* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Top LLMs struggle to make accurate legal arguments

doublelayer Silver badge

Re: Who’s actually talking gibberish here?

Laws are not easily understood, but even if they were, LLMs wouldn't handle them properly because they are LLMs and they can't handle anything particularly detailed. An LLM builds its model by getting a lot of reinforcement, which means if there is a small detail that's important in your situation but not in others' situations, then it's likely to have seen many more sources that don't bother with the detail and try to treat you accordingly. Laws, meanwhile, are a collection of details that apply in some situation and not in others, making them a poor thing to use an LLM to understand.

doublelayer Silver badge

Re: what's special about legal eagles?

There are some reasons to expect that it will be even worse at legal situations than at some others, since it is very easy for historical data to be invalid and for tiny differences in the input situation to make a big difference to the accurate answer. While it's not too accurate at anything, law would be one of the worst things to use it for, probably along with medicine. Some things that involve more rote memorization would be more accurate, though likely not accurate enough to use, which is why LLMs have been so useful at cheating at basic schoolwork where you have to learn the same basics that everyone else learned in order to properly manage the advanced stuff you'll learn later.

doublelayer Silver badge

Re: Quite human

Not in my experience. When I search for something, I may get something useful, I may get nothing related to what I want, or I might get things that are related but aren't helpful. What I rarely see is something that looks like it's helpful but is actually complete gibberish. For example, I was looking for a source for firmware update files for hardware whose manufacturer does not properly organize and present them, and I got firmware files for a similarly-named but otherwise completely different product. I did not get an essay summarizing firmware updates that didn't exist. I much prefer the former because I can quickly identify that the hardware I'm looking at is not for radio stations, so I don't want that result.

doublelayer Silver badge

Re: Reason

It's not even as simple as the AI being fed garbage data and not filtering it out, but sometimes the AI being fed applicable data and not being able to determine when it is applicable and when it is not. Admittedly, I've seen humans fail that test as well, but they're usually a bit better at it. For example, a person does a search for a legal issue and gets results that describe, accurately, the process for dealing with that issue in a place they're not in. The location where it applies will be written in that article, and most people will find that out and try to find another article. Language models will probably fail to correlate that mention of the location with all the words further along in the article and, if what it says is common enough, give it to anyone who asks about the issue, even if that person specifically mentioned a different location. It got correct data and nonetheless generates garbage. That is what an LLM does, and the sooner people realize that, the fewer idiots they will make of themselves.

Trump-era rules reversed on treating gig workers as contractors

doublelayer Silver badge

The test you propose isn't very good at dealing with this question. For example, in the case of the ridesharing companies, the person driving is told how much they would be paid and what they would be doing, but they have the choice to individually accept and reject those occasions. If we were using your test, I think that would not meet your qualification for employees. There would be a lot of arguing from the companies that this makes the workers independent. If that's not what you intended, you may need a different test.

X's 2024 plans include peer-to-peer payments in app push

doublelayer Silver badge

My best guess is that you try to identify customers who don't know about the product, then some who do know but aren't convinced, then those who like it but need to be pushed to buy, then those who already bought who need to be encouraged to buy more of it (even if it's something you buy every decade or two). You write four different ads for the types of customer, then spam them out at random because the targeting system has no good way of determining which of them any given user might be. Eventually, somebody tries to save some money by not bothering to write four ads and spamming the one version out to everyone, and we have the internet ads we know and block today.

OpenAI: 'Impossible to train today’s leading AI models without using copyrighted materials'

doublelayer Silver badge

Re: Sounds like...

True, but this was a discussion about whether you can claim that training an LLM is similar to human learning. You don't need to prove the method of human intelligence if you just want to make a copyright point, but if your defense to the copyright claim is based in neuroscience, you do. The AI companies have made it clear that they're not going to attempt it, likely because they have experts who know how silly it would be to do. While they might succeed at confusing a jury, they'd have to do it by lying to them. Meanwhile, their fair use defense will be easier to argue, so it appears they're going with that. Their analogies will not be to education and human brains, but to libraries and search engines. I don't think that argument is good, but it's a lot closer to valid than the one about learning.

doublelayer Silver badge

Re: Sounds like...

