Friday Squid Blogging: New Species of Squid Discovered

A new species of squid was discovered, along with about a hundred other species.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.

Posted on March 22, 2024 at 5:03 PM106 Comments

Comments

vas pup March 22, 2024 5:49 PM

Senate Select Intelligence Committee Hearing on Global Threats

Director of National Intelligence Avril Haines, CIA Director Bill Burns, and FBI Director Christopher Wray joined other leaders from the intelligence community to testify before the Senate Select Intelligence Committee

h ttps://www.c-span.org/video/?534027-1/senate-select-intelligence-committee-hearing-global-threats&live=

vas pup March 22, 2024 5:53 PM

Nvidia: US tech giant unveils latest artificial intelligence chip
https://www.bbc.com/news/business-68603198

“Nvidia has unveiled its latest artificial intelligence (AI) chip which it says can do some tasks 30 times faster than its predecessor.

The firm has an 80% market share and hopes to cement its dominance.

In addition to the B200 “Blackwell” chip, its chief executive Jensen Huang detailed a new set of software tools at its annual developer conference.

Nvidia is the third-most valuable company in the US, behind only Microsoft and Apple.

Nvidia said major customers including Amazon, Google, Microsoft and OpenAI are
expected to use the firm’s new flagship chip in cloud-computing services and for their own AI offerings.

It also said the new software tools, called microservices, improve system
efficiency to make it easier for a business to incorporate an AI model into its work.

Other announcements include a new line of chips for cars which can run chatbots
inside the vehicle. The company said Chinese electric vehicle makers BYD and
Xpeng would both use its new chips.”

Q: What about US manufactures of EV?

Anonymous March 22, 2024 6:53 PM

‘Mass surveillance’ fears over law change plans
https://www.bbc.com/news/technology-68625232

“The UK tech industry has deep concerns over government plans to amend a law dubbed a “snooper’s charter”.

Ministers insist their changes to the Investigatory Powers Act is intended to keep UK citizens safe.

But, in a statement, trade body techUK said the changes were neither balanced nor proportionate. It warns that citizens’ privacy, security and safety could be put at risk.

The act currently allows the intelligence agencies to access large amounts of data, including from electronic devices.

It also gives them the power to access messages and listen in to phone calls, and requires internet service providers to keep data about their customers’ internet browsing for one year.

This data is accessible to the police, to some government departments and some emergency services.

The proposed amendments would require messaging platforms to inform the Home Office about security updates before they are released – this applies to any firm with UK customers even if the business is not based here.

It also introduces a new category of “less sensitive data” although critics say this does not have a clear definition.

TechUK and the others says the legislation is being “rushed” and has not had “proper scrutiny.” Their statement outlines a series of concerns, saying the amendments would:

Weaken safeguards when intelligence services collect bulk datasets, potentially enabling the harvesting of millions of facial images and social media data

>Expand the range of politicians who can authorize the surveillance of parliamentarians*

>Impede companies' ability to advance the data protection efforts expected by users, governments and regulators globally

>Make the UK the "weak link" in the chain of global online security."

I mark by * how I think it should be.
1. Search, surveillance and/or arrest warrant for former US President, acting Federal Senator or Member of Congress, Members of Cabinet, Governors and Lt. Governors of any US State should be granted by NOT Magistrate Judge – low level judicial official not went through approval by Senate but by Federal District Judge or even better three of them.
Surveillance by FISA as well.
2.Request for all above should signed and approved by Deputy AG not less to provide protection against abuse of legal system for political purpose and high level of protection of top officials.
Just opinion. Nobody is going to listen anyway until become personal victim of abuse… That is reality when logic is not in charge and reactive modus operandi prevail proactive.

Clive Robinson March 22, 2024 8:35 PM

@ JM, ALL

“A rather dystopian news item that I saw recently is related to huge stainless steel doors being installed federal buildings.”

Has a regional blocker on it, so is not visible where I am, so I’ll have to make some assumptions.

Like they are note painted or coated in any way, otherwise, why use stainless steel…

So with regards,

“My mind immediately goes to the idea that these will likely be defeated in some simple and unexpected way, possibly disallowing them to open”

I will note that when I was younger I used to “spot welded” stainless steel contact straps with a “car battery”. Modern LiPo’s are a quarter the weight and around ten times the “short current” available.

I’ve not had reason to try it in quite some time, but you can by “screw strap” for construction work quite inexpensively. It’s a steel tape with regular screw holes in, you cut into lengths with cutting shears, you screw it across cracks and gaps to reduce or stop movement before putting up plaster or plaster board etc.

I suspect that it will “spot weld” as easily now as it did in the past.

The thing about “spot welding” is unlike arc welding it is an almost “quiet process”. It makes little or no noise and does not create blinding light or other sparks etc so obvious PPE “safety clothing” etc is not a necessity.

Also you could “drag graffiti” in a similar way… Stainless steel is usually fairly easy to clean paint and similar off… But dragging a high current probe tip across it will “burn in a message” that can not be washed off. And even if you “grind it down” it will still leave visible marks as the light will not reflect in the same way (it’s some what similar to criminals trying to grind off gun serial numbers, if you know what acid to apply the numbers become visible again because the impression goes down into the metal).

Oh and “stainless steel” is not truly stainless, as I’ve mentioned before that some chemical salts used in etching “Printed Circuit Boards”(PCBs) will turn the bright shine to dull black quite easily so don’t pour such chemicals down the kitchen sink or drip on surfaces around cook tops etc (there are reasons sinks in chemistry labs are still made of vitreous glazed porcelain, heavy earthenware, or similar).

ResearcherZero March 22, 2024 11:20 PM

Side-channel in Apple’s M-series allows for extraction of keys. DMP cannot be disabled on M1 and M2.

‘https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/

The data memory-dependent prefetcher (DMP) activates data loaded from memory that “looks like” a pointer…

‘https://gofetch.fail/files/gofetch.pdf

You may want to disconnect your TV from the internet, disable it’s WiFi and Bluetooth.

‘https://www.forbes.com/sites/thomasbrewster/2024/03/22/feds-ordered-google-to-unmask-certain-youtube-users-critics-say-its-terrifying/

Walmart also bought Vizio to tap it’s ad platform.

‘https://www.pcmag.com/how-to/how-to-stop-smart-tvs-from-snooping-on-you

Smart TVs are often the most vulnerable devices. (and may contain passwords)

‘https://www.bitdefender.com/files/News/CaseStudies/study/429/2023-IoT-Security-Landscape-Report.pdf

TVs often have out of date firmware. Turn on automatic updates, or manually update using a USB device by downloading the firmware from the manufacturers support website.

To update TV firmware manually, the firmware may need to be extracted into a folder with a specific folder name for the manufacturer. LG uses LG_DTV for example.

At least put some black tape over TV cameras if you don’t want to disconnect your TVs from the internet. (you cannot turn off all of the snooping)
https://www.consumerreports.org/electronics/privacy/how-to-turn-off-smart-tv-snooping-features-a4840102036/

RickRoll a TV

‘https://github.com/yunuscadirci/DIALStranger

CVE-2021-0889 (RCE) creep up and silently pair a TV without it displaying a prompt.
https://www.bleepingcomputer.com/news/security/android-november-patch-fixes-actively-exploited-kernel-bug/

lurker March 22, 2024 11:23 PM

@Clive Robinson
re. regional blockers

See what Brexit can do for you? Try this one:

‘https://www.portlandtribune.com/news/massive-stainless-steel-security-doors-being-installed-at-portland-u-s-courthouse/article_b642b1ce-e6c8-11ee-80e6-6748b3734ca5.html

I would try the electric etch graffiti as a first attempt, but after the first one I see 24hr armed patrols.

Then I ask, what is it they are afraid of, or protecting against? Surely there must be cheaper social methods of reducing this risk.

ResearcherZero March 22, 2024 11:37 PM

A dinner invitation from the SVR, disguised as an email from the CDU, with links to ‘waterforvoiceless’, delivers a payload along with an invite.

In addition to compromising political parties for policymaking insights, Cozy Bear may also try to use their access to infect downstream cloud providers and their customers.

The invitations arrived ahead of elections and targeted politicians.

‘https://cyberscoop.com/cozy-bear-russia-spearphishing-germany/

Clive Robinson March 23, 2024 1:55 AM

@ ResearchZero, Bruce, SpaceLifeForm, ALL,

Re : The Xmas gift that keeps giving.

“Side-channel in Apple’s M-series allows for extraction of keys. DMP cannot be disabled on M1 and M2.”

Oh and it’s not just Apple’s chips, it’s the latest 13th Gen Intel chips as well…

Speaking of Intel, how long is it since Meltdown was found? Getting on for seven years[1]…

Back when the news broke I predicted on this blog that this sort of “go faster stripe” logic faults would continue to be found for half a decade or so and named it “The Xmas gift that keeps giving”. Well at now well gone six years that first mile stone has been cleared and it’s still giving…

But the fact that such logic errors are still being made in what are effectively totally post Meltdown chip designs should concern people.

It means, one of only a few things, is true,

1, They have not learned the Meltdown and Spectre lessons.
2, They do not understand the issues behind race conditions and similar that can become visible time based side channels.
3, For reasons of “Spec-manship” they don’t care about customer security.

My money has moved with time down that list to the “Spec-manship” / “don’t care” as the most likely reason[2] (yup have a good think on that implication especially as both Microsoft and Google are moving to the “Force them on-line” OS model so they can effectively “suck your brains out”.

But further consider these high end chips are appearing in “Electric Vehicles”(EV’s) further up than the “base level” in current cars. At a level where Internet and other insecure Communications connectivity happens again “as a requirement”. But the consumer vehicle internal connection bus is one and the same wire and all systems are connected to it.

In the past I’ve explained why the likes of “Data diodes” and “Data sluices” are very definitely not “One Way” due to “Error and exception” handling moving not “Left to Right” as most programmers assume data flow is, but actually “Right to Left” and how systems are very “transparent” to this “back channel” so external systems can “reach back” into the most security sensitive thus supposedly most secure parts of a system.

Thus I suspect issues based around this will happen in the next half to full decade.

Any one want to bet the price of a beer I’m wrong in this prediction?

Also I’m waiting to see academic papers on side channel exploitation of AI LLM and ML systems for various reasons[3] they will be particularly prone to them, even “over the wire” used for user communications.

We’ve had a close one with a form of “Time based Prompt Attack” but not quite where I expect it to get.

So prediction number two I expect to see them starting in the next 12months.

[1] Meltdown was on Intel chips and although made public in early Jan 2018, it was kept secret by Intel’s lawyers and executives for over six months. During which Intel’s peak annual “Xmas prezzie” sales happened and a senior Intel executive sold their shares at a much higher value than they were worth after the announcement (but apparently SEC decided it was not “insider trading”…).

https://en.m.wikipedia.org/wiki/Meltdown_(security_vulnerability)

After Meltdown was made public so were similar problems found on ARM and AMD chips. In the case of AMD it was in a different area of the CPU and thus called “Spectre”,

https://en.m.wikipedia.org/wiki/Spectre_(security_vulnerability)

[2] An interesting thought to consider, Nvidia is now the third most valuable “tech-stock” in the US in part because they have the fastest AI chips there are[3]. As these logic insecurities are all effectively due to “go faster stripes” what are the odds that all Nvidia high end chips have them? Especially the just announced “Upto 30 times faster” BL200 “Blackwell” chips,

https://www.bbc.co.uk/news/business-68603198

But also those chips for “Electric Vehicles” ChatBots, anyone want to predict what would happen with a security busting side channel could do in the EV systems built around them that you are doing 80kph or more towards a freeway bridge in?

[3] As I’ve mentioned befor AI LLM systems and even the AI ML systems are effectively DSP algorithm based systems. As such they would normally be considered “constant time algorithms” thus not suffering from or having very little side channel leakage. Unfortunately they are not true constant time, the timing is dependent mainly on the user query and in part on a stochastic source.

The stochastic source however does not really effect the “constant time” but the user query very definitely does both on the input and the output of the query and it will be “visible on the wire”. This makes both much much easier to sperate and pull out in analysis of both LLM and ML systems because the otherwise constant time makes synchronisation way way easier.

I’ve yet to see any academic papers on this security aspect of LLM and ML systems, if anyone knows of one I’d be interested in seeing a link.

Clive Robinson March 23, 2024 3:13 AM

@ lurker,

Re : EU and EEU has them to scared to play.

“See what Brexit can do for you? Try this one:”

Nagh it brings up a for EU and EEU no access message page.

Maybe some one should start an open access database of all such sites…

After all what have they to worry about?

Unless of course they are “data r4ping” people who visit their site to make just a few cents via very very unsavoury advertising and data broker agencies…

But,

“Hey that’s the American way”
“Sell your readers every day”
“To earn a Shekel just to pay”
“Shareholders who run away”
“When regulators start to bay.”

“The corporate executives say”
“This is essential don’t be fay”
“On us vast bonuses they do lay”
“So your privacy we must flay”
“Or you should just go away.”

lurker March 23, 2024 1:00 PM

@Clive Robinson

Well, I did note another link, but for me msn always gives a local news page and the search box on that page will not look for any overseas news …

‘https://www.msn.com/en-us/news/us/massive-stainless-steel-security-doors-to-be-installed-at-portland-us-courthouse/ar-BB1kfEvf

But the portlandtribune link I posted above had a set of five photos, inside and out during construction, perfect recce …

Clive Robinson March 23, 2024 1:28 PM

@ fib, ALL

Re : Solar storm on it’s way.

