Comments

Anders April 30, 2021 4:20 PM

Things seems to be very bad in India.

hxxps://www.nytimes.com/2021/04/24/world/asia/india-coronavirus-deaths.html

And this new strain B.1.617 is already in Europe too…

hxxps://www.dw.com/en/the-covid-variant-from-india-what-we-know-so-far/a-57313664

Brodie April 30, 2021 5:54 PM

Jaron Lanier’s Ten Arguments for Deleting Your Social Media is quite persuasive. Newspapers are better than news feeds, and social interactions with friends are better when unmediated and unmanipulated by third parties. But I think he misses something.

Part of the appeal of Web 1.0 were the social encounters with people very different from yourself—serendipitous, often trivial but not infrequently substantial and enduring. I’m thinking of IRC, bulletin boards, early instant messaging services with randomization features. It seems that most of this has shifted to social media, except not really—the nature of the interactions are generally more superficial, fleeting and largely focused on metrics of popularity.

Have you noticed this and if not—assuming you reject social media, as Lanier does—how and where so you socialize online?

SpaceLifeForm April 30, 2021 7:48 PM

@ Anders, JonKnowsNothing, Clive, MarkH, Winter, ALL

Sumptin, sumptin. No travel.

Any planes involved?

JonKnowsNothing April 30, 2021 8:59 PM

@SpaceLifeForm, @ Anders, Clive, MarkH, Winter, ALL

re: Travel

They snagged a few who did an end run through the Desert Air Shuttle System and closed that route.

They parked someone in the Bubble-Travel-Free-Zone that wasn’t a Bubble Traveler.

afaik They have not stopped any Bubble Jets for Rich Dogs, Big Dogs, Small Dogs (Mustard, Ketchup, Relish, Chili, Jalapeno, Sauerkraut or Bacon Wrapped), Burgers or Fries (Freedom, French or Poutine).

lurker April 30, 2021 10:40 PM

@Brodie

Newspapers are better than news feeds,…

Heck yeah! But I moved out of town after many years as a subscriber to home delivery of a printed paper, so they pestered me for a long time to subscribe to the paywalled version of their web offering. I complained that the menu structure was clunky, that I had no interest in what was trending, and would rather read a screen version of the printed page. They offered me at an outrageous price to email several hundred megabyte pdfs of each day’s edition.

My pleas that the same layout could be acheived at a tenth the file size in clean html fell on deaf ears…

For socializing on line I use email. Slow: the others know I’m not perched on the letterbox all day; and the only people who read it are Sender, Recipient, and the postman in California whom I trust to not directly enter the conversation…

Winter May 1, 2021 2:34 AM

@Lurker
“They offered me at an outrageous price to email several hundred megabyte pdfs of each day’s edition.”

Strange. Newspapers here in the Netherlands always include an online subscription with your paper subscription and allow online only subscriptions. And the online is a facsimile layout of the paper version, with some extra reading options.

I cannot see the advantage of not doing such a thing.

Maybe it is an American thing? Like Jack Nicholson trying to order a slice of toast without salad in a lunchroom, and not being allowed to get it under no circumstances (Five Easy Pieces?).

Reader_Zero May 1, 2021 5:03 AM

There’s a lot to unpack here, but if I may try to restate the core idea:

Encraption Hypothesis: “The behavior of entangled particles can be explained by each particle having an internal PRNG. Sometimes two or more particles’ PRNG states sync up in such a way that they do the same (or opposite) things when observed.”

This explains some – but not all – of the behavior of entangled particles. It explains how when faraway labs measure entangled particles, they always see the same random outcome (or the opposite random outcome, depending on the kind of entanglement). But, in the lab, we see particles doing things that can’t be explained by this model: violating bell inequalities.

Bell inequalities confuse me, so I prefer to talk about “nonlocal games” which are closely related to Bell inequalities and much easier for cryptographers to understand.

Here’s the setup. There are two players, Alice and Bob, who you can imagine are separated by lightyears of distance so they cannot communicate. In between, there is a Referee who challenges Alice and Bob to a game. The referee generates two truly random bits X and Y and sends X in Alice’s direction and Y in Bob’s direction. Alice and Bob each send a bit back to the Referee, and their replies have to come back fast enough for the Referee to be convinced they haven’t communicated with each other in the meantime (since information can’t travel faster than light).

Pictorially: Alice Referee Bob

Let’s call the bit Alice sends back “A” and the bit bob sends back “B”. They win the game if X AND Y = A XOR B.

How often on average can Alice and Bob win the game? It turns out that if you model Alice and Bob as probabilistic Turing machines (which you can, under the Encraption Hypothesis), then the best possible strategy wins 75% of the time. You can prove this by considering all possible deterministic strategies and then seeing probabilistic strategy outcomes as averages of different deterministic strategy outcomes (https://cs.uwaterloo.ca/~watrous/CPSC519/LectureNotes/20.pdf).

In the real world, if Alice and Bob share entangled particles, then they can win with ~85% probability. This is better than what they could do if they were probabilistic Turing machines, so if the Referee sees them winning this frequently, then the Referee can conclude Alice and Bob are more than just probabilistic Turing machines, and that the Encraption Hypothesis is false.

If you already understand quantum mechanics math, you can read this to see how they achieve ~85% probability of winning: https://sergworks.wordpress.com/2016/10/26/chsh-game-in-detail/

I’ll try to give an intuition in English about what’s happening.

Suppose Alice and Bob each have a photon, and the two photons’ polarizations are entangled. Alice and Bob can choose to measure their respective photons’ polarizations at any angles. For example, one of them can ask their photon “Are you polarized vertically or horizontally?” or instead they could ask “Are you polarized at a 45° angle or a 135° angle?” No matter what angle the photon is actually polarized at, they’ll always measure it to be in one of the two possibilities in the question they ask, and after they ask the question, the photon’s polarization changes to the state consistent with the answer.

Because of the entanglement, if Alice and Bob both ask the same question, e.g. they both ask “Are you polarized vertically or horizontally?” then they will get the same (random) answer. If they ask opposite questions, then they both get independently random outcomes.

They can also ask questions at angles in between “horizontal vs. vertical” and “45° vs 135°”. The more aligned their questions are, the more likely they are to get the same outcome. The more misaligned their questions are, the more likely their outputs are to be random and uncorrelated.

So the trick to winning the game is this: They choose which question they’ll ask their photons based on their input from the Referee, and they do this in a special way so that:

  1. If X AND Y = 1, then their questions will be more-misaligned and thus their answers will be closer to independently random, making it more likely that A XOR B = 1.
  2. If X AND Y = 0, then their questions will be more-aligned and thus their answers will be more likely to agree, making it more likely that A XOR B = 0.

This works experimentally, so we have to accept one of three things:

  1. The universe conspires to break the Referee’s random number generator so that X and Y aren’t actually random but are correlated in a way that let Alice and Bob win.
  2. Alice and Bob are communicating somehow.
  3. Alice and Bob can’t actually be thought of as two separate physical systems with their states independently described by probabilistic Turing machines.

(1) and (2) are called Bell test “loopholes” and scientists have been doing better and better experiments to rule them out. The latest in this series of experiments is https://thebigbelltest.org/ in which (1) would imply an insane conspiracy between the states of particles in the brains of people all around the world.

Anders May 1, 2021 10:25 AM

@SpaceLifeForm

Yep, planes are involved, because
important wealthy people flea India.

hxxps://www.businesstoday.in/current/economy-politics/covid-19-crisis-in-india-wealthy-indians-flee-country-by-private-jets-as-infections-spiral/story/437634.html

And of course they take this new strain with them.

We have it already here in Estonia now.

hxxps://news.err.ee/1608197008/daily-indian-coronavirus-strain-identified-in-estonian-lab-last-week

Gunnar Gunarsson May 1, 2021 10:56 AM

I agree. It just can’t be that the Russians can do something like the West or, in the worst case, even better. It also seems that one wants to specifically denigrate the vector vaccines, because they can be produced more quickly.
You can’t really rely on Brazil. There are more and more stories on the Internet that people come to the hospital with something else like urinary tract infection, then there is a positive quick test, and whack you are in the quarantine ward and are forcibly intubated even if you don’t want to / said devices all come from Germany ).

lurker May 1, 2021 1:19 PM

@Winter
Nope, I don’t know if it’s a Nth American thing, that’s not my patch; and I had already cancelled my physical delivery sub when I moved out of the delivery area. Snail mail is available at extra cost but not worth the extra delay. I go to a nearby town to buy the weekend bumper edition: newsprint has more uses than just reading…

vas pup May 1, 2021 5:38 PM

‘Stomp Reflex’: When governments abuse emergency powers

https://www.bbc.com/future/article/20210427-the-stomp-reflex-when-governments-abuse-emergency-powers

“There is one network of powerful agencies that particularly benefit from emergency powers. They include the big tech companies engaged in what Shoshana Zuboff of Harvard University calls “Surveillance Capitalism”: the mass collective, use and sale of private, personal data.

==>Big tech is joined by a cabal of intelligence agencies across the world who have gathered more data and power over the past decades. As was revealed in 2013, most intelligence agencies had used the war on terror and ensuing surveillance powers to construct an intrusive, global web of surveillance.

The greatest danger is that these become a state of exception in which the government transcends the rule of law. The entire Third Reich occurred during a state of emergency that lasted 12 years. It began in 1933 after Hitler
==>invoked Article 48 of the Weimar Republic, allowing for the use of emergency decrees without parliamentary approval.

Such a despotic drift is not uncommon. The abuse of emergency powers also marked the descent from Republic to Empire in Rome, the centralization of political power in the Middle Ages, and the entrenchment of previously oppressive regimes in countries such as Chile and apartheid South Africa.

==>Emergency powers tend to only go one way: top-down. During an emergency, the knee-jerk reaction is always to stomp-down, to reinforce those atop hierarchies in the state and significantly curtail the freedoms, voice and agency of citizens, often in a draconian fashion. I call this the “Stomp Reflex”.”

Read the whole article!

Winter May 2, 2021 4:22 AM

@Lurker
“They offered me at an outrageous price to email several hundred megabyte pdfs of each day’s edition.”

Strange. Newspapers here in the Netherlands always include an online subscription with your paper subscription and allow online only subscriptions. And the online is a facsimile layout of the paper version, with some extra reading options.

I cannot see the advantage of not doing such a thing.

Maybe it is an American thing? Like Jack Nicholson trying to order a slice of toast without salad in a lunchroom, and not being allowed to get it under no circumstances (Five Easy Pieces?).

Winter May 2, 2021 4:29 AM

Daniel
“I find it difficult to feel sorry for anyone who uses a networked refrigerator, oven, and whatnot. You don’t need all that crap, you just think you do.”

Catering and restaurant chains do need networked refrigerators, and the food-processing industry in general. Not only for what is still in store (just-in-time-delivery), but also what is still not gone stale, and how does the temperature behave.

And for consumers we are going from owning appliances to renting services. From owning heating and airco systems and lamps to getting the climate and lightening delivered to our apartments.

All such systems need to be networked.

Winter May 2, 2021 8:11 AM

@- (real one)
“As for the “creepypasta” type posts they have increased the page load time to over two minutes which definately makes it a form of Denial Of Service (DOS) attack.”

I have already noticed that the troll-tool posts a fake discussion and then tries to make the remainder of the thread difficult to read with space filling nonsense.

This suggests that most of the troll comments are not directed to the readers of this blog, but to search engines crawling the blog. The aim seems indeed to be to discredit the site and to destroy the search ranking. As Clive noticed, the attacks are directed at Bruce himself.

- (real one authenticated ;) May 2, 2021 9:17 AM

@Winter:

“This suggests that most of the troll comments are not directed to the readers of this blog,”

Yes and no, the time chosen to attack is when the Squid page is new, and often busy, and has been increasingly the focus of the blog for some time now.

Oh did you spot the Troll-Tool does not know the difference between a DOS and DDOS and one or two other tells, about their lack of well… Let’s just say lacking in all depts on display 😉

With regards,

“As Clive noticed, the attacks are directed at Bruce himself.”

Yes and from my memory for quite some time now, first it was personal attacks that were ignored, then it slowely increased, and was still ignored. Then shortly after the change from the old web site to this new one things took a turn for the worse, now we have this Troll-Tool nonsense.

But the attacks so far indicate who ever it is doing this is actually quite lacking in resources, knowledge, and ability. If you think back to what happened to Brian Krebs when he upset some “wanabe” the difference is significant.

As @Clive Robinson also indicated, we just gather more information as the Troll-Tool leaks it out, the mistakes when they get angry are almost amusing.

Winter May 2, 2021 10:05 AM

@- (real one)
“But the attacks so far indicate who ever it is doing this is actually quite lacking in resources, knowledge, and ability.”

I noticed a slowly changing textual strategies, as if the troll-tool has to adapt to learning text-filters. That might also explain the holes in the comment numbers when large numbers of comments are posted in succession. It might indicate some comments trigger the spam filters and the troll-tool then changes the text creation strategy again.

Clive Robinson May 2, 2021 11:01 AM

@ Ismar,

As the evidence mounts up it’s looking more and more like the “Cuban Mystery Weapon” is not “Cuban” but backed by another state level entity.

