* Posts by doublelayer

10570 publicly visible posts • joined 22 Feb 2018

Facebook's Libra is a terrorist's best friend, thunders US Treasury: Crypto-coins dubbed 'national security risk'

doublelayer Silver badge

Re: Oh, please

It's pretty ridiculous to blame one cryptocurrency for a money laundering risk. Crypto can be used for that, but money laundering has been pretty easy for a number of criminals. Terrorists rarely need crypto because they can run bank accounts and get donations from various supporters as long as they make a token effort to hide who it is. Theoretically, everything with value, from gold to cash to securities to those pointless online game accounts, can be used for money laundering. The solution isn't banning whatever we've decided is being used, but either making that thing harder to launder or finding the people laundering with it and dealing with them using the tools of the criminal justice system.

This idea of Facebook's is terrifying because Facebook has proven themselves to have a trustworthiness score somewhere below -100%, but it's almost certainly not going to be problematic because terrorists or someone else will use it to hide. It will be problematic because Facebook will attempt to monitor and control users' and nonusers' financial activity. Hate it for the right reason.

Galileo, Galileo, Galileo, where to go? Navigation satellite signals flip from degraded to full TITSUP* over span of four days

doublelayer Silver badge

Re: We live in a society

It was always this way. At nearly every point in history, the vast majority of humans would not be able to sustain the loss of the technology they used. In the 1950s, only a small subset of people could get electricity running again if power plants stopped existing. They'd have to build generators, obtain fuel from somewhere, and find some method of cleaning up the power so their electrical devices would be able to run on it. Even as we move back in history and technology becomes simpler, this continues to be the case. Do you think a medieval farmer, though undoubtedly skilled in agriculture in a way we modern humans are not, could get a plow together at that point? Of course they could, if they already had the necessary technology. Could they if they first had to manufacture an axe to get the lumber and the metalworking tools the blacksmith had using only things found in the natural world? I wouldn't count on it.

Fewer people study silicon design, but that doesn't matter much. If we ended up in a disaster scenario, even if we had all the silicon designers available, we'd also have to have the people who build the machines that manufacture chips, and the people who power those machines, and the people who get the raw materials out of the ground, and the people who purify the materials after they got out of the ground, and the people who build the machines for that, and the people to ensure all the aforementioned people don't die due to starvation, disease, or environmental factors (temperature, something toxic, etc).

Similarly, I was taught C and C++. I consider myself somewhat skilled at writing in them. I've written things at the operating system level. I've been employed writing in those languages. Could I, alone, develop an OS? Not a chance. I'd need to read a lot about how the real OS developers have done things so I could copy their ideas. And could I do that if I had to start from scratch? Even less of a chance. I haven't written a C compiler, and I haven't ever really connected to one.

Most disasters don't destroy everything. Even if a small area was preserved while the rest of the world was obliterated, there would be technology from before the disaster in that area if there were humans there. They would have to rebuild a lot of stuff, but they would do it on the back of the tech that existed before. And there's a reason turns of phrase like "blasted back to the stone age" exist, because they'd have to reinvent several wheels. But this was always the case. There was never some miraculous time when the majority knew what they were doing technologically that we've thrown away.

X-ray specs: Signal whizz JMA Wireless claims to have solved indoor 5G, everyone

doublelayer Silver badge

Re: How will this compare to WiFi

That's true. However, the difference between countries is the maximum power allowed and some channels from the full set may be forbidden, not a completely different frequency and method to use that frequency. Almost all WiFi devices can be configured for other countries by editing a configuration file (the ones you have don't seem to be constructed well), but changing a 5G transmitter or receiver requires different chips and antennas.

doublelayer Silver badge

How will this compare to WiFi

I think I can field that one:

Indoor 5G (hereafter I5G): functions with 5G enabled phones assuming channels match up

WiFi: functions with pretty much any device released since 2009

I5G: Access points must be developed on a country-specific basis to ensure they properly connect to wider cell networks (they will be carrying telecoms traffic from phones, after all) and avoid interference with local cell companies.

WiFi: One standard, used worldwide.

I5G: Almost a hundred possible bands, requires phones to match specific bands to work at all. No phones actually support all or even most bands, and there is no common band they'll all do.

WiFi: Two frequency bands. All WiFi devices support 2.4GHZ, and most also support 5GHZ.

I5G: Massive lock-in.

WiFi: No massive lock-in.

I5G: Inconsistent range depending on exactly what bandwidth is in use, requiring site-specific surveys to determine why there are still a bunch of dead spots.

WiFi: Established norms that mostly apply and can be used to estimate how the network needs to be set up.

I5G: Data may go through the cable of the building or the outside mobile network. Both need to be enabled. There may be security risks to this.

WiFi: The building admins can control how that works, avoiding security issues.

I5G: Choices include low frequency (low speed, better coverage) or high frequency (high speed, terrible coverage).

WiFi: Established frequencies, generally deemed acceptable for range and throughput.

I5G: Given lifetime of 3G and 4G, may become abandoned in rush for 6G in five years.

WiFi: Will still work if slowly in fifteen years.