“AR3615 did unleash a solar flare, as we commented earlier in the week. A possible CME is being investigated.”

Two questions,

1, Will there be a geomagnetic storm on earth?

2, If so is it going to be a problem for electronics?

The answer to the first is very probably yes in about two days time. Which is sufficient time to take precautions should they be necessary…

Which brings us onto the second question. To which the answer is yes, but to which the answer needs to be qualified.

The problems can range from GPS signals not getting down to places with sufficient strength to be reliable, disturbance to the Earths magnetic field causing compasses to point off in direction, and radio systems above around 2Mhz suffering from decreased signal reception. To full-on blow out of the control inputs of active semiconductor devices and destruction of chips both electronically and physically (yup if enough energy gets in before the bond wires melt the chip casing can have a hole blown in it by rapid thermal expansion).

So on the principle of,

“Two is one, and one is none”

Protecting two sets of devices and backups might well be a wise precaution for a few days.

The question is what level of protection.

I have some EMP proof equipment that simply requires connections be disconnected and the conductive “dust caps” fitted over the connectors. Other equipment is already inside an “RF Cage” that is good for all CME induced storms that humans can reasonably tolerate.

As for the rest, of the equipment, time to get the shielded shipping crates out of the loft and do a little packing.

Is it necessary, almost certainly not, the probability of a harmful event is on balance very low.

But as some of the equipment and data is irreplaceable it makes sense to take precautions.

However this is a “twin event” of two sunspots and more recent analysis of historic events suggests the probability of a large storm is very much increased with these “twin events”…

The last time this happened the Canadian power grid got more than a bit of a wake up call…

So putting backups in conductive bags inside, insulated bags, inside a “biscuit tin” with the seams taped with conductive foil sitting ontop of an insulated surface might be precautionary move that will protect your memories etc.

Clive Robinson March 23, 2024 3:19 PM

@ lurker, ALL,

Re : Doors of steel so stainless.

“But the portlandtribune link…”

No worries, I suspect that any article or photo is in reality not going to give me any more information as to the “Why?” of them. But I guess would give specific information as to “How?” to “throw sand in the gears” as it were (which I don’t want to get into beyond the “obvious”).

As far as physical security is concerned, any barrier across an access way is going to have defects or weaknesses it’s unavoidable if future access is a requirement. As an example you can make the walls of a strong room as thick as you want, but there are very real physical limits on how big and thick a door can be as a consequence.

This should be obvious to anyone with a little knowledge and experience of Civil or Mechanical Engineering (of which I unfortunately have rather more of both than is good for me).

If you can also “think hinky” as our host would say about such systems then weaknesses will meet your eye in the same way that liberally spread caltrops[1] meet bare feet in the dark…

Hence I could make way to many suggestions on seeing photos, so it’s best I don’t ={

[1] A nasty piece “of work of man” that goes back in time at least four millennium,

https://en.wikipedia.org/wiki/Caltrop

But as is often the case nature got there first with plant pods. It’s known that these were collected and dried and used by both the Japanese and Chinese, though which got there first is a matter of unsolved history.

JonKnowsNothing March 23, 2024 8:18 PM

@Clive, @ fib, All

re: solar interference Soon(tm)

I think it’s already here… 🙂

My RT PVP game has so much “lag” recently that it’s almost a “turn based” game. Lag of course encompasses all sorts of problems with client-server and video updating.

Players are complaining someone(s) is using a Lag Switch:

In the peer-to-peer gaming model, lagging is what happens when the stream of data between one or more players gets slowed or interrupted, causing movement to stutter and making opponents appear to behave erratically.

By using a lag switch, a player is able to disrupt uploads from the client to the server, while their own client queues up the actions performed. The goal is to gain advantage over another player without reciprocation; opponents slow down or stop moving, allowing the lag switch user to easily outmaneuver them. From the opponent’s perspective, the player using the device may appear to be teleporting, invisible or invincible, while the opponents suffer delayed animations and fast-forwarded game play, delivered in bursts.

The term “lag switch” encompasses many methods of disrupting the network communication between a client and its server. One method is by attaching a physical device, called a hardware lag switch, to a standard Ethernet cable. By flipping the switch on and off, the physical connection between the client and the server is disrupted.

Some gaming communities refer to this method as “tapping” which refers to the users “tapping” on and off their internet connection to create the lag.

Solar Interference == Solar Lag Switch

===

ht tps://en.wi kipedia.org/wiki/Cheating_in_online_games

ht tps://en.wik ipedia.org/wiki/Cheating_in_online_games#Artificial_lag/lag_switch

JonKnowsNothing March 23, 2024 8:35 PM

@Clive, @ lurker, All

re: caltrop

Locally we have our own natural caltrop, we call it a Goathead. It’s got 3 long thorns that puncture bicycle tires, sandals, flip flops and thinner soled shoes and does substantial damage if you step on it or get one in your hand. It’s a large thumb-tack thorn; a menace.

===

ht tps:// en.wi kipedia.org/wiki/Tribulus_terrestris

  • having long sharp and strong spines which easily penetrate surfaces, such as bare feet or thin shoes of crop workers and other pedestrians, the rubber of bicycle tires, and the mouths and skin of grazing animals

Clive Robinson March 23, 2024 10:42 PM

@ JonKnowsNothing, lurker, All

Re : Natural source of caltrop.

“…[it] does substantial damage if you step on it or get one in your hand. It’s a large thumb-tack thorn; a menace.”

There are a few such species of them around and they have become a heraldic symbol on coats of arms etc in a stylistic form.

It’s ironic that you say of it,

“we have our own natural caltrop, we call it a Goathead.”

As was pointed out to me when I was very young up on a relatives farm (where we children were treated much like “live stock” 😉

“If a goat won’t eat it then it’s a menace on the farm.”

Whilst goats have a reputation for eating “anything and everything” they actually don’t, and if a goat won’t eat it it’s best to follow the goats advice and treat the plant as a menace and “grub them out when young” before they grow and kill something or someone (unlike a lot of livestock goats are actually quite smart and useful and you can learn a lot by just watching them).

Where I lived in Surrey the worst we had locally was “blackberry bushes” and the thorns on their stems were evil. They came to points so fine not only are they sharper than the sharpest knife/blade the tips would break off in wounds and if unlucky you could get festering wounds or worse (bird droppings can contain real nasties and effectively get injected).

And yes they would go through tough boot leather if you came at them from the wrong angle, hence tough canvas wrap around gaiters that became leggings upto the knee like old style dense wool “puttees” were worn by some older folk over their boots and they stepped with an odd looking swing, if they had to work in or around them. Also “blackthorn” and similar all used as “hedge rows” or natural stock proof field boarders and something that got “coppiced” along with hazel and other strong but fast growing plants that could be repeatedly cut for “hurdle” and “wicket” fence making used to protect sheep and other live stock from drift snow through winter and into early spring and from the wind in lambing time (as a “season” it can be from November to May in the UK but the actual lambing is mostly over by the end of March/Easter, with the quiet time starting in May when they are all “back on the hills” hence the time for a few festivities and fertility rights).

With such plant menaces around if you are aware of their historical use, it makes you wonder sometimes how our original “hunter gatherer” ancestors survived long enough to become live stock farmers…

Clive Robinson March 23, 2024 11:53 PM

@ SpaceLifeForm, ALL,

Nice to hear from you, I hope you are well?

With regards,

“”

I had to smile when I read,

“The UK’s NCSC has a more understated list of challenges in the so-called Cybersecurity Research Problem Book.”

They are certainly way more foundational, that is for sure, and if you don’t get all of them right all you build on them will fail.

But all these programs still suffer from a problem I’ve mentioned before and it’s such a critical failing that you can almost guarantee that all work is going to fail.

The “top down authoritarian view” which is so prevalent is exemplified by the “Single Sign On” failure.

We have very old sayings that warn against such stupidity like,

“Putting all your eggs in one basket”

Authoritarians see people as faceless just numerical identities, and that is not how humans work at almost every level. Humans have “roles” and they are many, varied, and for good reason mostly segregated.

Unless systems are designed to support this properly they will fail and often as not fail hard.

But a couple of things stand out,

1, Repeated mention of AI.
2, At the end it’s just “more of the same” thinking.

As these are both easily recognisable “industry traits” currently, it should cause people to stop and think.

AI is not a security solving tool.

Because current AI does not think, it does not reason, and it can not test it’s self. As a result it most certainly does not create new or original work. So like old Generals all it can do is fight wars the “old way” by rote, and thus be at the very best “second best”.

What AI does is take “second best” and “soften the edges” by a little randomisation. Which means that as like as not it won’t even be “second best” but worse potentially a lot worse. It’s kind of “inverse fuzzing” like,

“Throwing darts blind fold at a map of the world to decide where you are going to spend two months or more income on a two week holiday.”

Lets hope such people can swim…

But “more of the same” thinking is equivalent to that definition of “madness” by “doing the same repeatedly and expecting different outcomes” wrapped up in a faux-management meme of “nerding harder”. Which most definitely is not behaving smarter.

Doing things “smarter” requires insight and rationality few humans actually posses and current AI systems do not.

Evolution has been said by some to be,

“Random selected by fitness functions”

But it’s fairly useless as a definition without saying how those “fitness functions” come about in the first place. Which all to often devolves into,

1, A “You Know” appeal to vacuity.
2, A “Turtles all the way down” appeal to infinity.
3, Or both.

ResearcherZero March 24, 2024 4:12 AM

Outside of Portland, doors are standard fittings. In Portland it would be a freakout man!

@Clive

I just fixed an internet connection for somebody. As it was a single wire, twisted once and making barely one point of contact. It was a single point of failure. The cable was hanging free and blowing about in the wind. The other insulated wires were haphazardly wound around it without providing any purchase. The “joint” openly exposed to the weather.

After a little maintenance, DNS resolution now works properly. Connection speed improved and no longer drops out intermittently. The original modem/router is one of those old ISP models. I moved it up off the carpet. With a new router attached, it is quite snappy.

The professionals from National Broadband Network apparently visited the site last week.
It does not appear that they did a whole lot of work. Last few feet rules. Do FA. 😉

Clive Robinson March 24, 2024 8:12 AM

@ ResearcherZero,

Re : Reaching out.

“I just fixed an internet connection for somebody. As it was a single wire, twisted once and making barely one point of contact. It was a single point of failure. The cable was hanging free and blowing about in the wind…”

Sounds like it was an

“Easy job not but must required”

as Yoda might say 😉

I was once told a moral about old cables and such like,

“The weakest link is oft the one that can not be reached.”

Implying that the amount of “love and maintenance things get” depends on how easy they are to get to or do.

Something I’m sure California’s PG&E customers, who had their property burnt down, by PG&E’s “love for share holders and seniors bonuses, not service maintenance” understand all to well.

It is the reason I suspect,

“The professionals from National Broadband Network apparently visited the site last week. It does not appear that they did a whole lot of work. Last few feet rules. Do FA.”

The “Quick and easy” get fixed, whilst the “long and hard” get “No fault found” and a quick coffee stop on the way back. It’s what management want with their “less time on site” initiatives…

The first time it hit home to me must be four decades ago now back in the time of 1200/75 baud modems. I had “line noise” issues and the idiot they sent wandered around humming and harrumphing and took the handset off hook. Then got out an analogue meter pluged and unpluged the “line jack” and claimed it showed “line noise” was in my equipment[1]…

He was I assume not amused when I wrote a letter of complaint about his lack of competence and sent it in.

[1] It’s an old “wireman’s trick” that works because the telephone circuit from the “exchange battery” to the consumer instrument is effectively a partial “DC bridge” circuit. The off hook instrument looks like 300-1200 ohms and the line to and relays at the exchange look like 3000 or more so putting a volt meter across the line and unplugging the instrument will make the voltage reading jump up. If however you put the headset back on hook and thus open the line switch in the instrument then plugging and unplugging it won’t make the voltage jump across the line.

Clive Robinson March 24, 2024 8:40 AM

@ MarkH, ALL,

The investigation of the blown out Boeing 737 Max 9 door way cover on the Alaska Airlines 5 January 5th flight from Portland has apparently changed status…

‘A criminal probe was confirmed by the FBI in a letter sent to those aboard the plane, identifying them as “victims”.’

https://www.bbc.co.uk/news/world-us-canada-68640136

I’m not altogether surprised the US DoJ has been making noises about Boeing for more than a month now in various ways.

I guess we are going to have to wait upto a couple of years depending on how deep a dive the DoJ decide to do before we find out what exactly they’ve found to “Hang Boeing management with”.

Dr Wellington Yueh March 24, 2024 2:08 PM

re: steel doors in Portland…he he… That’s a hotbed of backyard bicycle builders. But surely none of them would know the least about welding, alloys, stuff.

re: goathead, it is the scourge of the bicyclist!!! Went for a ride with wife, had a lovely 20km ride along a nice paved path. Within 500m of the end she rode through a patch of goatheads, collected about 20 or 30 in each tire. 300m later we’re walking. 🙂

Clive Robinson March 24, 2024 2:56 PM

@ Bruce,

Re : Is it you?

