* Posts by KieranTully

9 publicly visible posts • joined 20 Nov 2018

Facebook, WhatsApp, Instagram deplatform themselves: Services down globally

KieranTully

Re: It was only a matter of time

Except in this case it did work if you'd cached the host IPs. Perversely the BPG routing snafu only impacted their DNS resolvers.

BOFH: You'll find there's a company asset tag right here, underneath the monstrously heavy arcade machine

KieranTully

Re: Personal heaters

But ... PROPER TEA IS THEFT !

Cockroach Labs scuttles its way to $160m funding, $2bn valuation thanks to the database that doesn't die

KieranTully

Interesting, it sounds like a cloud agnostic version of Google Spanner or AWS Aurora

https://www.nextplatform.com/2017/02/22/google-spanner-inspires-cockroachdb-outrun

BOFH: Judge us not by the size of our database, but the size of our augmented reality

KieranTully

Re: Performance a little choppy ...

BOFH being prescient as always:

https://www.youtube.com/watch?v=Lu56xVlZ40M

Phuck off, phishers! JPMorgan Chase crafts AI to sniff out malware menacing staff networks

KieranTully

Re: Where's it from

Yes as you say, should, but not always - software is only as perfect as the human who wrote it or configured it. They're probably also running DLP software as a belt and braces approach to prevent data escaping.

And what about zero day attacks where the email recipient doesn't have to do anything "stupid" other than click on a malicious link?

KieranTully

Re: Where's it from

They probably do already flag external emails, but humans still have to decide (sometimes wrongly) which external emails are legitimate.

KieranTully

"We asked the eggheads to describe what features the model learned ... but they declined to comment."

Rather than them being unwilling to share the features (lest malware authors adapt, security through obscurity) isn't it equally as likely that the deep learning model is opaque, and they can't explain the inferences it's making?

Let's spin Facebook's Wheel of Misfortune! Clack-clack-clack... clack... You've won '100s of millions of passwords stored in plaintext'

KieranTully

Re: Why might you need to use HTTP POST even when the request is idempotent?

I know what the answer is in the context of this article, but I'd have to be a mind-reader to stumble upon that in an interview.

What the #!/%* is that rogue Raspberry Pi doing plugged into my company's server room, sysadmin despairs

KieranTully

It's to tell you how busy the wiring closet is, before you visit

A student in the US found hidden Pis were being used to count MAC addresses to generate busyness heat maps for college facilities. See https://youtu.be/UeAKTjx_eKA