This is subjective, but I do not think your argument qualifies. Remembering a sentence and modifying it is not the same as remembering the entire book and quoting it. LLMs have frequently done the latter. It's not "It was the best of times, it was the worst of times" but me typing the entirety of the opening chapter into this box. I have read that book, but I cannot do that. I don't think any student could unless they had specifically studied the chapter or if they were trapped in a prison cell with only that book for years and had become obsessive. LLMs frequently do it without that being the desired outcome, and when people do want that outcome, it happens quite reliably.

doublelayer Silver badge

Re: Sounds like...

"Can it be argued that training is similar to a child reading a copyrighted book"

It can be argued, and it has been by many people. I have yet to see it argued successfully, however. Usually, the argument goes like this:

The process of getting text into this model is called training. The process of educating a child can be called training. Therefore they must be the same. The work printed by the model looks like an essay. Students also produce essays. They must be the same. Argument ends here.

Actually arguing that would require you to demonstrate why the training of a model which can and does memorize large chunks of text and sometimes prints it verbatim is equivalent to human reading, and not by resorting to humans with incredible memories who may or may not be able to recount a book back to you on reading it once. It will require you to determine if you think that reading some books and reading millions of books, more than any human could possibly do, are the same or not. It will require you to prove an equivalence between the statistical methods used on the training material and human intelligence, which will be quite difficult. It will require you to prove that the parts of human experience other than reading which affect their products are sufficiently small that they can be discounted when making the comparison to the way an LLM produces its output. Unfortunately for anyone making these arguments, these are all relatively subjective arguments, but to the extent that they can be argued, they usually produce a stronger conclusion that ingestion of text into a model is not at all like a student's learning.

Apple sets new 16,000-foot iPhone drop test after 737 fuselage fail

doublelayer Silver badge

It doesn't. You can set it to never lock automatically unless you press the button. It'll kill your battery the first time you think you pressed the button and didn't, it will make a stolen device much easier to keep alive while waiting, but if you want that option, you can select it. Alternatively, maybe they meant that the user had not set a passcode so it could be unlocked by anyone, again a nondefault behavior which you are certainly able to select.

doublelayer Silver badge

Re: "I found a phone sitting on the side of the road that had apparently fallen 16,000 feet."

Figure out where the phone came from: a plane. Figure out how high the plane was when the phone stopped being in it: approximately 16,000 feet. Insert the word "apparently" in case this was someone mocking up a fake ticket and planting a phone where debris from the plane would have landed or if a helpful skydiver carefully brought it down.

doublelayer Silver badge

Re: > Fake news

"I think it was Apple, who first started showing non-skippable ads on YouTube."

I don't know if Apple used that feature, but you can hardly blame Apple for YouTube deciding to remove your ability to skip ads. Well you can't if you're being logical.

Open source's new mission: To boldly go where no software has gone before

doublelayer Silver badge

Re: What but not why...

Which is why I have said, here and in multiple preceding comments, that it would make a lot of sense not to accept a deal which is only for exposure. However, it doesn't mean that someone offering it is abusing them, because they have the freedom to reject the offer, propose a different one, or find someone else.

A lot of this is also based on the concept of a going rate, as if there's some fair value of an artwork. In both software and art, this is not the case. A piece of software might be invaluably precious to one company that really needs that functionality and worthless to most others. I have written some of that. Similarly, an artwork is valued based on subjective estimations of quality, what they expect others to think of it, and whether they think it would look nice next to the other artworks they already have. If we removed all possibility of someone trying to get the artwork on the cheap and everyone actually said the maximum amount of money they'd be willing to pay to acquire it, they would still have a lot of variation and some people would offer really small numbers because they don't like the artwork very much or don't see much value in it. Those people are not abusing the artist by offering below a fair value. They are just customers the artist doesn't want to sell to.

doublelayer Silver badge

Re: What but not why...

"The Karens of the IT world use exactly this argument - they get to decide what the value is, not the person who has put months or even years of effort into a project."