I’m assuming a directed energy weapon that’s either acoustic or EM.

The problem is “collimating” the signal from a point source to a tight beam especially as the opperators of such a device will suffer from the issue of it being “radient” thus the power drops as the reciprocal of the distance squared (ie coverage area).

The photograph in the article makes it look like it has to work over atleast 100meters and through glass and masonry. So if you are operating it you are at, around 0.5m from the device which is 1/200th of the range ir needs to cover to be effective / harmful which means the front to back ratio and that of any side lobes or dish spill over would need to be 1/40000th or better than 46dB down to be of the same harm level (actually it needs to be about a further 27dB down due to near field issues so -74dB depending on wavelength[1]).

Either the device is going to be large or the operators are going to be wearing Compton suits (Faraday shield) both of which are kind of noticeable. So you would expect some of the myriad of CCTV cameras in DC to have picked it up…

Which begs the question,

“If not, why not?”

[1] If you look at a microwave oven the cavity is nearly all “near field” operating, the maths is dull but the near to far field transition as a rule of thumb is at 2C/f where C is the speed of light and f the RF frequency. The gain of an antenna is even duller maths but with a dish it goes up with the area of the illuminated face thus aproximates to kr^2 where k is the shap factor of the dish illumination, and r the radius. So with a circularly illuminated dish it’s the old “area of a circle formular and k = pi. A little mental gymnastics gives an approximate dish size relating to the wavelength and required gain, or you can look it up,

https://www.electronics-notes.com/articles/antennas-propagation/parabolic-reflector-antenna/antenna-gain-directivity.php

But a gain of 70db at a 13cm wavelength is going to be big… A rough rule of thumb is 4ft diameter is 30dB@2.4Ghz and each doubling of the diameter adds 6dB. So (70-30)/6 ~= 6.66 so 4 x 2^6.66 is ~400ft which is way to big. So ten times the frequency or 24GHz will give you the gain… But then you run into other issues.

But what ever you do the device is not going to be small, which means a truck or large van with fiberglass backbody.

Winter May 2, 2021 11:02 AM

@JonKnowsNothing
“it completely obscures several posts that surround it producing a blackout/paint-over effect.”

That seems to be the intent. Until the comment filters are updated to catch the relevant Unicode garbage.

Here are regex to catch Zalgo text:

hxxps://stackoverflow.com/questions/61519041/regex-to-detect-zalgo

Online tool:
hxxps://onlineunicodetools.com/remove-zalgo-from-unicode

V May 2, 2021 11:35 AM

@ JonKnowsNothing

> the Zalgo Text as rendered on my system is now so densely
> packed that it completely obscures several posts that
> surround it producing a blackout/paint-over effect.

This is true in Goog Chrome as well as Chromium. Firefox keeps the garbage post contained in its own area.

Imho the easiest way to mount an attack like this one is to have one crazy person using a bunch of aliases – perhaps with the aid of a bot, but probably just pre-planned drivel and [Ctrl-C], [Ctrl-V].

Winter May 2, 2021 11:50 AM

@V
“Imho the easiest way to mount an attack like this one is to have one crazy person using a bunch of aliases – perhaps with the aid of a bot, but probably just pre-planned drivel and [Ctrl-C], [Ctrl-V].”

That sounds like a very accurate description of the person and the procedure.

Winter May 2, 2021 12:34 PM

@Homer J
Warning!

Never click on opaque links!

If you cannot see where a link leads, it might be intended to harm you.

- May 2, 2021 12:57 PM

@ Winter:
@ALL:

“Never click on opaque links!”

Agreed, you might renember it’s been suggested that the @Moderator stops giving URL’s out as clickable links because some one on a smart device trying to skim through the other crud could very easily accidently effectively click on it.

But have you actually looked at the URL?

Have you noticed it’s effectively in two parts either side of the “?”, with the first part being the actual path to the object (.jpg), and the secobd part apparently random crud?

Well quite often such random crud is in effect an ID Tag containing sufficient information about the user for it to be effectivly unique to them…

1&1~=Umm May 2, 2021 1:34 PM

@JonKnowsNothing, @MarkH, @SpaceLifeForm,

You might want to watch,

https://m.youtube.com/watch?v=i195K2vYfnY

Note the date of end of August 2019 for Lombody, it kind of explains why things happened the way they did. Remember it is a well peer reviewed paper and can be tested again if people claim it’s not true.

It also makes many claims about from a lab a whole lot less credible, to the point one has to say their speculation lacks not just evidence but credibility.

Winter May 2, 2021 1:50 PM

@1&1
“Note the date of end of August 2019 for Lombody, ”

Not impossible, given the traffic between China and Lombardi. However, good anti-body tests are difficult.

Joe K May 2, 2021 2:34 PM

@-

it’s been suggested that the @Moderator stops giving URL’s out as
clickable links because some one on a smart device trying to skim
through the other crud could very easily accidently effectively
click on it.

Yes. I too think it is terrible when the web is actually functional.

Some people use crap devices. Therefore Management should ban hyperlinks from the forum. This will improve things for everyone. Permit me to share with you this recent picture of me and my giant brain:

https://i.redd.it/d46r28zx0iw61.jpg?brain=VeryGalaxy&user=me

vas pup May 2, 2021 4:43 PM

@FTC • May 2, 2021 9:34 AM
Any suggestion to other similar blog?
Thank you!

Unfortunately, policy is not applied consistently.

Sometimes post deleted not because of the facts, but just based on Bruce’s and/or Moderator opinion.

That is fine – that is his blog, but we do have two eyes and two ears to see and listen not one sided.

Let me tell bitter joke. Two friends are sitting in the bar, #1 asked: ‘have you read ‘1984’? #2 ‘no’.#1: ‘you don’t need to. Just look outside the window.’

Ismar May 2, 2021 5:21 PM

@Clive

“ So if you are operating it you are at, around 0.5m from the device which is”

or the device itself can be operated remotely

lurkwr May 2, 2021 7:30 PM

@Clive:
MSM carried reports over the weekend suggesting the “device” was a form of mass hysteria. They promised they wouldn’t, but if they published a report that Havana syndrome had been observed somewhere, then the reports would come flooding in of people who had also experienced it. I couldn’t say, I keep well away from those places…

Freezing_in_Brazil May 2, 2021 8:37 PM

@ Gunnar Gunnarson

You can’t really rely on Brazil. There are more and more stories on the Internet that people come to the hospital with something else like urinary tract infection, then there is a positive quick test, and whack you are in the quarantine ward and are forcibly intubated even if you don’t want to / said devices all come from Germany ).

Those are only, as you say, Internet stories.

These false narratives are unbelievably simplistic. Forced intubations? Come on. I’m surprised to see a SoS blog participant posting such nonsense. No offense.

SpaceLifeForm May 2, 2021 9:05 PM

Test

~!@#$%^&*()_+{}|:”?`-=[]\;’,./

~!@#$%^&*()_+{}|:”?`-=[]\;’,./

SpaceLifeForm May 2, 2021 9:18 PM

test2

~!@#$%^&*()_+{}|:”?`-=[]\;’,./

~!@#$%^&*()_+{}|:”?`-=[]\;’,./

SpaceLifeForm May 2, 2021 9:31 PM

test3

~!@#$%^&*()_+{}|:”<>?`-=[]\;’,./
~!@#$%^&*()_+{}|:”<>?`-=[]\;’,./
~!@#$%^&*()_+{}|:”<>?`-=[]\;’,./

SpaceLifeForm May 2, 2021 9:42 PM

test4

~!@#$%^&amp;*()_+{}|:”?`-=[]\;’,./
~!@#$%^&amp;*()_+{}|:”?`-=[]\;’,./
~!@#$%^&amp;*()_+{}|:”?`-=[]\;’,./

SpaceLifeForm May 3, 2021 12:12 AM

@ 1&1~=Umm, JonKnowsNothing, MarkH

Good link. Recommend everyone watch it.

It all fits. As I said, satellite imagery indicated it had started in Wuhan in July-August 2019 (unexpected amounts of cars in Wuhan Hospital parking lots). Plenty of silent spreaders during warm northern hemisphere summer into fall. Enough silent spreaders travel from Wuhan to northern Italy for the seasonal work.

It’s when it got cold, and more people spent more time indoors, the viral aerosol levels kept increasing indoors, and more and more people got really sick.

Winter May 3, 2021 12:27 AM

Troll tool Sunday May 2
First post: May 2, 2021 2:24 AM
Last post: May 2, 2021 3:56 PM

That is 13 hours. Let’s take it to be local time 9:24-22:56 (it is a Sunday). The servers of SoS have local time GMT-5. So we can hypothesize that our Troll tool lives on time zone GMT+2 +/- 1h). Which suggests Finland, Baltic, Eastern Europe, Greece, down to South Africa. And, possibly neighboring time zones.

Weather May 3, 2021 1:59 AM

@slf
The posts above look like Iis fingerprint, but it has to be less than 8 with the last two chars numbers.

Winter May 3, 2021 2:21 AM

@slf
“I’d go with GMT+3. NO DST.”

I forgot. Sounds plausible.

That suggest the Saint Petersburg Troll Factory. Reports on working shifts at the Troll Factory vary, some report 11 or 12 hour shifts, 9-21h, 21-9h. Others 9-21h day shift and 21-6h night shift. There might be some overlapping shifts to prevent hard cuts.

So, our Troll Tool’s 13 hour work day might be the result of a small team posting fake “discussions” with slightly shifted work times.

On the other hand, reports about the Troll factory imply much more sophisticated approaches than what we experience. Maybe he is just an amateur?

hxxps://www.nytimes.com/2018/02/18/world/europe/russia-troll-factory.html

hxxps://kremlintrollconfessions.wordpress.com/2018/06/15/kremlintroll-trollfactory-kremlintrollconfessions-work/

hxxps://www.rferl.org/a/russian-troll-factory-hacking/31076160.html

hxxps://meduza.io/en/news/2016/08/16/another-former-employee-is-suing-russia-s-troll-factory

hxxps://www.diis.dk/en/my-life-as-a-troll-lyudmila-savchuk-s-story

Clive Robinson May 3, 2021 2:50 AM

@ Ismar,

or the device itself can be operated remotely

Yes but two probs,

1, Once clear of the radient source the levels drop at the same 1/(r^2) as it does for the targets.

2, It becomes more of a “fixed instalation” thus harder to deploy secretly.

My thoughts are as I said in the back of a fiberglass body large van with the engine running (based on US anti-crowd non-leathal weapons using microwaves you are looking at a 100kW power source). The driver “ready to drop the clutch, with an oppo in the passenger seat being the weapons officer. Basic camouflage would be say a well known delivery or phone/cable company such as UPS AT&T etc. UPS has the advantage that leaving the engine running would not be unexpected if you do it the right way (remember they only need a few seconds to a couple of minutes to give several hundred high energy “boxer punch” pulses to cause micro damage to the brain that can only be detected by autopsy currently (see what the NFL went through a few years back).

Weather May 3, 2021 3:37 AM

@clive ismar
It could be coffee and sleep depreciation, based on coffee , like light sleeping and been awaken by minor noises.

Clive Robinson May 3, 2021 3:46 AM

@ Weather,

It could be coffee and sleep depreciation, based on coffee, like light sleeping and been awaken by minor noises.

I would not rule anytging out, but some involved were “my body is a temple” types who don’t drink coffee or tea etc, nor do they do sugar etc. Also the attacks have happened at all times of the day…

My aim is as usual to look at what the laws of natute/physics alow or don’t, and what constraints like physical size, power input etc they add to the mixture.

Winter May 3, 2021 4:56 AM

The Troll Tool is late today:
May 3, 2021 4:33 AM
May 3, 2021 4:37 AM

The first is the customary “maybe/could be” type of research papers trying to blame the Chinese for creating the virus. This is in a low impact factor journal (1.5, which is very low for a medical journal)

The second is an upshot to disinformation comments about vaccines being as dangerous as SARS2 itself. The journal of the study has an impact factor of 14.5, which is good, but neither links says anything about vaccine. And we already know that vaccines have blood clothing complication rates in less around 1:200,000. Which is much lower than the risk from having COVID itself.

hxxps://www.cbsnews.com/news/covid-vaccine-blood-clots-risk-disease/

Note how intentionally dangerous this disinformation is:
Miami school bars vaccinated teachers from seeing students
https://www.bbc.com/news/world-us-canada-56905752

Pennhurst Resident May 3, 2021 5:17 AM

A potential SARS-CoV-2 variant of interest (VOI) harboring mutation E484K in the Spike protein was identified within lineage B.1.1.33 circulating in
Brazil

https://www.biorxiv.org/content/10.1101/2021.03.12.434969v1

Summary

The SARS-CoV-2 epidemic in Brazil was dominated by two lineages designated as B.1.1.28 and B.1.1.33. Two SARS-CoV-2 variants harboring mutations at the receptor-binding domain of the Spike (S) protein, designated as lineages P.1 and P.2, evolved within lineage B.1.1.28 and are rapidly spreading in Brazil. Lineage P.1 is considered a Variant of Concern (VOC) because of the presence of multiple mutations in the S protein (including K417T, E484K, N501Y), while lineage P.2 only harbors mutation S:E484K and is considered a Variant of Interest (VOI). Here we report the identification of a new SARS-CoV-2 VOI within lineage B.1.1.33 that also harbors mutation S:E484K and was detected in Brazil between November 2020 and February 2021. This VOI displayed four non-synonymous lineage-defining mutations (NSP3:A1711V, NSP6:F36L, S:E484K, and NS7b:E33A) and was designated as lineage N.9. The VOI N.9 probably emerged in August 2020 and has spread across different Brazilian states from the Southeast, South, North and Northeast regions.