I’ve been sent a link,

https://m.youtube.com/watch?v=Wr8qY3yJr5I

That sure looks like you, talking about Tik Tok and it’s supposed danger to US National security…

So “fess up” 🙂

The answer to the question is of course,

“It’s just as bad as all the other ‘Social Media Corps’ in Silicon Valley that have all sold their souls etc to the US Gov, and other Gov’s around the World.”

So as an individual you are probably currently fractionally safer with Tik Tok than you are X, YouTube, et al.

And people still wonder why I don’t do any of them…

But… Let’s assume Donald Trump gets his “Hissy fit” way, All the major US Social Media corps have already sold their souls to China anyway, and they are dependent on China in fairly major ways. As are a great deal of their employees and those dependent on them economically…

So if the Chinese Government did a “tit for tat” I suspect US National Security would be harmed rather more due to the loss in “economic benefit”…

So folks in the US should consider which side of their bread has butter on it… And which side up they want it to land if the Numpty US Politicians banging the war drum have their “Propaganda Way” and the bread heads for the floor…

Clive Robinson March 24, 2024 4:07 PM

@ dbCoper, ALL,

Re : Vulnerable Hotel door locks.

““Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds””

From the article,

“By exploiting weaknesses in both Dormakaba’s encryption and the underlying RFID system Dormakaba uses, ‘known as MIFARE Classic‘”

Oh dear “MIFARE Classic”… Say no more it’s less secure than a sardine tin is to a steam roller…

Even Mossad have know how to get around MIFARE Classic for several years now…

Clive Robinson March 24, 2024 6:45 PM

@ vas pup,

It might have been due to the “sounds completely false” claims coming out of the media/government in that area.

Or the fact that the US –based on EU intel– had been waving a small red flag about large entertainment events were being targeted in that region for over two weeks prior.

Either would attract unwanted attention by the metric crap-ton.

fib March 24, 2024 6:50 PM

Re CME

Dear @Clive, please correct me if I’m wrong, but, on account of the Parker spiral[0], the worst case scenario is more likely when the CM is ejected from sunspots located close to the western limb or even a little beyond [usually to the right in Space Agency images], because the material is thrown in such a way that intercept Earth’s orbit at a point in the future – 12 hours to 3 days. In these circumstances, the Earth collides head-on and crosses the bulk of the plasma mass and frozen-in-flux magnetic field.

The center of the last CME crosses the point in Earth’s orbit where we were last Friday and we are being hit at the edge of it. As far as the complex AR3614/15 is concerned, things start to get dangerous from here on out as it begins to transit the western side of the solar disk.

ResearcherZero March 24, 2024 7:32 PM

@vas pup

Such posts get deleted all the time.

Here is another one. This has a bit of a rundown of all the things that were said, what sources in Russia are claiming, and a little about the alert that went out. CNN had a little more information about the alerts the US put out earlier.

ISW commented that the Kremlin did not explain how the individuals might cross a heavily defended border. Russian sources claimed they are all citizens of Tajikistan.

Putin called the warning from the US of a likely attack by extremists “provocative”.

‘https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-march-23-2024

“The Islamic State’s (IS) Amaq News Agency published footage on March 23 purportedly filmed from the perspective of the attackers involved in the March 22 Crocus City Hall attack.”

“The footage further supports ISW’s assessment that IS is very likely responsible for the Crocus City Hall attack, despite continued efforts by Kremlin mouthpieces to baselessly tie Ukraine to the attack.”

‘https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-march-24-2024

lurjer March 24, 2024 7:37 PM

@fib, Clive Robinson

Yes, you’re right about the Parker spiral and the best/worst might be yet to come. One could ask why the mass arrived 12 hours earlier than so-called forecasts. One popular “spaceweather” site thought this would be good for pretty pictures of aurora from Australia/NZ. A full moon and cloudy weather stopped that, but almost nil reception of my usual BBC southern Africa service.

ResearcherZero March 24, 2024 7:58 PM

@Clive Robinson

I’ve dealt with some of those friendly chaps too. From the old national carrier, back in the day. A barrel of laughs to deal with. Charging people a large service fee, plus another $50 an hour to wonder around for half the day drinking coffee. Irate customers would ring me up and ask if I could come and nip the problem in the bud before they bled out.

A guy tried to sell me a $400 soldering station yesterday, rather than a cheap, portable gas iron. Bit overkill for a single wire. He explained that he solders “whole boards”. I explained earlier to him, I was soldering a single wire with not access to electricity.

My wife must have then given him ‘dagger eyes’ at that point, as he mentioned he would leave us alone to discuss it and quickly left to serve another customer. 😀

Clive Robinson March 24, 2024 10:38 PM

@ fib, lurker, ALL,

Re : CME.

“Dear @Clive, please correct me if I’m wrong,”

Much of what goes on is still guess work[1] with the 1989 event that took down power grids in North America being the last “twin CME” to play smack down on Earth with serious consequence. And we’ve had some near misses that have been modelled with some quite fun videos[2].

Remember that there is also a north / south element to the CME path, so although it can look bad with just an East / West projection it could figuratively speaking “go over our heads”.

I tend to be “cautious” but yes this current G4 event may be causing “only a few” problems[3] as much of it went north of us.

You can read a fun blow by blow account,

https://community.spaceweatherlive.com/topic/3137-20240323-event-cme/

(Warning it’s 13 pages so might take a little while to read).

But it looks like we may have seen the worst of it.

Sadly 100% cloud cover where I am so nothing seen, but yes HF is seeing effects,

https://www.sws.bom.gov.au/HF_Systems

” Latitude Band
Date Low Middle High
25 Mar Normal-fair Fair Poor(PCA)
26 Mar Normal-fair Fair Fair
27 Mar Normal Normal-fair Normal-fair

COMMENT: HF radio communications on UT day 24-Mar were mostly
normal at low latitudes and fair to poor at middle to high latitudes.
Fair to poor conditions were due to significant geomagnetic activity
that was observed on 24-Mar. Polar cap absorption (PCA) contributed
to poor conditions in high latitudes. HF radio conditions are
expected to be degraded over 25-26 Mar due to the geomagnetic
activity, but are expected to begin recovering by 27-Mar. Shortwave
fadeouts are probable.”

[1] https://www.arrl.org/news/a-perfect-coronal-mass-ejection-could-be-a-nightmare

[2] https://svs.gsfc.nasa.gov/4167

[3] https://www.swpc.noaa.gov/news/severe-g4-geomagnetic-storms-observed-24-march-2024

ResearcherZero March 24, 2024 11:11 PM

Fake documents increase in price, and social media companies to receive closer scrutiny over scams.

“proposing a raft of changes in a new mandatory code of practice for social media companies”

‘https://www.abc.net.au/news/2024-03-25/criminal-inflation-stolen-data-price-increase-dark-web-scams/103620916

ResearcherZero March 24, 2024 11:29 PM

@Clive

Re: meltdown

If prefetchers are still revealing info that can help to retrieve encryption keys and other secrets, the go faster model is certainly going to help your data go faster to another destination than intended.

Clive Robinson March 25, 2024 12:57 AM

@ ResearcherZero, ALL,

Re : The Xmas gift that keeps giving.

“… the go faster model is certainly going to help your data go faster to another destination than intended.”

Yup, and it does not matter at what level of the computing stack it happens at…

A data leaking side channel requires just two things to exist and harm you,

1, A mechanism that changes energy/matter in a data dependent manner.
2, A Shannon Channel that your adversary can observe the energy/matter changes.

After a moment or two’s thought you will remember what you got taught in School Physics,

1, All work requires the movement of energy from a coherent state to a less coherent state.
2, All work is inefficient therefore energy has to be released into the environment.

So you know that any and all parts of “information processing” results in “energy released to the environment”.

Further that this “released energy” is “modulated by the level of work”.

So if the Shannon information channel has enough bandwidth then the work done thus in effect the data value gets released into the environment.

Is there anything that can be done to stop this?

Two obvious things can be done,

1, Stop down the Shannon Channel bandwidth several orders of magnitude below the processing rate.
2, Use certain types of data obfuscation techniques.

Less obvious is identify how the amplitude of the modulating signal drops with distance, and what the “natural noise” in the information channel is. Because,

1, The “natural noise” is evenly generated for any unit of distance along the channel.
2, The information signal gets antennuated by the same percentage for any unit of distance along the channel (exponential decay).
3, Therefore at some point –from the source of the information signal generation– along the channel the information signal will be less than the natural noise.

At which point the signal starts to become obfuscated.

These are the basic physical laws of the Universe by which the human TEMPEST and EmSec rules are created.

morganism March 25, 2024 3:58 AM

still havn’t heard a confirmation, or a denial on the supposed RU gov network hack by nebula. Posted this last fri, and an article link to fintech

Nebula (@Nebula00x)

and surprised not to see this mentioned here yet

Truck-to-truck worm could infect – and disrupt – entire US commercial fleet

The device that makes it possible is required in all American big rigs, and has poor security

Vulnerabilities in common Electronic Logging Devices (ELDs) required in US commercial trucks could be present in over 14 million medium- and heavy-duty rigs, according to boffins at Colorado State University.

In a paper presented at the 2024 Network and Distributed System Security Symposium, associate professor Jeremy Daily and systems engineering graduate students Jake Jepson and Rik Chatterjee demonstrated how ELDs can be accessed over Bluetooth or Wi-Fi connections to take control of a truck, manipulate data, and spread malware between vehicles.
Schemes for tall vehicle relay testing
White Van Man could become a rolling radio relay
READ MORE

“These findings highlight an urgent need to improve the security posture in ELD systems,” the trio wrote [PDF].

The authors did not specify brands or models of ELDs that are vulnerable to the security flaws they highlight in the paper. But they do note there’s not too much diversity of products on the market. While there are some 880 devices registered, “only a few tens of distinct ELD models” have hit the road in commercial trucks.

A federal mandate requires most heavy-duty trucks to be equipped with ELDs, which track driving hours. These systems also log data on engine operation, vehicle movement and distances driven – but they aren’t required to have tested safety controls built in.

And according to the researchers, they can be wirelessly manipulated by another car on the road to, for example, force a truck to pull over.

The academics pointed out three vulnerabilities in ELDs. They used bench level testing systems for the demo, as well as additional testing on a moving 2014 Kenworth T270 Class 6 research truck equipped with a vulnerable ELD.

“In our evaluation of ELD units procured from various resellers, we discovered that they are distributed with factory default firmware settings that present considerable security risks,” the authors noted.

This included an exposed API that permits over-the-air (OTA) updates. The devices also have Wi-Fi and Bluetooth enabled by default, with a “predictable” Bluetooth identifier and Wi-Fi Service Set Identifier (SSID) and weak default password. That makes it easy to connect to the device and then obtain network access to the rest of the vehicle’s systems – at least for attackers within wireless range.

This can be achieved via a drive-by attack, or by hanging out at truck stops, rest stops, distribution centers, ports – basically anywhere that heavy-duty trucks tend to congregate.

The ELDs use a Controller Area Network (CAN) bus to communicate. For one of the attacks, the boffins showed how anyone within wireless range could use the device’s Wi-Fi and Bluetooth radios to send an arbitrary CAN message that could disrupt of some of the vehicle’s systems.

A second attack scenario, which also required the attacker to be within wireless range, involved connecting to the device and uploading malicious firmware to manipulate data and vehicle operations.

Finally, in what the authors described as the “most concerning” scenario, they uploaded a truck-to-truck worm. The worm uses the compromised device’s Wi-Fi capabilities to search for other vulnerable ELDs nearby.

Here’s how it knows the devices are vulnerable:

It specifically looks for devices with SSIDs starting with “VULNERABLE ELD:”. Although this may sound contrived the SSID of the ELD we examined was predictable and could be used to identify the vulnerable devices.

After finding the right ELDs, the worm uses default credentials to establish a connection, drops its malicious code on the next ELD, overwrites existing firmware, and then starts the process over again, scanning for additional devices.

“Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications,” the researchers warned.

The team also conducted a real-world, drive-by attack simulation on an empty airfield to demonstrate this attack. It used a 2014 truck, and the “attacker” drove a Tesla Model Y at 20mph with a laptop and an Alfa extended range wireless adapter. While both vehicles were in motion, in just 14 seconds the team connected to the truck’s Wi-Fi, used the ELD’s interface to re-flash the device, and started sending malicious messages causing the truck to slow down.

According to Jepson, the researchers disclosed the flaws to the ELD manufacturers and the US Cybersecurity and Infrastructure Security Agency (CISA) before publishing the paper.

“The manufacturer is working on a firmware update now,” Jepson explained. “But we suspect these issues may be common and potentially not limited to a single device or instance.”

https://www.theregister.com/2024/03/22/boffins_tucktotruck_worm/

Commercial Vehicle Electronic Logging Device

Security: Unmasking the Risk of Truck-to-Truck Cyber Worms

https://www.ndss-symposium.org/wp-content/uploads/vehiclesec2024-47-paper.pdf

Eriadilos March 25, 2024 5:51 AM

@morganism

Re: Truck-to-Truck worm

“The ELDs use a Controller Area Network (CAN) bus to communicate. For one of the attacks, the boffins showed how anyone within wireless range could use the device’s Wi-Fi and Bluetooth radios to send an arbitrary CAN message that could disrupt of some of the vehicle’s systems.”

Because putting wireless capability on CAN is such a good idea as has been proven in the past. The automotive industry truly never learns.