That is not what I am saying. I am saying that everyone, big company or individual, programmer or buyer, decides what they think the value is. They then suggest some terms to the person they're negotiating with, and if their values are wildly divergent, a sale doesn't happen. If I'm selling licenses to my product and I think the appropriate price for a license is £5k per user per month, you are not being unfair to me by telling me that you don't see any more than £500. I may reduce my price because I want your business, but with a difference like that, the chances are high that I will simply tell you that your price is not acceptable for me, but you are free to come back if you fail to find something at the price you want. Nobody is forcing people to accept lower prices. As disappointing as it might be to find that people are not willing to pay you the value you expect, they have not violated you by not valuing your work as highly as you do. If they offer you something insultingly small, then don't hesitate to tell them you'll find another buyer.

doublelayer Silver badge

Re: What but not why...

As the buyer of the art, I decide how much value I think the art has. As the seller of the art, you decide how much value you think you are getting from my proposal. That means that if I offer you £50, you consider such things as whether you want payment in pounds and whether 50 is enough of them, and if I offer you exposure, you consider what kind of exposure you'll actually get and how likely that is to result in a benefit to you. You might ask such questions as whether I'm going to display it, and when and where that will be, and for how long, and lots of other questions. Then you put a value on that and decide whether it's worth it.

The same applies to me saying that I'll buy your product if you make it open source. You have to decide how much it's worth to you to keep this closed source, how much you'll lose by making it open source, and see if what I'm offering bridges that gap. If you decide it doesn't, you either negotiate with me for better terms or you decline my offer and find something else. That I offered you terms you don't like is neither abuse nor should it be unacceptable. It shouldn't be unacceptable because the other party is making exactly the same calculations: they decide how much they're willing to pay for something and try to factor in any other options, for example how much value they would expect to gain from having access to the code they purchased. You may find yourself facing an offer like "I'll pay you £50k if you make this open source", and it may well be composed of a "I would pay £2k for the product as is, I would pay £15k if I had a guarantee of support, and I would pay £50k for the ability to support it myself and distribute changes in case the writer disappears". All of those numbers may be too low for you, but they have not violated your rights or the bounds of propriety by suggesting them.

doublelayer Silver badge

Re: What but not why...

And, like the art world, it's completely acceptable. I can tell someone that I won't pay for their art but I will happily show it to people. If they don't like that, and they have good reason not to, then they shouldn't give me any of their art. If someone refuses to pay the price you think is deserved, then don't give them your product. If everyone isn't willing to pay what you want, then you may have to reconsider what you'll charge or how you'll do it, but that doesn't mean you just do whatever anyone asks for.

doublelayer Silver badge

Re: What but not why...

"It also (as another poster raised and promptly got downvoted for) can be wildly abused as a mechanism for denying the reward for work done."

They got downvotes because it's not abuse. It's specifically written into the license the person doing the work chose. If I write some code and say you can use it for free, and you can make money from using it, then maybe I should have tried to charge you in the first place. There's a reasonable chance you wouldn't have used my code in that case, but if I choose to give you the right to use it for free, then I should expect that you get to use it for free. There are a lot of options for making software which cannot be used in commercial situations without payment. If you don't choose any of those methods, and you specifically choose one that does allow it, it is not abuse when people do what you said they could.

Everyone's suing AI over text and pics. But music? You ain't seen nothing yet

doublelayer Silver badge

It doesn't set any precedent. She could do that because she retained copyright to the music itself, just not the specific recording of her singing it. She had the rights to make a new recording of her singing her copyrighted work. Nobody had a claim against her for doing it. Had she signed over the rights to the song, not just the recording, she would not have been permitted to do so.

doublelayer Silver badge

That's been tried. It doesn't work. Just as you can release every combination of two words into the public domain, and every single word, but that won't eliminate copyright on sentences produced from the words. Music copyright complaints, when they're talking about small similarities between two distinct pieces, are often dubious in quality. A brute force algorithm won't fix it for two reasons:

1. The copyright office in the United States has clearly stated that a dumb program's output can't be copyrighted unless there is significant human effort involved, so they don't have copyright over the tiny chunks in the United States, where many of the lawsuits occur.

2. Most of the sections would be too small to copyright anyway, in the same way that I can't write "I am" (copyright me, you can't use it).

doublelayer Silver badge

Re: Won't be a problem

They'll probably try, but I doubt it will work. A lot of musicians and bands have a powerful brand which attracts people to spend money on it. It's not just that they make good music. Most of the popular ones make reasonably good music, assuming you like the genre they're making it in, but others could manage that as well.

