* Posts by gnwiii

27 publicly visible posts • joined 6 Nov 2018

Death to one-time text codes: Passkeys are the new hotness in MFA

gnwiii

Re: I use the "I've forgotten it" method

For me the physical letter doesn't arrive before it has expired.

Dell says Windows 11 transition is far slower than Win 10 shift as PC sales stall

gnwiii

No need for violence

New models replace parts that used be metal with plastic that becomes brittle and breaks, sooner in warmer climates. Manufactures just have to tune the number months to breakage so they don’t suffer reputation damage and stop making the parts when failures start.

Software engineer reveals the dirty little secret about AI coding assistants: They don't save much time

gnwiii

AI crosses disciplines and silos

I look for examples where AI has contributed to solving problems. Many of these have been from AI finding relevant insights from sources outside the user’s field or language.

I also asked AI a question in a subject I know well. At first, AI proposed an old, incorrect “solution” that has been too widely used. A few months later it found the correct solution. My father was an applied mathematician and told me he enjoyed learning the fundamentals in many different subject areas. Many fields start with a big idea followed by a lot of hard work putting the idea into practice. He led a group of mathematicians in a large laboratory and hired people with diverse backgrounds, unlike most academic departments that focus on a few subject areas. AI has the potential to help break out of such silos and suggest novel approaches to problems because it uses wider range of documents than can be found in libraries and conventional web searches.

FBI flags scam targeting Chinese speakers with bogus surgery bills

gnwiii

Telcos need to prevent use of spoofed numbers

Setting phone to not accept incoming calls where you are not a contact won’t help if the spoofed number is a contact. Health care systems are leaky, so bad actors may have data that includes patient phone numbers.

Microsoft's lack of quality control is out of control

gnwiii

Enshittification

Enshittification: Why Everything Suddenly Got Worse and What To Do About It — By Cory Doctorow

AlmaLinux gives Btrfs a home after Red Hat kicked it out

gnwiii

Filesystem choices and training for administrators

Until I retired, I worked in a large enterprise that used RHEL. Since retiring in 2018, I have been using Fedora with btrfs. Many Fedora users have reported problems with btrfs. If you leave out the hardware failures, the main cause of btrfs issues has been running out of free space. Some users don’t track free space, and many who do were relying on df and didn’t know that df wasn’t reporting the space used by metadata. There have been improvements to btrfs since 2017, and there are new improvements in maintenance tools, but linux is experiencing a flood of users moving off Windows who are used to frequent breakdowns and just reinstalling (or get IT to reimage) when the system breaks. The fact that Meta is happy with btrfs says their training of sys admins goes beyond the level of many RHEL sites.

How malware vaccines could stop ransomware's rampage

gnwiii

Cooperation and the security industry

“ As a result of this almost incidental research, which is not part of any commercial solutions Recorded Future is working on, the Massachusetts-headquartered firm is now keen to explore creating an open source community where researchers trade information to help create and deliver malware vaccines to combat families of ransomware.”

Cooperative game theory attempts to understand when coalitions can form in terms of economic benefits. If an open source community made significant progress combatting malware, less money would flow to the industry and security researchers would lose their jobs. Real progress would require external support, e.g., government, so more likely to occur in authoritarian regimes than current populist governments that are cutting existing support for security efforts.

Folks aren’t buying the PCs that US vendors stockpiled to dodge tariffs

gnwiii

Portable devices are replacing PC's

Many users are making more use of phones and tablets for things they were doing in Windows 10.

California sues President Tariff

gnwiii

Re: giving the President "Kingly" powers

Checks and balances on the President were considered by those drafting the US Constitution. Congress has consistently failed to do its job, allowing Presidents to usurp their responsibilities and failing to remove Trump during his first term.