Competing Interest Statement
The authors have declared no competing interest.

Clive Robinson May 3, 2021 5:38 AM

@ SpaceLifeForm, JonKnowsNothing, MarkH, ALL,

1&1~=Umm :

Good link. Recommend everyone watch it.

You will love this not…

A group of UK MP’s have said that opening up air travel for vacations is very unwise (they can obviously read facts and draw logical conclusions).

But a UK Government Minister is saying that the groups chairperson is “obviously projecting” and that “the Government” is “taking measures and precautions”…

Yeh, right, just like they have donre all along, where “taking measures” is apparently code speak meaning the same as “taking brown enevlopes and other inducments” and the “precautions” being equivalent to “not getting caught sucking of a lobbyists teat”.

Seriously unimpressed…

Even less so with easing up restrictions on funerals… Some cultures that just happen to be where the new highly suspect variants are infecting as many as half a million people a day, have certain rituals regarding funerals that involve very large numbers of people, touching, kissing things and other behaviours guarenteed to spread infection as well as very large numbers of people…

Oh and the news also mentioned almost as an after thought… That people in Iselworth West London close to Heathrow Airport, an area very popular with immigrants from India and Pakistan, with very dense multi generational housing quite a number of whom work at the airport and local transport hubs, should get tested fairly urgently. Because apparently there is community spread of a new Indian mutation… That is moving up to become a contender for a serious VoC (it would already be so but certain parties are fighting hard to stop it being said “officially”).

And just to prove you can not make it up, Pfizer is prommising 50million USD help for India, but… Their vaccine is not approved in India and likewise most other medicines they might offer are either not made or are actually manufactured in India or the components are, so it sounds like a “paper shifting excercise” rather than real aid.

What India needs is oxygen production and delivery systems, oh and to get off of the remdisiver fixation[1] that is building up so much debt I doubt it will get cleared in any readers lifetime.

[1] The drug as an antiviral only does any good in the very early stages of COVID infection. By the time most people in India are going to hospital it is way to late, if they get into hospital they are hours away at most from death by oxygen deprivation and their bodies are in deep shock with in quite a few cases secondary infection already causing septic shock… Thus the only thing that will keep them alive is oxygen therapy and even then it’s doubtfull they will survive the shock, and if they do it could be weeks or months they tie up the way too few hospital places even in ordinary times.

Joe K May 3, 2021 6:58 AM

Steven Murdoch, at University College London’s infosec blog, writes about a recent judgement overturning on appeal some few of the convictions of close to one thousand subpostmasters (branch managers) prosecuted for decades by the UK post office, apparently on the basis of unreliable evidence, and suggests we think about design criteria for …

“Evidence Critical Systems: Designing for Dispute Resolution”
https://www.benthamsgaze.org/2021/04/27/evidence-critical-systems-designing-for-dispute-resolution/#content

I haven’t yet seen any mention of this UK post office affair here on Bruce’s blog. I (briefly) searched and got nothing. Has there been some earlier discussion that I’ve missed?

Full post is 7 short paragraphs total, and includes links to much more. Some excerpts from Murdoch’s blog post:

On [23 April 2021] 39 subpostmasters had their criminal convictions overturned by the Court of Appeal. These individuals ran post office branches and were prosecuted for theft, fraud and false accounting based on evidence from Horizon, the Post Office computer system created by Fujitsu. Horizon’s evidence was asserted to be reliable by the Post Office, who mounted these prosecutions, and was accepted as proof by the courts for decades. It was only through a long and expensive court case that a true record of Horizon’s problems became publicly known, with the judge concluding that it was “not remotely reliable”, and so allowing these successful appeals against conviction.

Perverse incentives to keep the Horizon system’s “evidence” unfalsifiable:

The causes of this failure are complex, but one of the most critical is that neither the Post Office nor Fujitsu disclosed the information necessary to establish the reliability (or lack thereof) of Horizon to subpostmasters disputing its evidence. Their reasons for not doing so include
* that it would be expensive to collect the information,
* that the details of the system are confidential,
* and disclosing the information would harm their ability to conduct future prosecutions.

It is unclear to me what sources indicate that particular triad of “reasons”, though I’ve only begun looking at linked material. Are these just Murdoch’s personal speculation/observation? I mean, they might not be wrong, as far as they go. But on the other hand they sound so familiar, so similar to (say) any three letter agency’s boilerplate mystification (bad-faith excuses), deployed to protect a totemic oracle from scrutiny.

As far as reasons go, I’d tend to consider instead the benefit authorities derive from waving around digital purported “evidence”. It’s like a sceptre revered by the cargo-cult, a holy artifact of the office.

Be that as it may, Murdoch suggests some distinctions between safety-criticality (comparatively well-studied) and what he calls evidence-criticality (overdue for development):

We already know how to build safety-critical systems, but doing so is expensive, and it would not be realistic to apply these standards to all systems. The good news is that evidence-critical engineering is easier than safety-critical engineering in several important ways.
* While a safety-critical system must continue working, an evidence-critical system can stop when an error is detected.
* Safety-critical systems must also meet tight response-time requirements, whereas an evidence-critical system can involve manual interpretation to resolve difficult situations.
* Also, only some parts of a system will be critical for resolving disputes; other parts of the system can be left unchanged.
Evidence-critical systems do, however, need to work even when some individuals are acting maliciously, unlike many safety-critical systems.

Clive Robinson May 3, 2021 7:14 AM

@ Joe K,

Has there been some earlier discussion that I’ve missed?

I’ve mebtioned it a couple of times, mainly in regards to what happebed to sebior managment who fully knew what was going on but were happy to see those who ran post offices go to jail for crimes they had most certainly not committed.

I will not mention the name of the woman who was in charge, apparently she obtained some kind of injunction.

Lets just say she has gone on to other senior managment posts related to UK Gov policy and has failed in those as well.

My feelings are she should be locked up for a minimum as the agregate of all the sentences passed on the innocent, all fines should come out of her and her families assets and preferably she be kept in the same conditions that the UK Governmebt are inflicting on Julian Assange.

Is she deserving of such harsh treatment… Well it was she and the UK Government started it to scare people into silence etc, so “what gors around comes around” and perhaps it might discorage other self entitled sociopaths from such behaviours.

AL May 3, 2021 9:38 AM

@Winter
Re: May 3, 2021 4:33 AM
I checked out the author, and seems distinguished in genetics. He seems to be to genetics what Bruce Schneier is to security.
As to the paper itself, it is not talking about what is possible, but what is likely. I saw two main points out of many. First, the Covid-19 virus contains a furin cleavage piece with parts that are a genetic match to MERS. The research assigns a probability of that occurring through natural evolution at 0.0039

The overall probability harboring the same nucleotide sequence in these two positions is 0.0039.

The other piece is pretty much what many are saying, a virus that jumps from animal to human normally is not ideally adapted to human cells. So, versus what it possible with what is likely, it is more likely that this virus was passed through humanized animals.

It’s unfortunate that Trump was the first person who made the lab hypothesis widely known, because everybody retreated to their respective tribes, and people, including myself called it a conspiracy theory.

But the evidence is not adding up. Washington Post, ABC news(US) and others are pivoting to the lab hypothesis.

Amongst the dumbest thing I ever heard of was in American politics in 2004, where it was stated that it is better to stick to an incorrect policy instead of “flip-flopping” to something more intelligent. Flip-flop is good. I flip-flopped to the lab hypothesis a while ago.

I’ll flip-flop again back to the natural infection hypothesis if the evidence points in that direction, but I’m not seeing it. I think genetic science is going to solve this. Hopefully, we’ll see more research in this area.

As far as blaming China is concerned, I see “Together with US scientists (who were even in charge of this)…”

Winter May 3, 2021 10:11 AM

@All
“The other piece is pretty much what many are saying, a virus that jumps from animal to human normally is not ideally adapted to human cells. So, versus what it possible with what is likely, it is more likely that this virus was passed through humanized animals.”

Viruses jumping hosts successfully is extremely unlikely. However, it happens every year with influenza and a host of other animal viruses, and periodically with Ebola etc, and at least 5 times with Coronal virusses (1-4 common cold virusses SARS1 and less successfully MERS). Every zoonosis is such an example, and almost every human transmittable disease comes from a zoonosis.

And viruses recombining unlikely? That is how viruses work. And bats are literally loaded with viruses that recombine and evolve:
hxxps://www.news-medical.net/news/20210308/How-do-viruses-evolve-in-bats.aspx

hxxps://journals.plos.org/plosbiology/article?id=10.1371/journal.pbio.3001115

So, a single author paper in a low impact factor journal claiming SARS2 was developed in a petri disk because he thinks

It is highly unlikely that this complex scenario that facilitates the virus entrance was gained in a single step and in an intermediate animal host.

does not cut it for me. No one claims it was a single step, and we still do not know which intermediate animal(s) was/were involved and how much time it took. And he does not offer ANY evidence besides “unlikely”.

It smells too much like “Human Creationism” to me. Talk to any biologist and claim some things “need human intervention because nature cannot do that”, and she will laugh out loud.

Btw, the message of the article is:

Even though evidence is lacking that the virus was intentionally genetically engineered, the possibility that the virus could have emerged unintentionally through laboratory experiments should lead to a rethinking of the need for gain-of-function experiments aimed at enhancing the pathogenicity of a disease-causing agent.

That is just common sense SOP Biosafety level 4 thinking. And I agree fully.

JonKnowsNothing May 3, 2021 10:18 AM

@Joe K, @Clive, @All

re: UK Post Master debacle

The High Mistress of the Debacle earned plenty of lolly during the period of incarcerating her own employees, held high level grifting positions on boards, and ranked high in the worshiping profession.

She no longer does any of those activities but kept the lolly. She has supposedly said she is sorry.

The bigger point has been circulating for a while:

The Trust that the Computer is Always Right.

The Cellbrite Problem has exposed more of the “Trust, Maybe Not” and moving towards “Faux”.

In Australia, their RoboDebt system has similar hallmarks. A hidden algorithm, using unsound and illegal accounting maths, charged a huge swath of their citizens with fraud, garnishment recovery of supposed over payments and years of penury. It was officially stopped and then reinstated and still churns out wrong accusations using secret methods.

In the UK they have more programs run under hidden systems, that denies citizenship and residency permits to their own citizens, deports them at will and refuses to remedy these false charges even when ordered by the courts.

The USA is no angel in this regard. We still run on the assumption that if the information was provided in a computer generated printout/pdf/log that it is correct. We do the same things: charge people with embezzlement, jail them, rip their citizenship away and deport them to ancestral homelands.

There is almost nothing an individual can do to fight these “stipulated” statements in court and the algorithms are patently incorrect. The LEOs/Government perpetrators of these systems are not innocent, they and the corporations that provide the software know that the systems are subject to false data and false targeting.

The money is just too good to pass up and doesn’t bother them that they ripped apart other people’s lives to get it. It’s all justified and justifiable.

===

ht tps://en.wikipedia.org/wiki/Stipulation

In United States law, a stipulation is a formal legal acknowledgment and agreement made between opposing parties before a pending hearing or trial.

For example, both parties might stipulate to certain facts and so not have to argue them in court. After the stipulation is entered into, it is presented to the judge.

In other legal systems, a similar concept is referred to by different names.

ht tps://en.wikipedia.org/wiki/Fingerprint#Validity

The validity of forensic fingerprint evidence has been challenged by academics, judges and the media. In the United States fingerprint examiners have not developed uniform standards for the identification of an individual based on matching fingerprints. In some countries where fingerprints are also used in criminal investigations, fingerprint examiners are required to match a number of identification points before a match is accepted. In England 16 identification points are required and in France 12, to match two fingerprints and identify an individual. Point-counting methods have been challenged by some fingerprint examiners because they focus solely on the location of particular characteristics in fingerprints that are to be matched. Fingerprint examiners may also uphold the one dissimilarity doctrine, which holds that if there is one dissimilarity between two fingerprints, the fingerprints are not from the same finger. Furthermore, academics have argued that the error rate in matching fingerprints has not been adequately studied. And it has been argued that fingerprint evidence has no secure statistical foundation.[25] Research has been conducted into whether experts can objectively focus on feature information in fingerprints without being misled by extraneous information, such as context.

