* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Raspberry Pi production rate rising to a million a month

doublelayer Silver badge

Re: A Bit Late Now

There are several products that aim for that part of the market. This post compares several good options for performance and power usage, although it didn't include everything and has not been updated. In many cases, it comes down to your specific requirements. Many projects will absolutely need something that not every other project does, and so some of these boards will leave something out that makes them unsuitable, or in some cases include something that makes it worse such as adding on other peripherals which increase the size of the unit for space-constrained projects.

Windows XP's adventures in the afterlife shows copyright's copywrongs

doublelayer Silver badge

Re: The problem is caused

Except your analogy doesn't fit the software experience at all. If you work in industrial controls, you already know this.

Microsoft did not disable Windows XP from working. It still runs on any machine on which it was installed, and you can still activate it. They don't sue anyone who makes spares for it; if I open a company where I say I'll help you install XP on something, I'm allowed to do so. If I write antimalware software for it, I'm allowed to do that. Microsoft not only doesn't sue me for doing this, they have no right to sue on that basis. If I sold a bunch of copies of XP which I've hacked, they do have the right to sue me for that, although they probably don't care enough to bother, but that is not at all what you were implying with your car analogy.

If we stick with the car analogy, manufacturers eventually stop making spares for a certain model. That doesn't mean you're forbidden from using your old car, or that you won't be able to find spares, but at some point, they don't consider it worth it to continue making parts that few people need. Software people do the same. It's your choice whether to use the old versions, buy the updated version, or switch to an alternative product. Where that choice is limited, I oppose it, but the response to that should be freedom to choose the software you are going to buy, not a mandate for permanent support.

doublelayer Silver badge

Re: Make like trademarks, not patents or copyright?

"the publisher still stands ready to fix any significant bug or security vulnerability that might pop up."

You don't have that now. The publisher will try to fix any bug or vulnerability that they feel is bad enough to cause them a problem, but not otherwise. This is annoying, but there has never been any requirement that manufacturers of anything, software or otherwise, fixes a problem you might have unless it leads to safety issues. You can sometimes return a product based on those, but not even that in all cases.

It's not really a parallel to trademarks either; to keep a trademark, you must continue to use it in business, not to make available the products with which you once used it. If Apple decided they were shutting down but wanted to keep the name for computer products, they could make a single Apple Computer which sells for a million dollars and contains as the only processor an RP2040 and a tiny screen, no battery, no disks, and no ports. Insert your joke about actual Apple prices and product features here. They can still keep the name, even if all the Macs are dropped.

doublelayer Silver badge

Re: Hmmm..

"You will never fix *anything* if you put off trying because "doing that one thing won't fix it all in one fell swoop"."

You will also never fix anything by just making changes because you're aware of the problem but not how or whether your changes will address it. That approach is likely to have more counterproductive effects, because after a few "Something must be done, so how about this" attempts, people lose the desire to keep trying things at random.

"Copyright should be 20 years" is a policy that's going to cause several big changes in the area of IP. We don't know what all of those are, but even those which can be assumed are being ignored by many here who are proposing it. For example, if copyright was canceled that quickly, then you could use Windows XP for free without legal problems, which is ... basically what you already have because Microsoft hasn't sent anyone to punish those who leaked the license generator. It's not enshrined in law, but it is what happens de facto. That's not what people are asking for, though, which means that when the change to copyright means that software support and availability hasn't changed, they'll want to introduce a new change. For example, some posts here which have advocated some type of mandatory publishing of source code, which will cause a lot more changes. In the meantime, the shortened copyright term will have caused a lot of chaos in other types of intellectual property that don't become as obsolete in two decades, and someone will want to clean that up. This idea seems to have been written after about five minutes' thought, and that's a poor way to fix any problem.

doublelayer Silver badge

Re: Coppyright length

"Where is that income stream coming from? Obviously from the pockets of music consumers (e.g. subscribers to streaming services), but less obviously, by diverting money away from current, less well-known artists, into a small pool of incredibly wealthy artists and corporations."

No, that's not the case. It comes from people who still like that music, even years on. If everybody decided that they've heard that music and they're done with it now, there would be no income stream. It exists because people who listen to music, buy it and put it into something else, or ever make a choice of a particular piece are choosing that one. The successful artists are making a lot of money, and the corporations that have those artists in contracts are making even more, but they're only making that much because the music available through those contracts continues to be popular. Under your system where that popular music becomes free, you're going to get even less money going to new artists for a simple reason. Here's an example.

The current method:

Advertiser: We want to put some music under this advert. We could buy the rights to a very popular song from the 1980s for $bunch_of_money, or this less well-known song for $bunch_of_money/4. Which one do you want?

The shortened copyright method:

Advertiser: We want to put some music under this advert. We could buy the rights to a song which is not well-known for $bunch_of_money/4, or a very popular song from the 1980s for $0, which a lot of people are listening to because anyone can have it for free. Which one do you want?

In the second scenario, the artist who wrote that famous song will be getting nothing, but the new artists will also be getting less. You would have a cheap streaming service which just has all the popular music, not including the last twenty years or whatever limit you set, and they'd be able to charge much less because they keep all the profits.