Books work similarly. There are several authors I really like reading and, when they publish a new book, I eagerly go out and read it. This isn't because other authors can't write a book of comparable quality, but because I don't know about them yet. The author's name can be a powerful influence on whether people buy it since they know what they're getting. If every book was published under a new pseudonym, I wouldn't already know I liked it and would be less likely to find out about its existence, meaning fewer sales. Publishers might respond to this by trying to sell lots of AI-generated or ghost-written books under the same pseudonym, but if they do it too much, I will figure out that the name is no longer attached to the consistent quality I'm looking for and stop reading books by that pseudonym. The benefit of a brand that conveys a certain message to the people buying the work will probably keep individuals around, both in literature and in music.

Ransomware payment ban: Wrong idea at the wrong time

doublelayer Silver badge

That will result in a lot of debates about what counts as a result of. If I can find another factor, would that cancel out the "result of" part? For example, you had to enter your password, but then a software exploit allowed it to gain more control after that. Can the software writers argue that they're not at fault because nothing could have happened had you not entered the password? It will also mean debating the definition of "exploit". One that permits installation or elevation is clear enough, but those are often less common than something less clear, such as malware watching user actions and stealing credentials, which could theoretically be prevented with different system design but in practice wouldn't on any platform. If Microsoft points out that, had this been Linux, the malware would have had the same ability to conduct monitoring, who is at fault then?

If you want to assign blame to someone, you will often find that the blame goes to a very large set of different people, often including people you don't want to see blamed.

doublelayer Silver badge

Re: class ransomware as a weapon of mass destruction?

Do you want that tested over your house? Are you really planning your international policy on Russia being unwilling or unable to maintain some nuclear weapons to back up the frequent threats, weapons they already had? I'm sure the Russian arsenal is less modern and well-maintained than the American or British ones, but an old nuclear weapon can still kill a lot of people. The reason that nuclear powers usually have a strong line against any use of nuclear weapons is that even one detonation can be catastrophic. Unless you seriously believe that Russia somehow managed to break every nuclear weapon they've ever had, you need to take their ability to use them into account when planning actions against them, which means that nuking them yourself is a really risky thing to do.

But let's assume it's not Russia. It's the People's Republic of Alphia which doesn't have any nuclear weapons. They can't get any meaningful revenge if you decide to attack them. Are you satisfied dropping a nuclear weapon on them when criminals operate from them and they don't do something about it? That will result in thousands to millions of innocent Alphians who didn't do that dying. It will probably cause people in Alphia's neighbors to die as well. It will certainly cause complete chaos in the region. It will likely cause a lot of Alphians to hate your country, so expect some Alphian terrorist movements trying to make you pay. Is that something you're comfortable doing, both from a moral and a pragmatic point of view?

doublelayer Silver badge

It depends what you have to do to get cut off. If it's really difficult, effectively making yourself a pariah to everybody, then it won't matter. The only country that's achieved that is North Korea, and basically nothing comes from their tiny address space. All their attacks come from other countries' addresses, most of that launched from Chinese proxies (as the first link in a chain to more proxies), and some also committed by people operating from a different country already. If it's really easy to get a country blocked from the internet, what makes you so sure that the one you're in won't get blocked for some reason? Russia may have burned a lot of its bridges with European countries and close allies, but they've got plenty of links with other countries, especially including India and China. How would we ban Russia from the internet if India and China were voting on their side and could easily proxy as much traffic as they needed to. Would we try to ban those two as well for not complying with our ban? The decisions required to implement that and trying to decide who should have the power to make them is a very difficult task.

doublelayer Silver badge

Re: How about a bounty?

