* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Excuse me, sir. You can't store your things there. Those 7 gigabytes are reserved for Windows 10

doublelayer Silver badge

Re: 32GB HP Monstruosities @Dave

The atom is indeed quite a nice processor, just as the quad or octacore ARM chips are. That is to say, when those chips are running something that can run in parallel, they can perform miracles of performance. When they run things on only one core, the performance is fine, but not particularly notable.

However, atoms tend to be paired with two things that put major restrictions on their utility. Number one is the tiny amount of RAM typically put on the SOC. Most atoms that actually get used have 2GB, and some have 1GB (and people have built tablets with the 1GB RAM SOCs in them; those people are evil). When you take a processor that is somewhat slow and also make it page to use modern GUI applications running on a GUI OS, it can be painfully slow to respond. The second thing is windows. Windows will run fine on more capable hardware, but it is not lightweight enough for the atom. If that is the only thing that runs, it will probably work fine, but users of windows intend to run multiple applications because this looks like their laptop or desktop. When they see how slow the thing is, they try to use web applications instead on the theory that the heavy lifting can happen in the cloud. This, of course, means that they're now trying to run chrome on an atom processor and the 1GB of memory left after windows used some, and that's a recipe for disaster. Lighter browsers will run, but not with many tabs or script-heavy sites.

Running Linux on one of these is better in some cases, but a GUI Linux is still going to use up a bit of memory. These things usually only have a bit of memory, so that can still be very limiting. In general, a Linux user is probably more likely to know that the thing can only run two programs at once and stick to that, meaning that a Linux user will probably be more satisfied with it than would a windows user, but the windows user could similarly run only two (or one depending on size) program and use the thing. For most use cases, neither option is particularly useful.

She will lock you out, livin' la Vidar loca: Enterprising crims breed ransomware, file thief into hybrid nasty

doublelayer Silver badge

Information

"The idea is that the victim will be so concerned with cleaning up the Gandcrab malware infection that they won't notice the malware was also lifting their passwords, payment card numbers, and unique system configuration information."

Passwords and card numbers I get. I can also see taking a bunch of user files in the hope that some of them will prove lucrative to you. But what kind of system config information do they take, and why? It can't be to break in, because they already got access. It couldn't be to break in again, because if the user properly cleans up from the infection, most config information will be changed by the full wipe and reinstall. If they don't properly recover, the infection will remain. However, I don't know what intrinsic benefit might exist in configuration data that would make that worth stealing.

You were told to clean up our systems, not delete 8,000 crucial files

doublelayer Silver badge

Re: xfer

When I create temporary files, I put dates in the file names that are my estimation for the latest date where I'll need this. My rule to myself which I've been pretty good at following is that if I find one of these, and I don't know what it is, and the date in the name is more than a week ago, that file gets deleted without my putting any effort into figuring out what it is. So far, that has never been a problem.

You can blame laziness as much as greed for Apple's New Year shock

doublelayer Silver badge

Re: Never mind China

The utility of icloud's approach for the non-technical user is the ease with which the thing sets up and works. It does the "sane and useful defaults" thing. For readers here, the sane defaults thing is usually not what we want because we want settings set to exactly our preferences. A person without that skill or who cares less about that may appreciate that apple has built it so it will work from the get go.

Recently, a family member wanted to view some pictures that they had taken on their phone, so they called me up to ask how to get them on their computer. They were happy with the answer that, because this was an apple computer and icloud was enabled, that they were already there and they just had to launch the photo application to view them. For me, this is actually a downside because I don't need my photos auto-uploaded. For them, it let them do something that would have been more difficult. That is one benefit of apple's approach. It's not for everyone, but it provides real benefits for some.

Stormy times ahead for IBM-owned Weather Channel app: LA sues over location data slurp

doublelayer Silver badge

Re: "To the contrary, the app misleadingly suggests . . ."

And the lawyer in question did it right this time, by stating things truthfully. The app did not lie, I.E. it did not say "We don't send your location data to the highest bidder, the second highest bidder, and on down the list." Instead, it said something along the lines of "Your location is required to retrieve weather information from your area". That falls under lying by omission, perhaps, but it is more correct to say what that was, which was an attempt to mislead without outright lying. I don't know whether the privacy statement had lies or just buried the truth in a bunch of hereunders. However, the last thing we need is for a word that doesn't imply in the strict dictionary definition to be the cause of a failed case to protect users' rights.

Grab a bucket and spade: Sandbox open for Insiders again with fresh Windows 10 build

doublelayer Silver badge

Maybe fix the account craziness

I recently had to help a person who set up a win10 laptop to sign in with a microsoft account, but then entered the wrong email address. The system let that work, for some reason, but kept asking for an email verification which couldn't happen because that address was not one the user had. Meanwhile, the system for switching the email address would not accept the real one because, according to whatever backend was put on it, that address was not available. I presume by this they meant that someone had already set up a microsoft account with it. The fact that that someone and this someone were the same person did not seem to matter. In the end, we ended up having to create the email account with the typo in it just to get the computer to shut up. So maybe someone could look into making that sign in method functional rather than trying to build what seems like the fifth sign in system for win10.

