Forgot your password?

Comment: Re:If you pay... (Score 1) 15

Are they addressing people's problems, or creating gadgets for elite techies? There is a huge ongoing crisis in personal computing because we have an Internet that (understandably) assumes endpoint security, but those points (PCs and mobile) are collections of black-box proprietary chips.

I have recommended running Qubes OS as a way to mitigate the security shortfall created by run-of-the-mill PCs and software, but that leaves us with the problem of trusting hardware designed and produced by a handful of large corporations who are increasingly willing to shaft their customers. Privacy and security are exchanged for maintaining a close relationship with the military-industrial complex (or police surveillance state, depending from which angle you prefer to view it).

In short, open PC hardware should be a priority for the open source community if not the IT industry as a whole. What are open hardware people doing about it?

Comment: Formal verification (Score 1) 129

by Burz (#47460819) Attached to: Mozilla Doubles Down on JPEG Encoding with mozjpeg 2.0

Why indeed would Mozilla waste their resources on this when stability and security on web clients ought to be their greater concern?

If it were up to me, I would start with self-contained date formats like JPEG that browsers handle frequently, and put that code through a formal verification process. Eventually, maybe even HTML rendering and the browser could be subject to formal verification. This could strengthen computer security dramatically.

Comment: Re:What's been removed,dumbed down,made incompatib (Score 1) 87

by Burz (#47409509) Attached to: KDE Releases Frameworks 5

1) Color management refers to controlling the color accuracy of the display. Typically this will involve importing an ICC file, or performing a manual calibration sequence. KDE has a not-half-finished module (not included in the core package) for System Settings panel, whereas gnome and unity are fully functional and included by default.

2) You're probably not setting the DPI to match your display and using the default that results in text becoming tiny on higher-res displays.

3) It occurs when the setting is on "group when taskbar is full". It will switch back and forth when there are a few dozen windows on the desktop.

4) You can switch to double-click (as I usually do), but then you have a situation where, for instance, the icons on the main System Settings panel are doulble-click, but going down a level, say into Application Appearance, gives you another set of icons that are presented the same way but are single-click. Sometimes this switch shows up *inside* applications, making the overall UI feel goofy and inconsistent. On the one hand, single-click everywhere can be inconvenient and risky, whereas their implementation of double click is VERY unprofessional. They could simply show an underline on mouseover if the object is single-click and be done with it, but meaningful ques for the user are not this project's strong suit.

5) Yeah... really they should give people a way to get that sh!t out of the way; Better yet, choose a sensible default and leave it disabled so it isn't sticking wacky-useless icons everywhere.

6) The last time I tried, the new Konqueror's kio integrations were broken. The fact is that they trashed their two best-loved apps: Konqueror and Amarok.

9) Having used KDE since 2000, I'd say the project has a general problem with deterioration. They used to be the most reliable desktop, but lately it seems more like Gnome2.

Comment: Re:What's been removed,dumbed down,made incompatib (Score 1) 87

by Burz (#47405907) Attached to: KDE Releases Frameworks 5


1) No (working) color management

2) Taskbar overinflates icons when its vertical (no more ability to control it since 4.x) and doesn't care what the panel's max icon size is set to.

3) Taskbar switches between grouping and non-grouping, from minute to minute

4) Very loose UI design leaves me less able to anticiapate how KDE will react to my input, and I can't tell it, for instance, to underline single-click widgets.

5) Activities - A huge waste that detracted from bug fixes and design consistency, and even scared away a lot of the technical users.

6) The pretense that Dolphin is anywhere near as flexible as (the old) Konqueror.

7) Can't control keyboard layout from login screen

8) Can't control trackpad speed

9) Decreasing stability.

I have to use KDE every day. Quite frankly, it only has the "Special Window Settings" really going for it. I'd trade all the rest of the KDE features for a Unity that had Dash replaced with a launcher menu.

Comment: Re:WUWT (Score 1) 441

by Burz (#47357383) Attached to: Researchers Claim Wind Turbine Energy Payback In Less Than a Year

Yet, there is still a huge difference between reporting facts from a particular perspective and running a misinformation campaign.

Efforts to downplay the significance of climate change resemble the determined efforts of tobacco lobbyists, in the face of scientific evidence linking tobacco to lung cancer, to prevent or delay the introduction of regulation. Lobbyists attempted to discredit the scientific research by creating doubt and manipulating debate. They worked to discredit the scientists involved, to dispute their findings, and to create and maintain an apparent controversy by promoting claims that contradicted scientific research. ""Doubt is our product," boasted a now infamous 1969 industry memo. Doubt would shield the tobacco industry from litigation and regulation for decades to come."[64] In 2006, George Monbiot wrote in The Guardian about similarities between the methods of groups funded by Exxon, and those of the tobacco giant Philip Morris, including direct attacks on peer-reviewed science, and attempts to create public controversy and doubt.[12]

Former National Academy of Sciences president Dr. Frederick Seitz, who, according to an article by Mark Hertsgaard in Vanity Fair, earned about US$585,000 in the 1970s and 1980s as a consultant to R.J. Reynolds Tobacco Company,[65] went on to chair groups such as the Science and Environmental Policy Project and the George C. Marshall Institute alleged to have made efforts to "downplay" global warming.

