* Posts by gnwiii

19 publicly visible posts • joined 6 Nov 2018

California sues President Tariff

gnwiii

Re: giving the President "Kingly" powers

Checks and balances on the President were considered by those drafting the US Constitution. Congress has consistently failed to do its job, allowing Presidents to usurp their responsibilities and failing to remove Trump during his first term.

Intel, AMD engineers rush to save Linux 6.13 after dodgy Microsoft code change

gnwiii

Intel x86_64 is part of the problem

Linux has a problem with the complexity of the x86_64 hardware ecosystem. Devs well versed in older Intel CPU’s are aging out. Linux devs generally have current hardware, and are not likely to make understanding older Intel CPUs a priority, so it should not be surprising when someone adds something that breaks linux on older systems. This adds to the Linux dev and distro support workloads.

Rapidus US chief says AI chip crunch, supply chain paranoia make for an ideal growth climate

gnwiii

Moore's Law hasn't changed

"Moore's Law has slowed"? Say something like "hardware has not kept pace with Moore's Law".

Ford in reverse gear over AM radio removal after Congress threatens action

gnwiii

FCC rules won’t ensure that AM radios in cars will actually be useful in remote areas or when disasters that bring down local FM and cellular services. The organizations that are expected to provide information during emergencies have been irresponsible by not making and enforcing robust requirements to supply vital information during disasters.

Asahi Linux developer warns the one true way is Wayland

gnwiii

You can't always get what you want

Several posts focus on what the author of the post wants. What that author gets depends on a complex ecosystem of paid and a small minority of unpaid (e.g., hobbyists and students) developers.

If what you want aligns with needs or desires of industry and/or government, you might get it. If not, you either assume responsibility for making it happen, or settle for what you can get.

Apple patched critical flaws in macOS Monterey but not in Big Sur nor Catalina

gnwiii

Re: There is an official update available from Apple

"It is only pretty recently that we would have considered a 9 year old computer to be anything other than utterly obsolete."

Yes -- only since 2014 Intel has managed to produce new chips that provide only marginal improvements for many use cases. My wife gave me her late 2013 iMac 27" after she bought an Apple silicon system. The iMac is only a bit slower than Intel (all core i5) systems purchased in the last 3 years -- not enough that many users would notice. Current Apple silicon systems are very noticeably faster. In my field, that difference means we can start to introduce improvements that were put on hold because the run times would have been excessive.

gnwiii

New update from Apple, but the installation is failing

I have an iMac Retina 2013, running 10.15.7 (Catalina), ini Canada .This morning a macOS security update was "available", but the installer is in a fail loop:

MacOS could not be installed on your computer. The file "firmlinks" couldn't be opened because there is no such file.. Quit the installer to restart your computer and try again. On restart I get: https://support.apple.com/mac which gets a page titled "If your Mac doesn't start up all the way" which suggests resetting the NVRAM, which gets back to the installer, which fails with the same firmlinks couldn't be opened.

Irony, thy name is SANS: 28k records nicked from infosec training org after staffer's email account phished

gnwiii

Public databases with emails and phone numbers

"The Government Electronic Directory Services (GEDS) provides a directory of public servants across Canada.

Information in this directory is supplied by individual federal government departments and agencies and updated by one or more data administrators within each department.

Some departments do not list all their employees."

If you publish in journals, author names and email addresses are generally included.

Not exactly the kind of housekeeping you want when it means the hotel's server uptime is scrubbed clean

gnwiii

Re: The cleaner did it.

Years ago my workplace had a satellite ground station that needed to run 7x24. The various bits were all plugged in to a wall-mounted power bar that was connected to a hefty Ferrups UPS. About once a week the UPS log would report an "overload". Checking the times of the shutdowns we found it correlated with the cleaning schedule. The regular outlets in the room were all under the equipment tables, so the UPS-supplied power bar was the most readily accessible place to plug in a vacuum cleaner. The cleaners were told to use outlets in the hallway outside the room.

