badge

Re: NIST

You can usually find a big book that nobody cares about in any workplace. A place I worked at a few years ago had a multi-volume set of instructions on administering Windows Server 2000, and as this was a software engineering area with few admins, nobody really knew why they were there. I have a feeling a convenient book code can be found when needed.

doublelayer Silver badge

Re: Yeah, right.

Microsoft's mobile offering is assuredly dead, but Blackberry is too. Just because someone's making android phones and calling them Blackberry doesn't mean the system survives. The QNX-based OS is dead, the Blackberry company isn't making those devices fully, and they're just a different hardware type running android.

Internet industry freaks out over proposed unlimited price hikes on .org domain names

doublelayer Silver badge

Re: Domain names are all pointless

"Ok sure maybe there are some security implications to my new system"

We need to talk about this. After this, I hope you have some extra time because I've got to learn the art of the understatement from you. But first, let's discuss the actual security implications of this. There are a lot of them. Whenever data is hidden from users, it becomes easy to make that data they never get to see contain the important part. It's hard to identify domains that are owned by the actual company apart from those registered by scammers with a bit of forethought. How will that change when domains are random sets of characters? Do I need to answer that?

Also, how useful will it be when I suggest you try out a new system by having to say "Well, I suppose if you do a search on [the site name] or you could always go to fa8enozvl3mz90vnae.airforce". Maybe a little harder for you to remember, no? And easier for you to get wrong, yes? And much easier for a scammer to register a bunch of things and SEO them into your search so you will get it wrong and won't be able to find out until it's much later than it should be, yes?

And even without the many security problems, and we've only scratched the tip of the iceberg on that, this system would require another layer of resolution services. Another set of servers. Another DNS query and some extra delay on actually connecting. An extra series of organizations running the thing with entirely unproven trustworthiness. Another layer of power that could make mistakes. Another layer that a user needs to administrate or stick with the OS default.

This idea is very bad. I know it doesn't compare to your understatement, but I'm working on it.

Microsoft's Edge on Apple's macOS? It's more likely than you think for new browser

doublelayer Silver badge

Re: Don't want it

People can't design edge-only sites without having a lot of problems. They could do that with IE because IE had its own rendering engine that could be changed to produce different functionality than other browsers and the spec. Microsoft just took someone else's rendering engine. It can't really do that anymore. A site that works on edge will also work on any chromium browser, and because firefox/gecko supports most of the frameworks chromium does, it'll work well in that too. Of course, a bad designer can break this, but it's a lot easier to do a chrome-only site than it is to do an edge-only one.

FYI: Yeah, the cops can force your finger onto a suspect's iPhone to see if it unlocks, says judge

doublelayer Silver badge

Re: Doesn't compute

I'm not downvoting, but I think this is not correct. Metadata describes some other piece of data, meaning that if you have a piece of data, any data that describes it would instead be metadata. If my data is a file, then the file size would count as metadata. If all my data is is the expression of a file's size, then its unit would be metadata. I think the definition of metadata specifically depends on the data involved.

On the point of surveillance, I don't think the argument should be "The stuff being collected isn't metadata; it's data", but instead "The stuff being collected is sensitive metadata about calls that should not be collected".

doublelayer Silver badge

Re: You can pry my password from my cold, dead lips.

You use some type of data storage, right? This generally applies to any form. They can take it, and if they need biometrics to access it, they can now take those, too. The warrant in this case allowed them to access phones, but a different warrant could allow accessing computers, drives, or other devices.

Facebook: Not saying we've done anything wrong but... we're just putting $3bn profit aside for an FTC privacy fine

doublelayer Silver badge

A good sign and a cynic

I'm glad to hear that there may actually be a penalty for their actions. It's been a long time in coming, and I think we can see that it is well-deserved. I'm afraid, however, that as much as they set aside, they don't actually intend to start paying fines any time soon. While this amount would be a large chunk for them, they can continue to operate just fine as it sits in a bank, including using their legal strength to try to get out of paying it or fixing any of their privacy disasters. Here's hoping the fine is charged and paid quickly.