Fingerprints can theoretically be forged and planted at crime scenes.

ht tps://en.wikipedia.org/wiki/Chimera_(genetics)
aka: I am my own Twin

A genetic chimerism or chimera is a single organism composed of cells with more than one distinct genotype. In animals, this means an individual derived from two or more zygotes, which can include possessing blood cells of different blood types, subtle variations in form (phenotype) and, if the zygotes were of differing sexes, then even the possession of both female and male sex organs (this is just one of many different phenomena that may result in intersexuality). Animal chimeras are produced by the merger of multiple fertilized eggs. In plant chimeras, however, the distinct types of tissue may originate from the same zygote, and the difference is often due to mutation during ordinary cell division.

Normally, genetic chimerism is not visible on casual inspection; however, it has been detected in the course of proving parentage.

… [of particular interest] …

In 2012, the first example of a naturally-occurring RNA-DNA hybrid virus was unexpectedly discovered during a metagenomic study of the acidic extreme environment of Boiling Springs Lake that is in Lassen Volcanic National Park, California. The virus was named BSL-RDHV (Boiling Spring Lake RNA DNA Hybrid Virus). Its genome is related to a DNA circovirus, which usually infect birds and pigs, and a RNA tombusvirus, which infect plants. The study surprised scientists, because DNA and RNA viruses vary and the way the chimera came together was not understood.

(url fractured to prevent autorun)

Winter May 3, 2021 10:25 AM

@Jon, Clive, Ismar
“The High Mistress of the Debacle earned plenty of lolly during the period of incarcerating her own employees, held high level grifting positions on boards, and ranked high in the worshiping profession.”

Was one of the battle cries of Brexit not “Take back control” and cursing Brussels rules.

I assume the rules to fight included those planned to curb all kinds of financial misconduct and human rights violations, like those involving guarantees to a fair trial.

Winter May 3, 2021 10:40 AM

@Jon
“The study surprised scientists, because DNA and RNA viruses vary and the way the chimera came together was not understood. ”

That is biology: Every rule has exceptions (even that rule) and whatever weird thing you imagine, you will find something even weirder.

For instance, squids and octopuses are weirder than can be imagined.

JonKnowsNothing May 3, 2021 10:50 AM

@Ismar, @Clive, @All

re: Unexplained Boxer Punches

iirc(badly) tl;dr

Some years ago, a dairy farmer had sudden deaths in his herd. It didn’t happen often but it happened more often that it should have because he took excellent care of his cows. He would find them dead, and the necropsy showed some died from cardiac arrest.

Cows are not cheap and cows with special breeding or genetic traits are even more expensive. As there was no sign of predation, there wasn’t anything the farmer could do other than buy replacement animals.

It took the farmer a long while to find a pattern to the deaths. He eventually decided it had to do with the electrical lines running over the cow barn. The electrical company checked the lines, all good, not us. More cows died.

Farmers can be stubborn and this one didn’t give up just because the meter said all was good. He kept track and traced and monitored the deaths and hired someone who could help sort out what the problem was. The farmer still believed it was the electrical lines over the barn.

The consultant checked everything, more than once and there didn’t seem to be any issues and the farmer just had bad luck with his herd… until they found the problem.

There was an underground cable running nearby and during a storm with lightening, the electrical lines over the barn would arc to the underground cable. Any cow standing near the location got the full blast. (1)

They rerouted the overhead lines away from the farmers barn and the sudden deaths ended.

===

1, Anything standing nearby would have gotten the blast but most folks go indoors during a storm.

Freezing_in_Brazil May 3, 2021 11:32 AM

@ Clive Robinson

Open your eyes not just to when it was posted but the “writing style”, and the handle used… I’m sure others will tell you what they think, in fact some have posted to the fact they think it’s a Troll-Tool comment…

Absolutely, my friend. I posted without reading the entire thread [my bad]. I was actually in the middle of the attack. When I realized the trolling it was already too late…

AL May 3, 2021 12:10 PM

@Winter
Re: “And viruses recombining unlikely? That is how viruses work.”
That wasn’t the contention. There is a contention that a specific recombination with a particular nucleotide sequence has a 0.0039 probability of occurring in nature. That specific contention isn’t refuted by generalities. Hopefully, another geneticist will chime in to refute or corroborate. This contention seem pretty binary, it is either “yes” or “no”.

Winter May 3, 2021 12:47 PM

@Al
“There is a contention that a specific recombination with a particular nucleotide sequence has a 0.0039 probability of occurring in nature. ”

Calculating that probability for a virus under evolutionary pressure in an unknown environment? You would also have to know all other possible solutions to the viral fitness question. I think that probability is purely speculative (or guesswork).

Actually, given the number of viral sequences in nature (~10^30), it is pretty well possible that there are already a large number of them floating around, just waiting to bump into a receptive virus. And people living close to animals is not very different to viruses in petri dishes.

I do not see the difference to Creationists claiming the eye, or some enzyme, could never have been evolved by chance.

PS, how many tries in how many viral strains make this p=0.0039 a near certainty?

Winter May 3, 2021 12:51 PM

@Al
“Hopefully, another geneticist will chime in to refute or corroborate. This contention seem pretty binary, it is either “yes” or “no”.”

Sorry, scientists never give binary answers. You cannot prove a negative, for one thing. We cannot prove something never happened. But we have a number of world-famous virologists investigating the origins of SARS2 in Wuhan. They said the lab origin was the less likely cause, and an animal to human jump was by far more likely.

AL May 3, 2021 2:55 PM

@Winter
Here we go with generalities again. Some things can’t be answered by “yes” or “no” (really true/false) and other things can.

I don’t have the expertise to 2nd guess a renounced geneticist. And I think that is the field, not virology that is going to resolve this matter.

As far as that “world-famous virologists” in Wuhan, the one American was the scientist that supervised the U.S. financed gain-of-function research at Wuhan. Conflict of interest much? Everyone in China was hand picked and approved by China. And now we’re supposed to investigate frozen meat for the next year? Well, we can multitask. The virologists can do their work, and the geneticists can do theirs. We don’t need to be in China for the geneticists to determine what is possible and what is impossible regarding that virus.

And I notice these virologists are long on opinion and short on evidence. I believed them until the evidence started rolling in.

SpaceLifeForm May 3, 2021 4:28 PM

@ Moderator

Excellent cleanup in aisle 13. You even got the imposter of me. Of course, it was obvious.

You can zap my test comments above if you want. I have my notes. After doing view source.

(note for others that do view source: At least with FF, when you do a view source, FF actually pulls the page again, AND caches it! So, it is possible that view source does not reflect current page. The normal rendered page in one tab can get out of sync with the view source tab. Force a refresh on the view source tab)

The HTML pre tag is completely broken.

Consider a mod:

Have two buttons for comment options.

One button is ‘use html’.
One button is ‘use markdown’.

Default: both buttons on. Current behaviour. Where they step on each other.

Both off: Pure plain text. No magic. And I mean no magic, no unneeded filtering and or conversion. Remember, 7-bit ASCII is valid UTF-8.

There is a really strong reason to do this that I will not expound on at this time other than to say it can become useful in repelling the Troll-tool.

SpaceLifeForm May 3, 2021 5:06 PM

Silicon Turtles

Fast is not secure. Disable SMT.

https://comparch.org/2021/05/01/i-see-dead-uops-thoughts-on-the-latest-spectre-paper-targeting-uop-caches/amp/

The problem with having a uop cache is that it adds an observable timing side-channel into the mix. Depending upon which instructions are executing, they may be fetched from the uop cache, or they may have to be decoded directly from the x86 macro ops. Worse, the uop cache is populated during instruction fetch/decode prior to any part of the backend getting involved. This means that existing “Spectre” mitigations that rely upon controlling execution happen too late in the pipeline – the offending uops are already present by then.

farm cowork May 3, 2021 5:27 PM

How the process continues depends on the selected strategy. In the divide and query strategy, each question refers to one inference that can be either correct or wrong. The different answers are transmitted to the debugger with the answers

(yes .)
(no .)

If the question asked is too difficult, the user can avoid to answer it with

(don’t know .)

In addition to these general answers, others can be introduced depending on the kind of question. If it corresponds to the application of a statement, instead of just answering yes, we can also trust some statements on the fly if we decide the bug is not there. To trust the current statement we answer

(trust .)

If a question refers to a set of reachable terms and one of these terms is not reachable, the user can point it out with the answer

(I is wrong .)

http://maude.sip.ucm.es/debugging/

When in doubt, tell the truth. If it’s not fun, you are doing it all wrong.

vas pup May 3, 2021 5:47 PM

Analysis: Russia’s secret services betray their weakness

https://www.dw.com/en/analysis-russias-secret-services-betray-their-weakness/a-57417994

“In the age of social media, video surveillance and ubiquitous online communication, data protection and privacy =>are under threat. The same applies to the state secrets of murderous intelligence services. This has been demonstrated by the British investigative online platform Bellingcat and its research.

!!!!Social media channels, images posted online and video footage, as well as communications and travel data exchanged on the internet have enabled Bellingcat journalists to reconstruct the cover identities, resumes, travel routes and cell phone conversations of Russian intelligence officers. One of the most clandestine Russian special forces units was thus exposed online. One of its “victims,” the FSB officer Kudryavtsev linked to the Navalny attack, was forced to admit that digital journalism is completely uncharted territory for Russia’s intelligence services.”

Clive Robinson May 3, 2021 5:59 PM

@ AL, Winter,

First, the Covid-19 virus contains a furin cleavage piece with parts that are a genetic match to MERS. The research assigns a probability of that occurring through natural evolution at 0.0039

In essence he’s claiming that the natural route is “impossible” there for what he offers without evidence just assumprions must be valid. Which even though couched in probabilities is not the most sensible thing to say…

I can tell you for free that, that probability is wrong, as it’s based on a false assumption in the reasoning.

Two things you need to consider,

1, MERS, stands for Middle East Respiritory syndrome, and is found quite commonly in camels. The assumption is there are few or no camels in China. Thus there is “no route”…

2, As long as people ignore the “bush meat” angle they will not see that a lot of exotic bush meat in China comes from Africa and up in the Middle East etc. Oh and the penis of various of large quadrapeds not just herbivores are routienly eaten for various very silly reasons.

The reason MERS exists is people eating camel meat especially wild camel meat or “bush meat”, but it’s not only camels that get eaten as exotic or faux aphrodisiac in Chinese Medicine.

But camel meat is eaten in not just the ME, but India and Asustralia to name but three and I know where to buy “farmed camel meat” in the UK along with the likes of Ostrich, Rea, kangaroo and various other “low cholestral meats” there is even a push on to get more people to eat camel meat in the US…

Until they rule out the ME link via “live exotic” and highly illegal import of “bush meat” by traders that also import legal “lab test subjects” and other meats any speculation around “Chinese Only” vectors is the equivalent of “Academic Masturbation” as the potential Reader for my PhD., so succinctly put it some years ago.

Even Sir Arthur Conan Doyle knew this back in the 1800’s and he was not even what we would call a scientist. Though he did train as a physician, under someone who was possibly the father of what we now call Forensic Science.

Bold claims require solid evidence and the scientist concerned realy does not have any so… Untill some turns up, I’m sticking with,

“No evidence, is no proof, and to claim otherwise is bad science”

which it most definitely is.

If he feels I’ve impuned him, he can come and argue his case, he might have something that approaches “criminal case standard” of “beyond reasonable doubt” by now, but I’d be supprised as people would be shouting it from the roof tops if that were the case, and they are not.

But also remember something that is not very well known, those experiments carried out in the Chinese lab are dangerous, no doubt about it. But you should ask if the experiments need to be done or not?

The answer is many think they should, but… They can not do the experiments in their own country because of “legislation and regulation”… So guess what the US Government who does not alow such experiments to be carried out on US soil, were diverting US citizen Tax Payer dollars to pay China to do the experiments on their home soil.

Perhaps people in the US should ask why the US Government thought doing such dangerous things in other peoples countries that is banned in the US was a good idea?

Because under the logic of “He who pays the piper calls the tune”, if the virus did come from the Chinese lab that was regularly inspected by the US Gov under their own admission, then the US Government is actually both moraly and ethically to blaim, if not legaly as well…

A point some realy should think about, after all do they realy want to live in a country where the Government is “bribing” to have “illegal” activities carried out in other countries because they think it will not come back against them?

Some would say it’s not just illegal[1], but unethical and immoral especially as how many US citizens have died because of it? More than in the Second World War? More than from both atom bombs?

Personally, I see it in a pragmatic way, in effect as a “Genie out of the bottle” issue or a “Pandora’s box” issue. That is “We can not put it back”, and appart from ensuring it can not happen again, our efforts would best be spent trying to stop it, then erradicate it, then stopping it happening again.

Thus three actions,

1, Do not do such experiments any where if a sound scientific reason for them can not be given. If it can be given then perhaps they should be done in an “Open manner” at a “safe location” which all the worlds nations can agree to.

2, Secondly and perhaps more importantly stop the illegal “exotic, faux medicine, and bush meat” trade. God alone knows how many diseases are related to the consumption of “non disease free” animals, but MERS is just one of potentially hundreds over almost the same number of years (most die out but some hang in there like the common cold, flu etc.

3, As important as stopping the bush meat etc trade, we should stop encroaching on clearly disease ridden “virgin” territory where zoonotic transfer of noval viruses is in effect guarenteed.

