Forgot your password?

Comment: Re:Great... (Score 1) 520

by ToasterMonkey (#47546515) Attached to: Satellite Images Show Russians Shelling Ukraine

I'll match American propaganda with some Russian propaganda. Please, actually READ IT? Huh? Willya please?

I can't say WHO shot that airliner out of the sky, because there is no CONCLUSIVE evidence yet. But, there's a helluva lot of circumstantial evidence that points at Kiev.

Do you have any idea why Kiev had fighter jets shadowing that airliner? Neither do I, but that's a question that needs to be answered. And, why did Kiev order the airliner to alter it's filed flight plan, flying a couple hundred miles north of the normal flight path?

There are a lot of questions that need to be answered, and I'm pretty sure that some of those answers will be "Well, we've invested so much money into the Ukraine, we can't abandon the plan!"

Meh, that page criticizes made up thunder storms in one paragraph then claims SAM operators would not be able to visually identify a plane that day due to the weather.

The small target window... how is that different for any other AA site anywhere? Anyone can look up at a high altitude flight over their home and do simple mental math how much time one would have to operate one of these things. It's not much.

And the tailing fighter jets I was not previously aware of, only increase the odds in my mind that rebels mistook this for a military plane.

There's spin... and then there's Spin. One possibility is... another real possibility is!!! And something else that could have happened is... retired Russian air force colonel says a fighter jet shot it, and then a BUK was ordered to finish it! Look here, at one possible map, from one source! (those are not my words!)

That thing is just conspiracy theory soup... It was accidentally shot down, period. I can speak with as much authority on this matter as random retired colonel somewhere in Russia. Why it's going from, and I'll leave it at SOMEONE, accidentally shooting it down to claims that it was all complexly orchestrated and done on purpose is just bizarre. Hanlon's razor - it was an accident to shoot down a loaded civilian jetliner. PERIOD.

Comment: Re:Beating aroud the bush (Score 1) 119

This article sounds like it is beating around the bush, alluding to but never mentioning the discovery of "Parallel Construction". Its a policy whereby illegal evidence is snuck into court by using it to find other evidence and not informing the courts, defendants and sometimes not even prosecutors where the initial leads came from. An example would be there is a suspected drug runner, NSA intercepts are used to tap his phone & internet communications. They find what they believe is a date and time where the runner will be carrying some drugs in their car, they then have some officers make up an excuse to pull them over and search their car. They conveniently "forget" however to tell anyone outside the law enforcement/intelligence community that their initial lead was based on warrant-less searches. And apparently many have the gall to say that it is a "It's decades old, a bedrock concept.", something tells me that if government agencies have to keep it secret from the courts its almost certainly illegal.

From the perspective of the agency doing the enforcement and helping bring a case to court, what's the difference between this and any other lead that's not directly usable as evidence, such as an anonymous tip? If the evidence is all properly and legally obtained, well I'm not sure this notion of an "illegal" tip is relevant.

Look, I don't know the exact methods used to do parallel construction, but I do see how it can be done legally, and IMO not infringing on your rights. There shouldn't be a distinction between me telling police there's a lot of cars stopping by my neighbors which is WEIRD and me doing the same with positive conformation in my opinion of criminal activity, regardless the particular methods I used to build that confidence. Obviously my confidence is not transitive, and I'd only share what I could, in a manner that protects my ass. The NSA is doing the same I'd imagine, and if you have a problem with THEIR methods, the drug case is not the proper venue to bring it up.

Comment: Re:What's it going to take? (Score 1) 119

This is the entire reason that the Department of Homeland Security was created, to bring all intelligence about threats to the United States under one body.

That's not true... The DHS absorbed INS, USCIS, Customs, Border Patrol, Coast Guard, Secret Service, and probably some other notable stuff I'm too lazy to look up. If you need help spotting the theme, it's enforcement.

There may be more collaboration between members of the intelligence community, which DHS is a party to but that's not the reason DHS was created.

Comment: Re:I don't see the problem. (Score 5, Insightful) 667

by ToasterMonkey (#47497215) Attached to: Russian Government Edits Wikipedia On Flight MH17

False equivalence.

