Forgot your password?

Comment: Re:Are you kidding (Score 2) 446

by AmiMoJo (#46766243) Attached to: Study Finds US Is an Oligarchy, Not a Democracy

He might be wrong about some things, but the American Dream(TM) lie is well understood. The UK had a its own version called Thatcherism. The idea that anyone can make it if they work hard. Well, maybe they can if they get really lucky, but for the majority they won't get rich in their lifetime. Not to say that they will have bad lives or anything.

The problem is people vote for tax cuts for the rich because they think they will be rich one day. They vote based on ideas that only really affect the rich because they think they are upper-middle class, when in fact they are working class. The majority of working class people in the UK think they are middle class, it's that bad. My aunt was a school cleaner and my uncle a factory worker, they thought they were middle class.

Comment: Re:Simple problem, simple solution (Score 1) 267

by AmiMoJo (#46766031) Attached to: San Francisco's Housing Crisis Explained

You must have missed the bit about much of the cheap, social housing where the rent controls actually kick in being owned by non-profits who exist only to provide social housing. In the UK local government used to fill that role, building a lot of low cost but good quality housing.

Everyone needs housing. You can't really chose to live in a cardboard box under a bridge as an alternative to renting or buying a property. It needs to be a social thing, with a free market on top for people who can afford it.

Comment: Re:Falsely accused (Score 1) 95

by AmiMoJo (#46765747) Attached to: 52 Million Photos In FBI's Face Recognition Database By Next Year

The problem is that if they do prosecute you in the UK the failure to mention when questioned anything you later rely on in court can harm you defence. It is assumed you making it up later if you didn't mention it when questioned. Maybe you could convince a jury you just didn't want to talk to the police, because they are well known for being corrupt scumbags, but it's one hell of a risk.

Comment: Re:Why spend another $700 for a car stereo (Score 1) 155

by AmiMoJo (#46765725) Attached to: How Apple's CarPlay Could Shore Up the Car Stereo Industry

Already exists, it's called MirrorLink and several manufacturers of cars and after-market head units support it. There is also the proprietary but well hacked Pioneer AppRadio. Plug your phone in and stash it out of the way, the screen is fully mirrored with touch control in the dash and you can even use the car's GPS antenna.

Comment: Re:Having the souce Code does not make it safe (Score 1) 156

by AmiMoJo (#46761953) Attached to: Snowden Used the Linux Distro Designed For Internet Anonymity

Most of us are gonna have to trust someone at some point. We can't build our own CPUs out of sand, we have to hope that Intel didn't install an NSA sponsored backdoor. Fortunately all the evidence so far suggests that the NSA avoids creating pre-exploited hardware and firmware, instead relying on more subtle techniques like weakening encryption or making use of genuine bugs. Maybe they insert a few bugs too, but again the evidence suggests that using systems like Tails is pretty effective.

At any rate, it seems to be far better than using Windows, even if I haven't personally audited the millions upon millions of lines of source code needed to build it.

Comment: Re:To Crypt or Not To Crypt (Score 2) 169

by AmiMoJo (#46756617) Attached to: First Phase of TrueCrypt Audit Turns Up No Backdoors

True, but if you are that paranoid you can use a VM with the hardfile in an encrypted container on the host OS that is protected by a keyfile.

It's actually a nice way to do it because you can have the host OS as something like a read-only bootable Linux DVD, and use it as an outer layer that somewhat mitigates attacks on the host OS. For example if the host OS was running a VPN/Tor and sending all traffic from the inner host OS over that there would be no way, short of the user making a mistake, for the host to get the IP address of your internet connection. It also prevents apps in the host OS from leaking data outside of the VPN/Tor, and allows you to spoof the network card's MAC address at a (virtual) hardware level, and limits hardware fingerprinting of the machine the host is really running on.

You can also Wireshark the host OS if you are really paranoid, see if it sends any packets to

Comment: Re:Fantastic Google Chrome marketing (Score 1) 202

by AmiMoJo (#46755701) Attached to: Mozilla Appoints Former Marketing Head Interim CEO

The problem is that in order for people who do a public facing job where their personal reputation and popularity affects the company's fortunes to have free speech without consequences everyone else would have to be forced to support the company no matter what. Boycotts could be made illegal, but how would you stop people uninstalling Firefox after his appointment?

Like it or not personalities matter when it comes to CEOs. Remember all the personal hate for Bill Gates and the way he acted at Microsoft? All the love/hate for Steve Jobs, who arguably was responsible for much of Apple's success due to his strong personality, his outspoken views and "reality distortion field". There have been endless cases where people paid to advertise a product have been dropped over things they did or said, because their actions tarnish the advertiser too. At least in the case of a CEO they have some involvement in the thing being tarnished and aren't just a pretty face.

I agree that leaks are worrying, but in this case I'd argue that donations to political campaigns should be public. If someone without money to spare wants to endorse or promote a cause they have to speak, revealing their position. Just because you can afford to give up $1000 shouldn't excuse you from that responsibility. Yes, you are free to say what you want, but you are never free from the consequences.

Comment: Re:Changing IMEI is illegal (Score 2) 105

by AmiMoJo (#46755639) Attached to: Inside the Stolen Smartphone Black Market In London

Actually it's demand from the networks that keeps the IMEI writeable. They want to buy phones in bulk from the manufacturer, program their own IMEIs and load up crapware, and sell them to customers. When the customer decides to upgrade they will offer some pittance for the phone, then sell it on to another network in another country who change the IMEI and sell it to their customers.

Comment: Re:What if we overcorrect? (Score 1) 331

by AmiMoJo (#46755603) Attached to: Climate Scientist: Climate Engineering Might Be the Answer To Warming

The argument doesn't extend to areas other than lighting. I can only drive one car at a time and the time spend driving is mostly limited by the fact that I need to spend 8 hours a day working and maybe 10 eating and sleeping, so have to keep commuting time down no matter how cheap it is. Similarly I can only watch one TV at a time, so there isn't really much point turning two on. Even if I did a modern TV uses less than half what an old CRT did anyway.

A lot of the techniques for reducing global warming involve removing the need for things like air conditioning and heating most of the time by making buildings more efficient. If there is no need for air con most of the time I'm not going to use more of it under any circumstances.

With lighting specifically I'd be amazed if demand had increased faster than population growth, considering we went from a 60W incandescent bulb to a 15W CCFL and now a 6W LED. In a few years when LED is the main type being sold there would need to have been a 10x increase in lighting use just to maintain the old level. Do you have any citations for the claim that it has gone up?

Comment: Re:To Crypt or Not To Crypt (Score 3, Insightful) 169

by AmiMoJo (#46755489) Attached to: First Phase of TrueCrypt Audit Turns Up No Backdoors

You should use a passfile as well as a password. Makes it much harder for an attacker because something like a hardware keylogger or audio analysis to recover keystrokes can't see which file you selected. When it comes to breaking your key there is no way to know after the fact that a keyfile was used, so they will probably waste a large amount of time trying a dictionary attack on the password before even realizing that they need to also try any of the 100,000+ files on your computer as well. That is assuming you used a file on your computer, if it was on an external drive they didn't collect when they grabbed it they are screwed. Keep a few corrupt USB flash drives around just to make the wonder if they had it but broke it.

2000 pounds of chinese soup = 1 Won Ton