They do that. For example, from this paper alone:

US offers $10m for info on DarkSide ransomware gang chiefs

US puts a $10m bounty on Hive while Russia shuts down access

US offers $15m for help catching Conti ransomware gang

If you have lots of cash to spend on that, you can keep doing it. I'm not sure the rewards promised in any of those have actually been paid, and I don't know how many useful leads they got from having those programs, but it is a tool and the US, at least, has been using it on occasion.

doublelayer Silver badge

It won't destroy cybercrime, but it would weaken it. Anyone could have set up an insider trading scheme based on causing sabotage any time in the past. However, it's much more difficult to implement correctly. You may not know, for example, how much damage your sabotage will do or when it will become known. If your attack occurs in July but they don't announce financial results until September, you don't know how bad it will look then and there's a chance your trading either fails or, more likely, produces a really tiny profit for a carefully-planned attack. If we could destroy ransomware entirely and only be left with things like that, that would be an improvement. I won't pretend that banning payment of ransoms would completely kill ransomware, as I'm sure there would still be some people willing to circumvent the ban rather than incur the consequences, but it would be helpful.

doublelayer Silver badge

Re: class ransomware as a weapon of mass destruction?

Sure, that will work great.

US: Excuse me Mr. Putin, but we detected some criminals operating from your country infecting hospitals with ransomware. We have a small missile pointed at Moscow and another one targeted at Volgograd, where we're pretty sure these guys are. We're about to kill two million of your citizens. What do you say?

Putin: One moment please.

...

Putin: I have thirty missiles ready to fire at thirty of your cities. I will kill fifteen million of your citizens. What do you say?

US: I have a hundred missiles. Thirty million citizens.

Putin: Five hundred missiles. Too many citizens to count.

US: Most of the missiles. Your country will not exist.

Putin: All our missiles. Your country and those of your allies won't exist.

The concept of mutually assured destruction is not new. You would do well to learn it.

doublelayer Silver badge

Re: "Such a ban would need to be universal"

If you want the logic to say that big business can do whatever it wants because it has ultimate power over everything, then let's just accept that. It's wrong and self-defeating, but we don't even have to argue about that to resolve this question. If the biggest businesses are beyond our ability to control them, then we still have the power to influence what everyone else can do, and that power is still big. So, whether we are powerless or not to regulate the actions of the largest companies (we are not), we can still make an impact by regulating what smaller ones and government-controlled entities as mentioned in the article, can do.

doublelayer Silver badge

Re: Wrong

"How can you frame it as a crime to pay to get your own data back under threat of damages to your company?"

Paying money to known criminals? It is already illegal if you replace "criminals" with "terrorists", because you know the money will be put to use committing terrorism which is assumed to be worse than whatever problem you're having. It's pretty easy to make that logical leap, and the law would be compatible with other criminal legislation that already exists. There is no legal obstacle, as far as I know, that would prevent you from passing and enforcing such a law. Therefore, it comes down to whether we, as the voters in democracies, wish to make that a criminal offense or not.

doublelayer Silver badge

Re: Wrong

The fact that someone made a mistake does not mean that we should adjust our laws to let them do whatever they think necessary to recover from their mistake. I have left too late for things before, but that didn't give me permission to treat the public streets as a racetrack to get where I needed to be on time. Making mistakes leads to consequences. Consequences are why you try to avoid mistakes when you can and to have contingencies for when you can't.

British Library: Finances remain healthy as ransomware recovery continues

doublelayer Silver badge

Re: I have trouble understanding this.

Let's say you have a server with reliable weekly backups. The server has been infected with ransomware and cannot be decrypted. The last four weeks' backups were encrypted as well because the operators watched you and determined that you do a test of the backup tape every month, so they waited for you to do one, corrupted the backups for the next month, then went through with the full attack. You can't restore any of those, but you can restore the one from five weeks ago. However, if you just hit the big restore button like you would do if the disks had failed, you'll get the server image from that time which still has their malware on it. So you may instead have to recreate a new server and carefully copy only the data back onto that server. Then you have to do something to recover last month's data, which could mean using some incremental backups you have, recreating from other sources, or dealing with unrecoverable data. Deciding which to do and actually carrying it out requires someone familiar with the system and someone familiar with the data, likely not the same person, and some time for each to evaluate the situation, determine the best method of recovery, and carry it out. Carrying it out may require more people to spend time doing so. You also have to make sure that the malware won't be able to reinfect the new server when you have it running, so you'll need to make some changes. I imagine you understand all these actions.