Whilst I do not advocate people stop eating meat, it’s clearly a significant disease vector at many points along the chain. We finally stopped what were in effect highly dangerous “canabilistic practices” via the likes of “swill” only a handfull of years ago. And remember our “food industry” carried out such experiments as feeding chickens on their and other live stocks excrement into the 1950’s if not later to get “increased production”. Also the main reason antibiotics are nolonger effective is because the food industry sees them as “growth promoters” thus “profit makers” and that both Big Farmer and Big Phama actively lobby governments all over the world to prevent such things being regulated against… The US Gov is perhaps one of the most remise in this issue of all Western Nations…

I could go on at length but this “Wuhan lab” finger pointing is right out of George Orwell’s 1984 “play book”. In essence the home Government (Oceania in the book) is trying to cover up it’s own significant and very real failings over the spread of SARS-CoV-2 (just as the UK Gov is doing) by pointing at (Eastasia in the book) China and the “Yellow men in distant lands” of “death worship”[2].

[1] When it suits the US Government, especially with things like “bribery” and things that are “illegal” in the US, that US insists it’s writ has “global jurisdiction”. If so then those acts payed for by the US Gov were illegal payments. Can you see any logical reason why the US citizens involved should not be tried for their “crimes”… Especially as it would turn out to be “WMD for genocide” if it was deliberately engineered the way that is being claimed, which means it’s an international treaty crime for which –thanks to the US– is still a capital crime… So something tells me certain people for political reasons just want the whole thing to go away.

[2] https://en.m.wikipedia.org/wiki/Nations_of_Nineteen_Eighty-Four

JonKnowsNothing May 3, 2021 6:54 PM

@Clive, @AL, @Winter, @All

re: Camels in China

There are camels in China but whether they are/were anywhere near the area in question, I dunno.

There are 2 types of camels: single hump and double hump.

Single hump camels are common in the M/E and are used as pack animals. There are Racing Camels that are exported to other Camel Racing Countries.

Double hump camels are or were common in Mongolia and used as pack animals carrying goods across the desert there.

There are zoos all over the place and most have camels in their animal parks.

There are camels in Australia too. Not sure about their status in the wild, they may be on the Exterminate List.

Other Camelids have shown responses to MERS, including llamas, and alpacas.

Early MERS reports indicated only dromedary camels (single hump) were affected. More recent studies showed either antibodies already present in other camelids or if exposed the animals developed antibodies (virus reservoir concern).

As Clive noted:

With the world trade in animals, domestic and wild, there maybe pockets of at-risk animals/herds/groups all around us besides the ones in the freezer.

===

ht tps://en.wikipedia.org/wiki/Dromedary
* The dromedary (Camelus dromedarius), also called the Arabian camel, is a large even-toed ungulate, of the genus Camelus, with one hump on its back.

ht tps://en.wikipedia.org/wiki/Camel
* single hump

ht tps://en.wikipedia.org/wiki/Bactrian_camel
* double hump

ht tps://en.wikipedia.org/wiki/Camelid
* The extant members of this group are: dromedary camels, Bactrian camels, wild Bactrian camels, llamas, alpacas, vicuñas, and guanacos.
* Camelids are even-toed ungulates classified in the order Cetartiodactyla, along with pigs, whales, deer, cattle, antelope, and many others.

(url fractured to prevent autorun)

Winter May 4, 2021 1:24 AM

@Al
There is a contention that a specific recombination with a particular nucleotide sequence has a 0.0039 probability of occurring in nature. That specific contention isn’t refuted by generalities.”

It is not a generality. If I step outside and see the license plate on a passing car on the street, the probability of seeing that specific license plate at that time is astronomically small. But that does not mean something fishy is going on. The calculation given comes very close to this license plate miracle. Because there are as many “miraculous sequences” as there are human (or vertebrate) infectious diseases.

It is basic biology that if a certain protein motive gives a fitness benefit, it will spread through the population, either by parallel evolution or by recombination. You can calculate the odds of parallel evolution if you know the fitness advantage, population size, and mutation rate. These are all rough guesswork in Coronaviruses. But recombination is much faster in all circumstances.

To exclude recombination, one has to prove the motive was not present in the environment. As no one knows where the bats lived that originated SARS2, I do not see how this is possible.

Ronscheid Broderick May 4, 2021 5:01 AM

@ Winter

Except the closest known relative of SARS-CoV-2 was found in bats in Yunnan province 1300km away from Hubei province, which is where Wuhan is located.

No bats in or around Wuhan had coronavirus relatives similar to covid. If I recall correctly, bats weren’t even being served at the wet market when cases were first reported.

On top of that, covid is more adapted to and spreads amongst humans far better than bats. It also has features not present in other coronavirus’ and has a bizarre host of disease symptoms.

There are just so many strange and questionable aspects of this virus. The strangest part has been watching the scientific community utterly silence or denounce this possibility. Its weird for scientists to not ask questions and investigate, especially when the subject is something as odd as covid.

Captain Smoker May 4, 2021 5:42 AM

The only thing that is constant in this world is change, and it’s not always for the better.

Winter May 4, 2021 6:47 AM

@X
“So you have a definite source for your claim that these kind of bats known for the specific virus strains relevant to the pandemic were and are eaten in Wuhan?”

An obvious distraction, as no one claims these bats were eaten by humans. They infected some other animal, e.g., camel, pig, chicken. pangolin, which might or might not have infected yet another animal and one of the infected second hosts was finally eaten by humans in Wuhan.

Or some farm worker in some other province caught the infection from his animals and transported the infection with the animals to Wuhan.

But you obviously already know that, if you would have been genuinely interested, and you are just stoking the flames.

1&1~=Umm May 4, 2021 8:52 AM

@Stephen Dollhurst:

“Covid would never have killed that many if they would have gotten the required medications at the right time”

Can you even provide a list of such medications backed by RCT’s? The required dosages/kgBM, at what phase in the disease, and for how long?

Or how about something simpler, when you previously used that handle on this blog with regards another security sibject? Even you should be able to do that if you are not some form of phoney cover…

Something tells me you can not and you are just “Whistling from a blown gasket”.

Winter May 4, 2021 9:09 AM

@All
Re: Troll-tool strategy

It is clear how the new strategy of our resident Troll-tool works. First, some regular papers are posted pointing to conspiracy talking points, e.g., Wuhan lab and spike protein, see my comment :
https://www.schneier.com/blog/archives/2021/04/friday-squid-blogging-on-squid-coloration.html/#comment-376168

Then more and more such selected papers follow, all posted under unfamiliar handles, but all using the same format. Then the conspiracies follow, streams of conspiracy comments all using the same rhetorical pattern according to “a lie repeated often enough becomes the truth”

In the end, we are back to full blown anti-vaxxer “vaccines kill” and anti-Chinese propaganda intended to discredit our host and his blog.

Points to watch are the creepy paste and insults that appear whenever they are called out. And the general inability to offer any real information on the subject. Trolls always pose a lot of leading questions but they are never interested in the answers.

SpaceLifeForm May 4, 2021 10:52 AM

Garmin was not the only company to pay the ransom.

Good security advice given by the hackers, after the ransom was paid.

Of course, this is windows.

Instinctively, I would not agree with the hackers about changing passwords every month.

Normally, that would be considered security theatre.

But, maybe, that is a hint. Why a month? Why not 6 weeks?

What could be leaking in a one month timeframe?

Drone May 4, 2021 10:52 AM

“(And you thought there was no connection between squid and COVID-19.)”

COVID rhymes with Squid. And that’s just the tip of the iceberg, you’ll see…

Clive Robinson May 4, 2021 10:53 AM

@ SpaceLifeForm,

Instinctively, I would not agree with the hackers about changing passwords every month.

For more years than I can remember now there have been to apparentky opposing views on passwords,

1, Never change them.
2, Change them as fast as possible.

I’m actually of the view that both are valid because there is more to passwords than at first meets the eye.

But first I’m now of the view that the human mind is not upto remembering passwords so…

1, Pass phrases for humans.
2, Pass words for tokens etc.

In either case as long as you can reasonably make them.

For instance with PAM on Linux you could have very long pass phrases. Being a commuter in London who was begining to feel as though I was in that pythons sketch where they claimed to get up before they went to bed… I once used,

BritishSnailAndTheLondonSlumberground

As a temporary pass phrase that I could easily remember.

Oh and one departing work colleague who had found a better job left a password of,

13a5t4rd

Which if you write it down right makes an illegitimate word.

The point about never changing a password is “because you never use it”, that is there are some reasons you might never need to log in, thus a long complicated password written on a piece of paper inside a sealed envelope in a locked safe is actually still an option for a supprising number of situations.

However having a TAM list or Rapid change Token is valid in other situations, where you have to log in fairly frequently across “public” equipment and communications.

At the end of the day the problem with passwords is that sixty years ago we knew that passwords were a “temporary compromise” untill the technology got better…

Proving once again “There is no thing as permanent as temporary”…

mrC May 4, 2021 10:54 AM

@Clive

My understanding of the password expiry issue is

There have been some actual studies and they found, unsurprisingly, that people find forced password changes really annoying and tend to respond by either choosing a spaceballs-grade password[1] on the spot or making a minor permutation to the old password. The former is terrible across the board, and the latter is terrible against the very scenario that password expiry is supposed to protect against.
Historically, password lifetimes bore a reasoned relationship to how long it would take an attacker to crack their hash, but those recommended password lifetimes have been brainlessly perpetuated into the modern context while the reasoning behind them has been forgotten and no longer holds true. The recommended lifetimes are derived from the 1970s-era multi-user DoD mainframe context, where it was possible to precisely compute the average time it would take a malicious user to crack a hash, and then set the password lifetime a safe margin shorter than that. The analogous modern-day threat is offline hash cracking against a stolen password database. In his scenario, we usually have no idea which algorithm/parameters the breached serviced used for hashing, and we have no idea what kind of hardware the attacker can afford. Consequently, we have no idea what a reasonable password lifetime would be.

[1] https COLON SLASH SLASH www DOT youtube DOT com/watch?v=a6iW-8xPw3k

David9 May 4, 2021 10:55 AM

https://www.youtube.com/watch?v=efs3QRr8LWw

This is an interview with Snowden around the time his book was published. It’s the Joe Rogan podcast.

Snowden talks almost constantly for almost three hours.
He gets into law quite heavily, including details I’m not sure are so well known even to those familiar with the matter.
The illegality of everything the US is doing in this regard, and the motivations that led to it, are really spelled out so clearly.
There is really some seriously interesting detail.

One of the closing points is a reference to the subject of Russia interfering with elections. Snowden quotes a Blue York Times, or New York Grimes, or NY Slime or whatever it’s called study from a few years ago.
The study found that, in the last century, Russia had demonstrably interfered with foreign elections a total of something like 36 times.
They study also found, in the same century, the US had interfered with elections something like 87 times

It may not be on youtube for much longer as Rogan has given Spotify an exclusive license to all his stuff

echo May 4, 2021 10:56 AM

While I do understand thereareawide variety of circumstances and situations government advice doesn’tseem to codify this. Nor does it codify who has a legitimate exception from mask wearing nor does it tackle the both in science and law provably bad beliefs of some people.

Some things concern me. “Leadership” is extremely bad at documenting the issues and codifying them. There is no clear message on what is best to wear or why. It’s all too often tainted with hidden agendas either from the medical profession who scoff or want to keep supplies to themselves or politicians who think mask wearing makes them appear weak. There is no scheme which codifies who has an exception. Really, precisely who is excepted and on what grounds? Can these lazy doctors write it up please? Can we also have a scheme where those who are “exempt” get a visor instead? And please no excuses. I’m really not in the mood for either weaponised psychology from the state or people weaponising their disabilities. Then there are law enforcement issues such as people with a “belief” not grounded in any science or law themselves causing a “breach of the peace” and potentially an assault by knowingly causing a risk of spreading life shortening bugs.

Last but not least can UK “security services” recommend closing down all access to US based social media platforms. They are clearly full of misinformation and bad influences and quite frankly dangerous. Before anyone says we can’t do that we can. It was done for Huawei who were absolutely not a security issue but a trade issue and the head of MI6 who sold his soul to curry favour for a Knighthood and post Mi6 company directorships knows this. Why one and not the other? Why also only kick up a stink over Hong Kong and not kick up a stink over black clad thugs in Portland closing down democtratic protests?

During this pandemic I have had to put up witha lot of personal inconvenience and a steep loss of income and have worn a mask at all times when outside on top of all other precautions. I know other people have cut and continue to cut corners. I know because I have seen them do it with my own eyes. So my life is on complete hold while others continue to cheat for advantage?

But for (a nice legal term) stupidity and greed and laziness this would be over a lot quicker.

https://www.theguardian.com/uk-news/2020/jul/31/no-one-stops-you-coronavirus-shoppers-attitudes-to-masks-differ-across-uk

<

blockquote>The 32-year-old from Compstall added: “We need to avoid another spike and wearing a mask keeps people safe. Equally, if someone isn’t wearing a mask, there is usually a good reason, like a hidden disability, and this is not the time for public shaming.”

