Forgot your password?

Comment: Re:Well, sort of. (Score 1) 109

by waddgodd (#47386043) Attached to: Can the NSA Really Track You Through Power Lines?

Wow, lots of flapping e-peens here. Please note I specificaly mentioned at the SUBSTATION for a reason. Anyone that thinks that a substation has anything at all to do with generation, please go away: while there CAN be generators at substations, if one's in use at the substation, the chances of there being enough current to do a TV interview anywhere within the substation's reach are vanishingly small, they typically call times when substation generators are active "brownouts". One of the bits of equipment at a substation, however, IS an isolation transformer, specificaly designed so asynchronicities induced downstream of the substation don't propagate back up the line to the generators and blow them out, even if an embedded signal had to be such a gross change that it affected the base 60 Hz signal (if you're dealing with 50 Hz power, again, go away, because all 50 Hz operators also have their own intelligence agencies that are decidedly NOT the NSA). Typically, you won't see even a need for that with embedded signals that are extreme-order harmonics of the base 60 Hz (6 kHz is an off-the-cuff example), which is what the entire point of an embedded signal IS: a signal that doesn't effect the existing signal in any negative fashion (you're still going to want the embedded signal to not travel upstream though, so you can actually use differing embeded signals for different substations, or the whole "locate the mook" thing falls prety flat, you already know to within a 20-block area if you can figure out which specific substation to inject the signal to)

I should apologize for one bit here: I really should have inserted a paragraph break before the "As for the hum..", apparently many of the flapping e-peens thought that TEMPEST was somehow interconnected with the inserted signal (it's not). There's an entire career path in the US Navy dedicated to the fact that individual electronic devices react in increasingly individual ways to data (EWs, if you must know) as they get older, and with multiple devices in the area to get signatures from, you can easily determine which devices are being used and from that and a general knowledge of where the devices may be, you can get a location on them. In fact, NCIS ACTUALLY PORTRAYS AN EW SPECIALIST, it's literally on your TV every week. So while TEMPEST can't really be used in real-time (well, it can, but a SLQ-25 isn't really manportable), it can certainly tell you if you have the right spot

Comment: Well, sort of. (Score 1, Informative) 109

by waddgodd (#47380625) Attached to: Can the NSA Really Track You Through Power Lines?

Tracking someone through landlines has been a Thing for many years now. Ever hear of a "lock and trace"? You can SORT OF do the same thing for power, by embedding a signal in a given substation. It's nontrivial, and it's horribly complicated, but it IS feasable. As for the "hum" thing, that's just standard TEMPEST, been a Thing now for going on thirty years, where you can fingerprint electronics via EM signatures and you can read those EM signatures via physical phenomena including audio hums and induced currents in surrounding circuits. This is why the LASER mike was actually developed, not for actual sounds (standard shotgun mikes do wonders there, because the glass reresonates sound just fine), but to get a good frequency signature on TEMPEST EM leakage. So, in sum, they're not specifically taking a van out and following lines to see what location an interviewee is at, but a lot of that is that they don't really need to because they can get all the information they need through older technologies that approximate the capabilities

Comment: Where's the guns to their heads? (Score 1) 281

by waddgodd (#47243751) Attached to: Bitcoin Security Endangered By Powerful Mining Pool

One would assume that the thousands of other miners, if it was really that important to them, could easily step up their collective games and provide more hashing power than ghash can, even if ghash is actually claiming their entire rented-out customer base as their own (a rough equivalence of this would be if, say, Hertz was claimed to control more than half the roads because the cars on it are Hertz rent-a-cars).

Comment: Re:This is the problem with Linux Security (Score 0) 127

by waddgodd (#46996115) Attached to: 5-Year-Old Linux Kernel Bug Fixed

Don't see where your flamebait actually changes anything. It certainly provides nothing new, because you can say "they're rude" all day, the question is is the bug in question fixed, and when. Yes, the chances are very good that a bug submitter is going to get a "patch or GTFO" response. In the overall scheme of things, I'd say that's as good as can be expected, given many other groups respond with legal threats.

Comment: Re:This is the problem with Linux Security (Score 1, Insightful) 127

by waddgodd (#46994175) Attached to: 5-Year-Old Linux Kernel Bug Fixed

Well, in a normal situation, I'd say yes, but Linux's response to all bugs is similar, patch it as soon as there's a good patch. Now if it were a certain company in Redmond that scales its response based on customer "value", yeah, security bugs had best get fast-tracked. I honestly prefer the "fix all bugs and don't embargo fixes" response that linux does to the "when we discover bugs (heartbleed), we'll let the Cool Kids in on it first and then release it weeks later to the average user" response that Google does

With all the fancy scientists in the world, why can't they just once build a nuclear balm?