Apple blew my mind – literally, says woman: MagSafe plug sparked face-torching blaze, lawsuit claims

doublelayer Silver badge

Re: Weird, it's otherwise never the *connector*

I concur on the many faults of the cable. I especially agree about those tabs to wrap the cable; that was clearly a bad idea. However, I like the magsafe connection because I heavily use my laptops, meaning that their batteries are going to reach that point where they do not last all day anymore. At that point, I'll need to plug them in in a place with people walking about. When they aren't looking where they're going and knock my cable, I'd rather have it fall out than stay stable. If it stays in place, either my laptop is to be thrown to the floor, which is not very nice, or the person will fall over the cable on their face, which is worse. For this reason, the magnetic connectors are useful to me. I've only seen them used on macs and Microsoft surfaces, though.

Crystal ball gazers declare that Windows 10 has finally overtaken Windows 7

doublelayer Silver badge

Re: Android

Hence why I used the word "could". In order to get that capacity, you still need the relevant access using those tools. My example here would be routers running openWRT. On those, you don't get all the same Linux compatibility that you might want, but you do get root functionality, ability to run virtually any code that you can compile and run in the resource limits and with the tools installed, and theoretically the ability to construct the tools you are missing, which some people choose to do with openWRT. On a rooted android device, you may have obtained root capabilities but you still can't get around the major changes android has made to the unix-like user tools. One major example of this is that android uses user accounts very differently to virtually every other Linux system out there, which is virtually guaranteed to get in the way with many complex tools.

On the other side of this coin, if I created a machine that used the full Debian distribution, with the Linux kernel, GNU tools, and all the other functionality that clearly makes a Linux system, and then sealed it in a virtualization system so you couldn't use any of it, I have changed how it works. All the Debian code is there, but it doesn't give the user the functionality of Debian. It only gave the creator of the system those capabilities. For the user, it is what the thing can do, rather than what code went into it, that makes the system what it is. When "Linux system" has come to mean a certain level of usability, compatibility, and modifiability, it is a disservice to use that term when those aspects are not present, even if the words are literally true. For me, my microwave is not a Linux system; it is a microwave. Until I am allowed to rewrite its code or at least log in, the Linux kernel it runs does nothing for me, and the thing is called what the thing does, which is a microwave.

doublelayer Silver badge

Re: Android

I accept that, but only somewhat. Linux is more than the kernel. The name may have applied only to the kernel at some point, but it has grown to be a term used to refer to a type of system using that kernel and certain types of tools above that. Android has some GNU code in there too, but it isn't GNU/Linux in the conventional sense, nor is it Linux in the conventional sense. Similarly, BSD may refer to a kernel, a license, a set of kernels that use the same paradigm, and an operating system distribution built on one or more. When comparing it to an operating system, I, at least, will assume the "operating system distribution" definition to be in use.

Specifically with GNU, having a system that would be accepted as Linux by many does not necessarily require the GNU implementations of the tools. For example, an embedded Linux using the busybox versions of the basic tools and without other GNU components could still fall into my definition of a Linux-style system if it allowed access and user control. Meanwhile, a system that puts all the code of a standard Linux system with GNU tools in, but then blocked its ability to be used in the standard manner (for example blocking login ability and the ability to install new code) would no longer count for me as a Linux *system*, instead being a thing using the Linux kernel.

doublelayer Silver badge

Re: Android

Android uses the Linux kernel. So do a bunch of embedded devices and some systems for internal virtualization components. None of those mean that Linux runs the world, for the major reason that an actual Linux system consists of more than a kernel. It's a great kernel, but with a completely closed layer above, the benefits to users just aren't there. Android uses the kernel but prevents real use as a Linux-capable machine by denying root access and being structured such that gaining root access through odd means doesn't allow compatibility with most Linux functionality. I can run some things, sure, but things that expect the standard environment of users or anything complex will run into roadblocks set up by the android developers in an effort to keep android unified and not easily changed by the end user.

If I want to run software that will run on Linux, I need a desktop install, a server running it, or a designed-for-linux embedded device like a raspberry pi or an openWRT-compatible router (some limitations remain). It will not run on my android phone any more than it will on my Linux-powered microwave. In that sense, Linux on the desktop, where there is effort put into letting users control everything, keeping things globally functional, and creating a nonproprietary system, is very far from running the world. It has dominance in servers, but not much else. Claiming victory because android borrowed some code is missing the point.

It's a lot of work, being popular: Apple, Tim Cook and the gilets jaunes

doublelayer Silver badge

Re: India is a race to the bottom

When you have so many buyers, you don't need a lot of margin for that to be a big thing. When you have such a large market with customers who will show their devices to others, you have a chance to become a brand that is popular across that market. This is how certain areas get a surprising distribution of a specific brand, and the phone manufacturers would not mind at all being that brand across India or some areas therein.