Why worry about cost of banning certain Chinese comms providers? Fire Huawei, says analyst

gnwiii

The US was not like China

Historically, the US presented a very different threat profile compared to China. US spying targeted governments and terrorist organizations, not industry. US taxpayers paid the bills, so the US government didn't need hacking for profit. The US has a history of cooperating with other countries to combat hacking for profit. The US once had effective whistle-blower mechanisms (intended to provide a way for someone like Snowden to pass information to overseers), Congressional oversight, and an independent court system. Before the Trump administration, a US entity found hacking for profit would have been shut down and faced legal proceedings. In

practice, many such hacks come from jurisdictions beyond the reach of US and EC authorities.

Today, the biggest security problem for individuals is the potential for leaks from data compiled by the "internet giants" and large corporations. These data are used in a variety of ways that involve internet access, and there have been many examples where "for profit" hackers have stolen data.

We should be focusing on internet infrastructure without examining mechanisms (whistleblower protection, independent oversight and courts) to ensure that bad behavior can't be hidden and that bad actors are punished.

German ministry hellbent on taking back control of 'digital sovereignty', cutting dependency on Microsoft

gnwiii

Consider liability

In the past, large organizations have often favored commercial options because, in the event of trouble, they could blame the supplier. Now, however, many risks have ambiguous chains of responsibility. Did an employee click on a link that installed malware? Should the vendor have provide software that didn't have as many security issues? Does it benefit anyone to blame unknown and/or untouchable perpetrators? Suppliers of proprietary IT kit are use licenses and contracts that shield them from liability and require dubious arbitration mechanisms to resolve disputes.

An instructive example occurred in Nova Scotia this week after a construction crane fell across several buildings (one under construction). Tenants of two occupied buildings were require to evacuate until the crane was removed, but the construction company could not arrange insurance in a reasonable time frame, so the province (e.g., taxpayers) had to exercise its sovereignty to declare a state of emergency and assume liability so the work could start immediately. Note that delay increases risks of further damage and added delays if another storm occurs.

Mission critical IT systems in large organizations should never have been allowed to reach a state where the organization can't assume effective control if something (ransomware, loss of a data centre to acts of nature or war, etc. ) goes bad. At present, however, expertise is in short supply because security has been pushed to the edge instead of being baked in during development. This means it will be painful for many organizations to reach a position where they could assume control, and they are exposed to elevated risks until they improve their position.

The Year Of Linux On The Desktop – at last! Windows Subsystem for Linux 2 brings the Linux kernel into Windows

gnwiii

Re: But why?

It is a fact of life that large enterprises have IT bureaucracies that seek to have someone else to blame when things go bad. For linux, this makes RHEL the "corporate standard" for large enterprises in N. America.

Here are some use cases:

I recently retired from a job in the Government of Canada (GoC), which, along with many other large enterprises, uses Windows as the "Enterprise Desktop Standard". GoC has large-scale linux clusters for remote sensing, atmosphere and ocean modelling, etc. These tasks makes heavy use of linux shell scripts, so the GoC groups using linux have Cygwin or Msys64 on desktop PC's. Such practices are common for large enterprises, but without a vendor, users have an uphill battle justifying the use of these tools. WSL gives users access to bash scripting and IT someone (M$) to blame if WSL causes problems.

In the USA, there are major software systems developed over decades by the US Government that would be difficult to port to Windows. There is also constant pressure to make the software available on Windows, due either to political support of M$ or perhaps because it would allow the software to be used in university teaching labs. One way to do this is to use the linux software in a network service and then develop a native Windows client. WSL allows users to run simple processing jobs using the Windows client (e.g., while developing large scale workflows or for use in student labs) without the need for a separate linux system.

Solid state of fear: Euro boffins bust open SSD, Bitlocker encryption (it's really, really dumb)

gnwiii

Re: Fed up with these nonstop security issues

"Nowadays, every time I see another (alleged) major security issue splashed all over the Internet I just chuckle and carry on with life."