Brilliant Boston boffins blow big borehole in Bluetooth's ballyhooed barricades: MAC addy randomization broken

doublelayer Silver badge

Re: Isn't the real flaw...

I've long thought devices should stop sending packets asking for the networks they know--they could instead listen for broadcast SSIDs which get announced anyway. This would at least solve the problem of devices that always respond yes no matter what SSID was requested and the other problem where devices can be fingerprinted based on the SSIDs they ask about. I'm not quite sure why WiFi decided to go the other way.

doublelayer Silver badge

Re: I still think...

MACs are supposed to be unique, yes, because networks can't deal with (some exceptions apply) duplicate MACs. That's how they're designed. However, why does my MAC have to be globally unique instead of just unique on my network? And why does it have to be the same unique value when it's on my network and when I've connected to your network?

Some things need to be globally unique, so people can find or at least recognize that specific thing when it appears. Others don't. Given that a MAC is essentially a random number, telling you only what manufacturer built the device (which you don't need to know because it doesn't tell you anything you need), there is no major benefit obtained from keeping that MAC or using a random one, unless you somehow connect to a network with another device that has simultaneously decided to use the same randomized number.

Oracle told to warp 9 out of court: Judge photon-torpedoes Big Red's Pentagon JEDI dream

doublelayer Silver badge

Re: Not Surprised

The single point of failure has validity, but so does the complex threat landscape. When there's just the one system, without interaction to others, the single point of failure argument is the more important, as everyone who wants to attack it knows what they're going to target. However, if the DoD used two cloud services and linked them together (I.E. one system running on AWS is used to control another system they've decided to run on Azure), an attacker could target either AWS or Azure in order to tamper with that system. If everything runs on only one of the cloud services, there are fewer available vulnerabilities. In addition, the costs for ensuring proper administration are reduced because the techs only have to be drilled in proper administration and security of one cloud service, rather than potentially following a policy appropriate to one and not the other or having different teams familiar primarily with different providers. So there's an argument for multiple providers or just one.

I don't have to save my work, it's in The Cloud. But Microsoft really must fix this files issue

doublelayer Silver badge

Re: I can see where you went wrong, step 1

You don't usually have to offer to help. Often, someone who knows you know about computers will ask you for help, and then you have to decide whether to agree, simply say no, or try to make up an excuse why you can't. This is made harder when it's your family or friends doing the asking. I can't count the number of times I've been frustrated with my family members doing something where I've suggested to them that maybe I shouldn't be doing their computer repair, but yet I still end up helping when something else has gone wrong, as I still like them as people and they haven't identified another option for getting out of whatever nightmare they're now in.

For example, I suggested to my parents that maybe they should ask someone else about their computer after they decided, against my advice, to do an in-place upgrade from Windows 7 to Windows 10 without taking a backup, then another in-place downgrade back to Windows 7, again without taking a backup. I recovered their lost files, but I told them the situation was untenable. Before that, I said a similar thing when they were running out of disk space and were trying, fortunately unsuccessfully, to destroy the recovery partition on their hard drive to gain that space (I think it was about four gigabytes) back. My suggestion to run CCleaner which could (and did when I ran it) clear up about thirty gigabytes of windows update files and crash dumps was seen as a stupid idea and why was I suggesting something like that.

doublelayer Silver badge

But that was before schools developed an odd love of PowerPoint presentations containing the required at least one image per slide and occasional video clips. My teachers never seemed to accept that my talking about the topic would be a completely fine presentation, especially when I was going to say all the stuff I wrote on that slide plus extra information. And having a short piece of text to read while I said it out loud wasn't good enough; I had to provide a picture for each topic. Usually, that meant typing the topic into Google images, selecting one that kind of sort of worked, and slapping it on so nobody would actually look at it. Those files were somewhat large, and after you've done a few, you could easily run into a storage quota were the school to impose one (when I was there, you had no quota because you also had no storage--you were responsible for creating the presentation on some machine and getting it from that machine onto the one that ran the projector).

doublelayer Silver badge

Re: She's not entirely wrong

There is one of those. If I recall correctly, its exact wording is "Would you like to save your changes?" if not a new document and "Would you like to save this document" if not saved previously. The user in this story consistently clicked "Don't save".

doublelayer Silver badge

Re: The user is right

The user might have been right, at least at first and given we assume that the way you described it is actually how it happened. However, there was one specific thing the user saw after which they were entirely wrong: "Do you want to save this document?". At that point, the user had received all the evidence needed to determine that the document was not saved or at least needed some amount of explicit user action. There wasn't even any option for the user taking no action or going with the default. When that question was asked, the user was forced to select an option, and the user looked at the box and consistently selected the wrong one.

Users have to read screens. If they don't understand what they see, they should ask questions. If a user sees a box that says "Would you like to perform a test of the building's emergency systems by turning off the power and on the fire alarms?", they should not click yes. Their options are clicking no after coming to the conclusion that they really shouldn't be here or leaving the box up and getting help. It's not suddenly fine if they've not seen the box before or thought it certainly couldn't do what it said.

doublelayer Silver badge

Caller: What? You thought I called the IT department from my phone? No, I'm using the one from my coworker across the office. Mine's been broken for a month.