Now you have ten thousand servers, and they're not all the same, and many of them aren't just standalone servers but various types of infrastructure, from networking equipment to functions that get resources provisioned automatically by your datacenter VM management software or your cloud provider. Most of them don't do anything on their own, but work in a big cluster of other things. The data on the resources covers everything your company used to use, so you need many more data experts to determine how to recover it. The scale of the recovery effort isn't linear. Fortunately, your team is likely bigger, but that only goes so far.

In such a situation, it often comes down to luck. Something may have evaded the attack because it was better secured, because it didn't work the way the attackers had planned, or for many other reasons. It can also be a great opportunity to change the systems. I usually have a long list of changes that would probably be good to make, but we don't do it because everything's running right now and making big changes could break something. Now that everything is broken and we're rebuilding from scratch anyway, it might make some sense to make improvements so that the new version is better. That adds delays as well.

doublelayer Silver badge

Re: Someone wasn't doing their job.

"This time [...] with some security" is not something you can just buy. You have to work on doing that better than last time, and that takes time and effort. Insurance covering the costs depends on whether you had insurance that covers that, which not everyone does, and doesn't necessarily shorten the time to recovery; if the insurance lets you hire the most expensive consultants and as many of them as you want, then you can cut down on implementation time to some extent, but it usually doesn't let you do that. Even if it did, there comes a point where adding more people won't speed up the process anymore.

doublelayer Silver badge

Re: Backups

Not necessarily, but it is possible. They may be trying to rebuild something better rather than restoring exactly what they had before, or they might have to rebuild something different because they don't have some of what used to exist. From the statements in the article, I don't think we can know for sure whether either of those apply. Similarly, they may have restored a lot of the content from backups but want to recreate all the systems that handled that content from scratch, which would certainly add to the recovery time. It's often not as simple as did they have unaffected backups yes or no.

Windows keyboards to get a Copilot key – but how quickly will users jump?

doublelayer Silver badge

Re: What right has Microsoft got?

They're not dictating it, they're just asking people to do it and those people are following the request. Maybe they're paying for it, maybe not, but you're treating this as a more significant action than it is. We all have that right. If you can convince people who make keyboards to put on another key and they do it, then we will have a new key.

doublelayer Silver badge

That's what I was saying. Folder represents the abstract concept at the user level because folders appear to contain files and more folders. Directory represents the abstract concept at the developer level because directories contain the name and location of other things. Both are abstractions to some degree because the directory is actually a linked list of strings which are serializations of objects which contain strings and integers which refer to filesystem-relative locations which are translated into disk-specific information* which can be used to locate linked lists of strings which can be concatenated to produce the big string the user put there before, but nobody wants to deal with the concept on that level unless they have to.

* Or sometimes there are more levels in the middle, such as virtual disks, RAID arrays, filesystem redundancy, etc. Either abstraction is much nicer.

doublelayer Silver badge

Re: Cart Before The Horse?

"But for Bobby and Susy Office Worker, what exactly does AI bring to the table? I can get useless search results even faster? What's in it for me and the millions of other average users?"

If you need to write an email but don't want to be bothered thinking or typing, then you can use this to create a message that looks like it answers a question but really doesn't. If the person you are sending it to isn't bothering to read it, then you've saved yourself some time. Otherwise, you'll end up looking like a person either being deliberately unhelpful or someone with reading comprehension problems. That appears to be the use case for office workers that AI companies have thought of. I'm sure some people will try doing that. I didn't say it would be a good thing.

doublelayer Silver badge

"BTW, what's the difference between directories and folders?"

The level of abstraction involved in the name. Both are pretty abstract, but "folder" was intended to represent to the user what the thing does, and "directory" was intended to represent to the user how the thing worked. The concept that they're doing is identical.

Microsoft pulls the plug on WordPad, the world's least favorite text editor

doublelayer Silver badge

Re: the application will be removed on upgrade

Removing features when you install an update doesn't, in fact, send anyone to jail. It's the reality of software: if you choose to run someone's software, and you choose to install updates, then those updates can break things and they get the right from you having chosen to do that. If you don't want them to do that, you have to make other choices such as copying Word Pad and keeping it around, which looks to be pretty easy to do, or blocking the update, which we've known how to do since Windows 10 introduced the automatic updates feature. It's been around for ten years. Anyone posting here either knows at least three different ways of blocking Windows updates or can find them online. It's been pretty easy with a few minutes' effort since the beginning. You'll have to deal with the consequences of that choice if you choose to make it, which is why I suggest copying Word Pad if you use it and want to keep it.

