Forgot your password?
typodupeerror

Comment: Re:Is this news? (Score 1) 62

The elevated lines between buildings are rarely protected from a build up of a static charge as routers and bridges were not built with this in mind. On the physical layer, both ends of the wire are terminated into an isolation transformer with no discharge path to ground. This is an installation design fault against the guy that designed the installation. Lightning protection is often a gas discharge tube for a lower breakdown voltage. A high current discharge through a protection device can produce a relatively high ESD pulse through the transformer into the tranciever chip resulting in corrupt data to failures. A link between buildings must include a bleed discharge path to prevent the build up of voltage on the wire, or a shielded wire with grounded shield should be used.

Engineers design systems. A good technician can make them work.

Comment: Re: Probe requests should be manual (Score 1) 112

by cbiltcliffe (#47435359) Attached to: Android Leaks Location Data Via Wi-Fi

GPS is completely passive (unless you use AGPS, but even then it doesn't leak a lot of information).

I know that.

You can use GPS without any network connection, and nobody will know.

This thread/discussion is about using GPS to figure out which network connection(s) to look for and connect to, so this statement, while true, is not even remotely applicable to the topic.

If you record and leak location information, that is not particular to GPS and can only be avoided by not using any location service at all.

Also true. However, most people have apps installed on their Android phone. Too many Android apps request fine location permission for no legitimate reason. I assume a lot of the free ones that display ads want location so they only display ads for brick and mortar businesses that are geographically relevant. Even for this, though, the coarse, network-based location service would be much more accurate than necessary.

See my response to your sibling post, as well.

Comment: Don't sweep it under the rug as collateral damage (Score 4, Insightful) 27

Is it me or is the mere fact that they automated the takedown notices speaking volumes of how frivolous the whole matter has become? Take them all down and let God sort them out, or how is that supposed to be?

Am I the only one who thinks it's about time for some (serious) fines for frivolous takedown notices? It's not like they don't cost the media providers anything.

Comment: Re: Probe requests should be manual (Score 1) 112

by cbiltcliffe (#47435019) Attached to: Android Leaks Location Data Via Wi-Fi

The article is about eavesdropping on probe requests that a device sends. In my proposal, a device would first listen for signals from GPS satellites to narrow the list of hidden SSIDs before determining which probe requests to send. Could you explain how using a GPS receiver to narrow down these probe requests would be "potentially even more intrusive"?

Because way too many programs on Android request fine location permission. Yes, this is a problem with the programs themselves, but that's why I said "potentially." However, every time your phone turned on the GPS momentarily to determine location and therefore which probes to send, any or all of these programs, if installed, would be able to snag your exact location, and send it off to the developer on the next network connection.

Comment: Re:read-only OS doesn't execute random files (Score 1) 38

by Opportunist (#47434867) Attached to: Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet

It got there using a buffer overflow in one of your outdated (read: 2 days since patch) software and also got executed that way. The downloader wrote it into your %appdata%\roaming folder (where it has write access without you needing elevated privileges) and got started likewise.

Why files in %appdata%\roaming can be run at all? Ask MS. I don't see a good reason why files located there should be executable. Actually, there are very few areas in user-writeable areas where execution of files makes sense, and not allowing it would increase security of Windows by leaps and bounds.

Sadly, you need at least Win7 Professional to make it so. Well, it is technically possible to get Win7 Home Premium to perform it, but the hassle is maybe not far away from having to reinstall the system and restore a backup if the malware strikes...

Comment: Re:Alternate use for this technology (Score 1) 93

by Opportunist (#47434787) Attached to: DARPA Successfully Demonstrates Self-Guiding Bullets

It already starts at you having to get that weapon platform to the point where you can fire it. You have to build the weapon platform, you have to build the targeting computer, and then you have to move that all to where you want to employ it. And all that to (hopefully) hit a person who may or may not be still there when you get there and who may or may not be an actual target for you.

In turn, your enemy just needs to send a suicide jockey to your well known base and blow up the checkpoint at the entrance. Even if you kill the first 9 guys it doesn't matter as long as the 10th makes it.

Comment: Re:Alternate use for this technology (Score 2) 93

by Opportunist (#47434739) Attached to: DARPA Successfully Demonstrates Self-Guiding Bullets

Well, it just MIGHT work to give people a reason not to hate the US and instead turn towards the shit that you don't want to go down. It worked like a charm after WW2, didn't it?

The cheapest way to retain the order that you want somewhere is to give the people there a reason to want it, too. That works great if you can show them the benefit of your way of life. Of course, that first of all requires that your way of life must have some benefit for them, though...

Comment: Re:Alternate use for this technology (Score 1) 93

by Opportunist (#47434453) Attached to: DARPA Successfully Demonstrates Self-Guiding Bullets

That's the key in asymmetric warfare. Basically what you need is:

- An expendable population that is not only willing to fight but also to die for you, your goal, your god, whatever.
- Cheap weapons (manpower is no issue, people are cheap)
- And enemy who doesn't have the two above.

If you can muster that, you have won. There is no way short of total annihilation that you could possibly lose.

Comment: Re:Make VM OS read-only unless updating (Score 1) 38

by Opportunist (#47434427) Attached to: Gameover ZeuS Re-Emerges As Fast-Fluxing Botnet

While a good idea, it's not that easy for Windows users. Especially since the "basic" (aka "premium") versions of Win7 come even without the ability to limit execution of files in certain directories (which would surprisingly actually defeat this pus, at least the variants that I'm aware of, my knowledge in this area is a bit dated, though).

Guess you have to pay extra with Microsoft if you want some semblance of security...

"Religion is something left over from the infancy of our intelligence, it will fade away as we adopt reason and science as our guidelines." -- Bertrand Russell

Working...