Caller: What do you mean why didn't I report it? Who do I report it to? You? But this is a phone, not a computer. Why couldn't you figure out that my phone was broken? Isn't that your job?

Caller: No, I'm sure it's broken. Your system must be wrong.

Caller: No, I didn't hear it ring. It doesn't ring; it's broken. Yes, my computer can access the internet. Well, it could, but it's broken now. That's why I called you in the first place.

[When an IT person comes to the desk:]

Tech: You've turned your call and ring volume to silent, and your computer says "installing updates, please wait".

Other worker: Oh, while you're here, my computer just came up with a message saying IT is remotely controlling it. Is it a virus?

Tech: No, that's probably a mistake. Did this [indicates original caller] person use your phone just now?

Other worker: Yes.

Tech: We thought this was the problematic computer so we logged in to fix it. I'll close that session.

Other worker: You can remote control my computer? And you don't bother to check that you need to? Why can't you do your job better?

Tech: [Suppresses rage and makes fastest possible escape]

Cough up, like, 1% of your valuation and keep up the good work, says FTC: In draft privacy deal, Facebook won't have to change a thing

doublelayer Silver badge

Re: "it just has to swear it won't break that 2012 agreement"

I suppose there's some hope that this means they will face something massive if they ever break it again, but knowing politicians and their level of knowledge about technological issues, I doubt it. Without a law that makes it clear what is or isn't allowed, there will continue to be pointless little actions like this one. While I'm clearly disappointed that they haven't managed to change Facebook's approach any, I never really expected Facebook to take any real action, and at least they're receiving some penalty that actually impacts their books.

Just because you're paranoid doesn't mean Google isn't listening to everything you say

doublelayer Silver badge

Re: They are still very much a work in progress

Way to miss all the points. Let's take your comment apart and look at each piece in detail:

"I'm surprised that this website, a website targeted at skilled users of computing technology, has so many commenters who are totally negative about voice assistants. We develop software for a living so we know the problem of developing and testing algorithms. Its 'non trivial', it takes a lot of time and effort to get things to function properly."

And because properly coding software is hard, we should accept massive privacy risks? Why? We don't have a problem with the devices getting the speech recognition wrong sometimes, we have a problem with data being sent out and kept without our permission. In summary, it's not the algorithmic details we have a problem with, but the operations details.

"I daresay they can eavesdrop on me but I can easily turn them off if it was important that they were unable to do so. (I'll overlook the numerous ways you can still be listened in on -- starting with the phone, computer and so on and going on to active listening systems -- you wouldn't believe how easy it is to eavesdrop --"

But your computer isn't listening unless you've been infected with malware. If you were infected with malware and it was listening to you, you'd be unnerved and upset, no? That's what these devices do by design, and we find it somewhat creepy.

"I realize that these systems represent something far bigger than just an amusing gimmick, they're groundbreaking devices in the development of what used to be called man/machine interactions."

No, they're not. They're pretty basic question/answer devices. They can do a rather limited number of things. It can be a useful interface, but the capabilities these have were available years ago.

"beyond mere commands; Alexa can tell when someone's breaking into your house, it can be asked to listen out for smoke alarms and there's even been some quite successful experiments to determine whether it can recognize the sounds of someone having a heart attack. This is cutting edge stuff,"

Yes, those things have been tested. However, given that it can't always recognize whether its own wakeword has been said or not, it can't be that cutting edge. Also, many of those use cases are kind of pointless--assuming the detection of an alarm is meant to alert someone not present, either the homeowner or an emergency service, the potential unreliability of the audio detection could be circumvented by having the alarm itself do the contacting. And once again, our issue is not with the uses of the technology but the abuses by its manufacturers.

"and, yes, it has to all go back to AWS or the Google cloud because we don't know yet how to localize the processing, nobody's quite sure what's needed, what should run where and how to package it so it doesn't require a small power station to run it (important if you're dealing with something that's running 24/7 or from a battery)."

That's incorrect. I built a thing that was kind of like a voice assistant. It had fewer questions it could answer, but as I wanted to code some of my own and my major questions were "what is the weather today" and "what time is it in [insert location]", it did just fine. I did this in part because I had an old computer I didn't know what to do with. Did I mention that this occurred in 2008 and the computer in question was built in 2003? Did I mention that all speech recognition happened locally? The devices need a connection to obtain information to say and stream media, but the manufacturer decision to make the devices pitifully powered and outsource all recognition to their systems was not done out of technical inability.

"So, let's have less of the negativity. If you don't want to play then don't bother with it. (...."

We don't. However, we still have the right to complain about it being creepy, and if we have the chance to prevent privacy violations that are, you know just technically, illegal, we'll do it. I'm tired of the "don't be negative, just don't use the thing" rubbish. On that basis, I could say "don't read our comments as you've made it clear you don't agree with them", but that would be a stupid thing for me to say.

"These technologies will evolve, there's no way to wish them away, so we either learn how to use and control them or become a slave to those who can use them."