Do not adjust your set: Hats off to Apple, you struggle to shift iPhones 'cos you're oddly ethical

doublelayer Silver badge

Re: it's not just about you

"Why did you arbitrarily exclude rooting and installing a 7.1.2 custom ROM? You are of El Reg's readership."

I'll include another reason. I can't install these things unless I've already gotten one of the android-makers' flagships. For these custom ROMs, the list of supported devices is rather short. All the expensive devices are there, but the nice thing that android has that apple doesn't is the availability of devices that have internals commensurate with their price. None of these get the ROMs created for them, and I do not intend to try to compile it myself. So my android devices rarely support anything other than the thing they came with. The devices that do get this are the flagships that are overpriced and underpowered. So my choices are too expensive but well supported (apple), too expensive with some rooting required and later no support because they'll use rooting as an excuse to say no (flagships), or sensibly priced but no software or support.

Another relevant problem is that these ROMs don't always offer all their functionality. They are buggy and require more user maintenance. I am capable of doing that, but I'd rather not do it for my friends and family or the devices I manage for my employer because a lot of stuff can break. This isn't like Linux on the desktop, where when something breaks it is easy to figure out what it is and slap in a fix, because things on custom android versions change a lot and a lot of things that break frequently are device-specific.

Is Google purposefully breaking Microsoft, Apple browsers on its websites? Some insiders are confident it is

doublelayer Silver badge

Re: support Mozilla

I would not be surprised to hear that google has deliberately broken various things. Recently, I noticed a difference between recaptcha (made by Google) systems on different sites. I use one site that makes me use it a lot, and the system always works then. Then, I wanted to set up a protonmail account, which also requires a captcha to prevent spammers from using it. Imagine this: the recaptcha system suddenly got confused. My computer or network was sending out automated queries or something. I should please try again after several minutes (it took four hours for this message to go away). And the next time, where keyboard input on the box didn't work because javascript error or something that was definitely just a one-time thing and not anyone's fault at all, and the next time, when my computer or network was back to sending automated queries. Back to another site, and it works well again. Either protonmail just happens to write very terrible code that also manages to infect Google's backend, or Google's captcha system would rather not support an alternative to gmail.

Ofcom asks networks, ISPs: Hey, wouldn't it be nice if you let customers know the best deal once their contract's up?

doublelayer Silver badge

Re: What is this out of contract thingie?

I'd like to do that. Unfortunately, I have been and can give you the results. I have no results. I'm not looking at U.K. contracts, but I assume they're much the same.

For each provider I check, they have several different plans, all of which seem very similar. I'm a very simple customer; I already have my hardware and I don't need very much data. Each plan has the following variables:

Minutes/texts provided

Data cap

Data speed

Data at high speed cap

Roaming costs

Price difference for different number of lines

Very few of this matters to me. Ideally, I'd like a plan where I have a specific price for each type a thing and just live with it, although I'm fine with caps. Whenever a plan as simple as this exists, prices are much higher than all the other plans where details are less clear. Or sometimes, they will have more complexity to make up for it, such as some plans where there is also a cost for the sim itself (I don't know why). I have found no resource that allows for easy comparisons, and I have had enough conversations with the people at the mobile providers to know that I dislike having conversations with the people at the mobile providers.

Forget your deepest, darkest secrets, smart speakers will soon listen for sniffles and farts too

doublelayer Silver badge

Re: It sounds like you're writing a letter...

Google has translate. Now they know what you're doing and how well you speak whatever foreign language you use. Victory while using the app is impossible.

doublelayer Silver badge

The bandwidth and storage costs are not difficult at all. Audio can be compressed a lot. There are some codecs that are optimized for voice and can retain a great deal of the data needed for voice in tiny files. That's until they get better at speech recognition, into which they have been pouring millions. Then you're storing text. They already are doing something like this. If you use google's captcha and use the audio version, they make you transcribe a few words from some recording. Since you're usually blocked from whatever the thing is, it's probably better not to think about where that recording came from or what they're using your response to do.

ZipRecruiter has been flying low: User email addresses exposed to unauthorised accounts

doublelayer Silver badge

October? That's a while

So they became aware of this back in October, and sent notification in December? If they were able to find and fix the bug in ninety minutes, which seems entirely plausible and not at all some random low number that someone made up, surely they could have identified the people whose data was read in two hours and sent them and the relevant oversight offices notification in three. What were they doing in these intervening months? By the way, isn't there some new regulation around that says notification should be sent in 72 hours or less? The protection of data or something like that? No, I must be imagining things.

Poor people should get slower internet speeds, American ISPs tell FCC

doublelayer Silver badge

Re: Here's the thing...

I somewhat agree with your points, but I think broadband should be defined higher than you do, because dialup doesn't work anymore. If we took your connection down to dialup levels, browsing wouldn't work anymore. Some sites still use small files and have done with it, but with the image, script, and other media-heavy sites out there, a dialup connection would take forever to load it. It is not feasible to use those services without the scripts and images, at least most of the time. So I think we should find a reasonable lower bound on the speed needed to do standard browsing, and then define broadband as some level significantly higher than that. Otherwise, I think your ideas are good.

doublelayer Silver badge

Re: What does "broadband" get you these days?