Intel, AMD engineers rush to save Linux 6.13 after dodgy Microsoft code change

gnwiii

Intel x86_64 is part of the problem

Linux has a problem with the complexity of the x86_64 hardware ecosystem. Devs well versed in older Intel CPU’s are aging out. Linux devs generally have current hardware, and are not likely to make understanding older Intel CPUs a priority, so it should not be surprising when someone adds something that breaks linux on older systems. This adds to the Linux dev and distro support workloads.

Rapidus US chief says AI chip crunch, supply chain paranoia make for an ideal growth climate

gnwiii

Moore's Law hasn't changed

"Moore's Law has slowed"? Say something like "hardware has not kept pace with Moore's Law".

Ford in reverse gear over AM radio removal after Congress threatens action

gnwiii

FCC rules won’t ensure that AM radios in cars will actually be useful in remote areas or when disasters that bring down local FM and cellular services. The organizations that are expected to provide information during emergencies have been irresponsible by not making and enforcing robust requirements to supply vital information during disasters.

Asahi Linux developer warns the one true way is Wayland

gnwiii

You can't always get what you want

Several posts focus on what the author of the post wants. What that author gets depends on a complex ecosystem of paid and a small minority of unpaid (e.g., hobbyists and students) developers.

If what you want aligns with needs or desires of industry and/or government, you might get it. If not, you either assume responsibility for making it happen, or settle for what you can get.

Apple patched critical flaws in macOS Monterey but not in Big Sur nor Catalina

gnwiii

Re: There is an official update available from Apple

"It is only pretty recently that we would have considered a 9 year old computer to be anything other than utterly obsolete."

Yes -- only since 2014 Intel has managed to produce new chips that provide only marginal improvements for many use cases. My wife gave me her late 2013 iMac 27" after she bought an Apple silicon system. The iMac is only a bit slower than Intel (all core i5) systems purchased in the last 3 years -- not enough that many users would notice. Current Apple silicon systems are very noticeably faster. In my field, that difference means we can start to introduce improvements that were put on hold because the run times would have been excessive.

gnwiii

New update from Apple, but the installation is failing

I have an iMac Retina 2013, running 10.15.7 (Catalina), ini Canada .This morning a macOS security update was "available", but the installer is in a fail loop:

MacOS could not be installed on your computer. The file "firmlinks" couldn't be opened because there is no such file.. Quit the installer to restart your computer and try again. On restart I get: https://support.apple.com/mac which gets a page titled "If your Mac doesn't start up all the way" which suggests resetting the NVRAM, which gets back to the installer, which fails with the same firmlinks couldn't be opened.

Irony, thy name is SANS: 28k records nicked from infosec training org after staffer's email account phished

gnwiii

Public databases with emails and phone numbers

"The Government Electronic Directory Services (GEDS) provides a directory of public servants across Canada.

Information in this directory is supplied by individual federal government departments and agencies and updated by one or more data administrators within each department.

Some departments do not list all their employees."

If you publish in journals, author names and email addresses are generally included.

Not exactly the kind of housekeeping you want when it means the hotel's server uptime is scrubbed clean

gnwiii

Re: The cleaner did it.

Years ago my workplace had a satellite ground station that needed to run 7x24. The various bits were all plugged in to a wall-mounted power bar that was connected to a hefty Ferrups UPS. About once a week the UPS log would report an "overload". Checking the times of the shutdowns we found it correlated with the cleaning schedule. The regular outlets in the room were all under the equipment tables, so the UPS-supplied power bar was the most readily accessible place to plug in a vacuum cleaner. The cleaners were told to use outlets in the hallway outside the room.

Why worry about cost of banning certain Chinese comms providers? Fire Huawei, says analyst

gnwiii

The US was not like China

Historically, the US presented a very different threat profile compared to China. US spying targeted governments and terrorist organizations, not industry. US taxpayers paid the bills, so the US government didn't need hacking for profit. The US has a history of cooperating with other countries to combat hacking for profit. The US once had effective whistle-blower mechanisms (intended to provide a way for someone like Snowden to pass information to overseers), Congressional oversight, and an independent court system. Before the Trump administration, a US entity found hacking for profit would have been shut down and faced legal proceedings. In

practice, many such hacks come from jurisdictions beyond the reach of US and EC authorities.