There you go. "use *and control*" them. Our issue is that we can't control them. Some people above also don't want to use them, but I have no problem using them or having others do so as long as control can be achieved and used to obtain privacy.

"BTW -- No, I don't work for Amazon or Google. I'm a retiree -- one of those old people that are regarded with amusement because we don't understand computers....or maybe we do, since we've been riding them up from the beginning...."

Given your comments, you either don't understand the types of privacy violations these devices do or you don't care. I'm going to give you the benefit of the doubt and say you do understand and don't care, but plenty of people who have these devices don't understand what is happening to their data, and get freaked out when they discover it.

doublelayer Silver badge

I prefer "don't get one", "if you have one, see if you can reprogram them to do something else", and "if you have one and couldn't reprogram it, see how much power you can send through the cable before the device emits a pop and some smoke".

doublelayer Silver badge

Re: "has violated our data security policies by leaking confidential Dutch audio data."

It's worth knowing that Google doesn't only give this data to their employees. If you've used recaptcha, it also has an audio version for those who cannot see the images or for those who are fed up with the stupid image tests. The audio version plays a snippet and asks the user to write down what the audio said. I think some of the clips are taken from random youtube ads, but others have the distinct sound of phone calls or basic microphones recording in rooms not designed for recording, and from the distribution, it's clear that this is not intentional degradation of sound to make the captcha harder. I have yet to hear anything sensitive because I don't do captchas that frequently and they only do a few words, but I do distinctly remember the one that came from a phone call and said "is at 9:00 tomorrow morning", so I really hope the first part of that sentence wasn't in the system in case it said what that person would be doing at that time.

IBM torches Big Tech's get-out-of-jail-free card, says websites should be held responsible for netizen-posted content

doublelayer Silver badge

Far too many facets

On one hand, allowing sites nearly complete freedom to allow anything through means they don't do anything to protect against their service being used for very illegal activities. Facebook, for example, hosted (and probably still does) many groups dedicated to the sale of stolen credit cards. They also allow advertisers to post ads that violate laws without verifying who it is or whether there are any problems. In those respects, there is a pretty good case for altering the law to fix that. However, we also need to avoid making places responsible for things that are not really their fault. As much as I despise Facebook for all their violations of privacy, they really aren't at fault as soon as someone uploads something illegal. They should remove it, but they didn't know it was coming. This applies perhaps more strongly to small sites, which don't have the kind of resources it would take to monitor all posts and accounts thoroughly. So there is a case for changing the law, and there is a case to clinging to it. Why do I have the feeling the politicians will take both cases and manage to find that spot in the middle that extracts the worst elements of both?

Facebook: The future is private! So private, we designed some handy new fingercams for y'all!

doublelayer Silver badge

It comes to mind

Anyone recently read The Circle by Dave Eggers and uncomfortably thinking about the transparent people?

For those who haven't read the book and not planning to (it is a good one), the transparent people are people coerced by pier pressure and the pressure of a massive fictional tech company, the titular Circle, to wear a camera that livestreams everything they see and do and keep it enabled at all times. As the company does this, they manage to use some benefits of the system (E.G. politicians not being able to engage in blatant corruption when on camera) to make it essentially mandatory for anyone important to wear one, which they then use to impose other types of surveillance on the world at large.

'It’s not a surveillance program'... US govt isn't going all Beijing on us with border face-recog, official tells Congress

doublelayer Silver badge

Given that the Chinese surveillance system was developed using bunches of datasets collected by universities in the west and shared with China by academics who didn't think it through, I think they have plenty of access to all types of faces. Since they were going for high accuracy rather than cheap or fast development, they probably have a much less biased system. Why is it always the evil people who have the best system?

doublelayer Silver badge

It's not a surveillance program

Thank you for telling us. So all we want right now is to have a look at your files and thoroughly investigate to make sure that's actually the case. Sadly, that's proven necessary given other not-a-surveillance-program systems we've been told about before. After we've seen and accepted your proof, you can keep going. Just come back every year to reassure us with the required documentation that you are still adhering to human rights and not exceeding your authority. Now where are those other agencies we need to do that with? Get in here, guys, and bring your documentation.

Internet imbeciles, aka British ISP lobbyists, backtrack on dubbing Mozilla a villain for DNS-over-HTTPS support

doublelayer Silver badge

Re: Mozilla

It sounds like you've panicked a bit too much about DoH's security risks. The kinds of problems you could see with DoH connections could also be seen by a user connecting directly to an IP address or using whatever open ports you have to run a VPN or connect through Tor. Either of those would bypass internal DNS controls and would probably flag as risks in your network analysis logs anyway. Since the use of any of those things would be violations of a security policy, you might as well tell people they must use a certain set of configurations that disallow DoH, and using DoH will be a violation of security policy. Wouldn't that pretty much solve that problem?

doublelayer Silver badge

Re: Mozilla

I would suggest that DNS requests be sent to an internal DNS proxy (if you have internal names, that's already there), which can do the HTTPS stuff recursively from there. Failing that, you could send all requests to that as primary, configure it to only know internal DNS addresses, and have the HTTPS address as secondary.

