Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Viewing Launches (Score 3, Interesting) 23

I was in Florida to speak at Orlando Hamcation and went to see the DISCOVR launch at Kennedy Space Center. I paid $50 to be at LC-39 for the launch, an observation tower made from a disused gantry on the Nasa Causeway between the pads and the Vehicle Assembly Building. A crawler was parked next door! A hot sandwich buffet, chips, and sodas were served. It was cold and windy! I watched for a few hours and unfortunately the launch scrubbed due to high stratospheric winds.

The next day, Delaware North Corporation, which operates tourism at KSC, decided not to open LC-39 or the Saturn 5 center for the launch. This was the third launch attempt and I guess they decided most people had left. I was annoyed.

The closest beach was going to be closed in the evening, it's a sensitive ecological area. I ended up seeing the launch from Jetty Park. This turned out not to be such a great location, the tower wasn't visible at all and the first 10 seconds of the rocket in flight were obscured before we saw it over a hill.

What's a better viewing location?

Comment Re:Isis (Score 1) 533

Oh, certainly. My point is not that they are harmless, or that their aims are noble(they aren't, and if they could they'd continue expanding until they ran out of room and/or infidels); but that this ideological commitment to territorial expansion also has downsides for them.

Since their desire is to expand(and their continued legitimacy as a 'caliphate' depends on it), they can expect basically all their neighbors to be frosty at best. The ones that aren't Real True Muslims can expect to have their heads sawed off and used to make snuff films, so they aren't going to be too happy, and will have a strong incentive to fight like their lives depend on it, because they do, and even the Real True Muslims can, at best, land an Emirate or similar subservient status. If the alternative is losing power entirely, they'll probably go for it; but they certainly won't like the idea. Aside from ensuring that local politics remain ugly, the enthusiasm for territory also requires a comparatively large amount of manpower dedicated to fighting relatively conventional battles for borders as well as doing boring but necessary administration and governance stuff. And, in addition to there being nothing quite like really, really, boring bureaucratic work to cool some hormonal, maladjusted 18-20something's zeal for Jihad, people fighting comparatively conventionally to take or hold territory are the type of army that we have the best shot at picking off from the air. They probably won't oblige us by behaving exactly like 1970s commies, only lower budget; but they aren't going to take and hold a contiguous nation-state without at least periods of relatively conventional warfare, of the kind the air force just smiles really wide when it looks down upon.

They can still be nasty fuckers, and they are; but their ability to focus on the 'far enemy' (ie. us) is pretty small compared to their ability to focus on the 'near enemy'(every last person who ended up on the wrong side of a nasty little tribal feud in the middle east). Not necessarily zero; but very low per unit manpower and resources.

Contrast to classic Al Qaeda, or the assorted islamist militants that Pakistan's ISI cultivates for use as proxies against India: such groups have no particular territorial ambitions, they just need some basic office and living space, they are generally at least somewhat willing to be 'ecumenical' about various internecine disputes as long as there are Americans and Jews and so on to attend to. Much less dramatic, in terms of capturing locations with actual place names and generally acting like a state; but much more flexible in their ability, and willingness, to deploy resources against soft targets wherever the opportunity arises, and much trickier to root out, since they both look much more like civilians and have a much better chance of having good relationships with at least one host country.

I would definitely agree that IS showing signs of actually expanding out of their little shithole would be Bad; but unless they can do that, their expansionist desires actually make them somewhat less risky to our interests because they'll be focused on slugging it out with their neighbors, rather than blowing up targets of opportunity worldwide. (Very, very, cynically, an IS that fails to expand might even have some benefits: if you want to remain even a nominally liberal democracy, you can't really do anything about religious wackjobs who hate you and your civilization; but live there anyway for some reason, until they actually do something criminal. If, suddenly, their most-likely-to-be-violent and/or most zealous people voluntarily start emigrating to some hellhole to get themselves killed, well, sucks for the neighbors; but some of your problems are now solving themselves.)

Comment Re:Isis (Score 2) 533

We're all in ISIS' gunsights. It's just a question of who's first

That isn't entirely false, in that they'd be more than happy continue their merry little campaign unto victory or death; but it's a fairly shoddy version of true.

ISIS are a bunch of sociopathically bad neighbors; but their ambition to 'caliphate'(which implies and requires acquisition and effective control and administration of territory) makes them rather more locally focused than an outfit like Al Quaeda. As does their (admittedly gruesome) enthusiasm for settling local grudge matches with Shia and various other groups they deem heterodox. It doesn't make them nice; but it does make them more likely to spend their time on local bloodletting rather than international plotting, and it makes them so uncompromising that they aren't particularly good allies, even of the most cynical convenience, for anyone. They've made it fairly clear that anyone who isn't the correct flavor of muslim is definitely off the table, and they don't call their little strip of sand "The Islamic State" as a gesture of cooperation with other nominally-islamic states in the region, who are unlikely to take being called illegitimate very well.

Comment Pathetic much? (Score 4, Funny) 533

Should I take it as an unflattering reflection of the true strength of The Caliphate(tm) that it is being actively butthurt about having its twitter privileges revoked? That's the sort of thing that is pretty pathetic among individuals, much less would-be nation states allegedly arranged allong deity-ordained lines.

Comment Wonder how they'll rate Global Warming discussions (Score 1) 375

... when there is more than one version of the truth (conflicts, spin vs fact)... plus not all information is facts... philosophical questions may have more than one answer etc... so I am definitely curious to see how this works out.

I'm curious as well.