Has Amazon found the ultimate lock-in? Cheap cellphone service for Prime

doublelayer Silver badge

Re: Connectivity and reach

That's probably true, and they'd have to make the system themselves because the mobile providers I'm aware of don't tend to make it easy to buy a lot of individual connections that are mostly unused. I've commented on this before, but I wonder if the costs are really high enough that they don't want to let people have lots of connections which are charged by the data used, not by just having a line open. If I could connect something cheaply without having to pay a frequent renewal payment, I'd probably have quite a few of them.

However, if this is limited to the United States, then Amazon may have an alternative since that's also where they have the Amazon Sidewalk (use your neighbor's bandwidth) system.

doublelayer Silver badge

Re: I might as well sign-over my pension check to Amazon. NOT!!

"I did not find any which excluded 5G (OTOH, none promised 5G would work)."

Out of curiosity, why do you want that? If your device doesn't support it or the signal isn't present, it won't be used. If your device does support it and you travel somewhere that has it, you get to use it. They tend not to exclude it because they don't really care which signal you're using, so whatever they have, they'll use that to provide you the service. The rest of your considerations make sense, but I'm not sure that finding one that is specific about that will be possible or would be helpful.

Smartphone recovery that's always around the corner is around the corner

doublelayer Silver badge

Re: Every comment above nails it

"no lack of gimmickry and complexity."

Actually, I can't think of any real gimmicks recently. Of course, every announcement includes something they say they've done with the camera using AI, but they're usually not clear what that is and I wouldn't use it anyway. As for other gimmicks, the only one I can think of is folding.

If manufacturers were making a lot of weird devices, I might not want them, but at least they'd have some interest level. Do we want a device with a custom-made laptop dock it just slots into the device with more buttons on the sides for shortcuts, or the device with multiple USB ports designed for connecting other peripherals? You might not want either of those, but we'd be able to discuss the potential benefits or drawbacks of the features. As of now, one phone compared to another comes down to basic specs and camera details for those who actually use all the different kinds of cameras that are available. Nobody is doing anything experimental; they just shove new SoCs and lenses into another rectangle and fling it out.

doublelayer Silver badge

Re: Every year is worse

“All too often, technologists solve problems by introducing additional layers of technology abstractions and disregarding simpler solutions, such as outreach and engagement,”

As a counter to that, sometimes we do that because not doing it is viewed as laziness, incompetence, or worse.

User: I loaded this file which starts as valid XML, then goes into complete corrupted garbage. The program crashed.

Programmer: [Idea: engage the user] Sorry about that, but this program doesn't handle corrupted files. In this case, could you repair the file and send that through?

User: You're just going to let your terrible code crash when it receives invalid input? How unprofessional can you get?

Programmer: Point taken. It's not great. I can do something to at least prevent a crash.

[One day later]

User: I put the corrupted file through today, and it doesn't crash anymore, but it doesn't work.

Programmer: What happens?

User: Nothing happens. It just ignores me.

Programmer: [Idea: user experience outreach] Can I watch how you're using it? [...] Why did you just close that message box? [...] Yes, but could we just take a look at the message to see if it's an error I have to fix? [...] See, it says the file is corrupted and needs to be repaired. So you need to repair it.

User: So you're just giving me the error message and making me deal with it?

Programmer: [Engage? Outreach? Options exhausted] Let me think about this and get back to you.

[Three days later]

Programmer: I'm thinking we should have a library which can parse truncated XML, present the user with a graphical structure document, and provide them a rich editor so they can repair data without modifying a file. Either that or an office in a different building and some code to intercept and delete emails.

doublelayer Silver badge

Re: Looking back (nothing to look forward to)

In honesty, those things are not gone, just less common. For the same reason, I often complain about the size of smartphones today as I'm in the group that liked the small ones, but you can still find those. The problem comes when you want all four of those together, and also long software support and someone else has ported other versions of Android to it, please. There won't be a perfect option and some compromises are unavoidable, but there are still options.

Depending on how you rank those desires, headphone jacks and SD card slots are quite common, just not on the most expensive devices. Look at the medium range and you're likely to find a device with both of those in at most five tries, probably fewer. Replaceable batteries are less common outside the very lowest end. However, you can still find at least some devices with those that aren't very weak. The most famous devices that fall into that category are the Fairphone and the Samsung Galaxy Xcover line, neither of which I have. If some of those things are more important than others, you can also look at companies that aren't as famous as phone manufacturers go.

Starlink bags US defense contract to keep war-torn Ukraine connected

doublelayer Silver badge

Re: No good deed goes unpunished

Read literally, it's still accurate. Musk demanded money to continue the service, the demand has been met. That doesn't mean he wasn't within his rights to make that demand, which he was. It doesn't mean that the demand couldn't be predicted, which it could. All it means is that Musk asked for something and the Pentagon has given him what he asked for.

We can get into a debate about the connotations of the phrase and whether it implies that the demand is unreasonable, but as a statement of fact, it correctly explains the event that occurred.