Broadband gets you a lot of things. It gets you el reg, and sites like it that don't exactly have tiny text-only article files, and most other news sites, which go straight out past medium sized files into the tons-of-images articles that would load in minutes over a non-broadband connection. It gets you the ability to stream video, which may just be entertainment, but may also be something like online educational materials. It gets you the ability to videochat with your friends or coworkers. It gets you the ability to download a linux update in minutes, or a windows update in an hour, rather than hours and a week, respectively. It gets you the ability to check job boards, go online to reserve a flight, or yes spend some time enjoying the content that the internet provides.

We've seen slower everything. None of us need things to go faster, as we'd all survive even if using a computer from 1990 with its modem access. We choose to use faster things, not because they are truly necessary, but because they are more functional and useful. And if we use those things, then the slow internet becomes obsolete and gets dropped. Like it or not, the 1200 baud modem of yore doesn't work. Even if we were able to connect it to the modern internet, you wouldn't be able to use it for anything. Even an SSH session uses more data now. The modem is obsolete. Dial up is obsolete. They should be replaced.

doublelayer Silver badge

Re: It stinketh

Take a look at any ISP website and the large amount of space it devotes to its gigabit fiber system. That's always fun to read, right before you click the "is this available for me" button and get told no. I begin to think that they just have one fiber line connecting their headquarters to their off-site datacenter but can say that anyway because they technically have the services; just not in your area.

The eulogising of The Mother Of All Demos at 50 is Silicon Valley going goo-goo for gurus again

doublelayer Silver badge

Double hyperlinks

No thanks. The benefit with a unidirectional hyperlink is that I don't have to control or know the person who controls the other end of that link, and I can link to things that are relevant to whatever I'm saying without having to worry about whether what I'm saying is relevant to them. Worse still, I could see this as the cause of an annoying amount of spam by people wanting to link to my page so I'll link back to them, which I'd have to run through because somewhere there would be one with useful content. Essentially, double-ended links would try to turn us all into a search engine, and I'd rather not do that.

Windows 10 can carry on slurping even when you're sure you yelled STOP!

doublelayer Silver badge

Re: Bah!

I somehow doubt that would work. You would need to be able to fake a signal from a real windows device, which I presume has some encryption on it so it's hard to mess up, and you would also need to know the contents well enough to make misleading contents that don't get automatically rejected. If they found you doing it, they'd just autodelete anything from your network connection and carry on. If you have a way, I'm interested to hear how you'd get around these things.

Ticketmaster tells customer it's not at fault for site's Magecart malware pwnage

doublelayer Silver badge

Re: Java f'in script !

I may be describing a badly written system, and I'll gladly stipulate that you can write a bad system in any language or paradigm you like. However, I still think this is an adequate argument against some, but only some, javascript use. The reason I say this is how many extremely terrible client-side form handlers there are. If they all worked really well, that would be nice, but it doesn't happen that way. Javascript is a tool like any other. You can do things with it that are not doable with other tools. You can also use it to turn a page that does not really need client-side interaction and turn it into a nightmare. It can also cause plenty of security problems, which doesn't help either. On balance, it's a tool that is misused a lot for whatever reason, making it unpleasant to many.

doublelayer Silver badge

Re: Java f'in script !

Client side scripting has its place, but to use some of your examples, I could do without intelligent forms. I don't need someone to store my address on my computer in a format that only works with their site. I can use one of the many browser add-ons for automatic filling of forms should I get tired of entering my address. I also don't need overactive warnings every time I already know that, that tell me that my phone number is not a valid number because I haven't finished typing it yet or that a person can't live at an address where the country says "please select". This kind of thing could be done with HTML5 form things that allow simple conditions to be sent to the browser, without requiring as much attention to client-side parsers and incidentally annoying me less.

They say software will eat the world. Here are some software bugs that took a stab at it

doublelayer Silver badge

So Dev Ops fixes everything, huh?

This article does a pretty good job of explaining how bugs can be a major problem. And then it comes along with the following line:

"In a carefully architected DevOps process for a web application, [...] the cost of fixing a bug found late may not be too bad."

Let's discuss this. A dev ops process has no good definition. I've read the dev ops articles here. They have essentially put the dev ops™ label on every known good coding, management, or systems concept under the sun. Unit testing? A primary precept of dev ops™. Ensuring security? Meetings with managers where the developers are listened to? Having firm documentation about policies for development and usage of the code? All dev ops™ concepts. This tends to assume a utopian ideal of code development and management style, anyway. The problem with this is that none of these things are actually connected. Articles about good policy simply have dev ops plastered on them. So there is no clear way to identify what exactly about dev ops makes these bugs so easy and painless to solve.

Or is there? Let's fill in that gap in the quote.