In particular, I wonder how they'll handle Global Warming / Climate Change discussions.

Then there's electoral politics, economics, Illegal immigration / undocumented migrants, ...

Comparing to a knowlege base presupposes that the knowledge base is full of truth. Filtering search results to exclude (or down-rate) anything at odds with the current paradigm is a recipe for hamstriging research, debate, and intellectual progress

  Ideas need to be supported or rejected based on evidence and logic, not whether they're orthodox.

Comment Re:Or the malware might cover its tracks. (Score 1) 324

I mean if they go to the trouble to do this why do it in a way that would be discoverable via jtag for other state actors. I mean if they go to the trouble to do this why do it in a way that would be discoverable via jtag for other state actors.

Because hacking the JTAG to hide malicious hacking of the software is a massive endeavor and a massive PITA.

Besides, if they built it into the original software they wouldn't NEED to hack the JTAG to hide it. The code would match the released version. (You'd have to reverse-engineer it to discover their back doors.)

Comment Re:I should think so! (Score 1) 107

The whole point of my post was to suggest one method for causing trouble with URL requests, and I don't doubt that there are others.

However, that doesn't change the fact that, while basically every step of the process is potentially up for grabs, the URLs stamped into the disk are static. Short of replacing the disk nobody gets to change them.

If you control the JVM, you can rewrite them there, if you control the player's OS, you can rewrite them there, if you arrange for your host to be the one replying you can provide whatever response you wish, all true, all bad; but not the same as changing the URLs on the disk.

Comment Or the malware might cover its tracks. (Score 1) 324

If you ask the drive to read out the whole flash.
The maybe the firmware would have to go to the platter to get the real image.

Or the malware could regenerate the un-attacked version.

For instance: If it's a patch that loads into an otherwise cleared-to-known-vallue region it can detect that region while reporting flash content and report the cleared value, instead. Add a couple other tiny regions where it saved (or alread knew) the previous contents where it "sank it's hooks" and you can't tell it's there from its replies to dump requests.

JTAG seems safer.

Yep. JTAG, in principle, could be corrupted. But it would require substantial hardware support that almost certainly isn't there (yet!)

Comment Hashes can be useful. (Score 1) 324

Which is why I always laugh my ass off at all these people who use PGP to sign things and put a hash on the same website you download it from ... look you can verify this file you downloaded from the website hasn't changed because theres no way anyone would be smart enough to update the hash as well!

That's why you SIGN the hash. Then only the public key needs to be published by a different route.

And it doesn't HURT to publish it on the web site as well: Then someone tampering by substituting a different public key sets off alarm bells when that differs from the public key obtained from another site or by another path. Blocking that makes man-in-the-middle more complex: The attacker has to have essentially total control of the path to the victim and be able to recognize and substitute the public key whenever it shows up. One slip-up and somebody may raise the alarm.

Meanwhile: Even if publishing hashes on the same site may not provide additional security against MITM, it DOES let you check the download wasnt corrupted in transit (in ways other than malicious substitution). With modern protocols that's less of a problem these days than it used to be, but a check would be comforting.

Comment Re: I should think so! (Score 3, Insightful) 107

I think that the apps are supposed to be signed(at least to get useful elevated priviliges, like access to the network or to the player local storage); but if a signed, legitimate, app makes a network request to a server that is no longer friendly, then it becomes a question of input validation, even if the application signing scheme is 100% in order and nobody screwed any part of that up.

Call me a pessimist; but I'd bet nontrivial money that a lot of the 'interactive' cruft that is pumped out to bulk up 'special edition' releases is barely up to the challenge of presenting a helpful error message if it gets a 404 from the remote host, much less not falling over and wagging its tail against moderately clever malice. In that case, it'd be a fully signed and approved app doing the work, but taking action based on (ill-founded) trust in content it downloaded.

Comment Re:Best defense is not to care (Score 1) 107

I'd not be terribly interested in the capabilities of the players themselves(routers make better zombies and are way more internet facing and unlikely to be turned off, and generally atrocious on security); but I would be very, very, nervous about anything that serves as a nice, subtle, persistent implant on a LAN.

Even enterprises have a nasty habit of pretending that they can get away with a little sloppiness 'inside the firewall', and consumer gear often can't be persuaded not be absurdly trusting of anything that happens to share a subnet with, in the interests of ease-of-use, 'autodiscovery', and similar. If you can get an implant on one device, especially one that nobody is going to suspect(and may have few options, short of replacing, if they do), you can reinfect other devices as they pop up more or less at your leisure.

Comment Re:Ha ha they used JAVA; morons! (Score 2) 107

Unfortunately, it's not just blu ray: 'BD-J' is their specific variant; but it is based on the so-called 'Globally Executable MHP', a truly horrifying acronym-standard-soup constructed to enable vaguely interoperable java-based UI atrocities for various flavors of set top box associated with DVB-T, DVB-S, and DVB-C(Basically, all digital broadcast and cable activity that isn't ATSC, ISDB, DTMB, or some fully proprietary oddball).

BD-J is North America's main point of contact with this delightful substance; but it enjoys near-total ubiquity in the parts of the world that also use DVB.

Comment Re:I appreciate the sentiment.. (Score 1) 102

For the record, I have nothing against CSE wanting to grow and wanting to become a stand-alone School. They are a great department and do a lot of interesting work. But I intensely dislike when the "haves" misrepresent facts or plead poverty in an attempt to acquire ever-more-scarce public funding.

Slashdot Top Deals

Elliptic paraboloids for sale.

Working...