This malicious PyPI package mixed source and compiled code to dodge detection

doublelayer Silver badge

Re: Why have pyc files in a package anyway?

You could, but that is likely to be detectable by code analysis. This exploit didn't do that and included the compiled version directly. I think the new policy should forbid that. Not only is it a security risk as I think this incident amply demonstrates, but it also loses all of the benefits introduced by new versions of the Python compiler, which can compile the same code to faster byte code. Most .pyc files are version specific, and while there's backward compatibility, there's a good reason they are usually recompiled instead.

Millions of Gigabyte PC motherboards backdoored? What's the actual score?

doublelayer Silver badge

Re: How do we defend against this? - Linux edition

I suggested the same thing, but that only works against a lazy implementation. If they were determined to push it, they wouldn't have to be blocked by encrypted volumes since, to boot them, you'll eventually enter decryption keys. The firmware could watch for them and then jump in to make edits before the kernel finished booting from them.

Implementing that would be quite a bit harder, and I wouldn't expect a company just trying to manage updates to do so. That doesn't make it impossible, though.

doublelayer Silver badge

Re: You missed a question.

"I don't expect that UEFI would be able to forcibly write this file to a local filesystem."

From other posts, it appears it's not trying to. However, it certainly could if it wanted to. The firmware has hardware access to the disks and has filesystem drivers for some of them. At most, someone would need to include a new driver in it if it doesn't have the one it needs, because the firmware cannot be blocked from accessing whatever hardware it wants. There's a bit of a space limit on most firmware partitions, which limits the size of the bootstrapped attack vector, but not such a small limit that it's likely to protect you if anyone did write firmware that bad.

doublelayer Silver badge

Re: You missed a question.

I'm not sure how that folder indicates any particular risk, given that you can run a system service from any folder. They could as easily write it to a user folder, anybody's, and run it just the same. For the same reason, they could write it into any Linux installation if they were willing to, but presumably they didn't compile it for Linux.

I wonder whether this works on encrypted OS disks, where the firmware doesn't have the keys to mount and write to them until the user enters a code. It could always insert the software after decryption occurs, right before booting that disk, but if it's running at the start, that might stop it. Either way, I can't imagine why someone at the design stage didn't explain how stupid this plan was, or more likely, what happened to those who did.

Amazon finds something else AI can supposedly do well: Spotting damaged goods

doublelayer Silver badge

Re: "it's 3x more likely to spot damaged goods"

So, your accepted outcomes are:

1. Near complete perfection.

2. Ridiculous false positive rate which causes complaints

3. The system must be entirely bad.

These seem to leave out a lot of options. Perhaps the three times better than a human deal is because, if they ask for 99% accuracy, they get too many false positives? Maybe my incredulity at your choices is because I'm having trouble seeing "three times better than a human" as a bad result. Sure, it would be nice if it never made a mistake, but it's a visual recognition task which is not deterministic.

For that matter, once it's built, the acceptable rate might have been if it was equal in accuracy to a human, because a computer with a camera running software you already have is probably cheaper than a human who also has a camera. Things that are three times faster or better at performing a task as I am tend to be rather useful things.

doublelayer Silver badge

Probably not, since it's just looking at the package it comes in, but it's not designed to do every task they have. It's just intended to reduce their costs from dealing with stuff that's sent back by people who are unhappy with its quality, and they want to catch the things that are likely to lead to such complaints. That isn't going to eliminate the existence of fraud.

That said, you could always train a new one on all the products that are typically sold and give it an x-ray generator so it can investigate the contents of packages. Why does this not sound like a good idea?

You might have been phished by the gang that stole North Korea’s lousy rocket tech

doublelayer Silver badge

Re: I wonder if

The attack method is kind of basic, but the rest of it isn't. They do a lot of research into their victims before they attempt to compromise them. They know a lot of information which can be used to convince them they're legitimate, and they do it to so many people that they have chances to practice.

I think we overestimate our own resistance to scams. We have technical knowledge to know about macros in Office documents, which is great, but it doesn't follow that we also have knowledge to detect scams in other areas in which we don't work. I've known people who were great at IT and did not understand finance or law, and if someone tried a scam that wasn't related to computers, they would be more likely to fall for it. It's not even limited to lack of knowledge, as successful manipulation of the victim's emotions can circumvent an otherwise skeptical person's brain. That includes both you and me, if the scammer is good enough at finding our weaknesses.

doublelayer Silver badge

Re: "Do not enable macros on documents received via email, unless the source is verified"

When that protocol was younger, it still contained all of that, but it didn't check any of it. I could open a connection to a mailserver, submit a message with any headers I liked, from any address I liked, with a long fake history if I pleased, and all that would be available afterward to try to track me down would be the IP address with which I connected to the first real server in the chain.

Nowadays, there are a lot of patches designed to prevent that from working, and most servers actually check those. However, it doesn't stop people from trying the old ways. I've run my own mailserver at times, although I don't now, and looking at what bots tried to do was instructive. Several types of attack were attempted, including many spoofed emails and some attempts to get my server to act as a relay for messages going to others. Fortunately, relay attempts were rejected and spoofed emails went to a separate mailbox for curiosity until I just sent them all to /dev/null. Still, not only can a mail client be manipulated to show an inaccurate source, headers can be spoofed if your server isn't careful.

