Forgot your password?

Comment: Re: Probe requests should be manual (Score 1) 112

by cbiltcliffe (#47435359) Attached to: Android Leaks Location Data Via Wi-Fi

GPS is completely passive (unless you use AGPS, but even then it doesn't leak a lot of information).

I know that.

You can use GPS without any network connection, and nobody will know.

This thread/discussion is about using GPS to figure out which network connection(s) to look for and connect to, so this statement, while true, is not even remotely applicable to the topic.

If you record and leak location information, that is not particular to GPS and can only be avoided by not using any location service at all.

Also true. However, most people have apps installed on their Android phone. Too many Android apps request fine location permission for no legitimate reason. I assume a lot of the free ones that display ads want location so they only display ads for brick and mortar businesses that are geographically relevant. Even for this, though, the coarse, network-based location service would be much more accurate than necessary.

See my response to your sibling post, as well.

Comment: Re: Probe requests should be manual (Score 1) 112

by cbiltcliffe (#47435019) Attached to: Android Leaks Location Data Via Wi-Fi

The article is about eavesdropping on probe requests that a device sends. In my proposal, a device would first listen for signals from GPS satellites to narrow the list of hidden SSIDs before determining which probe requests to send. Could you explain how using a GPS receiver to narrow down these probe requests would be "potentially even more intrusive"?

Because way too many programs on Android request fine location permission. Yes, this is a problem with the programs themselves, but that's why I said "potentially." However, every time your phone turned on the GPS momentarily to determine location and therefore which probes to send, any or all of these programs, if installed, would be able to snag your exact location, and send it off to the developer on the next network connection.

Comment: Re:Cisco is an accomplice? (Score 1) 255

by cbiltcliffe (#47428231) Attached to: Austrian Tor Exit Node Operator Found Guilty As an Accomplice

Does this make every link, switch, and router on the route an accomplice? Why not?

No. The vast majority of data that flows through a switch is not involved in a crime. Tor is explicitly designed to hide user's identity. It is widely understood to be the tool of choice for trafficking in illegal goods. Most people who are not committing crimes do not use it.

If Cisco started building switches with special features designed to evade the law, they would be an accomplice to crimes that used those features. They don't, and Tor does.

How does "hide the user's identity" == "evading the law"?

Comment: Attraction? (Score 1) 264

the sort of spectacular, over-the-top attraction Dubai is known for.

"Spectacular", yes. "Over-the-top", certainly.


It's in fucking Dubai. That in itself makes it as attractive as a dose of syphilis.

(OK,I'll admit to having had to work in that area - there are a few nice people in the working classes, but most of the locals and ex-pats are a bunch of bastards.)

+ - UK government to rush in emergency surveillance laws-> 2

Submitted by beaker_72
beaker_72 (1845996) writes "The Guardian reports that the UK government has unveiled plans to introduce emergency surveillance laws into the UK parliament at the beginning of next week. These are aimed at reinforcing the powers of security services in the UK to force service providers to retain records of their customers phone calls and emails. The laws, which have been introduced after the European Court of Justice (ECJ) ruled that existing laws invaded individual privacy, will receive cross-party support and so will not be subjected to scrutiny or challenged in Parliament before entering the statute books. But as Tom Watson (Labour backbench MP and one of few dissenting voices) has pointed out, the ECJ ruling was six weeks ago, so why has the government waited until now to railroad something through. Unless of course they don't want it scrutinised too closely."
Link to Original Source

Comment: Original article. (Score 1) 2

by RockDoctor (#47423359) Attached to: UK government to rush in emergency surveillance laws
The original message from Tom Watson is at

Sounds indeed like they're up to something.

Tom Watson is an enemy of powerful people. "According to the Sun newspaper, Watson is a fundamentalist zealot who denounces any deviation from socialism. MP and author of a book on corruption by NewsCorp."

If the Sun hate you, as well as the rest of Murdoch's Empire of Evil, then you must be doing something right.

Did I get FP?

Comment: Re:Mt. St. Helens ins't the monster volcano... (Score 1) 105

by RockDoctor (#47423227) Attached to: Mapping a Monster Volcano

The yellowstone caldera - that thing is the nation killer, possibly world-killer if it ever goes up.

It's not "if it ever goes up" ; it's "when it goes up AGAIN" ; there have been 4 or 5 major eruptions of Yellowstone in the last couple of millions of years.

"World-killer"? Evidently not. Nation-killer? Possibly. Very destructive, when it next goes off? Certainly.

Am I concerned? See 2 minutes into this video.

Comment: Re:And this doesn't seem like a bad idea? (Score 1) 105

by RockDoctor (#47423193) Attached to: Mapping a Monster Volcano
Do you think they're al going to be set off at once?

If they did that, how would they know if they're listening to a delayed echo from shot point #7, indicating a magma chamber at 17km depth, or a differently-delayed echo from shot point #13, indicating a magma chamber at 27km depth, or a differently-delayed echo from shot point #4, indicating a magma chamber at 7km depth, or a differently-delayed echo from shot point #2, indicating a magma chamber at 2km depth, ...

It gets repetitive, doesn't it? That's why deconvolving seismic data is, and always has been, a major consumer of computing resources.

Watch some video of a seismic array being shot. They (well, "we" - I do some seismic-while-drilling work, though I don't claim to be an expert) fire one gun at a time, then listen for an appropriate number of seconds (the "two-way time" to collect the echoes. Then they fire the next gun in the array (or wait for the gun to re-charge, if there's only one gun), and listen for the echoes ... it gets repetitive. With every shot (hundreds of thousands in a survey) recorded up to kilohertz for each of up to thousands of hydrophones, each one of which has it's GPS position recorded at all times in the recording phase (because where things are matters) ... you rapidly climb through the tens of terabytes of data.

You don't have to know how the computer works, just how to work the computer.