Sides are not equally wrong, and truth is not somewhere in the middle. There is a very clear wrong side - Russian equipment operated by Russian-sponsored terrorists and/or Russian military misidentifying civilian aircraft and shooting it down. Anything else is intentional misinformation.

"Terrorist" is the wrong word, it's obvious from the intercepts this was a tactical error on someone's part.

Terrorism isn't defined by actions so much as the reason. For the love of Jebus, it has a well understood meaning folks, look it up.

Comment: Re:Just a note (Score 1) 164

by ToasterMonkey (#47284359) Attached to: US House of Representatives Votes To Cut Funding To NSA

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized" Frankly, warrantless wiretapping IS illegal, per the US Constitution.

The per the US Constitution part is debatable, nothing you quoted makes it so.

I agree with Justice Black, that the Fourth Amendment was not intended to protect your privacy. It was intended to prevent the government from physically intruding on your life. It would have been worded to include eavesdropping if it was meant to be. IMO, if you want privacy protections you need specific laws or new amendments.
If you read the Fourth as some kind of generic privacy protection then how can police interview your neighbors about what they saw or heard happen in your house? It does't make sense. Evidence exclusion rules make more sense for general privacy protection. Laws against gaining knowledge in itself are moronic, in my opinion.

I think most people here would agree the "reasonable expectation" test is fishy.
If you close a phone booth door WARRANT, but open NO WARRANT. Extrapolating from THAT logic lets us say... well you let Google not only index your email but thoroughly analyze them, AND you don't encrypt... soo.....

The Supreme Court did us a favor, but it wasn't the right thing to do. This isn't the privacy protection you want.

Comment: Re:Why, New Zealand, WHY? (Score 1) 63

by ToasterMonkey (#47278453) Attached to: How Secret Partners Expand NSA's Surveillance Dragnet

I've been to NZ.. it's a wonderful place. Beautiful, raw, remarkable in all of its unique features. It's also pretty fucking empty with more sheep than people. There isn't a threat within 5,000 miles unless Australia turns Taliban. The worst thing they need to look out for is Chinese fishing poachers emptying their seas.

In all seriousness, please, kiwis, tell me why you have a //spy agency//?! Enjoy the wonderful land you live in and leave the stupids to the rest of the world.

... because they're on an island and have to trade with other countries? Non-military intelligence isn't around just to foil movie-like terrrrist plots, but nobody makes movies about the boring stuff.

Comment: Re:Too bad it sucked (Score 2) 52

by ToasterMonkey (#46806921) Attached to: Apple, Google Vying For Mobile Game Exclusivity

Mod parent up. This is the reason I've stopped playing games almost entirely -- I am sick of being nickel-and-dimed to death.

This sounds like going to a cheap theater and complaining the experience sucks and concession stand prices are high.

One option is to go to a theater that does't suck, and pass on the concession stand.

Neither of these will be cheap AND good. Shocker.

Comment: Re:Wish other OSs did this... (Score 1) 175

by ToasterMonkey (#46673663) Attached to: Linux Developers Consider On-Screen QR Codes For Kernel Panics

Anything's an improvement over:
"My computer froze."
"What happened?"
"It put some message on the screen."
"What did it say?"
"Something about an error."
"What error?"
"I dunno. It had some numbers and letters and stuff."

"Show me!"
"I already rebooted it."

Personally I would rather have a more sophisticated crash dump system, like other OSs, because whatever is going to fit in a QR code isn't going to help much unless you're looking up known issues in an enterprise Linux vendor's bug database. That's assuming they can cram a stack trace into QR codes, AAAAND you have a problem that leaves a predictable stack trace.

I don't remember the last time I had a Solaris system crash that didn't leave a dump (try not to giggle). It would have be be way back pre-ZFS, on a janky server without a dump partition. I'm also reading that Windows saves memory dumps to the page file going back to XP.

You go into the average Linux environment and even if it's not a "paid support is for wusses" camp, you are _EXTREMELY_ unlikely to have anything of value to send to support. Maybe your hawt X86 firmware will have logged an issue! ROFL.

Reboot and hope for the best :\

Comment: Re:Like photo printers (Score 1) 400

Remember how photo printers put photo shops out of business?