Feds, you'll need a warrant for that cellphone border search

doublelayer Silver badge

Re: I think I get it...

Then follow the other branch of that if statement.

"RealLife perps on the run from the cops and actively being pursued rarely change vehicles (On the rare occasion that they do, the carjacking victim tells the cops EXACTLY what the new vehicle is"

In that case, any time spent on pulling over a car which isn't the type of car they're looking for is time wasted and people needlessly harassed. The original statement confirmed that they were testing every vehicle, hence they were not following that logic. I stated this already, so I see no reason why you think the point is as ridiculous as your reply implies.

"and they certainly never take the time to don theatrical makeup."

A better point, but if I was on the run from the law and made a career of it, I might try that approach; it seems it would have worked in this case, at least if the police use the same logic you do, which as the car example shows, may not be as certain.

doublelayer Silver badge

Re: I think I get it...

Original: "Fortunately the office looked in the car and based purely on a glance was able to determine that there was no need to question any of us"

Reply: Becuse they were looking for a Mexican national in a blue Ford pickup, and you were obviously pastry white Brits in a green Chevy sedan?

If that was the logic, that's terrible logic. If they're willing to use "Not the right kind of car" as a reason not to question them, then they don't need to pull over that car, do they? If they're willing to assume that the person they're looking for could have changed cars, then that part of your argument has no importance. As for the appearance of the person, there are a variety of time-tested ways to make yourself look different which actors have been testing for decades. You can't prove that one of those people was the person in disguise along with some compatriots who had provided the replacement car. Either the situation justifies pulling over every vehicle and questioning the occupants or it requires a more specific search pattern, most likely the latter. The anecdote they supply doesn't appear to have followed either.

NASA experts looked through 800 UFO sightings and found essentially nothing

doublelayer Silver badge

Re: Experts?

You just have to get a certification from a [person with access to a printer] I mean certified expert who tests your knowledge by [making sure you will back up any lies they say], sorry again, are knowledgeable about the subject matter including all the stuff the government doesn't want you to know, unless your subject is one of those which holds that the government is powerless when compared to some other shadowy conspiracy. Your certified examiner will be able to provide you with important study materials about the subject as well to provide you with more information you need to know. If you don't agree with those materials, you are free to do your own research for which all you'll need is a blank sheet of paper and some way to put writing on it.

Fortunately for you, I am a completely certified expert and examiner on all those topics and many others as well [at least I will be when I turn this PDF into a piece of paper]. Just send your topic of interest and registration fee and you too can be an expert.

doublelayer Silver badge

That's possible, but there are only so many entomologists. Most of the people walking by would not be one, so the chances that that particular nest would be found by an entomologist are rather low given how many nests there are. There's also the chance that the entomologist, having completed a long day's work studying some other ants, wouldn't look closely enough to determine that these were an undiscovered species and just walked past thinking that they already understood what was going on.

If we posit an alien species that has the travel technology to end up here, there are basically two situations:

1. There are a lot of planets with life on them, in which case why are we of particular interest to the aliens who have likely already seen plenty of them.

2. There are few, possibly only two, living civilizations in the universe, in which case how would the aliens discover our existence so quickly?

My only solution to either hypothetical is to admit that, if aliens show up, we were probably quite close to them or it happened by accident.

Ukraine war blurs lines between cyber-crims and state-sponsored attackers

doublelayer Silver badge

Re: Void Rabisu used RomCom against .. water, energy, and financial entities ..

Nothing says they have to be. If they infect an energy company but don't manage to get access to the infrastructure, they can still do a number of things. They could look at communications and impersonate people, they could get records of energy usage from the bills, they could make fake documents to try to confuse people, or they could take down the corporate systems and see if the IT department can get them back up before problems show up. It's not as big an effect as taking down the energy generation systems would be, and I'm sure they'll happily accept an exploit of those if they could, but that doesn't make it harmless.

Twitter now worth just a third of what Musk paid for it

doublelayer Silver badge

Re: The Seething is Real

"a monster like [person we previously all worshipped for building electric cars, LEO satellite internet, SpaceX, etc."

This is where you failed. Actually, you failed right at the start with Twitter being the most important platform, but I'm assuming that was mockery. Yes, some people did appear to have a cult of personality around Musk. I was not one of them. It always struck me as weird and off-putting, but at least I respected Musk for Spacex, because I thought that was a good goal and at least he was managing to let others accomplish it. Not so much with Starlink, as whenever someone mentioned some of the problems with it, some Musk fan would come along to explain why nothing else could do it, the marvelous humanitarian advantages we wouldn't get, etc. And of course there were a lot of strong opinions about Musk from people who had strong opinions on electric cars, and those opinions happened to be direct mirrors of one another. I neither loved nor hated him consistently, although he's been doing increasingly more annoying things for many years before the Twitter fiasco which isn't helping. Fortunately for me, I haven't used Twitter so it doesn't directly affect me if he breaks it. For those who do use Twitter more frequently, I can't blame them for being annoyed as someone trashes something they used to like.

doublelayer Silver badge

Re: Crazy valuation??