So, take your tired Republican tactic of false equivalency and shove it!

Comment: Re:Run it all through Tor? (Score 1) 184

by Burz (#47295017) Attached to: EFF To Unveil Open Wireless Router For Open Wireless Movement

TAILS is an interesting suggestion, because it includes a general IP 'replacement' stack called I2P. And THAT is what the EFF should be encouraging people to spread as far and wide as possible: A P2P-routed, mesh-like, torrent-ready, anonymized network connection that isn't limited to TCP and browser stuff. Its even got secure decentralized messaging (also inspired by bittorrent as it uses DHT), so no more Tormail type incidents.

I almost feel like the current generation of network experts, even people like Jacob Applebaum and Bruce Schneier, are rooted in a hopelessly outdated vision of network privacy. They both advocate that the end user not only setup Tor, but also fend for their own privacy with each application's own security scheme. Instead, they could just tell people, "You can reach me on I2P; Avoid Windows; And encrypt your HD". What they offer now is more like a recipe for a nervous breakdown; They want to maintain their Tech Ninja image, so they keep spouting a dizzying array of jargon relating to "solutions" that only solve for one layer.

Offer a version of network access that is general-purpose, is anonymous/private by default, where people can choose how much of their real identity they want to associate with the virtual one.

Comment: Interesting Skype history: (Score 2) 63

by Burz (#47279891) Attached to: How Secret Partners Expand NSA's Surveillance Dragnet

Dec. 22, 2010: The great Skype blackout
Feb. 6, 2011: Skype goes online with NSA PRISM spying (6 weeks after blackout)
October 2011: Microsoft completes Skype acquisition
July 2012: NSA boasts that "a new capability had tripled the amount of Skype video calls being collected through Prism"

Comment: Re:Tie this in with the battery tech from Tesla... (Score 2) 262

by Burz (#47262933) Attached to: Elon Musk's Solar City Is Ramping Up Solar Panel Production

Lithium won't be a prime target for grid storage for quite some time (if ever). There are dozens of interesting energy storage techs actually coming to market that have much lower cost/KWh and longer lifetimes. Some are batteries like this or flow batteries and some are not, like the 'icebear'. Even used lithium batteries taken from cars will probably get more of the storage business than new lithium batteries; for now, its just more cost effective and efficient.

The idea of using electric cars themselves as grid storage is an elegant one, but don't hold your breath waiting for it to become a big thing.

Comment: Re:It's one of many reasons why Adblocking is mora (Score 3, Interesting) 174

by Burz (#47034225) Attached to: Malvertising Up By Over 200%

No, he's implying ad servers need to start acting like a responsible industry. They pollute the web with malware and make a lot of sites unreadable with adblocking, owing to the moving, flashing and sometimes audible garbage that cover some sites.

If a simple text article with a few associated photos causes my computer's fan to wheeze and slows it to a crawl, and the ads keep breaking my concentration, AND they pose a security threat that (over the years) has gone from significant to huge, then their business model is just attempting to use you as a pair of eyes with a wallet attached. FUCK THEM.

Website operators like Ars Technica and Slashdot should be researching ways to deliver ads that are safe and sane -- there is no justification for a friggin' advertisement to be otherwise. Its just too bad the advertisers don't trust the content creators to serve the ads themselves. So what we get is a cycle of mistrust and negligence that puts their readers at risk of attack. Its sicko.

Comment: Re:Does the nature of the business hold it back (Score 1) 254

by Burz (#46932001) Attached to: Anti-Virus Is Dead (But Still Makes Money) Says Symantec

Security by isolation is one way to solve that problem. With a hypervisor designed for strong security instead of primarily for conveniece as is usually the case, users can safely allocate their tasks and data to different domains. For instance, 'Work' and 'Personal' could be two domains that have network access, whereas 'Vault' would hold the most sensitive info (like certain keys and passwords) and have no networking. An 'Untrusted' domain is used for most of the general web surfing-- reading articles, watching video streams, etc. On Qubes, there is also a TorVM package that facilitates the creation of anonymous domains.

So, whatever "happens in Vegas stays in Vegas". Qubes even assigns high-risk hardware, like NICs, to their own unprivileged domains.

The nice thing about this setup is that the window manager resides in the privileged domain and both the WM and its graphics stack are isolated from attacks originating in the VM domains. Further, each domain is assigned a border-color when its created so you can always get an idea of what is running in which context by glancing at the desktop. A compromised browser in 'Untrusted', for instance, could put up a window asking for admin access to the privileged domain, but the red border (and [untrusted] marker in the title) would give it away.

Copy/paste and file copy between domains are also protected; they are integrated into the UI so as to require a confirmation step so the privileged domain knows the user really intends to perform the action.

Make headway at work. Continue to let things deteriorate at home.