But since the flaw is wormable, how about a timebomb that triggers (almost) simultaneous emergency breaking of all trucks ? I bet it would be quite a mess.

I am quite sure that other attacks on these systems could very seriously disrupt an entire country.

Clive Robinson March 25, 2024 8:15 AM

@ Eriadilos, morganism, ALL,

Re : vehicle to vehicle worm of APT payload.

“Because putting wireless capability on CAN is such a good idea as has been proven in the past. The automotive industry truly never learns.”

It’s not just the automotive industry…

As discussed on this blog in the past they already do such “one data bus to rule them all” stupidity on aircraft and to a lesser extent ships.

The argument is “Data Diodes” and “Data sluices” will stop bad data getting to sensitive components.

It won’t…

Most “data diodes” are not true “one way” devices they have the likes of “error detection” and “exception reporting” built into the system as a necessary part of correct functioning.

Thus whilst the “data path” channel appears at the upper protocol layer to be “left to right” only. The reality is at a lower layer there is error/exception and the channel for that is very definitely “right to left” at a lower layer.

With the way many OS’s etc are written, this error&exception right to left channel gets effectively “reported through backwards” and travels further in the right to left direction.

That is the systems by design are transparent to errors so they get reported back right into the heart of any part of the system.

I won’t go into details of how to exploit these “error&exception” channels again, but just remember any and all “reliable” shared data channels not just the CAN bus are susceptable to these “reverse channel” issues.

So the question arises as to,

“Why are there shared data buses?”

The answer is in two parts,

1, Simple mathematics
2, Simple economics

Simple mathematics will tell you that the number of data channels goes up as N^2 of the number of communicating entities N.

Simple economics will tell you that the cost in resources not just money goes up with each additional physical channel.

Thus the simplest implementation is,

“A single physical ‘data buss’ that is shared for N^2 virtual channels.”

Hidden under that is that for each “virtual channel” to work reliably in a shared environment there needs to be another data channel in the reverse direction for “errors&exceptions”… So now there is 2(N^2) channels.

But… Some systems play “error and exception ping pong”… That is each and every channel has a corresponding “back channel”.

Thus you can see how such systems might be vulnerable to what is an “amplification attack” as seen in “Distributed Denial of Service”(DDoS) attacks…

Such is the fun in the design of “fault tolerant systems” built upon “shared data busses”. At the very least the designers have to stop such “cascades” and that is actually one of those “Open Research Problems”…

So to put it crudely,

“The designers ‘wing it’ untill the ‘wings come off’ then their system no matter how cleverly designed just ‘crashes and burns’ in a ‘smoking pit of the designers failings’.”

Ardie March 25, 2024 12:27 PM

@Anonymous re: your March 22, 2024 6:53 PM

About your “Mass surveillance” ( ‘https://www.bbc.com/news/technology-68625232 ) being “neither balanced nor proportionate”…

I agree.

Today I’ve gone though a half dozen TOR bridges which were all blocked within minutes of my using them. I’m looking for a job and I want to get there before my babysitters, and I also wanted to buy survival equipment without tipping my hat. I expect I may have to sleep in a snowbank starting in about a week.

It’s not just a little perverse that after paying taxes faithfully for decades, the vampires that took my money have now turned their dogs loose, ripping our legs out from under us.

Surely Almighty God is not going to give these attacks a pass much longer.

In part Tor is valid because “whistleblowing is vital to holding powerful institutions accountable” (‘https://gm64cjz7un7ucso4yegkssuqfzmg7ctn7mkb66c7l6sj7gzyo6syphid.onion/source/) but

if https isn’t “dark”, why is tor?

if signal isnt crimial, why is tails?

if curtains on your home aren’t hiding crimes, why is tor on brave?

Conversely, even if the majority of tor users are criminals, why should I be penalized? Are we all criminals?

Are government agents all angels? Are the vigilante incitees they seduce all faultless?

Was three-mile island not on their watch? Was thalidomide not under their oversite?

Would all government officials be able to check all “no” in questions 25-86 of this questionnaire:
‘https://www.uscis.gov/sites/default/files/document/forms/i-485.pdf

Who cares, they cant touch me where I’m going ultimately, even if they do think I’m jack the ripper until then. Sooner the better. Surely tazering to death of suspects WOULD be better justice that decades of endless hourly surveillance and harassment and hate speech… and cheaper for tax payers.

I’m a sub-human right?

“and a woolfie even ate an ardvaark, would you if you could???”

TAG: rcmp-robert-dziekanski-taser-death

Clive Robinson March 25, 2024 1:41 PM

@ Winter, ALL,

Re : Just a couple if words to the wise.

“The Donald has never been a very successful man of business.”

You could leave the last two words off and be more accurate in your character assessment of the “Doh-gnarled”.

Smart he ain’t, venal and narcissistic he most definitely is.

As you note,

“Whom of his allies of 2016 on are still standing?”

It’s not just 2016, it’s fairly much most of his adult life if you take just a fraction deeper look than just the glow of the gloss on the faux-guilt-tan.

Depth is something he ain’t got, and never did.

Anyone taken in by him today is either incapable of learning, or has been under a rock playing house with a scorpion far out in the Nevada salt flats.

Any one daft enough to think they can go one over on the “Doh-gnarled” is forgetting that there is a long queue of such idiots and they all get in each others way like “Clowns in the Ring”… So all the Doh-gnarled has to do is stand out of the way and keep waving them on like some three year old with a 50cent stars and stripes living life on the belchers.

lurker March 25, 2024 2:14 PM

The latest squawking in the hen-house re APT31 is I believe technically just hearsay. But why do we have “conspiracy to commit wire frad; conspiracy to do this; conspiracy to do that.” Is talking about a prospective crime worse than actually committing it?

‘https://www.bbc.com/news/world-us-canada-68659095

‘https://www.bbc.co.uk/news/live/uk-politics-68654299

Winter March 25, 2024 2:30 PM

@Clive

Anyone taken in by him today is either incapable of learning, or has been under a rock playing house with a scorpion far out in the Nevada salt flats.

The line up is fitting:
‘https://www.gocomics.com/mattwuerker/2024/03/13

vas pup March 25, 2024 6:23 PM

EU probes Apple, Google, Meta under new digital law
https://www.dw.com/en/eu-probes-apple-google-meta-under-new-digital-law/a-
68660777

“European Union regulators have opened investigations into the tech giants in the first application of the new Digital Markets Act. The tech lobby has
criticized the move, saying it was “rushed.”

The law aims to prevent big tech companies from cornering digital markets while
creating a fairer digital space by curbing how the biggest companies act online, including ensuring they give users more choices.

“We are not convinced that the solutions by [Google parent company] Alphabet,
Apple and Meta respect their obligations for >a fairer and more open digital space for European citizens and businesses,” said the EU’s internal market commissioner, Thierry Breton.

If found guilty of failing to comply with the new law, the EU Commission, the bloc’s executive arm, can impose fines of up to 10% of a company’s total global turnover, rising to 20% for repeat offenders.

The DMA is an accompaniment to the EU’s Digital Services Act groundbreaking
legislation to put in force measures to moderate illegal content and prevent, for example, the promotion of hate speech on their online platforms.

Google said that it has already made “significant changes” to the way its
services operate in Europe to comply with the DMA – including recent changes to its Google Maps service.

“We will continue to defend our approach in the coming months,” Google’s director of competition, Oliver Bethell, said.

Apple said it is confident that its move to allow iPhone users to switch web
browsers more easily complies with the DMA, and that it will “continue to
constructively engage with the European Commission as they conduct their
investigations.”

ResearcherZero March 25, 2024 7:58 PM

Beijing-linked hackers were behind a breach of the UK Electoral Commission.

The intrusion which accessed the details of 40 million voters, was first detected in 2022. During the breach, attackers were able to access reference copies of the electoral registers which included the name and address of anyone in the UK who was registered to vote between 2014 and 2022, as well as the names of those registered as overseas voters and the commission’s internal email system.

UK MPs critical of China were also recently targeted in a series of cyber operations.

‘https://uk.news.yahoo.com/uk-set-blame-china-hack-084125099.html

The defendants and others in the APT31 Group sent malicious tracking-link emails to government officials across the world who expressed criticism of the PRC government. The seven defendants worked with dozens of other MSS intel officers, contractors, and support personnel to compromise and spy on computer networks and online accounts that were of interest to Beijing.

The more than 10,000 malicious emails that the defendants and others in the APT31 Group sent to these targets often appeared to be from prominent news outlets or journalists and appeared to contain legitimate news articles. The malicious emails contained hidden tracking links, such that if the recipient simply opened the email, information about the recipient, including the recipient’s location, internet protocol (IP) addresses, network schematics, and specific devices used to access the pertinent email accounts, was transmitted to a server controlled by the defendants and those working with them. The defendants and others in the APT31 Group then used this information to enable more direct and sophisticated targeted hacking, such as compromising the recipients’ home routers and other electronic devices.

‘https://regmedia.co.uk/2024/03/25/apt31_indictment.pdf

MSS access brokers UNC5174 targeting universities and orginisations using F5 vulnerability.
U.S. defense and UK government entities, were targeted concurrently by MSS access brokers UNC302.
China-nexus actors are researching edge appliances to enable espionage operations at scale.

‘https://www.mandiant.com/resources/blog/initial-access-brokers-exploit-f5-screenconnect

ResearcherZero March 25, 2024 8:19 PM

@Winter

When people get blinded by the smoke that gets in their eyes, they often don’t move.
They are not interested in which way the wind is blowing. If they see someone that looks successful, they imagine that “success” will rub off on them. They don’t notice the fire.

Trump once ran a stock offering using his initials. It finished up at 200 times less it’s opening value when trading was finally halted. Anyone who bought in got burned. Again.

Don’t use a car battery to charge your phones…

‘https://www.sbs.com.au/news/article/act-immediately-to-survive-warnings-issued-as-bushfire-rages-near-perth/fjuj5j8sr

ResearcherZero March 25, 2024 8:39 PM

Standard operating instructions state not to charge devices on flammable materials.

There’s a section about not being a d–khead in the fine print, but no one ever reads it.

44 52 4D CO+2 March 25, 2024 10:57 PM

DMA is really an unfortunate acronym (/backronym?) in re: protection against technoligopolies. I’m no vp of dei, nor would I care if I were. Unless the oxygen was being sucked out of my room, false vacuum, here we go 🙁

Clive Robinson March 25, 2024 11:43 PM

@ ResearcherZero, ALL,

Re : Fire needs fuel to burn.

“Don’t use a car battery to charge your phones…”

Whilst a real “Doh-gnarled Move” of the highest order of stupidity. It’s not the reason the fire mentioned in the article has been so devastating.

The actual reason is the twenty years or more of “fuel load” that bad land management had allowed to build up.

For various reasons sensible and required land management practices from within living memory have been stopped.

One of which is the use of fire.

Fire is a natural event and happens not just as part of an ecology but the life cycle of actual species. For instance some conifers can not release their seeds from the cones without the assistance of fire.

So stopping fire can be as devastating as strip mining is to some ecologies and wipe out entire species.

But also fire gets rid of disease and other pests upto and including mammals introduced into an ecology by mankind.

Most “invasive” non indigenous species are actually not a deliberate introduction into an ecology (though some are).

As such fire is one of the ways such invasive species are removed from the ecology. Because indigenous species have evolved with seasonal fires where as most invasive species brought into the ecology by mankind have not.

What the article is describing is the non linear nature of fire. With a sufficient fuel load the fire turns into a “fire storm” at which point it usually only stops for one of two reasons, it runs out of fuel to burn, or the weather changes significantly. With all his technology mankind still can not fight “fire storms”.

Thus sensible land management says you don’t allow the “fuel load” to build up as the result can only be seen as a disaster.

The least costly way to stop fuel load build up is to regularly burn it out with controlled fires that don’t approach the nonlinear change into fire storms.

This is especially important with certain ecologies where the plants contain certain highly flammable hydrocarbons such as most conifers and some other species like eucalyptus.

It’s known that as long as the fires are small then in a lot of cases the trees like the indigenous wildlife will “live through it” with limited harm.

[1] Fire as an essential symbiotic event in stable ecologies,

https://www.nature.com/scitable/knowledge/library/the-ecology-of-fire-13259892/

[2] Even as little as a decade ago the place of fire in maintaining stable ecologies was very much a scarcely researched knowledge domain,

https://fireecology.springeropen.com/articles/10.1007/BF03400628

Burt March 26, 2024 12:06 AM

@CM

Any physical security measures are only speed bumps. With the right training, tools and operators virtually anything can be defeated.

Clive Robinson March 26, 2024 12:13 AM

@ emily’s post, ALL,

Re : “Hey Presto” Might sound magic but really…

What could possibly go wrong ?

Where would you like me to start?

How about “Fire Hazzard?”

Whilst I can see why somebody would see it as a “neat idea” it’s realy not.

Once the technology is out there, others will grab it and use it.

The point of boxes with “tamper evident seals” is a low cost way to prevent tampering in the delivery or other supply chain etc.

You can see “Implant happy NSA” agents being over the moon with this idea.

But why leave others out?

How about “Evil Maids” etc slipping into your hotel room and “updating” your phone whilst you sleep or take a shower etc.

Then how about US DHS agents doing similar with an attachment to the airport scanner/X-Ray machine?