“Mask judgmentalism” is one of the side effects of the new rules, according to some who spoke to the Guardian. Those wearing masks sometimes look critically at those whose faces are uncovered.

Karen Bennett, 49, shopping in Princes street, Edinburgh, said she felt compelled to wear a visor even though she is exempt for health reasons, because the social stigma of shopping uncovered was too great. “You get all the looks and stares,” she said as she left clothing store Zara.

One young maskless woman in Camden said she believed it was her human right not to wear a mask.

“I’ve seen a lot of animosity for people like me who aren’t wearing masks,” she said. “But as long as we respect each other’s space I think it is OK not to wear a mask. I have a strong belief in God and I believe that the virus won’t touch me or if it does I won’t be badly affected.”

echo May 4, 2021 10:56 AM

@Clive

As everyone else has been opening up and returning to normality I have continued with my own schemes and plans. I’m effectively still operating lockdown mode and it is highlighting quite a contrast whether shopping or deliveries or anything else. The local post office continue to knock and step back to maintain a healthy distance. As happened before I had finished writing the first sentence other delivery companies just knock then stand their breathing all over the place so I have to tell them to leave it outside and wait for the air to clear before bringing the parcel in. Yes, even though I am wearing masks and things have eased I am still crossing the road to avoid pedestrians and cyclists and avoiding crowding places or anywhere which may be contaminated or have poor air replacement. At home I continue to operate a “soft airlock” along the lines of clean room/NBC/food industry standards. I’m lucky my immune system and physiology is quite robust, whether through winning the genetic lottery or fortuitous upbringing, but I have some risk factors and I’m not keen to see have these tested either medically or administratively or otherwise. There’s a few things I want to continue uprating and modifying as we go along and I have the money to spare. The time for being helpful has passed so I’m not going to advertise what those are to prevent a run on supplies.

There was a Guardian opinion column the other week which tackled the subject of style and fashion post-pandemic with a few editorial thumbs on the wheel. It wasn’t disimilar in its throwing of science out the window and citing peer pressure and comfort zones as modifiers instead of, you know, responsibility and self-actualisation. While not picking on religion in particular I will blame it, or perhaps more accurately, irresponsible amateurs in their field on a power trip for psychological abuse and peddling misinformation.

Myself I prefer people bring their “A” game to the table but sadly the “British disease” is back in circulation and likely killing more people than Coronavirus alone could. Sadly we have a Lord Halifax in Downing Street and a Lord Haw Haw running riot in the media every chance they get to shove their toad face on.

Speaking of rodents I just watched a documentary on “The White Mouse”. Having read the book “The Colidtz Story” by Pat Reid years ago I’m slowly working my way through “Colidtz” filmed in glorious square-o-vision and 1970s television lighting department dogma. There’s also a review available of the original Welrod developed by Station 9 of SOE. The design is even more clever than I thought it was which can be seen in the cutaway model.

Nancy Wake: Gestapo’s Most Wanted (French Resistance Documentary) | Timeline
https://www.youtube.com/watch?v=qNXKovYM15A

Silent But Deadly: Welrod Mk IIA
https://www.youtube.com/watch?v=d12AjvEsaHg

rrd May 4, 2021 10:56 AM

@ Clive

If I were God, I sure as heck would be getting fed up with this sort of nonsense,

Here in the US, we’ve had two preachers (one black and one white) declare “You can come here and worship in this closed space and God will protect us!”, only to die of COVID-19 within weeks. The moral arc of the universe is usually long but sometimes quick and painful, especially to those caught up in their ego when claiming to speak for God.

As to getting “fed up”, God gave us our greatest gift — our free will — to do with as we please, full stop. We can choose to emulate the ignorant or the wise, the evil or the good, the selfish or the selfless. It’s our choice, individually and, then, resultingly, in our groups.

Being the only Earthlings capable of abstract thought and ideation, our free will thus permits us to create out of whole cloth any belief system we choose and then give our lives to it, all the while ignoring the objective truths those delusions obscure.

We are also, however, imbued with the ability to selflessly hone our God-given morality by seeking out our highest purpose and then self-evolving ourselves and our societies towards that moral perfection. If one honestly and humbly pursues this path, one will find that we cannot accomplish this alone.

Belief is simply (but crucially) a part of our nature. That’s why EVERYONE has a religion, when used as a simple term for “belief system”. Usually it’s of their own creation, an amalgamation of ideas they’ve picked up over the course of their lifetime, starting in their childhood. Which ideas we choose to adopt are the most crucial decisions we ever make, because they affect how we treat others, the subsequent actions determining the inner peace we have with respect to both our conscience and the world-at-large.

not being sufficiently pious

Piety is judged solely by our love for ALL others. A person who does not wear a mask has no love for others, so their worshiping the vice of ignorance (instead of the virtue of selfless love) has harmed both themselves and those around them. The resulting unhappiness their ignorance caused to others will then manifest back within themselves in equal karmic measure. Remember: the karmic system is the universe’s feedback system to get us to stop being selfish aholes.

God does indeed work in mysterious ways, but most people haven’t developed their discernment to grasp such larger, subtler truths, the simple reason being that they have chosen to forgo seeking those truths for themselves. Choosing to believe that there is no spiritual component to our human planes of existence — which gives us a more direct, more accurate, more sensible survey of existence both in the small and in the large — results in that being the exact truth they live. A person who doesn’t believe they can learn algebra will never be able to do so until they try.

Put another way, the mask-refuseniks have chosen to ignore their potential to harm others, which is precisely because they don’t care about either others or the truths of this scientifically-structured reality, both of which are precisely because they have not given a crap to self-evolve their morality.

Furthermore, this applies to us all, at some level, with respect to our relations with our fellow human beings; that is, until we do the hard graft necessary to root out our vices and transmute them into their corresponding virtues, thereby upgrading our attitudes and behaviors.

There is not much you can do legally about small children as any parent of a “terrible two” can tell you.

When my toddler daughter tried to use tantrums to get her way, I would give her “upside-down treatment”. I’d just gently pick her up and hang her legs over one of my shoulders and let her look at the world from a different perspective. Gravity, increased blood in the brain, fun, immediate change of visual perspective — they all did wonders for her attitude within a few seconds. Every single time.

No one taught me this. It was inspired in me from the same place William Gibson goes to receive his stories, a place with no possible explanation to people who believe that this physical world is all there is to human life in this mysterious and fascinating universe.

Right now, we Earthlings are receiving “upside-down treatment” worldwide, because of the worldwide immoralities that are destroying the environment and subjugating its peoples.

For example, gambling and alcohol are being demonstrated for the selfish, wasteful evils they have always been, for the selfishness they ingrain in society. Ditto for our politicians.

This new, rather intense stress on our systems is certainly illuminating its cracks, but few have the clarity to see beyond the symptoms to the diseases.

Clive Robinson May 4, 2021 10:57 AM

@ echo,

Having read the book “The Colidtz Story” by Pat Reid years ago I’m slowly working my way through “Colidtz” filmed in glorious square-o-vision

In the book you will read about an escapee cycling across Germany and into Norway wearing “cricket whites” his name Dominic Bruce

https://en.m.wikipedia.org/wiki/Dominic_Bruce

He and I first met at the first floor lift door, when I went to see my father at Kingston College where he worked. Brucie or the “medium sized man” had expanded in girth some what, both of us though had an excess of energy as he bounded out of the lift as I bounded in. It was kind of a David and Goliath moment in reverse or if you prefer I was the mountain. I mumbled some apology and did not think anything more about it till a day or so later my father who had heard from Kieth Hill who had witnessed the incident had dropped the hint to my father that I had made a great impression on Brucie, and Brucie and Brucie’s over geberous backside had reciprocated to the lift floor. My father reminded me I was not supposed to go around bouncing College Principles around the place as it was not dignified (but he did not say for who).

The actual incident was not so much a meeting of minds more his nose with my solar plexis because “medium sized” Brucie was not. Any way we kept sort of bumping into each other without actually making contact when he finally realised –the school uniform might have been a clue– that I was not actually a student, thus demanded to know who I was so I told him and he said “Ahhh you’re Tom Robinsons son” to which I just nodded to which further said “It’s your sister who’s the student in the Union” which puzzled me some what. It turned out that my sister had been interviewed by the BBC at a Students Union demonstration in London and her words had ruffeled a few feathers… Any way Brucie said as he walked away “I’ve got my eye on you lad”…

Well a little while later I became a student at the college and it turned out Brucie was keeping his eye on me. When I was orphaned he did a lot to see that my education continued and that I was offered a job at the college so I could carry on my studies.

I later found out from Keith that although my father and Brucie rarely saw eye to eye, my fathers forthright nature and memory of conversations dates and places ment that they both had quite a bit of respect for each other.

What is not well known is that Brucie was sentenced to death several times when in Colditz and he kept the signed death warrants and he hung them on the wall of his office at Kingston College, when he had problematical visitors he would give them a cup of tea or coffee and aimiably chat about how he had got so many of them. He would if the person had not softened up then gently remind them that if solitary confinement and sentences of death had not detered him in the past, he would ask the person what they had that they thought would deter him.

He was all round an interesting charecter and was in some ways quite religious in a practical way, he caused a bit of a ruckus over school places, the powers that be wanted to reduce them Dominic however knew from his charty etc work that there was actually a big boom of babies working their way up. He had in part a hand in this with nine children. Any way for this and other reasons he came to the attention of the Vatican that ended up with him being made a knight.

Any way Dominic retired in 1980 and probably worked harder behind the scenes for the next twenty years than he had done for the fourty years before.

There are times when I wish there were more people like him and my father and Keith still around because they got things done not in any expectation of reward –more likely punishment– but because they saw things needed to be done as it was the right thing to do.

Clive Robinson May 4, 2021 10:58 AM

@ rrd,

Belief is simply (but crucially) a part of our nature. That’s why *EVERYONE* has a religion, when used as a simple term for “belief system”.

Yes most people do have belief systems but they need not be a religion (depends on how you define religion which is a very long discussion in of it’s self).

I’m what some call a humanist, that is I believe in what humans can do for themselves without idolising a deity or prophet.

We think that in the past humans imbued the planets with mystical powers. Well the powers the Sun and Moon have on us were certainly mysterious but mystical no. Science eventually evolved and those mysteries became not just understandable but explainable usually with very very simple ideas and models that mathmatics make all the more precise. And with that increasing precision more mysteries to be solved became uncovered and so it goes on.

But fundementaly early man was right, all the energy that gives this planet life originates one way or another from the Sun, the Moon and the tilt of the earth. Simple things build into complexity which gives us the rich tapestry of our world and it is this that drives us forward.

The history of religion shows that man creates deities in our own lickness but importantly always that little bit out of reach. Thus it harneses our inbuilt curiosity and turns it into striving.

I have no need to chase after such things, the pursuit of information to put to use not just creatively but for benifit is what makes me an engineer first and formost in almost everything I do.

I find I have little need to live anywhere except inside my own head. When I was younger I did not understand why others have a desperate almost pathological need to live in other peoples heads. I however quickly learnt it is neither healthy for them or those they fix their attentions on. So perhaps it is just as well there are dieties just out of reach for such people to chase.

Does this make me a better or worse person than them, actually neither it just makes me different. What makes me a better or worse person is how I treat others, how I give back what I’ve learned, and how I can make other peoples lives better with the knowledge I have by applying it to the world around me, not just for the sake of creating, but creating with responsability.

As I’ve frequently said “technology is agnostic to use, it’s the directing mind that decides good or bad”. But the technologist who creates without responsability is in part to blaim for when a directing mind takes their works and use them for bad.

As I’ve been saying more recently we have an issue of “Personal Rights -v- Social Responsability” way to many people go for the former not the latter and forget that it is society that makes it possible for them to have rights. This leads unfortunatly to a culture of “self entitlement” which is not good because almost invariably the entitlement they desire can only be gained by causing harm to others, and importantly to society mostly by way of what would be crimes if politicians and legislators were not “bought off” in some way.

Unfortunately for some self entitled it is not about wealth or ownership but “status”. Such people would happily destroy society and thus significantlt harm them selves if they thought it gained them just a tiny bit more status… Almost by definition such people are not just destructive but evily so.

At the end of the day we are all destined to die currently. I would like to go knowing I’ve given more to mankind than I’ve taken, thus in some small way I’ve improved the lot of mankind, even if they never find out it was by what I’ve done. It’s doing things because they are right, not for any gain I might get from doing them.

Ismar May 4, 2021 10:59 AM

@Clive
“ At the end of the day we are all destined to die currently. I would like to go knowing I’ve given more to mankind than I’ve taken, thus in some small way I’ve improved the lot of mankind, even if they never find out it was by what I’ve done. It’s doing things because they are right, not for any gain I might get from doing them”

Thanks for sharing your thoughts on this very important topic.
I also share your beliefs (pun intended) here and
would just like to add that doing things because they are right is necessary for the survival of our species as can be easily seen with respect to current global threats such as COVID-19 and climate change.

From memory, Bruce touched on a similar topic in his book Liars and Outliers, where he addresses the issues of a delicate balance between law abiding and law breaking citizens for the existence of any society.