Frugality is still a good idea, because a person who has all the same things as the situation 1 guy but doesn't have debt is better than both. Frugality, though, can go to a level where it is harming you. To pick an obvious example, if you were so frugal that you neglected your own health, then you'll find out that repairing medical problems is a lot more expensive than preventing them.

My simplistic financial advice: avoid debt when you can because it's quite dangerous, but if things are bad enough, there are things that are even more dangerous. This leads to very different results based on your needs, income, and career potential, and some of it will be subjective. The same advice applies to companies as well; a company can refuse to spend on everything and have a nice balance statement for a while, but it's likely to cause problems as time goes on.

doublelayer Silver badge

Re: Crazy valuation??

"Surely if they're approaching break-even it's financially healthier?"

Not surely at all. Consider two situations:

Situation 1: You have a full-time job and you earn a nice salary, but you have expensive tastes and have spent a lot of money on stuff you didn't really need. As a result, you find yourself in debt in order to afford your living expenses.

Situation 2: You have no job but you occasionally find money on the street, and you've identified some places where food is quite cheap. So far, nobody has interfered with the cardboard box in which you live, along with your meager savings.

The person from situation 2 is not only breaking even, but is turning a profit. Their situation is not better than the person in situation 1. If something bad happens, the person in the first situation is much more likely to be able to handle that, and they're also more likely to be able to fix their debt situation than the other person is to consistently maintaining those savings.

As this applies to Twitter, let's assume that somehow they are at a break-even position, which I doubt. They need not only to maintain that but to start turning a profit so they can pay for the things that allow them to keep existing. If they've reached their financial situation by cutting a lot of expenses, they run the risk that some of those expenses weren't as unnecessary as they thought, because if their systems fail, they will no longer be earning any revenue. Maybe they'll be able to run their systems on the payroll they have now and they'll continue to get advertisers to pay them, but if either of those fails, they may find that their break-even position has turned into a loss-making position when they weren't expecting it.

North Korean spy satellite launch ends in sea smash

doublelayer Silver badge

Re: "discovering concrete causes"

While the North Koreans do like unnecessary executions and have continued to carry them out with extreme frequency, part of the success they've seen is because the latest Kim is slightly less stupid than his father was. Previous technical failures resulted in several executions, which didn't exactly help people learn from their mistakes. They have significantly reduced that policy, which might explain why they now have missiles that appear to be usable whereas their missiles from the 2000s were quite unimpressive for a country that spends all its money just building weapons.

The FBI as advanced persistent threat – and what to do about it

doublelayer Silver badge

Re: Assigning Traffic To A Real Person Can Be Made Difficult.....

A lot of things that criminals don't find difficult are things that the rest of us find harder. Sometimes it's something immoral and we just won't do it, but that doesn't apply here. Two other problems apply in this case:

1. We don't particularly want to get punished by law enforcement, so we avoid doing stuff that's against the law even if we don't agree with the law unless we have an extreme objection to that law. If I obtained a fake piece of identification, that's a thing the police don't like, and I'd have to be in a pretty bad situation to take that risk.

2. Things that criminals have access to are not as easily available to non-criminals. I'm sure that there are markets where criminals can buy a number of things that aren't legal, but I'm unaware of how to find those places and to gain entry. I can find basic fake identification somewhere online if given enough time, but I'm not sure how much verification the countries that require it will do. If they do, then I might have to use a real identity that doesn't belong to me, and now we're looking more at the immoral category.

Fortunately, I don't live in a country that would require identification for that.

Seriously, boss? You want that stupid password? OK, you get that stupid password

doublelayer Silver badge

I think that most accents wouldn't be able to turn "thirty" into "three t", and "twenty" is even further. However, I've known a few people who for some reason swallowed the ending n from numbers ending in -teen, so that might even out the opportunities for miscommunication.

doublelayer Silver badge

Re: I wouldn't call it malicous compliance, but yes, I have a story

Do you have any level where it becomes the company's responsibility? If I bang on every door with a problem, a suggested solution, and volunteering to do it singlehandedly, how many people have to say no before it stops being my responsibility and you stop blaming me for the consequences of that problem. As the original poster indicated, they didn't even create the problem. I also assume that, had they attempted to fix the problem and introduced a new problem, you'd be blaming them for doing that when management hadn't approved.

Why do you jump to assuming that this person's failure to solve a problem that nobody cared about and they didn't create caused the demise of the company? It seems more logical to me to assume that the company's inability to work on the problem was a symptom of inept management which caused the collapse, something an individual tech, even if they took the initiative to fix everything above the complaints of management, couldn't solve.

doublelayer Silver badge

Re: Missing part

It was more of a generic example than what happened in this case, since I don't have almost any details. While there weren't many VPNs of the type we use nowadays, there could still have been more steps to access the login prompt than "telnet hostname". In addition, the stuff I suggested to check when you've logged in was still important in the 1990s, so it was still worth making sure the account worked as expected.

doublelayer Silver badge

From the article:

perhaps the MD knows enough about Unix to know that the password couldn't be all numbers, and that's why he cleverly said "oh" instead of "zero". That ought to stymie any would-be miscreants.