"where a code change can be made, tested automatically and deployed into production rapidly"

So that's a no. Dev ops articles frequently mention agile as a development style. That quote above clearly describes a system that works similarly to agile, in the sense that code is supposed to change often and get into production quickly. That does not have any benefits with bugs. Bugs will still happen. If and when agile is done wrong, bugs will happen *more* often, because managers think that agile coders should always be moving on to some new functionality rather than repairing things. Agile does at least mean that bugs should be patched more quickly, which has a bit of logic behind it. However, it does not have any specific way of ensuring the bugs are less dangerous.

Let's talk about the "tested automatically" stuff, too. You can't test everything automatically. Unit tests are great. I expect competent devs to be writing them and to make any changes go through them. But unit tests do not catch every bug. There may be unit tests that nobody thought of, or someone thought of but then nobody wrote. Worse, there may be a bug that you either can't test for or you won't notice until things are put together. Consider that heartbleed bug discussed in the article. It doesn't really have a meaning on its own. Unit tests of invalid data could have caught it, true, but there are a lot of types of invalid data, only one of which triggers this. Only when combined with a thing like a webserver does this bug become so noticeable.

That's not a thing a unit test, written by one person and never looked at again because "the automatic system will handle testing" is going to notice for you. That's a thing where you want devs writing unit tests and manually running a test suite, looking at the output to think "I wonder what would happen in this case, but there is no test for that. Let's see." and people doing larger real-world testing on larger components. An automatic system cannot possibly try all types of standard input to a large program and properly interpret the results, but a QA department can.

By making testing simply a speed bump on the road to production, rather than a required turn, you make it a lot easier for things to get through inadequately tested. Write fast and fix things when you find them won't work for rocket launches either.

Linux.org domain hacked, plastered with trolling, filth and anti-transgender vandalism

doublelayer Silver badge

Re: I cant believe that...

What would you use? As I said above, you can't register a domain to use for mail until you already have an email to create the account, which means getting one from somewhere else. I send most of my email through my own domain, but I have to have the domain registration account through another one because the last thing I need is for my domain to break, requiring me to log in to an account that uses that domain in order to fix it. I'd rather not use gmail for this, but I don't see a better choice.

So if we accept that a third party email service is required for this, which should we choose? I'm not accepting those companies that you pay for a mail account, because I've had enough of them fail. They change server settings, move your handler to a different one, or disconnect things. Then you end up in their customer support maze. No thanks. I have put some accounts like this on protonmail, but I am a bit concerned about trusting a service with something this important when that service relies on donations and doesn't really have a business behind it. If protonmail didn't get enough donations, I could not keep any of it alive. Say what you like about gmail, but at least I know that, if Google goes down, my domain problems are probably dwarfed by whatever took Google out. Google can't see my mail, because the domain mailserver handles that. They can't get malicious and log in for me because I have 2FA enabled and they don't know the password (and there is little likelihood that they would try anyway). So the major security problems with these mail services do not apply to my situation.

If you have a better option, I'm open to trying it. So far, I have not found one.

doublelayer Silver badge

Re: Using Yahoo! mail for something important?

That's the difficulty with domains. In order to have email through one, you have to register it. In order to do that, you need an email address. So the only convenient way to do that is to get an address from someone else and use it to get your domain and then your other addresses. To some extent, you could use your new addresses to reserve future domains, but that could still result in an all-eggs-in-one-basket situation if your primary domain breaks.

For example, I use my own domain for most email going to me, and that domain is backed up with a registrar account on a gmail address. I don't like that, and I'd rather have my own mailserver running that, but if something broke in my mailserver, registrar account, or domain, I'd be completely cut off. So gmail it is. If there is a way around this, I'm all ears.

Identity stolen because of the Marriott breach? Come and claim your new passport

doublelayer Silver badge

And one requirement to use this is

Have they set up any system that informs people if they have been included in a breach or at least lets them check? I haven't read everything, so I suppose it's possible, but I would figure that if such a thing existed the company would have referred to it in their statement or the article would have mentioned it. If they indeed lack such a feature, is it because they don't know whose data was breached or they don't want to tell people? Of course, this makes it hard for a customer to know whether to do anything and therefore whether to ask the company for damages. So I'm assuming nobody will be informed.

And the next 7nm laptop processor will be designed by In, er, AM, um, Qualcomm: The 64-bit Arm Snapdragon 8CX

doublelayer Silver badge

Re: Linux workstation?

So use a standard quiet workstation if you want to move everything to the server. Using a new ARM chip that isn't really that inventive won't change much, so the only benefit of it directly is the cellular connection. You can use your phone's hotspot or a USB modem for this, so it's not a major thing. I'll grant that it might be good for battery life, but you said workstation and implied that it's on the desk and connected to the mains, and you can already get pretty good battery life with a minimal Linux on a low-power laptop. Depending on your requirements for local power, you can use the following, in increasing levels of performance and price:

1. Raspberry pi: It will run debian just fine, provides all standard packages, and can be a perfectly good client for a server.