The list just goes on and on…

lurker March 26, 2024 12:30 AM

@ResearcherZero

Campers can be careless, but not usually stupid.

Phone addiction can do strange things to people,

‘https://www.bbc.com/news/world-australia-68662201

ResearcherZero March 26, 2024 12:56 AM

@Clive Robinson

Of course if they had of continued to use the old system, they would have had to continue employing the same number of people that originally worked in forest and fire management.

They can’t manage a proper fire management regime as they sacked most of the permanent fire fighters and DPC staff about 30 years ago. They just drop fire bombs from the air instead, producing large hot fires. This in turn increases the fuel load, as it destroys the natural vegetation and ground cover, encouraging the prolific growth of taller fire prone scrub-land species. They also clear-felled the large trees and destroyed the upper canopy.

The old regime of ‘cool burns’ reduced fuel loads. They do not even publicly admit we once employed the same methods of Traditional Owners with their assistance and guidance.

Basically their “hazard reduction burns” increase the fuel load – rather than reducing it.
This was all explained to each tier of government at the time they made the decision to change the fire management scheme, and why it was a very bad and dangerous idea. On top of this, it was also explained to them that forests were becoming drier as rainfall decreased.

There is actually an expensive report ($5m) accessing this problem prior to their decision to make the change. There is now a new report explaining how the new fire management system is making the matter worse, and that report recommends re-introducing the original fire regime. The very one and same management system originally recommended to be continued.

The old system employed the same techniques, assistance and advice of the Traditional Owners. Having managed these lands for thousands of years, in many different environmental conditions. They really know the land far better than anyone else. It takes a long time for people to clue-on and actually listen, and decades of scientific study to then confirm it.

The report found that as trees grew taller the risk of extreme blazes decreased.

“hazard reduction burns and logging can make forests up to seven times more flammable”

‘https://www.abc.net.au/news/2024-02-01/hazard-reduction-burns-increase-bushfire-severity-report-finds/103394038

Don’t destroy the canopy…

‘https://onlinelibrary.wiley.com/doi/abs/10.1111/brv.13041

Time travel not valid after 1910 (UNIX NTP)

‘https://www.theregister.com/2024/02/09/it_incident_report_the_clock/

ResearcherZero March 26, 2024 1:11 AM

@Clive Robinson

People’s houses burn down every year now due to fires, yet they have been extraordinarily lucky. The conditions have not yet lined up yet for the a big one. Maybe late this year, or early next year, or perhaps the following summer. It will happen. People will die.

I’ve taken a drive around recently through areas where we had bad fires many years ago and the scrub is 15 feet high and impenetrable in places. The pigs like it. They’ll burn too.

It’s tough fighting fires when the creeks are all dry, there is no electricity and water pressure is low. Certain locations are officially known to be “indefensible”.

ResearcherZero March 26, 2024 3:02 AM

@Winter

Complaining about delays while causing them is as smart as the cutting of funding to the many scientific research projects and departments. Fundamental scientific research. Once those federal departments are taken to with a knife, the experience lost will be vast. Yet, with the right bunch of jokers they could produce a press release about how great it is.

“Mr. Trump, …has already persuaded the Supreme Court to delay his trial in Washington.”

His lawyers have buried judges in Florida and Georgia in enough legal motions and procedural complaints that his cases there have no set trial dates, either.

‘https://www.nytimes.com/2024/03/16/nyregion/donald-trump-trial-delay-strategy.html

The D.C. Circuit clearly rejected the former president’s bid for immunity. Yet Trump’s new filing highlights a factor that could lead to further delay in the already-delayed case. The possibility of “further fact-finding” on “remand,” as the filing puts it, could require additional litigation in lower courts over how the court’s forthcoming ruling applies to the particulars of Trump’s case.

‘https://www.supremecourt.gov/DocketPDF/23/23-939/303418/20240319150454815_23-939%20-%20Brief%20for%20Petitioner.pdf

Trump and his lawyers again asked for yet another delay. They have used nearly every means at their disposal to delay his federal trial.
https://www.axios.com/2023/10/05/trump-classified-documents-trial-delay-2024

Trump’s defense team said the court should “withdraw the current order setting trial” and “postpone” consideration of a new trial date. They said they need more time to prepare a defense in the trial.

‘https://www.cnn.com/2023/07/11/politics/trump-delay-trial-date-classified-documents/index.html

Defense attorneys have demanded a lengthier delay of the trial and limits on key testimony

‘https://abcnews.go.com/US/trump-expected-court-monday-hearing-trial-date-new/story?id=108403651

Trump has once again sought to push back its start of hush money case.

Trump’s team didn’t seek additional documents from federal prosecutors until this January 18th, although they originally received documents last June.
https://www.cbsnews.com/news/trump-new-york-trial-delay-presidential-immunity/

Attorneys for Donald Trump have repeated their request for a delay over Jean E Carrol judgement…

‘https://abcnews.go.com/US/trump-seeks-delay-83m-judgment-jean-carroll-case/story?id=107782842

Trump privately happy with delay tactics and strategy. The trail dates being so close together could cause them to “collide” and cause further delays.
https://www.theguardian.com/us-news/2023/nov/05/trump-trials-attack-delay-strategy

Winter March 26, 2024 4:47 AM

@ResearcherZero

Once those federal departments are taken to with a knife, the experience lost will be vast.

The fall of the Roman Empire also started with corrupt senators and mad emperors.

Clive Robinson March 26, 2024 5:39 AM

@ ALL,

News just in.

Francis Scott Key Bridge in Baltimore struck and collapsed into water

From what is said a large vessel struck one of the supports at 1:30 Eastern Time (5:30GMT) and the whole main span just dropped into the water.

https://www.bbc.co.uk/news/live/world-us-canada-68663071

The numbers of people and vehicles involved is unknown at this time and a major emergency event is underway.

MarkH March 26, 2024 6:00 AM

Container ship Dali (Singapore, 95000 tons) reportedly struck a support of the F S Key Bridge — apparently, under the truss span. It looks as though the full length of the truss structure has collapsed.

Almost certainly, several have perished.

This may trigger calls for increased automation.

The disruption to auto and ship traffic will be heavy.

Clive Robinson March 26, 2024 7:17 AM

@ MarkH, ALL

Re : Key bridge collapse

First thing to note is that according to reports the Container ship Dali that reportedly struck a “support” was significantly off course but… Had two “Harbour Pilots” on board at the time.

Other later reports suggest that yes it was a truss from the support rather than the vertical members that were struck.

On survivability, apparently the water temperature was down to below freezing point, which takes survivability down to a matter of minutes.

Clive Robinson March 26, 2024 10:53 AM

@ JG5, MarkH, ALL

Re : Potential loss of control.

With regards CNN article etc, we still lack information and the little we know is scant.

“Lights on the ship flickered and a dark plume of smoke could be seen billowing from it before it veered towards a bridge pillar shortly before impact”

Appears to have been in part confirmed by,

“Maryland Gov. Wes Moore said the warning from the ship’s crew likely saved lives.”

That is a “Mayday” distress call was put out by the ship in time for much of the Key Bridge to be cleared of traffic, but sadly not all people.

I suspect that in many minds the operation has now gone from “rescue” into “recovery”.

Clive Robinson March 26, 2024 6:22 PM

@ Bruce, JG5, MarkH, SpaceLifeForm, ALL,

Re : Key Bridge collapse and closing of Baltimore Ports thus supply chains.

Whilst what has happened is a tragedy in many ways, what has so far happened may be as nothing compared to the shocks to the US economy via what some are indicating maybe the downturn and loss of upto 15,000 jobs in the area and the loss to the US of a major supply chain that “was” a choke-point through the port.

Worse it will have “Knock on Security Issues” at other already overly stretched ports along the East Coast as supply chains get moved. Whilst Baltimore is not a large port by tonnage, it has very high economic worth via container traffic. This can not “just be moved” to adjacent ports as a lot of infrastructure to do with containers is an essential requirement.

Just a short while ago (~16:00 ET 20:00 GMT) US Transportation Secretary Pete Buttigieg spoke to reporters,

“A reporter asked the transportation secretary how long the port of Baltimore might be closed.

He does not give a direct timeline, but says there will be a “major and protracted impact to supply chains” because of the importance of the Baltimore port.”

Which is a bit of an understatement, we are probably looking at a decade to get back to where things were, by which time container shipping will have advanced significantly.

For instance last year the port moved 4/5ths of a million new vehicles such a loss to the supply is likely to cause significant price inflation over and above that already caused by “chip loss” in the automotive sector.

Maryland Senator Ben Cardin , has indicated that it will be “critical for the US economy” to figure out a way to open up the Maryland port, which is one of the biggest (container ports) in the US.

But realistically people need to consider three things,

Firstly just getting what remains of the approximately quarter mile long main span out of the navigation channels just to let current vessels bottled up there out to sea is going to be a major task. With a similar amount of work again required to get shipping back to even a fraction of the two way flow.

Secondly the bridge is part of a major economic roadway (i695) linked to the ports docks and out into the North East of the US. It was also the only route cleared for “HazMat Transport”. Further it was a major access way into Washington DC with US Government workers using it as part of their journeys.

Thirdly replacing the bridge is going to prove to be interesting. It’s no secret that the bridge as was, was a “restriction” on shipping expansion at 1200ft length but only a 185ft clearance shipping scheduling was an increasing issue.

The bridge was first thought about seriously in the 1950’s designed during the 1960’s with construction during the early to mid 1970’s. It’s doubtful that such a design can be reconstructed these days due to manufacturing issues and cost.

The fact is at half a century old it’s maintenance costs were rising significantly as it started suffering from age and traffic degradation. It’s why work crews were a regular sight to users of the bridge.

What ever replaces the bridge, the simple fact is the design needs to be way more robust, international cargo ships are a 1/5th of a mile long (1000ft) and more these days and not going to get any smaller. Likewise their width has nearly doubled as has their loading hight and consequently draft all in a relatively short time period. The result as we know is “ship canals” around the world are having to be not just dredged out but widened.

The same logic applies to bridges across tidal water access to major harbours.

UnLurkered March 26, 2024 6:50 PM

Tragic news regarding the Baltimore bridge collapse. I can understand why the main bridge structure could not keep up with shipping mass increases but less easy to understand why bridge piers had insufficient layers of protection nearby to make this possible. Hopefully the ship control and security systems get a thorough review, the incident demonstates the risks that such a vehicle could pose if bad actor were to take control physically, remotely or by code.

vas pup March 26, 2024 6:59 PM

@Ardie – sorry to tell you but my recent post – reply to your post – was sanitized by Moderator or/and Bruce.

You know that statement from Jack Nicholson acting in the movie: “You want the truth – you can’t handle the truth.”
I could only add ‘ugly truth’ in particular.

vas pup March 26, 2024 7:04 PM

How crypto heists help North Korea fund its nuclear program
https://www.dw.com/en/how-crypto-heists-help-north-korea-fund-its-nuclear-program/a-68669802

“A new report by a United Nations panel set up to monitor North Korea’s
compliance with international sanctions claims Pyongyang continues “malicious”
cyberattacks that have netted the regime around $3 billion (€2.76 billion) in the six years to 2023.

The proceeds have reportedly funded as much as 40% of the cost of its weapons of mass destruction programs.

Analysts told DW that the crypto industry “is extremely concerned” that a
powerful state actor is apparently carrying out virtual currency thefts
effectively and with impunity, and that international law lags behind the rapid
pace of development in the sector.

Similarly, they point out, the leaders of some of the nations that are most at risk of a cyberattack initiated by North Korea — notably South Korea, Japan and the United States — are presently preoccupied with serious political challenges that are taking up their time and energies.

That is how hackers managed to access the Ronin Network in April 2022 — through a sidechain linked to blockchain game Axie Infinity — with the company estimating faked withdrawals cost it nearly $615 million. And the attack was a success for the hackers despite cryptocurrency firms impressing the importance of operational security on employees.

The security of the sector is also hampered by the decentralized,
freewheeling, global nature of crypto, which users like but which also makes it
difficult for governments to regulate.

“We are trying to create legislation that will fight cyber theft, cyber terrorism and other similar violations, but specific standards are difficult to achieve
because they need the consensus of all the states involved,” Park said. “Right now, there are lots of loopholes that bad actors, like North Korea, can take
advantage of.”

It is difficult to reach agreement within South Korea about the laws that are
needed to help fend off cyber attacks that threaten the nation, the legal expert said, with ruling and opposition parties unwilling to be seen to agree on any
issues less than a month ahead of the election.”

Several good videos inside as well.

Clive Robinson March 26, 2024 7:43 PM

@ fbi, lurker, ALL,

Re : Solar Weather and CME’s and the R-Value.

You might be interested in this talk / presentation that popped up on YouTube in the past 24hours. From an event a week or two before,

https://m.youtube.com/watch?v=ec3nBvfXRk4

As it points out we “organics” are not much effected, however our technology can get effected fairly hard with induced high currents in long run power cables. And what mainly interests me is the effect on the radio spectrum from DC to quite a ways up… As noted most often it’s HF that gets flattened but VHF airband, UHF aeronav and even radar and GPS can be effected.

You might be in an aircraft that is full up lightning etc protected so safe from terrestrial electrical storm weather… but if Nav Systems go out and also Comms all of a sudden due to space weather it’s not fun any more. It happens rather more than you are likely aware of as a frequent flyer and if sats go out as well you are into “The three blind men” game.