Well, yes. I haven't seen any photo shops lately. "1 Hour Photo" is dead. Kinkos has photo printers, and so do the local CVS and Walgreens, but they're not used much. Nobody has an in-store film processor any more. Palo Alto still has Keeble and Shugat, a high end photo equipment store with pro darkroom services. Redwood City has some wedding-photographer types and some commercial printers. That's about it.

It wasn't the photo printers, it was the digital cameras, it was the keeping them on a computer instead, mailing a CD, emailing, and texting them that did these places in.

Lack of demand... same reason people aren't buying printers so much anymore.
Why own a printer and buy ink when you can just bring your sd card to a Walmart and have them print for you?

Even after people stop wanting nice shoes, Walmart is going to have a nicer, more efficient shoe printer than you will, unless you are a shoe retailer yourself.

Comment: Re:Time for a code review? (Score 1) 44

In 2011, the NSA released 200,000 lines of code to the Apache Foundation.

it may be time for people to start looking for the backdoors that the NSA may have put into Apache.

When a /. post conflating Apache Foundation and Apache HTTP Server gets moderated up highly "Insightful", a hacker dies.

Nobody has ever thought of scouring httpd, the "The Number One HTTP Server On The Internet", the most common application you'll find exposed directly to the Internet, for back doors or security vulnerabilities. No, nobody never thought of that, thanks for your insightful comment.

Comment: Re:On Debian that's allready done. (Score 1) 223

by ToasterMonkey (#46260969) Attached to: Plan 9 From Bell Labs Operating System Now Available Under GPLv2

If you have daemons that keep falling over and needing restart, you're already at the hack stage.

What do you mean IF, it just happens from time to time for a variety of reasons. This is an incredibly basic problem in multiprocess systems.
It's like saying IF your computer crashes and needs to be restarted... in a datacenter, it's a matter of WHEN.

In both cases, absent an expected, non-rectified reason for them to crash, the immediate action for a human operator is... try restarting it.

If the dependancies are programmatically declared (a Good Thing in itself), we can automate this. It's not a hack, because machines are NEVER perfect. The "recoverable" error rate adds up when you tie bunches of them together. So does the "non-recoverable" rate... so why not do what we can to address it? This is why we put things like Xeons and ECC memory in data centers, it's the only way to scale out the number of machines, and ultimately processes.

Comment: Re:Already Possible (Score 1) 195

by ToasterMonkey (#46203783) Attached to: Is Whitelisting the Answer To the Rise In Data Breaches?

Newer versions of Linux can already do this. Using the integrity measurement architecture, module signing, and Secure Boot it's possible to have a system where almost any change is detected. I'm currently trying to get it all working on my machine right now, but it's slow going. Here's hoping that distros start shipping with this set up by default.

A shorter term security measure that more users/Distributions should take is making the root partition read only. I know Android already does this, but it really does help. Something that I would really like to see is an easy to use per application firewall. Cgroups mean that I don't even have to worry about it just spawning a child process. Yes, I want to play this game in wine. No, I don't want it to access the internet. No, wine refuses to run it as a different user, much less one with lower privileges.

Take it from a former Solaris admin, difficult to maintain over-engineering is not the answer. It will fail, and users will hate you.

Question of the day: Why are single user smartphone OSs better at segregating processes than server OSs in the first place? Even while using basic UNIX features to do it?

These classic UNIX systems kind of need to roll over and fall into their graves already. I mean look at what you get with VMWare ESX, then look at iOS/Android, then look at say.. a RHEL-type classic UNIX server.

Where is a modern datacenter OS with the flexibility, availability, resource accounting, process separation of ESX, and the developer friendly frameworks and "It's The Apps Stupid" focus like iOS or Android?

Well, it's not with Linux...

Comment: Re:Stunning. (Score 2) 227

by ToasterMonkey (#46203439) Attached to: Snowden Used Software Scraper, Say NSA Officials

There's zero reason to believe the NSA's version of this and every reason to believe Snowden's


Because, so far, every single thing that Snowden has said has turned out to be true when cross-checked. And, so far, every NSA official spokesperson has been caught repeatedly lying.

Once you start using absolutes, we're past the point where every single thing you want to believe is true, and every single thing you don't is a lie.

Consider that.

In every non-trivial program there is at least one bug.