2. Those windows 10 mini-PCs with atom processors. They usually run Linux just fine, and provide a few more features than does the pi. The atom isn't great for local work, though.

3. Those cheap windows laptops, reinstalled and running as a Linux workstation. This gives you portability, a processor that will handle low-end tasks with ease, and the stability of a battery backup.

4. A NUC or other small computer (most manufacturers have one, and there is one from system76 that was designed specifically for Linux use). This can get you up to an I7, which should be totally fine for most local tasks, especially as you offload to a server for anything bigger than that.

This chip doesn't provide any useful features for your use case.

doublelayer Silver badge

Re: What is "Fast Enough"?

I agree that it would not be good enough for me to buy one, but I'm afraid that it probably will cut it for the users that don't know what it is and the business users that think these features will make the devices they buy ultrasecure and thus better. Hopefully this doesn't start happening with the next generation of desktops and laptops, but it might.

He's not cracked RSA-1024 encryption, he's a very naughty Belarusian ransomware middleman

doublelayer Silver badge

The business may be legitimate, but it doesn't start being a good idea. For hostage situations, these consultants can actually mediate with the abductors. For ransomware, the business is essentially just paying the ransom, with the only additional service provided being converting to bitcoin for the user. That's not worth this or any markup, and it doesn't fix the problem of people paying ransoms when they should not. But I suppose the business could eventually make itself somewhat ethical.

doublelayer Silver badge

Maybe, although this depends on the nation's laws. But that's all moot because he DOESN'T tell his customers that. He'll be very honest when telling the ransomware people that, but his customers are under the misapprehension that he is cracking keys in a more honest way, which is probably why they pay him.

doublelayer Silver badge

It is, at least, false advertising. Given that this person does not actually decrypt anything, it is useless against any version of ransomware where the ransom doesn't help (quite a few of them). In addition, it is unethical to find the actual cost and then to multiply that by 10; that's not what an honest or ethical broker would do. While a broker that was up front about being a broker and what the fee would be would be doing so ethically, it's also a pointless thing and a very bad idea.

If you ever felt like you needed to carry 4TB of data around, Toshiba's got you covered

doublelayer Silver badge

Re: This has been available for a while

I can only speak for the one WD drive I have, but it has withstood my regimen, which included a full format and then transfer and reading of about 2.5 TB of stuff. I haven't put it through much more, so I cannot speak for its reliability. That said, I find that any time a drive gets a physical workout, it will either die within days or survive for the rest of time.

doublelayer Silver badge

This has been available for a while

I have a portable 4TB drive from WD; when I was buying this one, there were others like it. So Toshiba may be a bit too late to this game.

For wearable analysts, the glass is always half full

doublelayer Silver badge

Re: APAC?

Asia Pacific, usually limiting Asia to China south and India east, sometimes including Australia and New Zealand, but sometimes stopping at their north shores. Combined with such wonderful region identifiers as EMEA which is Europe, Middle East, and Africa, because those are essentially all the same (Middle East may or may not include Iran) and North America (Mexico optional), they make up the typical three markets mentioned.

Tape vendors feel the cold, clammy hand of AWS on their shoulders. Behind them grins the Glacier Deep Archive

doublelayer Silver badge

Hard drives have their downsides as backup media, but they are the most available and functional media for personal use. I do not have enough data to justify purchasing a tape drive, because I have not seen one that is sensibly priced for home use. So what other choice is there? I could use optical media, but that degrades as well and even the largest capacity conventionally available, blueray, isn't very big when compared to disk. I could use exclusively SSD storage, but that would be much more expensive, and can also fail. So my backup strategy uses disks. They are independent such that I can sustain failures in some of them without losing anything, and I don't have a better option. If there is something I haven't thought of that would be feasible, I'd like to hear about it. For now, I have a system which is pretty reliable.

doublelayer Silver badge

That's true, but glacier provides a lot of stuff that those hard drives don't. Among other things, I don't trust a two-bay RAID system. That looks like a really easy way to lose both disks, because one will fail and the other one would probably fail too when you use it to mirror again. It also doesn't protect against something that takes out your NAS, such as flooding, fire, lightning strike on the power or data line, theft, or dropping it. I'm not always advocating for cloud backup here; I tend to put a lot of backup data on hard drives which I store off site, but the two are not comparable.

doublelayer Silver badge

Re: I would love to see their service engineering docs

Engineer: Well, we capped it at eleven nines before for an event that has a likelihood of occurring once in a hundred billion years, like the sun going red giant on us. That would mean that our geographically redundant system wouldn't help much.

Marketer: What would you need to add some nines to that number?

Engineer: Well, we already added one last time on the assumption that we'd have travel outside the solar system by that point, so a really cataclysmic thing would only happen one in ten times a star destroys all its planets. And because you wouldn't stop badgering us. So we can't really--

Marketer: [interrupting] We need something new to distinguish our new product from our old product.

Engineer: Well, it costs less. How about that?