Rising sea levels? How about the rising risk of someone using a nuke?

doublelayer Silver badge

Re: Giving up nuclear weapons? Not likely

You are probably correct, but there are other examples. South Africa gave up their relatively small nuclear program and had all their weapons and manufacturing facilities dismantled with international oversight, and some countries have chosen to reduce their stockpiles, although not to zero. Not that this proves anything, but the history is interesting.

The peelable, foldable phone has become the great white whale of tech

doublelayer Silver badge

Re: Fixing a problem that doesn't exist

It's certainly pointless for me, but some people want it. They want a device that they can carry in a pocket but has the screen size of a tablet. They have reasons, and though I don't share them or even understand what the reasons are, they exist for some people to want the device. If they want it and a company can build it, it seems useless to complain about its existence. Just join with me and don't buy it. Of course, this all hinges (pun originally not intended) on the companies' ability to actually make the thing so it has some semblance of a lifetime.

doublelayer Silver badge

Re: Not surprising in the least

It will have less protection from stuff on the outside of the device, so it might get scratched, but it has an easier folding characteristic because the screen part doesn't need to fold completely flat but can instead curve. This means that it's less likely to simply crack in half, develop a crease, or interfere with the hinge opening properly. If they build the hinge properly such that the screen stays connected to it, it could also better withstand particulates getting into the screen from the hinge area. Of course, there are a number of ways to get this horribly wrong, and I would not be surprised to hear that they've found one of those. Still, outward-facing screen doesn't have to be a problem.

doublelayer Silver badge

Re: Industry shudders: Do we have a big problem?

"At this stage of the game I want to be able to buy a really good phone for < £100"

The major problem facing the industry is that you can. Actually, prices might be slightly higher than that, but a phone that sells for £150 can have comparable specs to the flagships. Of course, you're going to play a guessing game about how long security updates will come, but you get that on the higher-priced ones too. There is very little difference between phones made by different companies at different times. They're just flat slabs of glass that look the same and run most of the same code.

I think one important element is that the computing-relevant specs of a phone are pretty unimportant. Of course, you can find a phone that is too slow to handle its tasks, but four cores vs eight cores or 4GB vs 6GB of RAM doesn't matter to most applications. Neither do the advances in cameras--while some people do actual serious photography with their phones and justifiably want the best camera for their needs, a lot of other people either don't use it at all or simply want the ability to quickly capture an image, so all they need in a camera is to end up with a recognizable image at the end. When smartphones were new, you could usually tell when you bought a new one that it had a lot more processing power than the old one. That is no longer the case.

Meanwhile, companies think that any change they make justifies a massive price increase. The mainstream manufacturers think that their new even more high-res screen should be worth a bundle. Palm think making a very small android phone that some people, myself included, would actually want justifies a 200% profit margin, which makes me lose interest immediately. Companies who used to make the cheap and introductory android devices think they can get a lot more money by making the software a bit nicer and multiplying the price by ten. I don't know why they think this, but I don't think it will end well for them.

Behold, the insides of Samsung's Galaxy Fold: The phone that tears down all on its own

doublelayer Silver badge

Re: Two screens with an infinitesimally-precise and tiny mating junction

That has some advantages, but runs into the problem that the gap has to be really small to not be noticed when held close to the user's face. When this happens at greater distances, it's more doable, but for a phone, you'd hear a lot of complaining about the phone with a line down its screen. I think that pretty much any way you build this, it's going to have some major problems at first. Admittedly, they might have done a little more to avoid the problems they have.

Accenture sued over website redesign so bad it Hertz: Car hire biz demands $32m+ for 'defective' cyber-revamp

doublelayer Silver badge

Re: Any blame on Hertz for not actually being in charge?

To be fair, the typical definition of IT would include a lot of things related to the website, such as where it is being run, where the database is, and what the spec would be, but the writing of the code that runs the site would probably not be a specifically IT thing. It mostly depends whether programmers and administrators are both lumped into IT or not. In most places I have seen, these groups are in different departments and simply connect. On that basis, it's not the IT department's fault if the programmers, in this case outsourced, fail to write the code properly.