Today, the biggest security problem for individuals is the potential for leaks from data compiled by the "internet giants" and large corporations. These data are used in a variety of ways that involve internet access, and there have been many examples where "for profit" hackers have stolen data.

We should be focusing on internet infrastructure without examining mechanisms (whistleblower protection, independent oversight and courts) to ensure that bad behavior can't be hidden and that bad actors are punished.

German ministry hellbent on taking back control of 'digital sovereignty', cutting dependency on Microsoft

gnwiii

Consider liability

In the past, large organizations have often favored commercial options because, in the event of trouble, they could blame the supplier. Now, however, many risks have ambiguous chains of responsibility. Did an employee click on a link that installed malware? Should the vendor have provide software that didn't have as many security issues? Does it benefit anyone to blame unknown and/or untouchable perpetrators? Suppliers of proprietary IT kit are use licenses and contracts that shield them from liability and require dubious arbitration mechanisms to resolve disputes.

An instructive example occurred in Nova Scotia this week after a construction crane fell across several buildings (one under construction). Tenants of two occupied buildings were require to evacuate until the crane was removed, but the construction company could not arrange insurance in a reasonable time frame, so the province (e.g., taxpayers) had to exercise its sovereignty to declare a state of emergency and assume liability so the work could start immediately. Note that delay increases risks of further damage and added delays if another storm occurs.

Mission critical IT systems in large organizations should never have been allowed to reach a state where the organization can't assume effective control if something (ransomware, loss of a data centre to acts of nature or war, etc. ) goes bad. At present, however, expertise is in short supply because security has been pushed to the edge instead of being baked in during development. This means it will be painful for many organizations to reach a position where they could assume control, and they are exposed to elevated risks until they improve their position.

The Year Of Linux On The Desktop – at last! Windows Subsystem for Linux 2 brings the Linux kernel into Windows

gnwiii

Re: But why?

It is a fact of life that large enterprises have IT bureaucracies that seek to have someone else to blame when things go bad. For linux, this makes RHEL the "corporate standard" for large enterprises in N. America.

Here are some use cases:

I recently retired from a job in the Government of Canada (GoC), which, along with many other large enterprises, uses Windows as the "Enterprise Desktop Standard". GoC has large-scale linux clusters for remote sensing, atmosphere and ocean modelling, etc. These tasks makes heavy use of linux shell scripts, so the GoC groups using linux have Cygwin or Msys64 on desktop PC's. Such practices are common for large enterprises, but without a vendor, users have an uphill battle justifying the use of these tools. WSL gives users access to bash scripting and IT someone (M$) to blame if WSL causes problems.

In the USA, there are major software systems developed over decades by the US Government that would be difficult to port to Windows. There is also constant pressure to make the software available on Windows, due either to political support of M$ or perhaps because it would allow the software to be used in university teaching labs. One way to do this is to use the linux software in a network service and then develop a native Windows client. WSL allows users to run simple processing jobs using the Windows client (e.g., while developing large scale workflows or for use in student labs) without the need for a separate linux system.

Solid state of fear: Euro boffins bust open SSD, Bitlocker encryption (it's really, really dumb)

gnwiii

Re: Fed up with these nonstop security issues

"Nowadays, every time I see another (alleged) major security issue splashed all over the Internet I just chuckle and carry on with life."

This is dangerous thinking. Some of these nonstop security issues can be used to disrupt essential services such as utilities (power, water, internet), large facilities (airports, refineries, food distribution warehouses). Some security issues have been in the toolkits of nation-state and criminal enterprises long before they became public. With increased attention to the social media activities of nation-state and criminal enterprises, the use of stolen accounts for such activities is increasing. The US Government is so busy denying that nation-state hacking contributed to the current post-turtle president's election victory and distractions such as the "border emergency" that it has neglected cyber security for essential services. A key element in the US elections was use of social media to enhance existing divisions. Europe too is dealing with divisions between left, center, and right wing elements, separatists (Spain), racism, etc.