SpaceLifeForm May 4, 2021 11:00 AM

hXXps://tinyurl.com/y27l9k3z :

“What led you to send up big tech and the internet, or “the grid”, as it’s called in the book?”
“I’d love to write a book about butterflies or something, but I [got] so incensed about what’s happening. About five years ago it became clear that for many reasons the notion of us all having a voice [online] was going to take a different route than we had expected, because of brain chemistry and mob culture and what suited the profit motive… I’m not in any way a technophobe: this is about the extremely alarming agenda behind [online] technologies. We’re running around saying we suddenly have a voice [but] the internet infantilises you – you’re automatically a teenager when you use any of these [social media] tools. They are geared that way: we’re creatures who love an idea much more than a fact, and so we can ignore a whole lot of facts.(…)”

Weather May 4, 2021 11:01 AM

Its not the recent version, hope it doesn’t get deleted.

#include
#include
#include

#include “c:\openssl-fips-2.0.16\crypto\sha\sha256.c”
#include “c:\openssl-fips-2.0.16\include\openssl\sha.h”

int main() {
unsigned int i,p,l,t,s,r,r1,s1,c,z,z1,z2,k=0,max,found=0,topc=0;
unsigned int countq[4],storeq[4],xq[4],wq[4],yq[4],zq[4],baseq[4];

unsigned int diffchar = (unsigned int)malloc(0x1ffffff);
unsigned int diffchar1 = (unsigned int)malloc(0x1ffffff);
unsigned int diffchar2 = (unsigned int)malloc(0x1ffffff);

unsigned int diffcharr = (unsigned int)malloc(0x1ffffff);
unsigned int diffchars = (unsigned int)malloc(0x1ffffff);
unsigned int diffcharr1 = (unsigned int)malloc(0x1ffffff);
unsigned int diffchars1 = (unsigned int)malloc(0x1ffffff);

unsigned char chardiff = (unsigned char)malloc(0x3ffffff);
unsigned int collision = (unsigned int)malloc(0x1BE1C0);
unsigned int brute = (unsigned int)malloc(0x1BE1C0);

unsigned int upper=85, lower=70,jumpy=0x10000;
SHA256_CTX cd;

FILE *out;

unsigned int incq[12],len=1;
unsigned char md[34];
//unsigned char checking[32] = {“ADl9”};
//unsigned char checking[32] = {“Cpg74”};
//unsigned char checking[32] = {“ATtwCp9”};
unsigned char checking[32] = {“TgTAbE”};

//Weather!
unsigned char weather[12] = {“Weather!”};
unsigned char testy[34] = {0xc1,0xc1,0xcb,0x51,0x43,0x00,0x22,0x1d,0x3e,0x79,0x8a,0xc5,0x67,0xd8,0x74,0x06,0xc3,0x2d,0xea,0x0c,0xc8,0x64,0x69,0x6f,0x3c,0x50,0x2b,0x3b,0xa1,0xa3,0xdf,0x6a};
//unsigned char testy[34] = {0xb9,0x9e,0xce,0xf2,0x83,0x48,0xc4,0x19,0x15,0xf8,0x8e,0x8f,0x13,0xc3,0x08,0x70,0xa8,0x44,0x31,0xc5,0x68,0x80,0xbe,0x10,0xe5,0xa7,0xe9,0xdd,0x85,0xf5,0xca,0xde};
unsigned char checkinghash[32],combcheck[256];
unsigned int testorcheck = 1,checklen=0; //one of checking zero for testing
unsigned int maxp=0;

unsigned int t0,t1,t2,t3,t4,maxcount=0;
//BE1C0,0x17C380,23A540
unsigned int range=0x23A540,rangesave=0x23a540;
unsigned char comb[98] = {“0123456789abcdefghijklmnopqrstuvwyxzABCDEFGHIJKLMNOPQRSTUVWYXZ!@#$%^&*()_+|}{\”:?><,./;’][=-“};
unsigned int checkarray[100];
unsigned char bytey[0x200],check[300],buf[34];
unsigned char were[34];

for(i=0;i<=0xff;i++) {
bytey[i] = (unsigned char)i;
}

if(testorcheck != 1) out = fopen(“range.txt”,”w”);
memset(checkarray,0x00,sizeof(checkarray));
memset(diffchar,0x00,sizeof(diffchar));
memset(diffchar1,0x00,sizeof(diffchar1));
memset(diffchar2,0x00,sizeof(diffchar2));

memset(diffcharr,0x00,sizeof(diffcharr));
memset(diffcharr1,0x00,sizeof(diffcharr1));
memset(diffchars1,0x00,sizeof(diffchars1));
memset(diffchars,0x00,sizeof(diffchars));

memset(collision,0x00,sizeof(collision));
memset(md,0x00,sizeof(32));
memset(combcheck,0x0,sizeof(combcheck));
memset(checkinghash,0x0,sizeof(checkinghash));
memset(incq,0x00,sizeof(incq));
//memset(md_ctx,0x00,sizeof(*md_ctx));
checklen = strlen(checking);
memset(chardiff,0x00,sizeof(chardiff));

memset(were,0x00,sizeof(were));
memset(buf,0x00,sizeof(buf));

for(i=0;i<9;i++) {
// buf[i] = weather[i];
buf[i] = checking[i];
}

SHA256(buf,8,md);

for(t=0,i=0;i= 32) {
// printf(“Found\n”);
// exit(1);
//}

for(max=0,t0=0,t1=0,t2=0,t3=0,t4=0,c=0;max= 92) {
t4=0;
t3++;
}
if(t3 >= 92) {
t3 = 0;
t2++;
}
if(t2 >= 92) {
t2 = 0;
t1++;
}
if(t1 >= 92) {
t1 = 0;
t0++;
}

memset(were,0x00,sizeof(were));
were[3] = comb[t4];
were[2] = comb[t3];
were[1] = comb[t2];
were[0] = comb[t1];
//SHA256_Init(&cd);
//SHA256_Update(&cd,were,32);
//SHA256_Final(md,&cd);
SHA256(were,4,md);

countq[0]=0;
countq[1]=0;
countq[2]=0;
countq[3]=0;
baseq[0] = 0;
baseq[1] = 0;
baseq[2] = 0;
baseq[3] = 0;

storeq[0]=0;
storeq[1]=0;
storeq[2]=0;
storeq[3]=0;

for(p=0;p<=0x3f;p++) {
countq[0]=0;
countq[1]=0;
countq[2]=0;
countq[3]=0;
for(i=0;i= 0x1000) {
printf(“%8X %8X %8X %8X %8X %8X %8X %c%c%c %8X\n”,diffchar2[max],diffchar1[max],diffchar[max],r,s,r1,s1,chardiff[(max3)],chardiff[(max3)+1],chardiff[(max*3)+2],max);
c=0;
}
c++;

}

///////////Bruteforce stage
////////////////////

if(testorcheck == 0) {
found=0;
mid:
topc++;
range=rangesave;
top2:

//SHA256_Init(&cd);
//SHA256_Update(&cd,buf,32);
//SHA256_Final(md,&cd);
SHA256(buf,6,md);

countq[0]=0;
countq[1]=0;
countq[2]=0;
countq[3]=0;
baseq[0] = 0;
baseq[1] = 0;
baseq[2] = 0;
baseq[3] = 0;

storeq[0]=0;
storeq[1]=0;
storeq[2]=0;
storeq[3]=0;

for(p=0;p<=0x3f;p++) {
countq[0]=0;
countq[1]=0;
countq[2]=0;
countq[3]=0;
for(i=0;i<32;i++) {
xq[0] = md[i]^p;
xq[1] = md[i]^p+0x40;
xq[2] = md[i]^p+0x80;
xq[3] = md[i]^p+0xc0;
wq[0] = ~xq[0];
wq[1] = ~xq[1];
wq[2] = ~xq[2];
wq[3] = ~xq[3];
yq[0] = xq[0] | p;
yq[1] = xq[1] | p+0x40;
yq[2] = xq[2] | p+0x80;
yq[3] = xq[3] | p+0xc0;
zq[0] = yq[0] & wq[0];
zq[1] = yq[1] & wq[1];
zq[2] = yq[2] & wq[2];
zq[3] = yq[3] & wq[3];
wq[0] = zq[0];
wq[1] = zq[1];
wq[2] = zq[2];
wq[3] = zq[3];
countq[0] = countq[0] + wq[0];
countq[1] = countq[1] + wq[1];
countq[2] = countq[2] + wq[2];
countq[3] = countq[3] + wq[3];
}
storeq[0] = countq[0];
storeq[1] = countq[1];
storeq[2] = countq[2];
storeq[3] = countq[3];
baseq[0] = baseq[0] + storeq[0];
baseq[1] = baseq[1] + storeq[1];
baseq[2] = baseq[2] + storeq[2];
baseq[3] = baseq[3] + storeq[3];

}

z = baseq[0]+baseq[2];
z1 = baseq[1]+baseq[3];
z2 = z+z1;
r= baseq[0];
r1= baseq[1];
s= baseq[2];
s1=baseq[3];

memset(brute,0x00,sizeof(brute));
memset(check,0x00,sizeof(check));

for(t=0x00,p=0;t<=range;t++) {
if(diffchar2[t] == z2) {
if(diffchar1[t] == z1 && diffchar[t] == z) {
if(diffcharr[t] == r && diffchars[t] == s && diffcharr1[t] == r1 && diffchars1[t] == s1) {
brute[p] = chardiff[t];
p=p+1;
}
}
}
}

for(s=0,c=0;s<p;s++) {
for(t=s+1;t= 0x1) {
k=0;
for(t=0;t<=c;t++) {
printf(“%c”,check[t]);
}
printf(“\n %d %d %d %d \n”,incq[3],incq[2],incq[1],incq[0]);
printf(“%c%c%c%c%c%c\n”,buf[0],buf[1],buf[2],buf[3],buf[4],buf[5]);
}

if(c =0x7ff000) goto tr1;
goto top2;
}
if(c > upper) {
range=range-jumpy;
goto top2;
}
tr1:
if(maxp < p) maxp = p;
if(p != 1) collision[p]=collision[p]+1;
k++;
if(maxcount < c) maxcount = c;
checkarray[c]++;
for(t=0,p=0;t= 6) {
// printf(“Found\n”);
found++;
//exit(1);
}

//printf(“\n%d\n”,c);

//if(skippy == 1) {
// inc=0x25;

buf[0] = comb[incq[0]];
buf[1] = comb[incq[1]];
buf[2] = comb[incq[2]];
buf[3] = ‘A’;
buf[4] = ‘c’;
buf[5] = ‘p’;

if(incq[0] >= 92) {
incq[0]=0;
incq[1]++;
}
if(incq[1] >= 92) {
incq[1]=0;
incq[2]++;
}
if(incq[2] >= 92) {
printf(“we found %d d,%8X from %d d,%8x\n”,found,found,topc,topc);
printf(“the biggest bruteforce combantions is %d\n”,maxcount);
printf(“The range of lengths are\n”);
for(i=0;i<maxp;i++) {
// printf(“%d = %d\n”,i,checkarray[i]);
printf(“%d collisions %d times\n”,i,collision[i]);
}
fprintf(out,”we found %d d,%8X from %d d,%8x\n”,found,found,topc,topc);
fprintf(out,”the biggest bruteforce combantions is %d\n”,maxcount);
fprintf(out,”The range of lengths are\n”);
for(i=0;i<maxp;i++) {

fprintf(out,&quot;%d collisions %d times\n&quot;,i,collision[i]);

}
fclose(out);
exit(1);

}

incq[0]++;

goto mid;

}

if(testorcheck == 1) {

for(i=0;i<checklen;i++) {
buf[i] = checking[i];
}

//SHA256_Init(&cd);
//SHA256_Update(&cd,buf,32);
//SHA256_Final(md,&cd);
SHA256(buf,8,md);

for(i=0;i<32;i++) {
md[i] = testy[i];
checkinghash[i] = md[i];
}

top:

countq[0]=0;
countq[1]=0;
countq[2]=0;
countq[3]=0;
baseq[0] = 0;
baseq[1] = 0;
baseq[2] = 0;
baseq[3] = 0;

storeq[0]=0;
storeq[1]=0;
storeq[2]=0;
storeq[3]=0;

for(p=0;p<=0x3f;p++) {
countq[0]=0;
countq[1]=0;
countq[2]=0;
countq[3]=0;
for(i=0;i<32;i++) {
xq[0] = md[i]^p;
xq[1] = md[i]^p+0x40;
xq[2] = md[i]^p+0x80;
xq[3] = md[i]^p+0xc0;
wq[0] = ~xq[0];
wq[1] = ~xq[1];
wq[2] = ~xq[2];
wq[3] = ~xq[3];
yq[0] = xq[0] | p;
yq[1] = xq[1] | p+0x40;
yq[2] = xq[2] | p+0x80;
yq[3] = xq[3] | p+0xc0;
zq[0] = yq[0] & wq[0];
zq[1] = yq[1] & wq[1];
zq[2] = yq[2] & wq[2];
zq[3] = yq[3] & wq[3];
wq[0] = zq[0];
wq[1] = zq[1];
wq[2] = zq[2];
wq[3] = zq[3];
countq[0] = countq[0] + wq[0];
countq[1] = countq[1] + wq[1];
countq[2] = countq[2] + wq[2];
countq[3] = countq[3] + wq[3];
}
storeq[0] = countq[0];
storeq[1] = countq[1];
storeq[2] = countq[2];
storeq[3] = countq[3];
baseq[0] = baseq[0] + storeq[0];
baseq[1] = baseq[1] + storeq[1];
baseq[2] = baseq[2] + storeq[2];
baseq[3] = baseq[3] + storeq[3];