Fed up with 72-hour, six-day working weeks, IT workers emit cries for help via GitHub repo

doublelayer Silver badge

Re: Who is Complaining?

If you read the article, it's kind of a lot of people in China who are being forced into this and a bunch of other people who did argue about this and are having their comments blocked or erased. They're getting a bit of support from some engineers at github, but not very much. The information was all there.

I am happy to work longer shifts than is the norm, and perhaps six-day weeks. I won't mind doing it, as long as:

1. It lasts for a short amount of time before things go back to normal (two weeks would be acceptable, a month under exceptional conditions, see point 4)

2. There is some direct benefit to me, I.E. being paid extra, additional vacation time, or receiving some other benefit, not the chance that this will be looked well upon and someone will demonstrate their gratitude later

3. There is some planning so I know when this is going to happen. Not that it has to be scheduled a year in advance, but don't come to me on Monday and just announce it

4. There is a real purpose. If something needs fixing or building quickly, that's fine. If two projects need to proceed and I really have to work on both of them, that's fine. If I'm doing my normal job but they want me to work extra hours for no good reason, that's not fine.

Google rolls out Android Easter Egg for Europe – a Microsoft antitrust-style browser, search engine choice box

doublelayer Silver badge

Re: And why...

I'm not supporting Apple's decision to do this, but it is not the same as what Google is doing and is not as clear-cut a competition issue. Consider this:

Apple doesn't let anyone else build things running IOS. Google does let other people make android devices. Google does not allow the manufacturers to change defaults if they are running the Google build of Android (they can change the UI, but could not make another search engine the default or decide not to include Google's apps). Manufacturers also can't make some devices with AOSP or other non-Google Android builds if they also want to have some devices with Google apps. So Apple restricts only the customers of their own products, whereas Google restricts the many phone manufacturers that have at least some Android products. If Apple had a massive market share, this would be a factor, but they do not have enough to be considered a risk to customers or competitors, while Android does. That's the major difference between the cases as the law is concerned.

You may say that Apple is still worse, as the consumer has less choice. However, that is a bit simplistic. Apple doesn't let the people who buy those devices make some decisions, while Google tries to eliminate the choice for all users of Android regardless of manufacturer. For example, the reason we can't get Lineage OS shipped on a device is because Google has prevented it. Decide on your own whether this difference is relevant to you, but at least you know why Google is being targeted and Apple is not, for now.

doublelayer Silver badge

I'm a big fan of LineageOS, but it cannot be recommended to very many people because it's not supported on many devices. Yes, it's more than most other alternative mobile OS images, but it's not that long a list. Frequently, the people who ask me for ideas already have hardware they want to use, and it's rarely already on the list.

Even if it is already supported, the process is not easy enough for a nontechnical user. If a nontechnical user wants to try desktop Linux, they can get a disk from someone and boot it (usually happens automatically if it's an optical disk). From there, they just follow the instructions like they would on any other computer. To install Lineage, they will need to know how to root a phone, what a bootloader is, how to install and use ADB on the command line, and possibly other issues depending on the specific device. That is enough complexity to put a large part of the public off. I'm willing to install it for some, but I can't do so for everyone.

Take your pick: 0/1/* ... but beware – your click could tank an entire edition of a century-old newspaper

doublelayer Silver badge

Re: The most dreaded word in IT...

"I have to give honorable mentions to "Uh-oh", "Ooh-kay", and the less brief but still terrifying "Hey [insert your name or nickname here], what do you do when it says..."

doublelayer Silver badge

Re: "But I never experimented on a live system again"

Is it that suspect? The output from the formatter was very unclear, simply asking for a drive number. It did not explain its purpose. If that was normal, it is entirely possible that the expected utility wasn't clear either. Maybe it would have asked for a drive on multi-drive systems before going to the interface with which Adrian was familiar, which he had not seen because previous systems either had one drive or had a utility that figured it out. It seems like a bad process for displaying information to the user, but given that, I can understand getting it wrong.

Whose cloud is it anyway? Apple sinks $30m a month into rival Amazon's AWS – report

doublelayer Silver badge

Re: Hmm...