Any way grab a bowl of popcorn sit back and relax (unless you are under LAX flight path 😉

Clive Robinson March 26, 2024 10:21 PM

@ UnLurkered,

Re : Key Bridge.

“… less easy to understand why bridge piers had insufficient layers of protection nearby to make this possible.”

Untill relatively recently bridge pilings were left,

“Elegant in their look and simplicity”

For a whole host of reasons but “cost” has been ever present.

But also consider most bridges struck by vessels don’t get damaged supports. All to often it’s the bridge deck getting struck by vessel superstructure, thus the vessel has in effect it’s own “crumple zones” to absorb a lot of the impact.

I’ve no idea how much mass the vessel had in total, but it was travelling relatively slowly (I’ve seen 8mph reported by some journos). Needless to say though that is still a lot of kinetic energy.

As a rough rule of thumb bridge designers tend to aim to put bridge supports in as shallow a depth of water as possible thus rely on “grounding out” of larger vessels. But akso because the pressure goes up by an atmosphere at 30ft depth if water and so on. So working at more than that depth quickly becomes problematic and very expensive.

Building “artificial islands” is even more expensive especially as they “wash away” way to easily, so that is avoided as well…

Some bridges are built on what is a concrete pontoon that is floated out then sunk into place, but that also creates a hazard.

But none of these systems protect against collisions. Interestingly in the UK a pleasure boat crashed into a bridge on the River Thames just a few months ago,

https://www.bbc.co.uk/news/av/uk-67680559

It’s not the first and won’t be the last.

Some years back now a larger vessel did cause some damage and rules were put in place about adding protection (surprisingly the river is legally a “highway” attesting to it’s main use since Roman times). However if you look at the “latest bridge” seen in this article,

https://theconversation.com/straw-bale-hung-from-londons-millennium-bridge-to-comply-with-ancient-law-just-part-of-the-river-thames-long-legal-history-216110

You will see there is no protection…

ResearcherZero March 26, 2024 11:23 PM

If you are lucky you might get to see the odd object burn up entering the atmosphere, or perhaps a small meteor (if one makes it to the ground).

Saw one today at quite a long distance away. With a short, wide plume. Burnt up slowly as it entered.

‘https://minorplanetcenter.net/iau/lists/InnerPlot2.html

fib March 27, 2024 6:47 AM

@ Clive

Thanks for the video. Very informative.

As I was tracking Irma, I had no idea of the other drama unfolding. 🙂

Regards.

JonKnowsNothing March 27, 2024 9:00 AM

@ResearcherZero , All

re: a small meteor (if one makes it to the ground)

There is a lively competition industry in finding meteors. In the USA vast arid plains like in Arizona are prime hunting grounds. Since they fall often, the meteor hunters are constantly looking for them.

Once a hunter learns the geography of their hunting areas, they can spot an anomaly in the landscape with a good set of binoculars followed up with high-tech metal detectors for precise location, depth and metallic content.

It’s not unlike other treasure hunts.

I was able to hold a small one, and they are very heavy or dense, the core has to survive the entry and landing. Much heavier than one would expect given the size.

JonKnowsNothing March 27, 2024 9:25 AM

@Clive, All

re: Austerity in collapse

A MSM article about the collapse and pending collapse of 50 countries’ economies and the effects of the collapse give a hint about the types of economic, food, supply shocks coming as Austerity model careens into hyper-acceleration.

There isn’t any new news here, as other these collapses have followed the same scenarios.

The countries have debt loads many times their GDP. The interest rates on loans from international banking system and private equity lenders is beyond even minimal payments. The reduction of the economy over all as Hyper Austerity hits, driving millions more into poverty. The lack of a decent exchange rate makes products, food, manufacturing costs rise to the point that items are no longer viable to make, buy, sell. No banker or equity company will take a hair cut and write off the debt. At best they defer payment, with continuing accrual of interest and extending the debt period.

The article covers 50 countries’ economic collapse scenario by focusing on the effects on a family as they slide into poverty. It’s the same story we see in the USA, UK, AU, EU, China as the Austerity model hits the ceiling.

  • 15 countries have gone bankrupt since the start of the pandemic, and around 40 others are barely able to service their loans. Last summer, United Nations Secretary-General António Guterres spoke of a “systemic failure.”
  • The disaster can be traced back to a trillion-dollar credit bubble that starting forming in 2010.
  • ~165 million people fell into poverty between 2020 and 2023. This corresponds to more than a third of the population of the European Union.

===

1)

HAIL Warning

ht tps://w ww.spiegel. de/international/world/sri-lanka-dhanush-udeni-und-die-staatspleite-1710780783-a-48cd0daa-72b8-40ce-b574-386ba3ee244e

  • Sri Lanka: Dhanush, Udeni and the State Bankruptcy
  • The biggest humanitarian crisis in decades is raging in the Global South. Around 50 countries are nearing bankruptcy, and 165 million people have fallen into poverty.

Clive Robinson March 27, 2024 10:35 AM

@ JonKnowsNothing, ALL,

Re : Synchronicity again…

Earlier this AM I was looking at was going on with regards the cryptotrading firm Binance and Nigeria’s clearly failed and corrupt government.

Basically for good reason people in Nigeria have not trusted their government’s fiscal policy and have thus shuned the deliberatly veing devalued local near worthless national currency and have veen tucking money away in the likes of Bitcoin.

Well the Nigerian Government invited two people from Binance to talks tried getting them to divulge names and when the people would not oblige, arrested them and tried a hostage ransom exercise demanding $10billion from Binance.

It was ruled in Nigeria that they were being illegally held and the person responsible allegedly arrested. one the two Binance people who had Dual Nationality thus two passports left the country apparently quietly but quite legally.

This has upset the Nigerian Government that they are trying to get Interpol to issue an arrest warrant.

The real reason when you brush aside the Nigerian claims that appear bogus is that the Government have sunk well over their heads in debt very much of their own making and are trying to force people who have money but no trust in the Government to bail the politicians out… The obvious question of why should they when Nigerian Politicians have a very bad reputation for steeling from the Nigerian people is apparently something the Nigerian Politicians do not want asked… I wonder why?

From what has been reported apparently poverty in Nigeria has reached the point where food and fuel poverty is of epidemic proportions.

Clive Robinson March 27, 2024 11:19 AM

@ Bruce, ALL,

Re : Key Bridge and supply chain security.

As predicted the elephant in the room of the unfortunate collapse of the Key Bridge of “supply chain” security has arisen.

At the moment it’s about economic down turn in Baltimore of 15,000 waged jobs and another 100-20o thousand jobs elsewhere.

Some will very soon ask if it could lead to a recession of some kind in the US well the answer is unfortunately,

“We do not have enough data to say not.”

Which on it’s own could be sufficient to act as a tipping point.

However I suspect in the next few days there will be IS and ICT stories not just about the supply chain supply issues but also about the actual security of data etc.

This is not a “pebble in the pond” issue sending out a few ripples, this is more like a mountain dropping into the ocean, with significant waves on both sides of the Atlantic bouncing back and forth.

At the very least it has happened at a time where the likes of Russia and similar will see it as an opportune time to run attacks against the US and other Western Nations.

We’ve already seen a lot of “fake-News” from Putin trying to make hay out of the Crocus City Hall concert stadium massacre,

https://slate.com/news-and-politics/2024/03/russia-shooting-concert-hall-isis-attack-putin.html

So as it’s his M.O. at a very minimum expect Putin to try and take advantage of the Key Bridge collapse any way he and his cronies can think up.

JonKnowsNothing March 27, 2024 1:05 PM

@Clive, All

re: Burrito Economics

A MSM Report on the electric response to the cost of a burrito in San Francisco California. (1) From the report, it seems that the initial fireworks started on social media platforms, but the article does a written breakdown of the situation.

  • The issue: A burrito that now costs $22 USD

For those not familiar with a burrito, it’s a food source found all over Mexico and many parts of South America. It’s ancient in form and the contents come from centuries of cultural innovations. It was a “poor person’s meal” but after some CorpBros saw an opening in the fast food restaurant trade, made it into a fast food bonanza dish. Restaurants that specialize in Mexican cuisine have this on their menu. This is a staple item for what we call a “taco truck”, which is a mobile kitchen that often parks at construction sites or corners where there is food traffic.

A burrito consists of

  • A tortilla: corn or flour
  • A filling: rice, beans, meat or braised meat
  • Add ons: cheese, salsa, pico de gallo, hot sauces

It’s a pretty basic food meal.

The upset is in response to how much the cost of the burrito has risen in the last few years. About 20yrs ago I could get an ultra deluxe burrito with everything in it including the kitchen sink in it and big enough for 2 meals for $2.50 USD. Today it’s $22.00 USD.

Current costs

Beef $6.60/lb

Cooking Oil $35/case

Onions $80/case

Beans $47/ 50lb bag

Rice $42/ 50lb bag

Tomatoes $30 / 20lb

Fresh Corn $39

Limes $60 / 200 count

Minimum wage $18/hr

Payroll taxes (employer portion) $3,200 / month

Estimate increase over 2 years: $10,000 additional / month

===

1)

HAIL Warning

ht tps://w ww.thegua rdian.com/food/ng-interactive/2024/mar/27/burrito-price-inflation-vaca-birria-san-francisco

  • How a viral $22 burrito explains inflation in the US
  • A San Francisco taqueria owner made waves after raising the price of a signature dish. We break down the costs – and why economists say it could be justified

Clive Robinson March 27, 2024 2:31 PM

@ JonKnowsNothing,

Re : Burrito Economics

I blame the US Government and Fed printing presses…

Whilst it was a while ago since I was last in Downtown Redmond doing a few things for AT&T Mobile I remember being a little miffed that the price of a stake dinner had gone up by fifty cents from my previous visit a month before… That is with soft drink it was $12.50.

Back then I think a Burrito was less than the $2 mark depending on how far you were prepared to walk. It was only a little more than the “bus fare” from Seattle Airport to Downtown Redmond which was an interesting ride for anyone else that’s tried it[1] (and way less travel sick making than a “town car”).

[1] The Hotel was surprised to see me turn up as a guest as I was dressed in my usual “travel clothes” and looked like a cross between a Canadian hiker and Boston construction worker and my Scottish accent was broadly on display (for some reason I don’t have any probs and people are friendly, might be because being 6’6″ and around a third of that broad back then… I kind of filled doorways 😉

JonKnowsNothing March 27, 2024 3:03 PM

@Clive, All

re: Burrito Panfamine Economics

Of interest on the ingredient list is that nearly everything on that list has a supply shortage either from crop failure, supply chain failure, wars and economic failures in the delivery chain.

For an item that was a meal-on-the-cheap to a meal-not-in-the-budget, one can extrapolate different hardship scenarios across the globe.

  • Corn, wheat crop failures
  • Ag beef industry problems post the C19-emergency-slaughter
  • Cooking oil of various types including Olive Oil have multiple year crop failures
  • Rice crops also failing and import-export rule changes in some countries to safe guard local supplies by preventing export exploit
  • Fresh produce subject to climate incidents reducing entire harvests to nil
  • Crop pests like Citrus Greening in oranges and unexpected freezes reducing harvests
  • Field crops like tomatoes, onions lost to climate change flooding, scorching, freezing

Behind the increase of price in the burrito, is the increasing scarcity of basic foods.

lurker March 27, 2024 6:44 PM

@Clive Robinson All

The english language news from one of the US’ “adversaries” is often amusing and provocative. Yesterday they recounted how the Dali had hit a bridge in Baltimore harbour, caught fire and sank. Today no mention of of fire or sinking, the narrative has morphed to this being as big a hit on the US economy as Covid. The route to this conclusion came by counting the cost of closure of the port of Los Angeles during the pandemic. I suspect there are a number of east coast ports able to take up the slack from Baltimore, but locally there will be a hitch for a lot of commuters who must be thanking $Deity this didn’t happen in drive time.

The foreign reporter asked a Baltimore port official how many “days or weeks” it would take to clear debris and reopen the port. The official wisely deferred that to the Army Engineers who will do the job.

More reputable sources report that the NTSB people tasked with recovering the data logger were unable to board the ship while search and rescue continued on the water. Why?

lurker March 27, 2024 6:50 PM

Asking for a friend, which would be easier, to run a ship into an important bridge, or fly an airliner into a tower block?

anymouse March 27, 2024 8:40 PM

If you needed yet another reason not to trust VPN providers or proxy services…

Here Facebook partnered with a bunch of companies to have root certificates installed on people’s phones so they could intercept other app’s traffic such as Snapchat, Youtube

https://x.com/haxrob/status/1772766039199363375

Facebook Intercepts as MITM decrypts other apps encryption…

Clive Robinson March 27, 2024 10:16 PM

@ lurker,

Re : Laws of fluid dynamics…

“Asking for a friend, which would be easier, to run a ship into an important bridge, or fly an airliner into a tower block?”

Well first off lets insert the word “accidently” in there…

The ship can not “fly over the bridge” so it will be at “strike hight” all the time.

Now there is the strange issue of why,

“Ships don’t pass in the night the kiss unless stopped”

Put simply and without a bunch of maths such as Bernoulli’s equation, two vessels sailing side by side will be “drawn together” due to the fact that if close enough they push the water out of the way for each other thus there is more pressure on the outer side of the vessel hulls pushing in together than the inner side of the hulls pushing out apart.