It's like asking what gave my distribution maintainers the right to remove Python 2 from their repositories, because now old scripts from 2008 which don't run in Python 3 (and might not run correctly anyway) can't be run unless I install Python 2 manually. I gave them the right by using their distribution, or rather they didn't need the right because they choose what they put in it and I choose to take it. If I don't like it, I change what I'm doing so it doesn't happen.

doublelayer Silver badge

Re: Word Processing in the Cloud

It appears people disagree with my supposition. I'm curious if others have another reason they'd like to propose for why a school would intentionally remove both editors from a system? It can't be Microsoft doing it; Notepad is always there and Word Pad has been thus far as well. To actually remove them would take someone deliberately trying to do so. As much as we might try to blame Microsoft for it, can you actually name a version of Windows that has had them stripped out to push Office365, or for any other reason?

doublelayer Silver badge

Re: the application will be removed on upgrade

Because there is a risk in telling people that they ship this binary on everyone's installation but it's not supported. If, for example, a security vulnerability was found in it, would they really be able to claim that they don't support it, so that's not their fault? They would be blamed for that, so if they're no longer going to maintain it, they remove it. You can always put it back. It appears to be one executable, one DLL, and a resources file for each installed language, so it should be pretty easy to keep even after it's removed from preinstallation.

doublelayer Silver badge

Re: Word Processing in the Cloud

I'm sure that, if this is true, it was done intentionally by the place of education. If so, they likely did it to prevent students from writing something locally, saving it to a disk which isn't meant for storage of student work, and either losing important work or claiming that they did to get out of turning something in. The same reason why I've been asked to prevent people from being able to save documents except to a network drive, because evidently just telling people is not working.

After injecting cancer hospital with ransomware, crims threaten to swat patients

doublelayer Silver badge

It's a bunch of people from everywhere. One common setup involves Russia, because it and surrounding countries have had a lot of people who have technical skills but few job prospects, and Russia has turned a blind eye to criminals who don't attack Russians and occasionally help them disguise government actions. That's why some of the largest operations are based there. However, even those have a lot of outsourcing. For example, they might write the encryption software themselves and run the negotiations, but they let someone else break into the networks to install it. That person gets a cut and could easily be outside Russia. Similarly, even those who work for the group need not be in Russia, and very commonly are located elsewhere. Ukraine had a lot of participants, and while the Ukrainian authorities were much more helpful in arresting them when identified, it didn't stop it being a country with plenty of participants. A group can form in any country, can have employees or partners in any other set of countries, and can be created by multiple types of people, from those interested in a quick heist to governments trying to disguise military actions as a criminal enterprise.

doublelayer Silver badge

Re: Brutality

The quality of the prison doesn't change the expectation of ending up there. People do things all the time where the severity of the bad outcome is high but the risk of incurring it is, or they perceive that risk to be, low. Ransomware operators already have received very long sentences, but that's a small subset of people, and some of the others are living with quite a bit of wealth and happily evading law enforcement. Criminals have chosen to believe that they'll be like the latter and avoid the situation of the former. So far, they're mostly right to think they'll avoid the arm of the law, although they're often wrong about how well they'll be paid for the work. Increasing the severity of what will happen if law enforcement gets them won't have much of an effect unless law enforcement starts getting to more of them, and I think that the effect would be similar without increasing the penalties at all if they could only be applied more broadly.

doublelayer Silver badge

Re: Would it not be possible to give a patient list to the police...

It should be, and for all I know they may have some method of determining that which for some reason isn't used for many calls. However, criminals who have even a bit of a clue could find ways to relay calls from their location to somewhere local, or even pay someone to make the calls on their behalf. There was a group of adolescents interviewed on a security podcast who operated swatting as a service operations, so they could try outsourcing the work to those guys. It probably won't end well for the less intelligent of those ones, but it offers them another proxy.

For those who are interested in hearing it, the specific episode is Episode 83: 'DING-DONG DITCH' ON STEROIDS (link goes to Apple podcasts).

doublelayer Silver badge

Re: Would it not be possible to give a patient list to the police...