I'm not actually familiar with any such limitation, and it doesn't appear to affect my Linux machine now. However, if that was the case, the person setting the password should know the limitation and it wouldn't take long to figure out what the obvious answer is. Also, if I had been there, I would have assumed that such a simple password was the temporary password used to gain initial access, to be changed later by the user. I figure that, if they told me the wrong thing, they'll come back in ten minutes and say it doesn't work. If they don't, they probably got in and changed their password successfully. It's not as good as asking for clarification at the time, but I don't see following the dictation to the letter (pun originally not intended) as "screw[ing] them over". A reasonable worst case is that the director came back in a few minutes. The absolute worst case is that the new admin reset it a few days later.

doublelayer Silver badge

Re: Missing part

If the user was intelligent, they would have tried their account immediately. That's a good idea, not only to make sure that you dictated your password correctly*, but that your account has the stuff you need in it. Did the admin remember to add you to all the groups you need but didn't ask for? Does the server require SSH keys and the admin used one that used to be yours but isn't the one you want? Do you need to log into a VPN to access the server? You might want to know those things before the admin leaves. You do that on Friday, which means testing your password on Friday.

* Dictating things with a specific format isn't deterministic. If someone reads you some letters which are probably an acronym, do you capitalize them all? All lowercase? And of course the fact that there is a possible character pronounced "o", so you should always pronounce the other one as "zero". Whenever I'm reading passwords, I end up saying the case of letters a lot to avoid this problem. While I'd probably ask for clarification, there is one way of pronouncing the string "11o554", so anyone who understands passwords should know to be specific if they don't mean that.

Windows XP activation algorithm cracked, keygen now works on Linux

doublelayer Silver badge

Re: DO NOT go on the Internet with XP

It's perfectly capable of sending on some network traffic as a proxy, DDOS bot, or C&C link. It's likely terrible for cryptomining and may not have access to sensitive data. If it's part of something important, it could be a great thing to attack with ransomware because, if it's not firewalled off, it indicates the user probably isn't backing up anything.

Probably some types of criminal would turn their nose up at it, but there are still some cases where it's worth attacking.

doublelayer Silver badge

Re: Plan B.

Yes, you can do that. The most common reason why sites don't load anymore is to do with encrypted connections, which are very common. Old browsers may lack support for the later TLS versions, may have outdated certificate management, or both. That's pretty easy to intercept and handle transparently.

The reason that we don't go farther than that is that there's relatively little in it. It would allow you to browse on nearly any hardware, but only by getting some other hardware and manually configuring it. In many cases where that would work, it's often easier just to use the new hardware for the internet and either replace the old hardware or just use it for whatever purpose has caused you to keep it around.

It also doesn't cause completely safe browsing. It would put an extra firewall on any exploits that use a script to try to interfere with the host, but the browser sandbox, while flawed, is frequently tested and patched in that respect anyway. You could accomplish the same thing by refusing to run any scripts, and your proxy will have similar problems; either a malicious script will be unable to affect the system, or it will be able to affect your proxy from which it can do the same things it could do on the local device. The more common security risks while browsing are either something a human typically filters, such as whether this site is the kind of place you want to enter sensitive information, or privacy-related, such as whether you're sending a copy of everything to an advertiser. A proxy can't deal with those any more than a local program can.

doublelayer Silver badge

The USB path wouldn't be fast, but it would take several hours (ideally about 4.5, but I'm willing to double that). That could be completed overnight. I wonder whether installing and activating Windows by phone is really a shorter process. Also, if you want to go faster, does that machine have an ethernet connection? That is probably faster.

BOFH: Get me a new data file or your manager finds out exactly what you think of him

doublelayer Silver badge

Alternatively, the file is obfuscated and possibly encrypted, the provider is contractually obliged to make the file, and the contract may even have a clause that says that the customer must not alter files that the provider is responsible for. Can someone break the format and change things? Probably, with some effort, because it's relatively unlikely that the provider has encrypted it asymmetrically. It's still probably more complicated than opening an XML file with clear names and changing a value. While this is a fictional scenario, the possibilities I mention aren't outlandish. People have tried to lock clients in by making a weird file format and providing the only access methods since selling software to others became a thing.

I've experienced this firsthand. I have used a few different programs which were intended to write music data and lock data into their own proprietary formats. Some of these pieces of software could export to some kinds of data (one could give you an audio file, one could export a limited subset as MIDI, and both could produce printed scores), but neither made it possible to export all the data you had entered in a standard format that could be used in another piece of software. The one that agreed to export MIDI would give you notes, but dropped several important types of data which would take about as long to recreate as manually rewriting the whole thing would take. I don't think either format was locked down too much, but manually reverse-engineering the formats would take a lot of time and testing.

doublelayer Silver badge

Re: What you're missing is that they're _right_.

While most of those are reasonable, they're generic and may easily fall into the categories of request that aren't feasible.