Marketer: But it's also better, right?

Engineer: We already have tapes with redundant copies stored in libraries on six continents, in a total of eighty nine datacenters, in order to let me sleep soundly with all the nines we have now. So we did open a few more datacenters to store the tapes, but not really enough to make the number any longer. Also adding more nines would be pretty pointless.

Marketer: I give up. We'll think it over and see what can be done.

Accountant: Just slap two more nines on the number; it's meaningless anyway. We haven't listened to the engineers for years. They still think we have eighty something datacenters all over the world.

Marketer: What do we actually have?

Accountant: A warehouse in South Dakota.

Marketer: So our real level of reliability is?

Accountant: It's a pretty good warehouse. Maybe 99.9% or so.

Marketer: What happens when people find out?

Accountant: I'm still paying that engineer, the one who's in charge of and thus responsible for our entire glacier system, aren't I? Don't worry, I've covered every contingency. Our employment and liability is 99.999999999999% secure.

Marketer: I should probably quit before something happens, right?

Tesla autopilot saves driver after he fell asleep at wheel on the freeway

doublelayer Silver badge

Re: The question to ask is whether self-driving trucks will ever be a thing.

I disagree. The reason I want one is for efficiency, yes, but my efficiency while riding in it. I can use the time spent in transport working on things, or reading, or something useful. Obviously, that's not safe to do yet, but there are real benefits to the users of the personal cars in addition to companies doing transport. Nobody thinks it is acceptable if a car will just crash into things, which is why I'm not expecting to get one of these for at least a decade, but there are many reasons to want one, even if you personally don't.

Wanna save yourself against NotPetya? Try this one little Windows tweak

doublelayer Silver badge

Another solution

I have a suggestion that might help to reduce vulnerability to notPetya and similar malware, and it is to PATCH THE ETERNALBLUE VULNERABILITY ALREADY. The patch involved was released for every windows version in March of 2017, and the first time it became really obvious that that patch was important was in May. It's now been eighteen months. What excuse is there for leaving eternalBlue open for this long? Now every basic malware release uses it, because it's evidently still working. Fix it.

Google internal revolt grows as search-engine Spartacuses prepare strike over China

doublelayer Silver badge

Re: Hmm

I'm not arguing that it makes business sense to do any of this, nor that I actually expect Google to even consider it, nor that if Google did it that China would improve. However, it would be a way they could comply with Chinese law without abetting the human rights abuse. That was the original question: were we who view Google's Chinese search engine as a problem suggesting Google break Chinese law. I answered that question.

For the record, just because someone else will do a bad thing does not make it reasonable for you to do so. I also don't remember Germany blocking Google because it didn't censor, nor their asking for a special google that censors. China and other dictatorships seem to be the ones asking for that, so let's not make up a theoretical scenario which is most definitely not happening.

doublelayer Silver badge

Re: Hmm

No, it's not. It is an argument for google to do the following:

Do not comply with China and make it easier for them to abuse human rights.

They can implement this entirely without breaking Chinese law by doing one or more of the following things:

A) Do not start a search engine in China, because China will use it to abuse human rights,

B) tell China that Google will not start a search engine under those limits, and that Google will not help other Chinese companies to do similar things, to put pressure on China to drop its policies,

C) use Google's power and large megaphone (a note on the google search home page might help) to raise awareness of China's abuse of human rights and suggest that democratic countries put even more pressure on China to make them stop their abuses.

They could do many things without breaking Chinese law, either to actually help the situation or at least to not be complete hypocrites on the issue.

doublelayer Silver badge

Google's ethics code

Employees must always do their work ethically, without harming the world, Google's customers, and Google, in that order. We aren't the most important thing; human rights, physical safety, and the like all outweigh our corporate interests. Whenever you do something, consider this. Then do whatever we tell you to do because you have no idea exactly what we'll do to you if you don't. Those who are curious are welcome to go to the basement of the administration building and peruse the records located in room 001. That room has a double door system, just because we don't want the papers to get wet or something. Don't worry that they say "soundproof" on them.

Little FYI: Wi-Fi calling services on AT&T, T-Mobile US, Verizon are insecure, say boffins

doublelayer Silver badge

Meanwhile, maybe they can make it work

While they're taking a look at this to see whether there are really any security problems that need fixing, perhaps they could make calls over WiFi functional? I frequently visit a building where mobile signal is terrible, and completely nonfunctional without leaning out a window (people literally do this). It does have comprehensive wired and WiFi network connections, though, so I figured I'd just enable WiFi calling and we'd be back to normal. Which we are in terms of quality when a call is established; it's usually very clear. The only tiny problems are that:

1. Calls drop randomly, requiring a reconnect,

2. After receiving and answering a call, I have to spend about five seconds waiting for the connection to happen so the person on the other end can hear me,

3. When sending a call, there's a fifty-fifty chance that it will go through immediately with good clarity of sound or immediately drop making the person think that I've just called them and immediately hung up,

4. When moving, and therefore changing from one AP to another, quality for the other person drops. At least they complain that they cannot hear me anymore, although I can always hear them fine.