Fine with me. And those are? The problem with crime of this nature is that we usually don't know all the names and addresses, and when we find out one of them, it's usually more useful to hide it because there's a chance we may find more, while publishing the one we have will just alert them that we're getting close. Some criminals have been arrested successfully when law enforcement has succeeded in unmasking them, but unfortunately not often enough to stop others doing it.

AI-generated bug reports are seriously annoying for developers

doublelayer Silver badge

Re: Charge bug bounty hunters an entry fee

It won't affect academia or Project Zero types because those people have a lot more ability to report things without penalty and they are also listened to if they have to report something publicly. If a company wants to get rid of the HackerOne types, they have a clear option: don't have a HackerOne presence. If they've decided that the noise from people looking for an opportunistic quick reward is worth the potential benefit of more people looking for and reporting real issues, then this is a more important problem for them. Public bug bounties have always been prone to bad submissions, a problem that AI will probably exacerbate, but each company can individually choose whether to participate.

doublelayer Silver badge

I'd argue against this, but I think you misread the situation so much that it's virtually impossible to debate the point with you. Somehow reporting a problem is the same as advertising, even though I don't pay anybody to use libcurl and the article mentions nothing encouraging use of it. I think you might need to read the article again.

doublelayer Silver badge

Re: Charge bug bounty hunters an entry fee

It will probably get rid of all hunters, both those who submit crap and those who don't. Hunters may be concerned about submitting a real bug and getting charged for it, especially if companies are being vindictive as they sometimes do. While I don't do commercial bug hunting, I've had the experience of reporting a vulnerability to a company and getting a nasty message back because they didn't like having a problem brought to light, so I'd be careful not to do that if it involved getting a nasty message and paying them for the privilege. I think that's what you'll get, but we can always try. I wish there was a better way, but I don't have one.

Google to start third-party cookie cull for 30 million Chrome users

doublelayer Silver badge

Re: What's the betting

It probably won't be as simple as rm Chrome/Profile/advertiser_files/*, but I expect it won't be intentionally obfuscated as you appear to suggest. They just don't need to do that. If someone was motivated to do that, they could do all sorts of things, for example just creating a basic profile containing their settings and, every time Chrome closes, delete the old one and substitute in the premade one. Google hasn't prevented that or even made it at all more difficult. They don't collect data by making it impossible to avoid, but by making it difficult to avoid and counting on people not bothering to do anything too complicated. The things they have gone after have been the ones that are easy for lots of users to do, for example installing an ad blocker, which can be managed by a nontechnical user who is willing to push a few buttons, and even that isn't particularly common among the general public. The reason it doesn't happen is that those of us who are willing to take more invasive measures are less likely to be running Chrome anyway, using either Firefox or a Chromium-derived alternative with some of this stuff stripped out, though not as much as would be ideal.

Tech support done bad sure makes it hard to do tech support good

doublelayer Silver badge

Re: A penny saved and a pound lost

I've also seen some disasters of doing things on the expensive. Mostly, it's people who don't want to spend the time to build something right, so they figure that the expensive option will mean they can skip that part. Alternatively, people who actually do get things set up properly, but spend so much on the expensive things that they eventually run out of money for other things they also need, usually just at the level of the project budget rather than the entire company, but I'm sure other companies run into a similar problem.

This situation looks unrelated. I see nothing here that says the private feed they were using was required over the cheaper option, so someone who told the company that they should stick with the private option to avoid this mess would be needlessly spending money. What they actually needed to do was to properly implement the new option they switched to, but that's on their processes and the vendor's docs, not the decision to switch feeds.

SpaceX accused of firing employees critical of free speech fan Elon Musk

doublelayer Silver badge

Re: Don't get this confused with free speech.

Musk has spoken frequently about "free speech", that is to say, not government restrictions on speech, but others' reactions to that speech which he doesn't like. Now, he is reacting to others' speech that he doesn't like. The inconsistency is common. I think he has the right to do what he did, but it is inconsistent with his complaints when others were treated similarly. I interpreted the headline to be referring to his previous statements about speech and its consequences, which he has contradicted numerous times including now.