For example: "I want my applications to spin up and work, every time." Great. Everybody wants that. Let's assume we have the people who wrote those applications and those who administrate them all here trying to improve things. There's still no information about what happens when they don't work correctly, which means it's much harder to fix the problem. Sometimes, the errors people report are things that can easily be fixed by patching the code. Sometimes, they can easily be fixed by changing the configuration. Sometimes, they're the user failing to process something and either invoking the software in an incorrect way or not dealing with a message the software generated. We can't know which of those categories applies without specifics, and if it's the latter, it is likely either impossible to fix or is more efficient to train the user on correct operation than introduce more code. This is a question the IT department has to work with the users to answer, and it has to be a polite problem-finding attempt from both sides. I've been part of this as a programmer, and I've found plenty of cases where the code is at fault and many others where the user is. This is, of course, if you have the programmers available. If they work for another company, you may not be able to make them change the code, and if they have a lot of users, you may not be able to get them to change the code for a use case that's specific to you. The IT department may not be able to handle each request.

Here's one that tends to work out worse: "When you make changes to how I do my job, I want that change to make my job easier, not harder." I'm sure you have had some changes which made your work much harder and weren't necessary. The problem is that a lot of users use a request like that which, in their mind, means "I'd like there to be no changes at all". That includes things that introduce needed security, such as the change from every resource being open to the internet with simple authentication to having a VPN. In the four-level example you provided, I can see why that would become a usability issue (though I doubt you have that many levels), but some users will complain with the introduction of a single one. At some point, the user's aversion to change has to be balanced with the benefits created by the change. Some changes will introduce more steps to the user and are still necessary. If we could eliminate everything that annoys people, we'd have lots of money from users who never had to deal with annoying systems again. If I were one of those people, I'd use that money to build great hiding places for when that all collapsed, because the systems can't be infinitely easy without compromising on other important aspects.

doublelayer Silver badge

Re: would resist any change to get it removed,

It fits what you wrote pretty well. When is it reasonable to make someone adopt new software, with the added burden of figuring out the new process? This depends on the primary focus of the company. If they're focusing on short-term productivity, that likely means that they don't want to stop using the old tools unless they absolutely have to. If they're focusing on long-term productivity, they may be happier to replace something that's not completely broken yet. If they're focusing on employees' wishes, the decision might come down to the specific employee's willingness for change and displeasure with the options rather than the productivity difference. If they're focused on other things as listed by the post that replied to you, they may make the decision based on whether either option has more security, whether one is cheaper, whether one improves efficiency, etc.

Every company has a different approach to how they'll handle situations like this. It often comes down to personal decisions combined with the primary goals of the directors.

Neuralink says US OKs human experiments with Elon's brain chips

doublelayer Silver badge

Re: Will it work the other way?

Much closer to downloading than to uploading. Someone is running those systems you could be uploaded to, and I'm guessing their spam prevention system will be pretty strong unless they're owned by a social media company, in which case you will no longer own yourself after uploading.

Why you might want an email client in the era of webmail

doublelayer Silver badge

In the author's defense, I do know a lot of people who do exclusively use webmail. They're not working in IT or IT-adjacent fields, and somehow they manage with it. Generally, these are the kind of people who don't understand the privacy implications of always being logged into a Google account while browsing and often don't care when I tell them about them, so it's not the only point where their priorities and mine diverge.

That's only for their personal email, as most of them are using Outlook at work because that's what the IT guy installed. I haven't seen many Google-focused setups, but I wonder whether people who have Google instead of Microsoft managing their general applications (Docs instead of Office, whatever the videochat thing Google does now instead of Teams*, GMail instead of Office365 email) are using the webmail interface more often.

* More companies use something other than Google or Microsoft for the video calls and chat system, but very few step outside that set for word processors, and unless it's quite a big company, the email systems are quite common.

doublelayer Silver badge

Re: Not bad, not bad at all.

"And just as a general remark. Since we seem to have more and more applications that work on the FF base, would it not be an idea to make it a code base with extensions for e.g. Firefox, TB, Zotero..?"

I don't think it's worth doing for a few reasons. It leads to a lot of clashes between the projects. For example, there are licensing problems. Zotero uses AGPL, while Firefox and Thunderbird use the MPL. If you merge them, somebody is going to have to change their mind, and they don't want to. Depending on how you merge them, you might also end up including more stuff for one program in the main codebase, and users who don't intend to run it would actually end up using more space for the combined program than they would for the subset they're using. I have Firefox and Thunderbird here, and I have Kiwix which is also based on XUL, but I don't have Zotero or, as far as I know, anything else XUL-based here.

The closest you could get is separating out the application from the common components, including XUL and Gecko. The first application to be installed installs those common components, and any subsequent application looks for and links with them. That would work, but as with any other platform, it introduces some dependency. If someone uses the ESR version of Firefox and the non-ESR version of Thunderbird, which one picks which version of the components is going to be used? Do you trust that Mozilla has kept all versions perfectly backward compatible or that the new version probably doesn't use anything that new? The most likely outcome is what happens with Java or Python. An installed application checks for the version it wants, if it's not there, it gets installed, then nothing does a great job of removing the old versions because theoretically something else might be using it, and now you have nine JREs.