This is dangerous thinking. Some of these nonstop security issues can be used to disrupt essential services such as utilities (power, water, internet), large facilities (airports, refineries, food distribution warehouses). Some security issues have been in the toolkits of nation-state and criminal enterprises long before they became public. With increased attention to the social media activities of nation-state and criminal enterprises, the use of stolen accounts for such activities is increasing. The US Government is so busy denying that nation-state hacking contributed to the current post-turtle president's election victory and distractions such as the "border emergency" that it has neglected cyber security for essential services. A key element in the US elections was use of social media to enhance existing divisions. Europe too is dealing with divisions between left, center, and right wing elements, separatists (Spain), racism, etc.

It is quite possible that the only reason we haven't seen more large scale attacks is competition among nation-states and criminal enterprises for control of key assets.

Security is hard, and requires ongoing diligence. Too many businesses have been given a free pass due to lack of penalties for peddling shoddy implementations. Cell phone batteries that catch fire are recognized as a danger to the public. Mistakes in widely used encryption tools have the potential to be used for crippling attacks. This is a clear and present danger and nothing to chuckle at.

So, that's cheerio the nou to Dundee Satellite Receiving Station: Over 40 years of service axed for the sake of £338,000

gnwiii

images are all available elsewhere -- until something breaks

No ground station is 100% reliable. The NASA direct download mailing list sometimes has requests for missed data.

Windows Subsystem for Linux distro gets a preening, updated version waddles into Microsoft's app store

gnwiii

Re: Price

"... I'm pretty neutral when it comes to Linux distros other than preferring ones that don't come with SystemD."

I'm using WSL for Ubuntu and Debian. Although both use systemd for bare metal installs, neither WSL configuration uses systemd.

Don't be too shocked, but it looks as though these politicians have actually got their act together on IoT security

gnwiii

US industry should support standards for IoT security

In the auto industry, many vehicles available outside North America don't meet safety standards, so competion for US manufacturers is reduced. At present, consumers have few ways to judge the quality of IoT devices, but they know how much they are paying, so cheaper mostly wins. With credible standards many consumers will pay more for compliant devices. Local governments are heavy users of IoT building management and security cameras. With credible standards, it will be much easier to justify spending more on a better class of devices. For US industry, the standards will be a barrier to cheap imports from vendors who lack the expertise to build standards compliant gear. A big question will be how much influence US law enforcement can exert to have standards mandate back-doors.

Surface Studio 2: The Vulture rakes a talon over Microsoft's latest box of desktop delight

gnwiii

Re: Hmmmmm!

Space is at premium in cubicle farms. Every watt the gear consumes adds to the A/C bill. Noise from desktop cooling fans and rotating storage mean that mass storage and compute-intensive processing is done in server rooms. Small form factor PC's with external monitors need extra power outlets and clutter tiny workspaces with cables. All-in-one has one or two cables (power and perhaps network). Desktops with external monitors need 3 or 4 cables (2x power, monitor, and perhaps network), which means you need more cleaners. IT time to set up and relocate desktops costs more than all-in-one systems and could be significant if worker turnover is high. The retail pricing for all-in-one systems seems inflated. Bulk purchases all-in-one should come in below the cost of similar spec desktop+monitor configurations.

I'm just not sure the computer works here – the energy is all wrong

gnwiii

Re: on a similar note ...

At my work we had just received one of the original IBM PC's. The PC crashed every afternoon at 4PM, so I put a multimeter on the outlet. Sure enough, at 4PM the outlet dropped to 90 volts and the PC crashed. The problem was traced to faulty wiring for a huge ventilation fan controlled by a timer and set to go on a 4PM.

Macs to Linux fans: Stop right there, Penguinista scum, that's not macOS. Go on, git outta here

gnwiii

Re: Why Linux on Apple Hardware?

In the past, Apple hardware has generally been reliable and there is a large community of linux on Apple hardware users so linux bugs affecting Apple hardware get more attention. If your livelihood depends on having a reliable linux laptop, paying extra for top quality makes good business sense. Thinkpads are also popular with linux professionals for the same reason. In general, the reliability of high-end systems from major vendors has been catching up with Apple's laptops, so I would be surprised if fewer people are running linux on Apple hardware in the future.