Forgot your password?

Comment: Re:As expected from google (Score 1) 113

That is what I'm saying. Google can not remove the article, but is forced to remove a link (among many). For a useful right to be forgotten the concerned party should request for the article to be taken down or redacted.

The judgement show the foolish stupidness and incompetence of the judges.

Comment: Re:As expected from google (Score 2, Insightful) 113

Yes to the right to be forgotten. But do it right.

Currently the search engines must remove the link to the article, but the article stays. This is bullshit. If the article contains something to be forgotten it should be removed or redacted. This is the only correct way to do it. Also, there should be an open procedure, with appeals, to decide if the article must be redacted / deleted.


Comment: Re:Fission is Dead (Score 3, Informative) 218

by markus_baertschi (#48171801) Attached to: Fusion and Fission/LFTR: Let's Do Both, Smartly

Unfortunately yes.

It is easy enough to get a big public outcry for any new nuclear plant, irrespective of its safety. The public has learned that nuclear = big accident (sooner or later). If you ask an activist if he want a coal or a nuclear plant, he will say 'neither' and fight both, but probably more vigorously against the nuclear one. That makes investing into any kind of nuclear stuff a very risky proposal.

The only way to change is when other fuels get expensive and we'll see rolling power outages again and the public experiences that we need new plants.


Comment: Should also incorporate AIS-like facility (Score 1) 77

by markus_baertschi (#48168087) Attached to: An Air Traffic Control System For Drones

This sounds like a centralized style solution. It only works if communication between any drone and the central server/agency is maintained. For some parts, like flight planning, this is fine. But for collision avoidance I don't think this will cut it.

In the shipping world we already have a decentralized system called Automatic Identification System (AIS). Every vessel broadcasts its position and course on a common radio channel. Other vessels listen and if equipped with collision avoidance systems can take evasive action. Something similar for Drones could be imposed by the FCC, like it is on ships by the International Maritime Organisation.

This would suffer from the same drawbacks (ships can fake their identification), everybody can listen to broadcasts, but it would help solve 95% of the problem.

Comment: Re:There are no "remote" exploits for bash (Score 1) 329

by markus_baertschi (#48019127) Attached to: Bash To Require Further Patching, As More Shellshock Holes Found

After some reflection I suspect that there never was a 'pure' /bin/sh on Linux. It may have been bash all along.

Most commercial Unixes come with a dedicated /bin/bash and the korn shell. One could install bash, but this would be a 3rd party tool and not affect system().


Comment: Re:There are no "remote" exploits for bash (Score 4, Interesting) 329

by markus_baertschi (#48018485) Attached to: Bash To Require Further Patching, As More Shellshock Holes Found
Bash has network connectivity on plenty of servers because it is used to execute cgi-script by the webserver (and other network services).

Here the definition of the system() function call often used to run external commands:

system() executes a command specified in command by calling /bin/sh -c command

/bin/sh is linked to /bin/bash and vulnerable. Executing external commands through system(), and therefore bash, is by far the easiest method, so it is widely used. It is sufficient to trick the server or daemon.

Here a proof of concept where a dhcp server tricks a dhcp client into running an arbitrary command.


Comment: Re:Data compression is data processing (Score 1) 263

by markus_baertschi (#47285633) Attached to: The Supreme Court Doesn't Understand Software

> Data compression on the other hand is a different domain.

Why ?
Data compression has been used since a long time, think about stenography or shorthand, for example. This is a manual data compression system, no computer required. Many algorithms are only practical on a computer, but they still are mathematical algorithms.

Comment: Re:I cooled off on Samsung... (Score 4, Informative) 105

I had a SGS2 and have a SGS4 now. They are fine phones. I want a replaceable battery and a SD card slot. This reduces the field for me a lot.

For my wife I bought a Moto G and I suspect I will replace my SGS4 with a phone in the same class, once it needs to be replaced. Phones are rapidly approaching the phase where most middle class phones are good enough. Two years ago a high-end device was necessary for a good experience, these days this is no longer true.

Life will become tougher for phone manufacturers.

Comment: Re:No choice (Score 1) 338

by markus_baertschi (#43663153) Attached to: BT Begins Customer Tests of Carrier Grade NAT

>The carrier has the choice to implement ipv6. Run ipv6 natively, and tunnel ipv4 traffic.

I don't think this will solve the problem. In the end, even if tunneling, some applications expect to see an IP per end-user. So the carrier still has to expose a dedicated IPv4 address per customer to the internet.

Comment: Re:No choice (Score 1) 338

by markus_baertschi (#43663131) Attached to: BT Begins Customer Tests of Carrier Grade NAT

>Oh they can get more IPv4 addresses if they want. They are simply not willing to pay the asking price for them.

No. He will have to pass the additional cost of the IP addresses to its customers. And those customers are not ready to pay the price. They prefer a cheaper, but crappier service, otherwise the'll upgrade or switch to another more expensive carrier with real IP addresses.

Comment: No choice (Score 1, Informative) 338

by markus_baertschi (#43652885) Attached to: BT Begins Customer Tests of Carrier Grade NAT

The carrier has probably no choice. He can no longer get IPv4 addresses for new customers, so either he refuses customers or uses NAT to map multiple customers on the same IP.

On the other hand, the average Joe customer will not see the difference. He can surf as before and all his apps will work as before. Some apps (mostly p2p stuff) will suffer, but most internet user don't use those.

If you as customer do need a 'real' IP, then there always is the option to get a more expensive option.

Comment: Re:Security (Score 4, Insightful) 114

I agree, I find this an excellent password recovery scheme. It does not protect against a bad choice in friends, but there are no technical protections possible against that. But for password recovery it is very good and quite safe against abuse by anonymous internet hackers.

Maternity pay? Now every Tom, Dick and Harry will get pregnant. -- Malcolm Smith