With this set of problems, I'm afraid I do typically conclude that using a bit more disk space is the easiest way to guarantee that it all works well. In a disk-constrained environment that for some reason uses all of these applications, one could manually verify the versions that share a library and link them all to the same copy of that, but I don't know when that would be worth the effort.

doublelayer Silver badge

I also find most webmail interfaces to be basically usable if all you want to do is look at some messages and send one, but not so good if you want to search or process them in bulk. The other reason I use a mail client is it makes things much simpler if you have multiple email accounts, and I have quite a lot of them.

PyPI subpoenaed: US govt demands data on developers

doublelayer Silver badge

Re: Curious About Other Sources For Python Packages

Basically, yes. They're created by your distro's package maintainers. Those maintainers are an extra layer between you and the source, but who knows where they're getting the source from. Probably they're just using the original repos for the libraries, and if those sources are compromised and they're not aware, those packages could also be attacked. That's true of any other packages those maintainers allow through as well. Responsible distros have maintainers who do a lot of checking on such things, which probably indicates that the packages they allow are better than unverified ones, but probably does not mean certainly.

However, the ones installed by default are likely to be the much more common packages which are more rigorously checked for changes and secured from replacement. The more dangerous ones tend to be the ones that are created by one person, meaning that if an attacker gets the access necessary to embed some malware, that person is less likely to detect quickly that it has happened. Other Python packages are certainly in your package repositories, and those may not be as secure.

Microsoft finally gets around to supporting rar, gz and tar files in Windows

doublelayer Silver badge

What makes you say that? I've just put some files in a password-protected zip archive. If I try to open one, I'm asked for the password. If I try to extract it, I'm asked for the password. In both cases, when I enter the right password, it decrypts it and opens as expected. What problems did you notice?

doublelayer Silver badge

Some protocols did support compression, but doing that means that the uncompressed data takes up more space on the server and requires extra processing every time someone downloads it. If it's not going to be accessed or modified by the server other than to send it to you, there are advantages in compressing it once and just sending that compressed version, even if the speed doesn't change.

Also, it isn't guaranteed that the speed would be the same. Compression can be set up to compress as much as possible, which is slower, or to compress at a certain speed. If the compression speed was lower than the network speed, as would be the case with an old CPU or one that's serving a lot of connections, it would either slow down your connection to wait for compression to complete or make the compression less efficient so that it could send as fast as you could receive. Either way, that would be slower than compressing once and just sending you that.

I've seen this in practice when I was compressing a disk image to send it over a network. The image was certainly going to get compressed because a lot of it was empty space or very compressible text files. I originally set the compression level rather high, and this was running on an ARM chip, and not a particularly fast one. It took hours to compress that way. Meanwhile, the destination for the data was on a local network, so it would have been pretty fast to just send it. I ended up lowering the compression level to optimize the time spent compressing and the space the file would eventually take, a tradeoff that any server eventually has to make.

doublelayer Silver badge

Re: Advantage of 7-Zip

The file names may be important as well. If you're encrypting the contents, you may not want to rename the files to hide what they are, but leaking that metadata could be undesirable. That's in addition to the risk of replacing a file with an unencrypted substitute. Nothing is foolproof, but it's usually safer to encrypt a lot rather than leave a few things out on the assumption that nobody will care.

Lenovo Thinkpad Z13 just has this certain Macbook Air about it...

doublelayer Silver badge

Re: Working as designed?

I don't really think Microsoft would care that much, although I disagree that people wouldn't buy the product. They'd likely want a laptop enough to buy it anyway and they'd just speculate about the potentially malicious code in that recovery firmware which they can't see or change. If someone wanted to complain about Microsoft, it would be one more thing in their list, similar to how some people complain about Secure Boot even though Microsoft didn't write that.

The reason I bring it up is that Liam is, as many have pointed out, an advocate of open source software and of user control of systems. This is usually the kind of person who would not be pleased with closed-source firmware, so in my first comment, I assumed that he was trying to ask for something else and I was misunderstanding. Now that he has stated that I understand him correctly, I just find it surprising that he has that opinion and wanted to explain to anyone else who might share his collection of views what the request would actually look like if implemented.

I take a different view on most respects. I like open source software, but I don't tend to view Microsoft as evil or incompetent. However, I don't want them to have recovery firmware on all computers. I appreciate that the typical X86-based computer boots to whatever disk I've put in based on an open and configurable firmware setup. If the cost to that is that it can't automatically recover if I destroy my firmware partition, I can deal with that. In addition to the security concerns, I also don't have confidence that that recovery environment will handle all the different ways someone might choose to boot their computer, and as a person who sometimes has unusual configurations, I'd rather have to clean it up if I destroy it than to have something automatically clean it up when it might be working as expected.

All Microsoft Surface Pro X cameras just stopped working

doublelayer Silver badge

Re: Certificate!

I've never seen that before. What model of phone was it? That's a pretty good reason to run away from the manufacturer if other ones aren't doing it.