With last year's revenue coming to $265.6 billion, it comes to about 01:09:16 of the revenue each month. Then again, this shows more about Apple's scale than it does for the cost of AWS or other cloud services. For the real numbers, we should track down statistics on how much they pay for Google Cloud and how much they paid up front and pay on an ongoing basis for their many datacenters, as they do have quite a bit running in house.

Now here's a Galaxy far, far away: Samsung stalls Fold rollout after fold-able screens break in hands of reviewers

doublelayer Silver badge

Re: Need better testing

They may tell you everything, but many of them don't really understand the thing you gave them. So as long as you choose ones with a less technical mindset, all they'll be able to say to someone after they've broken the device is "So it's like a phone, but not, but big and like two phones but only one sometimes but also two, and breaky and you can move it around and watch the lights". I think that, if you know enough to identify the children being used, you might know that much already about the product.

Double trouble for Lyft after share price drop sparks class action lawsuits claiming hype

doublelayer Silver badge

Re: Has someone external run the numbers

That is true about calculating exact market share, but it also means that each company can't really know the right numbers either. Each company may have a great deal of data about their own numbers, but they don't know the specifics for the opposition. That's why there are places that do third-party estimation of this type of thing for investors. I haven't seen if any of those have investigated this, but I would not be surprised to hear that they've been asked. If there is a report about this either already or shortly to be released, its contents will dramatically affect the prospects for this case.

doublelayer Silver badge

Has someone external run the numbers

Is there some place where an analyst has figured out what the real market share is? Just as Lyft could be making up the data in order to sell more stock, Uber could be making some up to tank Lyft's stock price too. Uber have a history of being somewhat less than ethical, and Lyft have a better but not exemplary record, so some verifiable data from an unbiased source might be helpful here.

Who's using Mueller Report Day to bury bad news? If you guessed Facebook, you're right: Millions more passwords stored in plaintext

doublelayer Silver badge

Ah, but you see, they were sneaky with their adverbs. You would think that they meant them in the sense of internally abused or internally improperly accessed, but they meant internally accessed but only in a proper way (you probably don't want to know what Facebook considers proper ways to access data) and not abused internally. Should they want some abuse done with the data, they can get an external entity to do it. Adverbs are tricky.

Idiot admits destroying scores of college PCs using USB Killer gizmo, filming himself doing it

doublelayer Silver badge

Re: Don't Blame the Victim, But

"While they're at it, they might also do something about the more subtle attacks from USB sticks that allow malware infections."

And that would be? IF the USB does something at the hardware level like trying to fry the board, there are hardware solutions to that problem (although they aren't perfect and don't result in "completely impregnable"). If it does something at the software level, the OS has to respond to any threats. The problem is that the software-based USB threats aren't by their nature detectable as unusual. They represent themselves as various types of USB device, including input, storage, and network. But you can't eliminate any of those capabilities because people use legitimate versions of all of the above. You also can't prevent multiple devices from being connected to one port (which wouldn't even work to protect against most exploits but has been suggested before) because people use USB hubs and some devices have good reasons for showing themselves as multiple classes of device.

Facebook: Yeah, we hoovered up 1.5 million email address books without permission. But it was an accident!

doublelayer Silver badge

Re: It's time...

It should apply, but the GDPR enforcement people don't seem to actually be doing anything. One fine against Google for not all that much, and a few minor actions against minor companies. Haven't they had long enough to start investigating these places? How long do they need to do this?

Surprising absolutely no one at all, Samsung's folding-screen phones knackered within days

doublelayer Silver badge

Re: Extremely poor

That's ridiculous. Not only do Apple design a lot of the components, but they write all the software that runs on top of those. You can like, dislike, or feel a burning repulsion towards IOS, but if you're going to argue about which phone manufacturers copy a lot of stuff, you might not want to look at the android manufacturers that get all the chips from Qualcomm and all the OS from Google. They just design a case to put them in and write a launcher and a few apps nobody uses. I don't think it's fair to say they just copied someone else's work either; they chose the components they wanted and built a device out of them. It's how electronics work--this isn't art here, where using someone else's work shows that you lack imagination.