When using DoH, you have to contend with the possible issue of the trustworthiness of the DNS server, but it is not at all required that CloudFlare or Google be used. DoH could be set up by any existing DNS server with relatively little effort. I've taken a look at a basic implementation of a DoH server. I'm planning to set it up on one of my servers to see exactly how difficult it is, but it doesn't look like it will take very long.

doublelayer Silver badge

Re: Mozilla

In addition to the pier-to-pier problems mentioned above, there are some other problems you might see with that. Depending on cache policies and the definition for "recent" you're using, that could break various things, as many devices maintain their own caches and contact later. It could also be problematic in various less common but still existing situations, for example when a new remote server is spun up and is accessible only by its IP as a DNS name has not been assigned to it yet, or applications that contact their own remote services, as those might have addresses outside of DNS (for example, some programs with group usage, especially games, list servers on their own main system without using DNS).

'This repository is private' – so what's it doing on the public internet, GE Aviation?

doublelayer Silver badge

Re: DNS problem only?

Good point. I stated that point badly. I should have phrased it more like this:

I like the basic security provided by the use of NAT that is standard in IPV4 networks due to the small number of available addresses. While this can be done in IPV6, it is not done as standard or recommended by many IPV6 advocates. I am worried that this security will be lost during the switch to IPV6 for the vast majority of people who stick with the default configuration and may therefore be left without either the security of a properly administered firewall or the somewhat unintended but nonetheless available security of private addressing.

Have an upvote for helping me clarify that.

doublelayer Silver badge

Re: DNS problem only?

The DNS in question would be the internal one for the company, for example instructing the actual public systems that the hostname could be found on a given internal system, and thus allowing a tunnel into the network to be created when that wasn't really desired. The other option is that some DHCP or static routing misconfiguration reassigned the server to a public IP and nobody noticed because DNS still resolved the hostname properly.

I have to say, though this isn't exactly on topic, that this is pretty much the only thing I'll miss when IPV6 takes over. It's nice to have specific IP ranges that won't be available publicly. Yes, I know that I can run an IPV4 network and NAT out to an IPV6 one, and that I should be firewalling anyway, but private space is nice because I know that, should the firewall be misconfigured, unsolicited traffic still won't be able to reach the server because the address can't be routed to.

'Is this Microsoft trying to be cool? Want to go to the Apple Store?' We checked out London's new retail extravaganza

doublelayer Silver badge

Re: Pavement Plodder

The stores can be helpful sometimes. If there are problems that can't be solved right there, the Apple employees in the nearby store can deal with it. When, for example, I was having trouble talking my brother through a Mac software failure (major software failure resulting in the OS not booting, so no remote control) from hours away, I could send him to the Apple store with a page of instructions I wrote up as to what the machine should be like when they finished with it. They are also reasonably helpful for some minor hardware problems. FYI, if a key tile falls off your Mac keyboard, the Apple store will replace it for you without you trying to hunt down a suitably-sized replacement and install it. At least they used to. I hope they still do. It doesn't change the problems with Apple, and almost all of the things that happen in the stores aren't of use to the technical among us, but they're occasionally mildly helpful.

Did you buy a hot Asus Rog Strix notebook? Like, really hot? Like, super hot? Like, ow-ow-ow my lap's on fire hot?

doublelayer Silver badge

So, here's what I'm hearing you saying. Let me know if I'm misunderstanding your post.

1. Your machine is fine.

2. Well, actually, your machine is fine after you did some work on it. It isn't stated what it was like before that, but something made you want to reapply thermal paste and pads.

3. So at some point, your computer probably wasn't fine.

4. You are fine with the charger not, if you want to get technical, working as expected in as much as charging the battery under some conditions.

5. Because you are fine with this, and your computer is, to restate things, working fine now, nobody else's could be defective.

6. Therefore, based on your sample size of one person who might not have all the problems and doesn't care about one of them, there is no problem.

Did I get that right?

Oh good. This'll go well. Amazon's Alexa will offer NHS advice

doublelayer Silver badge

Re: Solution looking for a problem?

I think the original point of the thread is a good one. What kind of information is it actually getting? If it's just querying a page online, how much information can that really provide? Is it going to do a simple search and start reading one of the health topics like this one with little or no reason for choosing it? The content is more nicely phrased on the NHS site, but we could get the same benefit from implementing feature number six on this XKCD.

Facebook and Max Schrems back in court again, both pissed off at Ireland's data regulator

doublelayer Silver badge

Re: GDPR

This concerns data transfers in 2013. Sadly, GDPR does not apply. They could make some progress, however, on getting enforcement to happen more often.*

*Operative word being "could".