It’s a similar reason birds like geese fly in a V formation and racing cyclists bunch up. They are in effect on the flat but travelling down hill with a wind behind their back.

However the faster you go the less distance the effect works over. Unless an aircraft is flying in another aircrafts direct slipstream the effect will be negligible at best.

Where water flows a ship will get pulled toward the bridge if it gets within a certain distance in part described by the Venturi effect. With small vessels it’s not often noticed with large long vessels it is noticed when coming alongside to docks etc.

So you actively have to “steer away” on a new course heading. That is if you maintain the same compass course you will find the ship moves sideways without changing it’s heading.

Then there is the fun of how a river or other body of moving water behaves in a channel. I won’t attempt to describe why as it’s a nonlinear process, but as far as a ship is concerned in some water ways the banks are like they are “down hill” of the central stream thus they will head in that direction[1].

So “on points” the ship gets it even before you do the “kinetic energy calculation”.

Large vessels even with engines in full reverse just don’t stop moving forward we discussed it on this blog some months back. In open water you throw the wheel over so the vessels hull becomes broadside on to the inertial direction. Which is something you just can not do in a waterway.

Dropping anchor is a risky thing to do as it can tear a ship apart if done incorrectly. Thus is seen as a desperate measure, so why might it be done?

Consider a ships ability to steer is based on it’s relative velocity to the water it is in[2]. Thus it might be moving towards a fixed point such as a bridge at say 8mph but as it has no relative velocity difference to the water it is in, it has no steerage way, thus is to all intents and purposes “just drifting” and uncontrollable by the ships crew in any way.

[1] You can actually experience this for fun when things go in the other direction by “running a tidal bore wave” of which one of the largest is in Bristol up the Seven Estuary which I’ve mentioned in the past with respect to both subsea xables abd wace power (if you want the fun of the mathematics of bore races, https://www.coastalwiki.org/wiki/Tidal_bore_dynamics ). Similar can be done with “stopper waves” at river sluices which often attract canoeists (yup I wasted a lot of weekends in my life from 14 to 18 and nearly killed myself a few times in the process as I’ve mentioned before).

[2] In between the channel islands and France there is a tidal phenomenon called the “Alderney Race”,

https://royalsocietypublishing.org/doi/10.1098/rsta.2019.0492

Amongst such strange effects as a gyre that can make your boat go backwards and forwards every few minutes you can sit on the shore and watch boats apparently sail backwards even with full steerage way as the water can move at 5m/sec or 18kph. I actually got a small boat to “plane” but from the shore it looked backwards like a strange film clip in reverse. You really do not want to be on the French side of it because the bed is very rocky and whilst charted it’s to difficult to navigate.

ResearcherZero March 28, 2024 1:18 AM

@JonKnowsNothing

The Earth has been passing by the Apollo Group over the last few weeks. Most of the asteroids, particularly the larger ones, are at distances of up to a million kilometers or greater from Earth. There a few small ones that occasionally get closer and fall to Earth. The object we spotted may not have even got close enough, as it did look very far away and perhaps just skimmed past. That might of explained the very short tail. Probably just got lucky to glimpse it during the day. I have not yet seen any reports about it.

I found a very small meteorite once in the outback with a team of hunters from the museum.

@Clive

The Kremlin has been pushing out regular fake news via mouthpieces like sott[.]com. The stories are completely fabricated with invented quotes about “planned” terror attacks, assassinations and other disinformation. Multiple stories are released daily by these outlets, gaming search results to get high rankings, with many targeting English speaking countries. The usual fear mongering and flimsy connections to unrelated events.

Most of the real issues from the accident in Baltimore will likely be logistical in nature.

TheMoon botnet targeted 6,000 ASUS routers in less than 72 hours. Many are older unpatched models.

“80% of Faceless bots are located in the United States, implying that accounts and organizations within the U.S. are primary targets.”

‘https://blog.lumen.com/the-darkside-of-themoon/

Firmware updates can be found here along with instructions of how to install them.

‘https://www.asus.com/content/asus-product-security-advisory/

Spyware vendors were responsible for 50% of 0days in 2023.

‘https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Year_in_Review_of_ZeroDays.pdf

SMS phishing service targeting Android and iPhone.

‘https://www.netcraft.com/blog/darcula-smishing-attacks-target-usps-and-global-postal-services/

Chinese Ministry of State Security (MSS) was behind a breach of Finland’s parliament disclosed in March 2021.

‘https://apnews.com/article/legislature-beijing-finland-china-hacking-f9879cd03785aefda6c631e1c5c46fb5

ResearcherZero March 28, 2024 1:56 AM

Here is a very real problem the Kremlin (and anyone else) could seize upon for propaganda.

Coles pauses/resumes all cash withdrawals and deliveries from Armaguard.

Armaguard has been struggling to stay afloat despite merging with rival money mover Prosegur last year, due to the rise in cashless transactions, making the transportation of banknotes and coins around the country increasingly unprofitable.

‘https://www.abc.net.au/news/2024-03-28/armaguard-rejects-funding-deal-cash-transport-future-banks-coles/103643674

Coles has reduced its cash withdrawal limit from $400 to $200, with the changes putting it in line with many other retailers. Australian cash usage has dropped to 13% of transactions, according to Accenture, down from 27% before the pandemic.

‘https://www.theguardian.com/business/2024/mar/28/armaguard-collapse-fears-coles-cash-withdrawal-limit

lurker March 28, 2024 4:06 PM

“Crypto King” SBF gets 25 years, and the Reuters sketch shows him looking unhappy at that

‘https://www.bbc.com/news/business-68677487

Clive Robinson March 28, 2024 4:36 PM

@ JonKnowsNothing, ALL,

Re : Impossible but happened

An update on Horizon, that would shock a person not familiar with what has already happened,

“Secret papers reveal Post Office knew its court defence was false”

https://www.bbc.co.uk/news/uk-68663750

And a hundred million in UK tax payer money used in keeping it covered up.

Clive Robinson March 28, 2024 4:49 PM

The first negative leap second

Will it be an “ICT security concern”?

Actually yes it should be as a lot of software wont handle it correctly… As it effects UTC not local time.

https://www.bbc.co.uk/news/science-environment-68684244

UTC is oft used incorrectly as the “base time” in computers and the local time including the leap forward and fall back of Summer time and winter time is done as an “overlay” to the computers UTC.

Also how UTC is corrected on computers varies often it’s done as a long integration of a step change so it is smoothed over quite a time interval.

With “moon shots” due to happen RSN and people are talking about putting satellites in close orbit around it then relay satellites back to Earth for “remote control” and “experiments”. How we deal with the “time wobble” is going to prove somewhat interesting… So the sooner we start the less painful and expensive it will be.

lurker March 28, 2024 5:51 PM

@Clive Robinson

In a table, the draft report detailed hundreds of debited transactions entered by “non-branch users”, who the report explained “can access branches remotely for support purposes”.

But we still don’t know if the shortfalls in the sub-postmasters’ accounts were caused by
a) bugs, or
b) TITK* fudging numbers to “correct” for bugs, or
c) TITK* committing actual theft, or
d) all of the above.

*Those In The Know could include Fujitsu and/or PO backroom staff.

JonKnowsNothing March 28, 2024 8:35 PM

@ lurker, @Clive, All

re: the [cause of] shortfalls in the sub-postmasters’ accounts

Actually, it’s pretty easy to black box back to the causes with the known information. It’s not evidence in court but it does answer the HOWs and WHys.

  • It’s all in the Point of Sale software.

Computers, and even humans, do not make things up out of thin air. Computers work in a designed way and even humans messing with that design have a “concept or idea” of what they want to change.

PoS (yes they are) all have the same layout, design and the same flaws. It’s baked in to a PoS system. Remote PoS systems have even worse design flaws, and that’s more than baked in, it’s encrusted in the design.

There are 2 concepts: Accounting and Remote Polling

These are at the center.

  • Accounting systems can never be “out of balance”, if they are, there is a fault.
  • Polling systems gather the source information for the Accounting system and feeds into that. Polling systems are not supposed to go “out of balance” because this is the bedrock for the Accounting system. However, polling systems fail and when they fail they are out of balance, feeding out of balance information to the Accounting system.

The Accounting system should burp, and clearly it did. Which is why the Polling system was tampered with to “fix it”. They fixed the Accounting system by tampering with the polling system data. Because it was a kludge, the problem repeated. It repeated so often that the kludge became common practice to tamper with the Polling System data from the sub-postmasters.

There are only so many ways you can invent a £50,000 shortfall at the sub-postmasters.

We can see current implementations in this in globally invented shortfalls via

  • ROBODEBT – a demand for payment from an imaginary debt going back 30-50yrs
  • CLAWBACK – a demand for recovery of an imaginary over payment going back 30-50yrs

Start with Follow The Money backwards from the final end point of a £50,000 ROBODEBT.

Work your way back into the code stream, trying to keep the Accounting System in balance, and keeping the Polling System from collapsing because there’s an unknown transaction for £50,000 randomly applied to different or the same sub-postmasters.

Then run the same regression against a £10,000 ROBODEBT and a £500 ROBODEBT applied to different or same postmaster, you will uncover the problems of Remote PoS (yes they are).

The problems of the sub-postmasters was and is, this sort of reverse regression design analysis was denied to them. The government, post office investigators and policing agencies outright lied about it.

Another way to think of this problem is the old riddle of a summing string of numbers.

You ask PersonA to think of a number but not tell you that number

Then you tell them to add X, subtract Y, in a series, keeping track of this sum

At some point while doing this list you tell them to subtract their original number.

The great reveal: You know the Answer

You never need to know the value PersonA selected for this process, but it is the £50,000 ROBODEBT floating in your list of numbers; numbers that have a fixed behavior. It has to come in and it has to go out.

ResearcherZero March 29, 2024 12:01 AM

@Clive Robinson

Re: Supply Chain

Fortunately ships have previously crashed into bridges, become stuck across canals, or droughts and conflict have forced rerouting. Data has been available for purchase from data brokers and other sources long before everyone carried a phone around in their pocket.

There are companies who provide data services with all kinds of maps and statistics about movements, volumes and trades and all the other various bits, bobs and pieces of eight…

“The Little St. James report features five maps, one of which reveals locations of devices observed on the island over more than three years prior to Epstein’s arrest.”

Two of the maps indicate the inferred “Common Evening Locations” and “Common Daytime Locations” for each device that had visited the island.

Near Intelligence, for example, tracked devices visiting Little St. James from locations in 80 cities crisscrossing 26 US states and territories, with Florida, Massachusetts, Texas, Michigan, and New York topping the list. The coordinates point to mansions in gated communities in Michigan and Florida; homes in Martha’s Vineyard and Nantucket in Massachusetts; a nightclub in Miami; and the sidewalk across the street from Trump Tower on Fifth Avenue in New York City.

“It’s deeply concerning to think that any sexual abuse victims’ location will be tracked and then stored and then sold to someone, who can presumably do whatever they want with it.”

…others point to lower-income areas where Epstein victims are known to have lived and attended school, including areas of West Palm Beach, Florida, where police and a private investigator say they located around 40 of Epstein’s victims.

11,279 coordinates obtained by WIRED show not only a flood of traffic to Epstein’s island property but also 166 locations throughout the US where Near Intelligence infers that visitors to Little St. James likely lived and worked. The cache also points to cities in Ukraine, the Cayman Islands, and Australia, among others.

‘https://www.wired.com/story/jeffrey-epstein-island-visitors-data-broker-leak/

$200k for something or other…

‘https://www.abc.net.au/news/2024-03-28/national-corruption-watchdog-claims-first-scalp-airport-bribe/103644382

Thousands of submissions have been made, most have been dismissed, yet hundreds still remain under review or investigation.

‘https://www.crikey.com.au/2024/03/14/national-anti-corruption-commission-nacc-convictions/

ResearcherZero March 29, 2024 12:47 AM

More than 7,000 years ago, people navigated the Mediterranean Sea using technologically sophisticated boats.

‘https://www.sciencealert.com/7000-year-old-sunken-boats-reveal-how-neolithic-seafarers-traversed-the-mediterranean

“Where the land is currently located is not where we always lived.”

20,000 years ago, the coastline would have been far out of sight, roughly 160 kilometers from where it rests today. To Aboriginal people, country is kin and it should be cared for, and for saltwater people like Lee who reside on the coast, their stewardship stretches out into the sea. Around two million square kilometers of land around Australia was lost to rising seas after the last ice age, about the same area as modern-day Mexico.

‘https://hakaimagazine.com/features/stepping-off-the-shore-and-into-sea-country/

Clive Robinson March 29, 2024 1:36 AM

@ JonKnowsNothing, lurker,

Re : Theory v. Reality.

“Accounting systems can never be “out of balance”, if they are, there is a fault.”

That is in theory… In reality accounting systems are “out of balance” when transactions are in progress, such is the necessary behaviour under the laws of nature of sequential actions.

Things are easy to “keep balanced” when only “one transaction” is being progressed at a time, you simply “spin untill finished”.

Now consider how you do things when a thousand transactions are being processed at the same time.

