Forgot your password?
typodupeerror

Comment: Re:Download only? (Score 5, Informative) 69

by Albanach (#47437759) Attached to: Finnish National TV Broadcaster Starts Sending Bitcoin Blockchain

The summary was quite lacking. For those not wanting to rtfa, here's what it says under why broadcasting the blockchain in a way that can be picked up by low cast receivers is or might be useful. An AC post below also mentions that TV coverage may be better than mobile internet coverage.

This scheme makes it easy to construct affordable receivers that do not need mobile data connections in order to follow bitcoin traffic and to react to the received bitcoin payments. This would make it possible to build bitcoin counterpart for cash payment terminals, anything from a cash register to a coin operated self-service laundry. If the receiver application follows only transactions relevant to itself, it will be possible to build it using even an ARM microcontroller.

Also, it allows an alternative way to access the bitcoin network in cases where only a very low speed Internet connection is available. And, for all the tin foil hat wearers out there, this is a way to connect to bitcoin network without a trace! You only need online access when you want to make transactions yourself.

The data stream can contain other information, such as exchange rates between bitcoins and traditional currencies.

Comment: Re:Windows or everyone? (Score 2) 51

by Albanach (#47433051) Attached to: Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet

Of course linux is targeted. There are large numbers of linux servers, with fast processors and very fast high capacity network connections. Making matters worse, because they often to run important services, people may be slower to upgrade packages/kernels.

I don't know about this particular botnet, but it's been a long time since saying "I don't run windows" counted as a security strategy.

Comment: Re:why the word needs openstreetmap (Score 4, Interesting) 131

by Albanach (#47426543) Attached to: How Google Map Hackers Can Destroy a Business

Fifteen years ago, you opened the yellow pages for the same information. Did you say then, who controls this book? Did you worry about all the power being in the hands of a single phone company?

Likely not, and for two reasons. If the phone company abused it, they'd lose the trust and goodwill that makes the very product valuable, and if it was no longer accurate someone else would come alone and make an accurate version.

Why is that not the same for Google? If their maps become unreliable, won't people move to Bing? If not, why not?

Comment: Re:FDA != NIH (Score 2) 119

by Albanach (#47412229) Attached to: A Box of Forgotten Smallpox Vials Was Just Found In an FDA Closet

Misleading headline: FDA != NIH.

Guessing you never read the article. Had you done so, you would have seen this bit:

"[E]mployees discovered vials labeled ”variola,” commonly known as smallpox, in an unused portion of a storage room in a Food and Drug Administration (FDA) laboratory located on the NIH Bethesda campus."

Comment: Re:Borg Home (Score 2) 63

by Albanach (#47385655) Attached to: Hacking Internet Connected Light Bulbs

I get why I'd want to do it at home, but not why I'd pay someone else to do it

I'm not sure how you're going to create an asthetically pleasing multi color 1,000 lumen LED that fits in a standrard lamp using a $10 controller. Plus create an app or web interface to control timing/dimming/color. If you figure it out, please post the details as I'm sure lots of folk would love to take on that project.

In the meantime, I'm thinking these look pretty neat if a little expensive since I think you'd need quite a few bulbs for the best effect.

Comment: Re:So who is behind this? (Score 2) 112

by Albanach (#47379475) Attached to: FCC Proposal To Limit Access To 5725-5850 MHz Band

Seems it is about operating beyond the permitted frequency and power:

13. The Commission’s investigations found that most 5 GHz devices are manufactured to enable operation across a wide range of frequencies, extending down into the 4 GHz bands and up to almost 6 GHz. The devices are controlled by software that manages the specific parameters used in the
equipment. In most of those cases for which a specific cause was determined, the harmful interference was the result of third parties or users modifying the software configurations to enable operation in frequency bands other than those for which the device had been certified, but without meeting the technical requirements for operation in those frequency bands (such as the U-NII-2C band where interference to the TDWR was occurring).

So a hardware limit to prevent out of band operation would solve the problem; while allowing the software to be controlled by the user. I've no idea how difficult a hardware solution would be, and I can see why it would be more expensive than a software one. If this has been abused, I can see why the FCC would be seeking such a ruling.

Comment: Re:Blaming Google (Score 3, Insightful) 238

by Albanach (#47371147) Attached to: Following EU Ruling, BBC Article Excluded From Google Searches

He doesn't really blame Google. From the article:

To be fair to Google, it opposed the European court ruling.

He does question why there's no apparent right to appeal. It would certainly seem reasonable to allow the person responsible for an article to highlight why it is still relevant or not outdated since often they will have better knowledge of the subject area than a paralegal.

Comment: Re:javascriptards (Score 2) 91

by Albanach (#47368757) Attached to: WebODF: JavaScript Open Document Format Editor Deemed Stable

Are you serious? The applications exist for when you have access only to a computer and a browser. it doesn't matter what operating system it runs, it doesn't (or shouldn't) matter what browser it running. It doesn't matter that you have no admin rights. If you need to edit a document, it should just work.

+ - FTC sues T-Mobile over bogus charges

Submitted by Albanach
Albanach (527650) writes "The FTC has filed a lawsuit alleging that T-Mobile charged customers millions of dollars for premium rate spam text messages the customers neither wanted, nor signed up for. In response, T-Mobile point out that, unlike other major carriers they stopped billing for these services last year, and put in place procedures to enable customers to obtain refunds. Despite these measures, coverage in The Wire stated the FTC has determined T-Mobile not only refused refunds, but many of those who did receive refunds only received a fraction of the cost."

Comment: Re:Serious? (Score 1) 71

by Albanach (#47344239) Attached to: KeyStore Vulnerability Affects 86% of Android Devices

Sounds like you want to compare the cheapest android devices with the most expensive apple ones. The more expensive android devices are much more likely to keep getting updates. And if they're a Google branded device, even when official updates end there's a community to support it. That's why a four year old Nexus One can run Android 4.4 today.

Comment: Re:Serious? (Score 2) 71

by Albanach (#47342479) Attached to: KeyStore Vulnerability Affects 86% of Android Devices

That was a new $700+ iPad, from the Apple Store in the summer of 2010 about five months after launch.

Wikipedia reports: Operating system iOS 5.1.1 (build 9B206) Released May 7, 2012; 2 years ago

No longer supported; third party operating systems available

So it was abandoned by Apple 28 months after launch. The hardware is still functional. It even still holds its charge. But there's no security updates whatsoever.

Polymer physicists are into chains.

Working...