Guy is booted out of IT amid outsourcing, wipes databases, deletes emails... goes straight to jail for two-plus years

doublelayer Silver badge

Re: A Cryptic Response

They said they completed the recovery effort in ten hours, which implies they had backups of some sort. Whether that is cloud backups that were not destroyed or were recovered in time or physical backups, it seems likely they had something.

doublelayer Silver badge

My guess is that they brought in some external people at high rates to do it (probably getting them in a rush, too), and that those people took it upon themselves to spend extra money, such as paying for someone to recover data from the hard drives in the mac on the theory that some data might be on that but not yet in the backup. Add in some money for lost productivity and fifty thousand sounds more normal, if still a bit inflated.

doublelayer Silver badge

Plenty of small places have only one admin. Some very small places have no admin. I, for example, am a volunteer admin for a charity near me. Other than me, they have nobody, outsourced or not. When I arrived, their server was running on the "it better not fall over because nobody knows what it does or how its configured or the login password" paradigm. So it isn't that unusual to have only one admin, or at least one admin who manages all the systems with lower-level admins who do specific systems or systems in specific places. And I could destroy all this place's data in about five minutes should it turn out that I'm evil.

Take the bus... to get some new cables: Raspberry Pi 4s are a bit picky about USB-Cs

doublelayer Silver badge

Re: Let me get this straight

Of course it makes sense to do that, but here are a few other things it makes sense to do:

1. Have one, and only one, type of cable that can connect to the connector so you can't have, say, a thunderbolt cable which will connect to the port but won't actually work unless both devices are thunderbolt, or a cable that is designed only for visual data so can't carry power or connect two general purpose devices.

2. Have one, and only one, power style so you can't accidentally connect a standard USB 5V system to the newer high-power system and fry it.

3. Make the spec as rudimentary as possible so people who don't read it all the way through (random startups, the raspberry pi people this time unfortunately), are likely to have it work.

And yes, I would have to ask if USB C is really that big an advantage over normal USB. There were a lot of downsides about it, but the flipping cables over to try the other way was a minor annoyance and the connectors proved their longevity.

doublelayer Silver badge

Re: "the Pi is not a toy but increasing used for serious jobs"

"If you buy and use something designed for a different use, especially if you do just because it's the cheapest around, and you have issues, it's just your fault."

They're not buying it for a "different use [case]". The pi is meant to be a computer with the specified interfaces, and they're buying it to use the computing with those interfaces. It is failing to properly do one of the things it said it would, namely receive power from a USB C connection.

In addition, you're not at fault if a product fails to do something it said it would. The designers or manufacturers or sometimes plain bad luck are at fault. If you still subscribe to this policy, I'm pleased to inform you that I've just started a business. If you have a task you want to perform, send me a message detailing what you're doing and what tech you would be using for that purpose. Our business will happily sell you technology with the same feature set for twice as much. You don't want to buy our solution for twice as much? Well fine, but just remember that if the one you buy doesn't work for some reason including a design flaw, it's all your fault because you decided to buy a cheaper product.

Marriott's got 99 million problems and the ICO's one: Starwood hack mega-fine looms over

doublelayer Silver badge

Re: Collateral damage in the Cyberwar

There's a clear difference between you getting burgled and a company having customer data stolen from them. I'll lay it out for you:

You get burgled: your stuff is gone. At the very least, you have to go through the insurance claims process and purchase new possessions. Usually, you're out quite a bit of value.

Company has information stolen: Customers have to worry about account compromises and identity theft. Without laws like these, the worst the company itself has to deal with is the risk that people might try to avoid their hotels. Given that this is not a market with an infinite number of participants, that isn't a major risk.

There's the difference. When the negative event only harms you, we don't penalize you for the consequences. When it does, we can look into whether you were at fault. That doesn't mean that you or the company in this case is at fault for the whole thing, and their sentence isn't of the kind you'd get for actually performing that breach, but it is a perfect case for laws against negligence leading to harm, and data protection law better formalizes that in the specific case of data loss. I hope the ICO takes this into account, as a breach can happen to anyone no matter how much security they've done, but I don't see any evidence that they have not.

doublelayer Silver badge

Re: Just the cost of doing business

If you're referring to the California Consumer Privacy Act, that doesn't take effect until 2020, so California can't impose any penalties based on that law for this breach. By 2020, I'm sure the various amendments proposed by the many definitely consumer-oriented organizations founded just after the CCPA was passed because some consumers in Mountainview and Menlo Park were just that interested will have been installed in the law and it won't have any effect then either.

Wanna sue us for selling your location? Think again: You should read your contract's fine print, says T-Mobile US

doublelayer Silver badge

A backup plan

So, although we all think arbitration clauses are harmful, they'll probably get supported. I can only hope that the contract makes the company cover the costs for the arbitration unless they are proven to not be at fault (I'm sure they don't want to do that, but I've seen it before in such clauses). Maybe we can get enough people to start individual arbitration cases to show the companies that, if they want this to end within their lifetimes, they should just let the single trial go through.

Chinese government has got it 'spot on' when it comes to face-recog tech says, er, London's Met cops' top rep

doublelayer Silver badge

I don't know what calculations you tried, but I think you're missing a variable necessary for the calculation of the false negative rate, namely the number of people in the sample who were supposed to be detected. Given that the sample was "the public" and the number of faces in the database is known but the number of people in the database who were actually there is entirely unknown, I would say that, even with an estimation of total sample size that we can assume is completely accurate, we cannot determine or even estimate the false negative rate.