No, I don't know why this is, but it really isn't helping. So maybe they could figure out why and fix it. If they find security problems on the way, fix as needed.

Support whizz 'fixes' screeching laptop with a single click... by closing 'malware-y' browser tab

doublelayer Silver badge

Re: Do you like making work for yourself?

I'd scan it, just to make sure, but this doesn't warrant a reimage in my book. Especially if the user could have done this on purpose to try to get a new model.

Facebook spooked after MPs seize documents for privacy breach probe

doublelayer Silver badge

Re: The irony....

I believe you may have missed the point. The irony is that data about facebook was recently obtained, but facebook didn't want that data released. So facebook violates their users' privacy but want to keep their own corporate data private.

The rest of your comment is good though.

Reverse Ferret! Forget what we told you – the iPad isn't really for work

doublelayer Silver badge

Re: Ipads @ work

"I do dev work as well and:"

1) "I prefer to have a RAID system to ensure I can keep on working even when the drive fails, because reinstalling would take time, and VM are not the solution to every need"

I do this with full-disk backup images which I can deploy in minutes. The advantages of RAID do not outweigh the extra kilos for me. If the disk fails, I switch it, press restore, wait five minutes, and resume working. Also, I haven't killed my disk to require this.

2) "Good graphics cards are not for gamers only, today."

No, they're not. But I still don't need one. Whenever I need that type of processing, I typically offload that to a dedicated machine with a lot more processing than a desktop would have. I don't have a reason to have a graphics card in my dev machine.

3) "Storage is still needed if you happen to run VMs locally, or other storage intensive stuff."

Granted. I have two disks in mine for a total of 1.5 TB. I don't process a bunch of images or video to need more, at least on my work dev machine.

4) "I don't want to take all my code and documents with me when I go to a demo or whatever - that have to stay safe in the office. Sure I have repositories and backups, but I'm obviously worried about stolen data, not lost one."

Hence my disks being encrypted. And I might demo to my managers or their managers, rather than to clients. Or maybe I'd like to work near someone else on my team, or in another office, or from somewhere else because my company will let me. Then, I might want access to my code.

5) "Desktop have better cooling, and can work at higher speeds for longer, thus usually have more powerful processors."

Yes. All true. But my point is that I need a sufficiently powerful processor. An I7 will be perfectly enough for my needs. I do not need a xeon, and it wouldn't really help. When more processing is required, I offload once again to the massive compute resources available to me.

6) "The docking station takes space on a desk, especially for larger, powerful laptops. I can put my "desktop" under it and free space (should I call it "deskbottom"?)"

I don't use my laptop screen when it's on the desk, so I put my docking station on the bottom. My desk is quite free.

doublelayer Silver badge

Re: Ipads @ work

I'll have to agree on the laptops over desktops. Not all the time, but at least for me. I do relatively intensive dev work, and I do need a lot of processing to do that. I can get that in a laptop as well as a desktop (I need a good CPU and quite a bit of memory, but I don't need a graphics card, a lot of storage, or tons of ports and drives). The laptop can sit on my disk in a docking station for connecting to any hardware I want at work. It is useful, however, to be able to relocate my working machine. I can take it to demos or to someone else's area without copying stuff, and I can work remotely. My job allows me to work from most places, so I can do work (my expected work in expected hours) from other places if that is more convenient for me. For this reason, I prefer the laptop.

Consultant misreads advice, ends up on a 200km journey to the Exchange expert

doublelayer Silver badge

Re: Exam question.

To some extent, that's true. Still, there are situations where you can't get people to tell you why you're doing something. It's entirely logical, if told to sort a box of bolts, to do so. After all, if the person telling you to do that just wanted the biggest one, they could either have taken it out at the beginning or asked you to find one with the required specifications.

Sometimes, you want someone to just do what you ask of them rather than to believe they can do it better if only they know everything there is to know about what you're doing. For example, if I ask someone to find the most cost-efficient machine with a set of specifications, I only want them to look at the options, eliminate those that have worse specifications, and choose the one that has the lowest cost (perhaps taking into account other things that they can definitely ask me to elucidate). I do not need them to question me as to whether I want more power because they found one that's only a little more expensive, nor do I need them to suggest that we'd probably be fine if we bought machines with less memory. I set forth the specifications and gave them a task. If they're going to change the task instead of just doing it, perhaps they should be doing my job.

The same is true of software jobs. I cannot deal with every part of a project team thinking they can and should be designing a better system for every component. Their system for some of it may in fact be better than the one we're using, but if it doesn't integrate and won't without doing a lot of work first, it can still be worse. And if each team or team member comes up with their own version that doesn't interact, we spend forever getting things back together. That's why abstraction is so key; figure out the best way to do your job, not the best way for someone else to do theirs or even for you to do someone else's job. If you have some improvements to suggest, go ahead, but don't neglect what you're supposed to be doing just because you don't like someone else's work.