In theory it’s easy, in practice it’s where “bugs are born”…

JonKnowsNothing March 29, 2024 3:01 AM

@Clive, @lurker, All

re: accounting systems are “out of balance” when transactions are in progress

This is true even for manual entry books. While writing in one column, the other column has not been updated. If you stop mid-transaction and never finish the other entry, the books will be out of balance.

This fault would normally set off an alarm in a computer system where the numbers can be added up faster than manual addition, or when the grand totals no longer match on the paper sheets.

That’s how it is supposed to work.

However, the Post Office system, may have been screaming out of balance for 20+ years and the humans in charge could not solve the base source error in the Remote PoS Polling Design, so they kept shoving in numbers hoping to stabilize the condition.

  • Add 10, Add 50,000, Add 500…

Once you start shoving numbers, even if you think you have the “correct balancing entry” into the system, you find that the “balancing entry” didn’t balance the books.

  • This is sometimes called the: WITTB Account
    • What It Takes To Balance

Except, after a few rounds, it was both technically and by accounting methods, clear the entire system was corrupted and unreliable. At this point, Fujitsu, the UK Post Office, the investigators, police and prosecuting legal system just lied-through-their-teeth about the cause.

For a better design and to keep things in balance, banking, bookkeeping and accounting systems can use Transactional Processing. It’s like putting a lock on a section of code or memory register.

Transaction Validate (matching entries)

Transaction Lock Start

Post Line 1

Post Line 2

Post Line 999

Transaction Validate (post lines match)

If Error Rollback Transaction (Lines 1… Line 999)
Else Post Complete

Transaction Lock End

The failure in PoS systems is, they rarely use Transaction Blocks. They generate what @Clive called “spin until done” entries. There is no validation or verification. There may be subtotals on a register report or tape but it has no connection to what’s in the PoS Transmit File or what is not in the Transmit File.

There is no validation at all.

Once the Transmit File is pulled into the mainframe processing hopper more shyte can happen and does, as few systems run any type of archiving or rotation file system, they basically overwrite file after file.

So PoS (yes they are) send One Sided Entries into an Accounting System with no verification, check points, roll backs or roll forwards. If the process burps mid update the entire system is FUBAR.

However, all this is pretty well known for PoS Systems. It’s not new news. It’s not even rocket science. Every PoS (yes they are) has these same issues. Better designed ones take into account problems with the polling file before transit, during transit, during processing.

  • The problems at the PoS Register was another source of errors dumping crap data into the transmit file. The Register Program was crap too.

Some of the juicier reporting tidbits of Fujitsu’s masterful accounting and PoS system indicated they just had no management at all on the PoS processing. When the PoS Polling file was crapped up either at the cash register or while being polled or on processing, the humans just made up WITTB and jammed it into the system where ever they could find a spot.

Then they lied to everyone about it, those people lied to more people about it, the programmers lied to save their arses and sent lots of people to jail, bankruptcy, and ruin all to save their $50,000/yr salary as a Fujitsu Employee and to save-face for their families back home.

Clive Robinson March 29, 2024 4:23 AM

@ ResearcherZero, ALL,

As Wired called it “the troubled” company “Near Intelligence” is so in debt –by apparently $100million– it has had to fend of bankruptcy proceadings.

Further it appears according to the way Wired writes it very close contractually, financially, and in other ways to the NSA and other Federal and State agencies wanting to get around “Warrant Restrictions”. That is the government agencies at the very least unlawfully acquire data on US Citizens that the lawful processes they agencies are legally required to follow don’t allow.

This is not just “a little bending of the rules” but “a very clear and determined effort to break the legislative restrictions entirely”.

The cessation date of the “little St James Report” strongly suggest that “payment for services” to Near Intelligence stopped on that date. I would suggest that it’s correlation with “law enforcement action” is actually an indication of “causation” pointing to some entity within that law enforcement agencies “inner circle”.

However the Wired comment about “centimetres of space”,

“The coordinates that Near Intelligence collected and left exposed online pinpoint locations to within a few centimeters of space.

Is disingenuous at best, because it implies that the phone location precision is sufficient to say which buttock your phone is resting on when you move around in your designer pants… It’s not.

It maybe what “Neat Intelligence” put in their report, but that does not reflect reality, more likely the bit width of a data field in some over specified software[1] “Neat Intelligence” developed internally.

The reality is nobile phone signals really can not do anything even remotely close to that and at the very best of times GPS accuracy in phones is measured in thousands of centimetres distance so volumetrically somewhere in a billon centimetres or more variance. As for WiFi accuracy mostly it’s a nonsense based on what is often called a “Received Signal Strength Indicator”(RSSI) which is not based on measurement of “signal amplitude” at all, but the highly nonlinear “data error rates”. For positional accuracy it is almost entirely useless… because such RSSI values are more effected by interference and multi-path distortion by many orders of magnitude than by range.

Further is the problem of “filtering” by integration etc.

All “real world signals” are “Noisy Data” and within a lot of limitations such signals can by an “averaging” process appear to reduce / remove the noise. That is “it is assumed” that noise is “random” and so by using a variant of Pythagoras’ little equation you can by finding the “Root of the Mean Squared”(RMS) reduce the noise by the square root of the number of samples.

However if you walk around in a big circle the algorithm puts you not on the circumference but at the center of the circle, where you might never have been…

[1] The over specifying of bit widths of variables in software is not just common it’s endemic.

For example do you need 64bits to record days of the month? Of course not but often you get it because it simplifies software design.

Another reason is “maximum expectation” of an “unknown data source” during software specification prior to development. For instance laser measurement can give measurements to very small fractions of a millimetre thus I design my software to allow for that plus five orders of magnitude to allow for the likes of “coordinate conversion” from “range and 3D direction” to “map grid coordinates”. However Direction Finding from two points can have an error margin over 30% of the distance between them which is well over a kilometre in even city areas. But from a software perspective your complex data type is specified to allow “all” accuracies as it makes the design of maths libraries and the like easier and less buggy.

Clive Robinson March 29, 2024 5:26 AM

@ JonKnowsNothing, lurker, ALL

Re : Far distant Horizons

That’s how it is supposed to work.

But neither can it or does it in an asynchronous system.

When people “dig in” if they are ever allowed to it will very provably be found that an asynchronous process is involved.

I can give an example that has been found in other accounting systems, but “for NAD reasons” I can not say who’s systems, when, and other details. As they say,

“One distant horizon looks like any other.”

Look at a “cash register” it holds a float of cash so sales transactions can happen. Management want to know “what the float on the floor” is for all sorts of reasons at all sorts of times it is by definition an asynchronous process to that of sales transactions. The thing is it can not be exactly determined except by stopping all transactions and all movements of cash not just in sales transactions but also to or from the security of the “cash office” or the “Till excess vault” used to minimise loss if somebody does a “stick up” or equivalent.

Management used to manually graph the floor float to make forward predictions such that sales transactions would not get interrupted, but nor would stick ups be likely to happen or be costly.

Then computers came along and “manual” went out and as you’ve noted “speed” came in, and with it the desire by management for “more floor data” like employee performance etc etc etc. You name it somebody would want it… But computers are also allegedly “magic” they “don’t make errors”… only they do, they are actually unavoidable in active systems using sequential processing where parallel activities happen. They occur because of “asynchronous” amongst other things, and provided you both know and understand this the errors that arise can just be ignored without harm. Thus understanding that the “floor float graph” is about “relative change” not “absolute value” is kind of important to stop further consequential errors arising…

The thing is that those writing software mostly do not have a clue about what they are actually doing. Coding maybe but business logic rarely or not at all (something the RAD threw up almost every time).

Nor do most writing software understand the dangers of “state” and “asynchronous” (heck there was a very very good reason why HTML had “no state” and was designed to be fully “asynchronous” at the outset, and why I was telling people this back in the early 1990’s and why it was going to cause nasty issues if people tried “bolting state on” or “have client and server be synchronised”).

Then there is the failings of “moving validation to the left” out of “business logic” and not handling errors and exceptions as “expected thus recoverable events” (and why we have so many “Blue Screen of Death” fails).

Oh and don’t get me started on moving to the left out of the server and onto the client, that has caused more security vulnerabilities than can be catalogued…

ResearcherZero March 29, 2024 6:53 AM

@Clive

Probably ran the article through a grammar and spelling checker and it offered up some.
I think the word Wired was looking for was ‘circumstantial’ rather than centimeter. God knows what happened to the rest of the story. I guess that is released in a later edition.

“I think it’s pretty clear that [Evan] was picked up in order to be traded.”

From the unsubtle hints Moscow’s been dropping, it is clear that the Kremlin wants something – or rather someone – in return. That someone is thought to be FSB security service officer Vadim Krasikov, who is serving a life sentence for murder in Germany.

‘https://www.bbc.com/news/world-europe-68679483

“Dear Republican Senators of America. Ronald Reagan, who helped millions of us to win back our freedom and independence, must be turning in his grave today. Shame on you.”

‘https://apnews.com/article/poland-tusk-us-congress-ukraine-5a4b33bd76b03e35a376215e27b9746a

“I don’t like this reality,” Johnson said. “Vladimir Putin is an evil war criminal.”

https://apnews.com/article/putin-russia-republicans-ukraine-europe-trump-fbe56b789e7c37313ec158a00a571be4

‘https://www.ifw-kiel.de/publications/news/ukraine-support-tracker-europe-clearly-overtakes-us-with-total-commitments-now-twice-as-large/

“Yet, critics of aiding Ukraine fail to note that the enemies of America and its allies have united. China, Russia, Iran and North Korea have created an alliance. They share munitions, supplies, technology and financial tools, while coordinating military and diplomatic strategies worldwide.”

https://eu.usatoday.com/story/opinion/2024/03/28/ukraine-russia-war-us-military-aid-republicans-congress/73117310007/

“We [Russia and Iran] have signed an intergovernmental agreement on cooperation in ensuring information security.”

‘https://besacenter.org/russia-iran-intelligence-pact/

Echoes of the past…

Poland endured what few other European nations experienced, the dual occupation by Nazi Germany and the Soviet Union.

Between 1939–41 the Soviet Union and Nazi Germany undertook joint actions as outlined in the Molotov-Ribbentrop Pact and collaborated in the invasion and subjugation of Poland, a fact now willingly overlooked by Russian officials. Poles knew that although the reign of the Nazi scourge was coming to an end, it would be replaced by something equally sinister.

Soviet propaganda proclaimed that their invasion was a humanitarian exercise, but it wasn’t – it was a military invasion.

“There were a lot of casualties, a lot of deaths, and there were pitched battles between the two sides. It cannot be portrayed as a humanitarian operation.”

The two occupation regimes were essentially very similar, though they applied their brutality according to very different criteria. In the Nazi-occupied west, this criteria was racial. In the eastern Soviet-occupied zones, meanwhile, this criteria was class-defined and political.

https://www.historyhit.com/the-invasion-of-poland-in-1939-how-it-unfolded-and-why-the-allies-failed-to-respond/

ResearcherZero March 29, 2024 7:12 AM

@Clive

It could have also been a disguised warning regarding sexual repression and small sizes.

That might very well explain the unrestrained urge for conflict, chaos and destruction.

ResearcherZero March 29, 2024 7:35 AM

And speaking of short.

‘https://www.cbsnews.com/news/trump-media-dwac-merger-vote-3-5-billion-lock-up-cbs-news-explains/

Eriadilos March 29, 2024 10:23 AM

This might amuse
‘https://www.thisismoney.co.uk/money/bills/article-13244469/Why-people-hit-5-fines-counterfeit-stamps.html

The British Post office seems to be issuing stamps and marking them as counterfeit afterwards.

It looks to me like the QR codes are not read correctly either when the stamp is issued or when it is sent. The codes on the stamps also seem to lack the points of reference seen in regular QR codes, which may explain the lack of robustness of the system.

lurker March 29, 2024 1:26 PM

@JonKnowsNothing, @Clive

Subpostmasters are human, so there are probably a few that had a finger in the till, but surely not so many and so deeply as the shiny new Horizon system supposedly discovered. This suggests a major lack of commonsense in PO upper echelons. I coud never be in the PO upper echelons because my first question would be:

Why have our auditors let this much pilfering go on all these years?

Nor could I join those as I suggested in a post above, using Horizon to steal from the agents.

lurker March 29, 2024 1:38 PM

@Clive Robinson

“thousands of centimetres” = tens of metres

European GPS must still have the military fudging applied to civilian uses, or perhaps you’re all using the wrong brand of handset. In China and NZ I can routinely get GPS accuracies of two metres, within 30 seconds on a handheld phone.

Remember, the article was written in a country that can crash Mars landers from not being able to convert inches : centimetres, so even tho’ it’s a supposedly tech magazine they probably wouldn’t know how big a centimetre was if one fell on their head.

Ardie March 30, 2024 4:03 PM

vas pup regarding your March 26, 2024 6:59 PM

Did see your former post. Thanks. Agreed about the lack of stomach for and subsequent blindness toward truth, displayed by almost ALL of the otherwise clear thinkers on the planet.

Its a factor relied upon by “their side”: I called CSIS once and asked the receptionist if I could find out why they were stalking me. Without even a single thought she answered, “you need psychological help”, or words to that effect. I laughed and hung up.

Been 19 years of pointless vendetta seeking. Was served pine-sol at a coffee shop…

Cheers. Thanks again to you and everyone for your excellent thoughts.

Leave a comment

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.