I have no objections to judging the system as crap right now for its abysmal success rate and the unjust plans for its use.

doublelayer Silver badge

Re: China's not England

"Its really just an upgrade of the traditional PC Plod who knows everyone on his beat"

It isn't and I at least wouldn't want that either. Facial recognition isn't a police officer seeing a person and going "That guy is typically here". It's a system that records my presence, possibly reports me as someone I'm not, then keeps my picture on file and cross-lists it with any other pictures from other places and other times, because they've said they're not going to erase any of this data. That's not what a normal police officer does. In fact, a normal police officer shouldn't spend a lot of time identifying unfamiliar people anyway because sometimes we people visit places we don't frequent, and we're perfectly within our rights to do that.

Now let's deal with your contention that this is just an upgrade of the previous role of a police officer. I don't want my police officers upgraded. We've spent a long time trying to give police enough power to stop crime without giving them enough power to harm citizens' rights. There are lots of ways we could "upgrade" the capabilities of a police officer. Let's start with the easy stuff: remove the pesky requirement to get warrants before searching places. That will speed things up dramatically. It will probably also increase the number of criminals arrested, because there are a few people who find out a warrant is being sought and destroy the evidence before the officer gets there. There would actually be some benefits to removing the warrant requirement. The only problem being that WE NEED WARRANTS TO PROTECT PRIVACY! We need a lot of these restrictions on police activity to protect privacy. Without them, the police become a much too powerful institution, prone to massive corruption and criminal activity in their own right. That's a profound downgrade, and we should not let it happen.

doublelayer Silver badge

Re: Decisions, Decisions...

I "can't blame states" for wanting to control the internet traffic going through them in the interest of state security? I bloody well can, my friend. It's wrong by nearly every metric. It's censorship, violations of privacy, in itself breaks several human rights laws, and opens the doors to many more intense violations typically characteristic of dictatorships. Every country that does that, whether their control is just watching the traffic, blocking traffic, or manipulating traffic, gets as much blame as I can dish out. China, blame. U.S., blame. Russia, blame. U.K., blame. The sooner they cut it out, the better. To the extent I can, I intend to support movements that result in the cutting out of this unjust and completely blameworthy activity.

Got an 'old' Tesla? Musk promises 'self-driving' upgrade chip ship by end of 2019

doublelayer Silver badge

Re: I like the idea

Personal self-driving cars don't have to be part of a taxi net. It'd be an optional choice you could do to make money. For those who don't need the money and value immediate access to the vehicle, it wouldn't be a very good use case. It'd be sort of the same as allowing people to rent out your normal car if there was a convenient way to let them in, which doesn't sound like a popular program idea to me.

If this were attempted, there would likely be a requirement for dedicated vehicles for that service. In that case, I assume there would be charging stations located throughout the service area. When a car was low on power it would remove itself from the network, drive to charge, and only put itself back online when it had charged. Whenever there were gaps in traffic where more cars were available than in demand, the cars with the lowest charge would drive themselves to the charging stations as well.

Chrome's default-on ad blocker – which doesn't block adverts on 99% of websites – goes global

doublelayer Silver badge

Brief summary

If you like privacy, or security, or control, or diversity, don't use Chrome. That pretty much covers any Chrome-based article.

Fibaro flummoxed, Georgia courts held for ransom, and more

doublelayer Silver badge

Re: Lake City IT boss fired for ransomware payment

I concur in your argument, but most people whose job is hiring IT directors have different ideas. Keeping the systems up right now is their primary goal, plus getting new systems up as fast as possible. Thinking about the longterm is on the list but lower. At times, usually for financial reasons, backup plans are specifically left unfunded (no ability on the part of the IT director to reallocate funds to backup from something else). Of course, in that case, I'd at least have an improvised backup system, but I wouldn't support firing the IT director for a backup problem if this was proven to be the case. And then, there are those cases where someone does some misguided maths and decides that it might be cheaper to pay the criminals than to manually recover and a tech site says it's sometimes a good idea, which could also be a decision made by someone external to IT (though if that happened where I'm working, I'd protest the decision and make plans to leave. I admit, however, that these possibilities are unlikely to be the case in this situation.

doublelayer Silver badge

Re: Lake City IT boss fired for ransomware payment

The story and videos (if watching these, expect to see about ten video ads inserted), make it sound like this, but I'm not sure. It is possible that the insurance company made the decision, but it is also possible that the city made the decision and the insurance company simply covered part of the expense. If the decision was due to the IT person not wanting to do the work of a restore or not having taken backups responsibly while having the ability to do so, I would see firing them as a logical option. Oh, if anyone from Lake City IT is reading this, you're going to want to reimage anyway because ransomware can just sit there waiting for more data to be put in before locking again. Your television station didn't make it clear that you know that, so just to make sure...

Metropolitan Police's facial recognition tech not only crap, but also of dubious legality – report

doublelayer Silver badge

I'm not a downvoter, but your question is unanswerable and missing the point. Nobody knows how many people were present, as they didn't test it on that. Also, most of us here, myself included, are not that happy having a 80% rate of someone innocent being taken in for questioning on the back of a system that violates citizens' rights.

doublelayer Silver badge

Re: It's in its infancy, but it will improve

"Pushing back against facial recognition is a bit of a waste of time. [...] Where you need to concentrate the fight is things like generating spurious criminal charges arising from concealing your face. [...]"