It is quite possible that the only reason we haven't seen more large scale attacks is competition among nation-states and criminal enterprises for control of key assets.

Security is hard, and requires ongoing diligence. Too many businesses have been given a free pass due to lack of penalties for peddling shoddy implementations. Cell phone batteries that catch fire are recognized as a danger to the public. Mistakes in widely used encryption tools have the potential to be used for crippling attacks. This is a clear and present danger and nothing to chuckle at.

So, that's cheerio the nou to Dundee Satellite Receiving Station: Over 40 years of service axed for the sake of £338,000

gnwiii

images are all available elsewhere -- until something breaks

No ground station is 100% reliable. The NASA direct download mailing list sometimes has requests for missed data.

Windows Subsystem for Linux distro gets a preening, updated version waddles into Microsoft's app store

gnwiii

Re: Price

"... I'm pretty neutral when it comes to Linux distros other than preferring ones that don't come with SystemD."

I'm using WSL for Ubuntu and Debian. Although both use systemd for bare metal installs, neither WSL configuration uses systemd.

Don't be too shocked, but it looks as though these politicians have actually got their act together on IoT security

gnwiii

US industry should support standards for IoT security

In the auto industry, many vehicles available outside North America don't meet safety standards, so competion for US manufacturers is reduced. At present, consumers have few ways to judge the quality of IoT devices, but they know how much they are paying, so cheaper mostly wins. With credible standards many consumers will pay more for compliant devices. Local governments are heavy users of IoT building management and security cameras. With credible standards, it will be much easier to justify spending more on a better class of devices. For US industry, the standards will be a barrier to cheap imports from vendors who lack the expertise to build standards compliant gear. A big question will be how much influence US law enforcement can exert to have standards mandate back-doors.

Surface Studio 2: The Vulture rakes a talon over Microsoft's latest box of desktop delight

gnwiii

Re: Hmmmmm!

Space is at premium in cubicle farms. Every watt the gear consumes adds to the A/C bill. Noise from desktop cooling fans and rotating storage mean that mass storage and compute-intensive processing is done in server rooms. Small form factor PC's with external monitors need extra power outlets and clutter tiny workspaces with cables. All-in-one has one or two cables (power and perhaps network). Desktops with external monitors need 3 or 4 cables (2x power, monitor, and perhaps network), which means you need more cleaners. IT time to set up and relocate desktops costs more than all-in-one systems and could be significant if worker turnover is high. The retail pricing for all-in-one systems seems inflated. Bulk purchases all-in-one should come in below the cost of similar spec desktop+monitor configurations.

I'm just not sure the computer works here – the energy is all wrong

gnwiii

Re: on a similar note ...

At my work we had just received one of the original IBM PC's. The PC crashed every afternoon at 4PM, so I put a multimeter on the outlet. Sure enough, at 4PM the outlet dropped to 90 volts and the PC crashed. The problem was traced to faulty wiring for a huge ventilation fan controlled by a timer and set to go on a 4PM.

Macs to Linux fans: Stop right there, Penguinista scum, that's not macOS. Go on, git outta here

gnwiii

Re: Why Linux on Apple Hardware?

In the past, Apple hardware has generally been reliable and there is a large community of linux on Apple hardware users so linux bugs affecting Apple hardware get more attention. If your livelihood depends on having a reliable linux laptop, paying extra for top quality makes good business sense. Thinkpads are also popular with linux professionals for the same reason. In general, the reliability of high-end systems from major vendors has been catching up with Apple's laptops, so I would be surprised if fewer people are running linux on Apple hardware in the future.