I'm not sure whether to upvote you for your last point, downvote you for your first point, or just boggle at how your last point almost directly contradicts your first point. Facial recognition equipment is in the same category as charging people for not letting them use their facial recognition equipment on you. They're two sides of the same coin, yin and yang. Since we both agree that charging people for hiding their faces is wrong, let's look at the first point. Having that equipment allows them to do the same kind of tracking. It makes it impossible for citizens to have privacy unless they specifically try to, in which case they will be charged. It is not a thing we should just accept, because in addition to it actually being illegal according to current laws, it is so unpalatable to those who like human rights that it should be made even more illegal through additional legislation.

Your comment that "Facial recognition is what cops do so denying them the use of a machine that will help do this is just not going to work" is rubbish for two primary reasons. First, there are plenty of things that cops do, and we accept, but we don't want to extend their abilities. Cops search suspects' houses for incriminating information, when they have a warrant. We could extend this by not requiring a warrant, but we don't because we don't want the police to have that power. We only want them to search places when they have a warrant to do so. Second, facial recognition is not the primary job of a police officer. Even those officers who work directly in public and not, say, investigating existing crimes aren't there to look at everyone's face and determine if they have seen it on a list. They're there to identify crimes and safety risks and deal with them. In almost all cases, they have not seen the perpetrator before, but they still go after them. If the police said they were going to throw away this system and instead employ a bunch of officers whose job it was to go to everyone and stare at their face to identify whether it's on a list, I wouldn't be any happier.

doublelayer Silver badge

Re: It's in its infancy, but it will improve

* You have a personal tracing device in your pocket RIGHT NOW (your phone).

With as much tracking turned off as I can, and if I was worried that people were actively tracking me with it, I'd leave it at home.

* You have listening devices in your home RIGHT NOW (Smart TV, digital assistant, games console...)

None of those. A few things have microphones and internet connections but I've set them up and know what they're doing. If I was worried that people were actively tracking me with them, I'd disconnect either the microphone or the connection.

* You have behaviour monitoring devices RIGHT NOW (activity tracker, internet connect fridge, home automation...)

None of those at the moment, but I once had an activity tracker that I gave away because I didn't use it. It monitored my heart rate during exercise, and could send it to my phone but I never enabled that. So it was a tracker whose tracking data only went to me, and it lacked the technical ability to report on me. If I was worried that people were actively tracking me with it, somehow circumventing the limitations of the device making this impossible, I'd leave it behind.

* You are using facial recognition RIGHT NOW (Facebook, Windows, Apple...)

None of those. I prefer passwords to log into my computer, and no Facebook account. If I did use a facial recognition system, I'd do so in such a way that the recognition was done using local processing on local data only.

* You are happy to be tracked RIGHT NOW (advertising)

I am not happy. That's why I have ad blockers, tracker blockers, and a DNS filter. Even that is tracking for economic purposes, not complete surveillance, so is not as bad an abuse as what has been considered (and done already) by governments.

doublelayer Silver badge

Re: Help with "Innovative Solutions"

You may be happy for the Chinese to use your data, but maybe you'll change your mind when you figure out that they can use your data to help improve the technology they use to commit massive human rights abuses on someone else. Consider this (audio), for example. That's what they can use data for, and it can come here once they've perfected it and on the way used it to imprison and kill thousands and eventually millions of innocent people. Are you still fine with it?

King's College London breached GDPR by sharing list of activist students with cops

doublelayer Silver badge

A suggested solution

As a developer, I'd like to suggest a software solution to this. The relevant modules are presumed to have been imported:

def dealwith(employee):

if !employee.ask("Did you have any knowledge of this?"): return

if employee.ask("Did you report this to the relevant authority?"):

authority=employee.ask("What authority was that, then?")

dealwith(authority)

return

supervisor_knowledge = employee.ask("Did your supervisor know about this?")

security.inform("We have another card for you to block out.", employee.cardnum)

hr.update(employee.id, employment_status=hr.NOT_EMPLOYED, flags=hr.DO_NOT_EMPLOY)

employee.employed = False

for colleague in employee.colleagues:

dealwith(colleague)

for subordinate in employee.subordinates:

dealwith(subordinate)

dealwith(employee.supervisor) # security warning, not trusting potentially unreliable result of variable supervisor_knowledge

employee.inform("Oh, dear. Unfortunately, you're going to have to leave now and never come back.")

return

dealwith(email_to_police.sender)

print("Done")

Microsoft has Windows 1.0 retrogasm: Remember when Windows ran in kilobytes, not gigabytes?

doublelayer Silver badge

Re: 32 Gigs

Most machines in that class have their storage on soldered-on EMMCs. It's flash and not bad from a speed perspective, but nearly impossible to replace. Usually, these are best with a card in the available slot for all user data storage, but things that have to be on the main disk can still rapidly use up the remaining space, especially Windows updates.