}

z = baseq[0]+baseq[2];
z1 = baseq[1]+baseq[3];
z2 = z+z1;
r= baseq[0];
r1= baseq[1];
s= baseq[2];
s1=baseq[3];

for(t=0x00,p=0;t<=range;t++) {
if(diffchar2[t] == z2) {
if(diffchar1[t] == z1 && diffchar[t] == z) {
if(diffcharr[t] == r && diffchars[t] == s && diffcharr1[t] == r1 && diffchars1[t] == s1) {
brute[p] = chardiff[t3];
brute[p+1] = chardiff[(t3)+1];
brute[p+2] = chardiff[(t*3)+2];

p=p+3;
}
}

}

}

for(s=0,c=0;s<p;s++) {
for(t=s+1;t<p;t++) {
if(brute[s] == brute[t]) goto asd1;
}
check[c] = brute[s];
c++;
asd1:
l=0;
}
for(i=0,r=0;i<c;i++) {
combcheck[i+1] = check[i];
for(l=0;l<10;l++) {
if(checking[l] == check[i]) r++;
}
}

for(i=0,r=0;i= 8) {
printf(“will find\n”);
exit(1);
}
if(c =0x7ff000) goto tr;
goto top;
}
if(c > upper) {
range=range-jumpy;
goto top;
}
tr:
/*
if(r < checklen) {
printf(“wont find it\n”);
exit(1);
}
*/
for(l=0;l<5;l++) {
incq[l]=0;
}
for(l=5;l<9;l++) {
incq[l]=c;
}

len=1;
for(k=0;;incq[0]++,incq[8]–,k++) {
for(i=0;i c) {
incq[i+0]=0;
incq[i+1]++;
//if(incq[i+2] == 0x00 && len == i+1) len++;
}
}
for(i=8;i>=5;i–) {
if(incq[i+0] == 0) {
incq[i+0]=c;
incq[i-1]–;
//if(incq[i+2] == 0x00 && len == i+1) len++;
}
}

if(incq[10] >= c) {
printf(“no match\n”);
exit(1);
}
for(i=0;i<32;i++) {
buf[i]=0;
}
for(l=0;l= 0x10c040) {
for(i=0;i<32;i++) {
printf(“%2X”,md[i]);
}
printf(“\n%c,%c,%c,%c,%c,%c,%c,%c,%c,%c,%c\n”,buf[0],buf[1],buf[2],buf[3],buf[4],buf[5],buf[6],buf[7],buf[8],buf[9],buf[10]);
printf(“%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d\n”,incq[0],incq[1],incq[2],incq[3],incq[4],incq[5],incq[6],incq[7],incq[8],incq[9],incq[10]);

k=0;

}

for(i=0,p=0;i= 32) {
printf(“found match\n”);
for(i=0;i<32;i++) {
printf(“%2X”,md[i]);
}
printf(“\n”);
for(i=0;i<32;i++) {
printf(“%2X”,checkinghash[i]);
}
printf(“\n”);
for(i=0;i<c;i++) {
printf(“%c”,check[i]);
}
printf(“\n”);
printf(“\n%c,%c,%c,%c,%c,%c,%c,%c,%c,%c,%c\n”,check[incq[0]],check[incq[1]],check[incq[2]],check[incq[3]],check[incq[4]],check[incq[5]],check[incq[6]],check[incq[7]],check[incq[8]],check[incq[9]],check[incq[10]]);
exit(1);
}

}

}

return 0;
}

echo May 4, 2021 11:01 AM

Pretty much everyone missed my hinting of location fingerprinting during the 5G discussion. Yes, the data from telecoms masts can pinpoint you more accurately than just a bubble but narrow down your exact location when combined with map data. 5G will be doing this with more granularity. Google as we know has access to similar types of data and wifi location and maps and visual information. This system uses similar principles to locate a drone.

Reading through it’s pretty obvious GCHQ blocked mandatory tower sharing to improve QoS and eradicate blind spots because they were being lazy and politicians either weren’t briefed on the technical reasons why or didn’t have the brains to figure it out. And this is on top of data loss and breaches, snoopers charter, and white elephant projects and constant empire building and demands for more money to keep feeding the cash guzzling monster already failing multiple statutory obligations. Let us also not forget that “but for” the EU things like lower prices for mobile and roaming may never have happened and “but for” the ECHR and ECJ multiple breaches of privacy would be ongoing and nobody would be the wiser while the security services failed to protect democracy and failed to act on the far right threat and social media misinformation platforms.

https://spectrum.ieee.org/tech-talk/robotics/artificial-intelligence/attention-rogue-drone-pilots-ai-can-see-you

After testing neural nets including dense networks and convolutional neural networks, the researchers found that a kind of recurrent neural net called a “gated-recurrent unit” (GRU) network worked best for drone tracking. “Recurrent networks are good at this,” Weiss said. “They consider the sequenced reality of the data—not just in space but in time.”

[…]

Depending on the specific terrain at any given airport, a pilot operating a drone near a camouflaging patch of forest, for instance, might have an unobstructed view of the runway. But that location might also be a long distance away, possibly making the operator more prone to errors in precise tracking of the drone. Whereas a pilot operating nearer to the runway may not make those same tracking errors but may also have to contend with big blind spots because of their proximity to, say, a parking garage or control tower.

And in every case, he said, simple geometry could begin to reveal important clues about a pilot’s location, too. When a drone is far enough away, motion along a pilot’s line of sight can be harder for the pilot to detect than motion perpendicular to their line of sight. This also could become a significant factor in an AI algorithm working to discover pilot location from a particular drone flight pattern.

The sum total of these various terrain-specific and terrain-agnostic effects, then, could be a giant finger pointing to the operator. This AI application would also be unaffected by any relay towers or other signal spoofing mechanisms the pilot may have put in place.

echo May 4, 2021 11:02 AM

I’ve been looking into buying in a drone for a project I have. Unfortunately it’s the more expensive drones which have the software features I need and some are limited because of arbitrary safety issues. It’s one of those “nice to have” things but not a priority. I no longer code but also have no idea what API is exposed and have no wish to be sidetracked into a project requiring me to write my own custom software.

While I’m concerned at the so-called service economy sucessive UK governments have driven us down it doesn’t bother me especially that I cannot source a European or British drone (and no I couldn’t care less about US drones) only a Chinese manufactured drone which leads into not just one but two scare stories of the week.

The Atlantic article takes a lot of unpacking. The Guardian article on the extremely toxic Bannon very definately requires a hazmat suit and a shower. I think both articles are problematic.

https://www.theatlantic.com/magazine/archive/2020/09/china-ai-surveillance/614197/

Despite China’s considerable strides, industry analysts expect America to retain its current AI lead for another decade at least. But this is cold comfort: China is already developing powerful new surveillance tools, and exporting them to dozens of the world’s actual and would-be autocracies. Over the next few years, those technologies will be refined and integrated into all-encompassing surveillance systems that dictators can plug and play.

https://www.theguardian.com/politics/2020/aug/01/steve-bannon-hails-dominic-cummings-and-predicts-lurch-to-right-for-no-10

Bannon urges Johnson to focus more on manufacturing rather than ensuring that Britain resembles a “Singapore on the Thames”, shorthand for a low-tax, lightly regulated economy.

Clive Robinson May 4, 2021 11:02 AM

@ echo,

Yup GCHQ like many of their ilk do not get paid by results but by the illusions they create of results. As their results are “Oh so secret” then those auditing them have the disadvantage of not being able to audit them properly so any old nonsense can be passed off…

With regards the drone tracking article it looks like there is something the authors have not considered when they say,

“This AI application would also be unaffected by any relay towers or other signal spoofing mechanisms the pilot may have put in place.”

Their method apparently relies on where the pilots “effective” eye is located. Otherwise this would not be true,

“But that location might also be a long distance away, possibly making the operator more prone to errors in precise tracking of the drone. Whereas a pilot operating nearer to the runway may not make those same tracking errors “

Or this,

“When a drone is far enough away, motion along a pilot’s line of sight can be harder for the pilot to detect than motion perpendicular to their line of sight.”

That is the assumption is the pilot is neither “autopiloting” via inertia and GPS sensors,or using an “onboard camera” that relays back to pilot from the drone making the pilot eye to drone location zero thus keeping the sight lines with distance error zero for the entire flight as well.

echo May 4, 2021 11:03 AM

@rrd

To keep things simple the short version is ego and reality are not the same thing and it is very very easy to keep tripping up on this.

“Before enlightenment chop water carry wood.
After enlightenment chop water carry wood.”

And so on.

In the formal sense at least I have forgotten more about religions and philosophies than, statistically speaking, most people will ever know. They are interesting subjects and I spent years reading and discussing them as a hobby but in all honesty unless your business is building religious palaces or writing books to sell to the gullible there is very little point.

“Words can convey meaning but words cannot convey understanding”.

You completely missed the infographics I posted. They had reasons plus a lot of other reasons. If you missed this what else are you missing? Go outside and stare at a bush and feel the wind if you want a religious fix.

“Wherever you go there you are”.

echo May 4, 2021 11:03 AM

@Clive

Yup GCHQ like many of their ilk do not get paid by results but by the illusions they create of results. As their results are “Oh so secret” then those auditing them have the disadvantage of not being able to audit them properly so any old nonsense can be passed off…

There’s a lot of that about across the whole system and I don’t see Cummings as the answer.

That is the assumption is the pilot is neither “autopiloting” via inertia and GPS sensors,or using an “onboard camera” that relays back to pilot from the drone making the pilot eye to drone location zero thus keeping the sight lines with distance error zero for the entire flight as well.

They asked a question and did the deskwork. It’s valid and I give them marks for initiative but also smacks of bureaucratic reasoning as you note.

While they do focus on line of sight I think it’s valid. I imagine not all scenarious will necessarily have GPS and cameras working (nor even the wifi signal). I expect they’re less concerned about military grade stuff but more concerned with things like urban guerrillas then dropping a mortar on them. GPS can be blocked. Vision is a lot of signal to hide. Controls are pretty light on data.

Clive Robinson May 4, 2021 11:04 AM

@ David8,

Colour me unsuprised…

I don’t know how long you’ve been reading this blog but from time to time I mention I advise people,

Paper Paper NEVER Data

For transfering information to a hostile entity (and they are all faily well hostile in this great competative world of sue or be sued, kill or be killed etc).

This just proves the case yet again, and hopefully people will not just remember but learn from this example.

The way to avoid this if you have to submit “electronic documents” is basically,

1, Get a nice new clean computer.
2, Print out the required documents from the private side or “dirty computers” at lowish resolution.
3, By hand scribble on an identifier, and if required “redact” with black marker. Any you do redact photocopy the redacted page and destroy the original so only the photocopy remains.
4, Scan them in as whole page images into the clean computer at moderate or low resolution “to save hard drive space etc”.
5, Rebuild compleate documents in PDF form.
6, store the papers once scaned in a secure place.
7, Submit PDFs to the people who want “electronic submission”.
8, if they complain offer them photocopies at their expense of the pages you’ve stored away.

Oh and remember the law only requires that the documents be readable to the human eye. That is there is no requirment for them to be of sufficient quality to be OCR’d.

I have also mentioned about “digital watermarking” of images back in the 1990’s and how it turned into a bit of a war. Which kind of ended when the UK Cambridge Computer Labs came up with a bit of software that twisted the image in two dimensions and slightly compressed and stretched it in two dimensions as well. It did not effect how human eyes percieved it but digital watermarking failed, as did OCRing.

But all organisations should have a regular (say three monthly) “Archive and Data Purge” cycle as a standard business process. If you do it the right way requests for “electronic discovery” have to fall back on what ever “Archive” format you have chosen to use. As we should all know by now electronic archives are the targets of hackers and other criminals and are thus “highly toxic”. Thus for the sake of security that all companies are bound to legaly with their shareholders and others, and noting the law whilst requiring archives be kept does not require them to be electronic. Suggests paper and microfiche might be a better option all round.

Clive Robinson May 4, 2021 11:04 AM

@ Anders,

BTW, is there in UK PSTN still available?
Can you use ordinary modem today?

Yes you can still get “Plain Old Telepone System” (POTS) lines today, in fact in terms of “geographical area” much of the UK is still POTS based.

The reason is history and the law. The law passed years ago requires “universal coverage at a uniform price” much like the postal service. Obviously it’s not profitable to run miles of cable to a single user so back then the telephone service supplier was required by first regulation then law. But nothing over a basic voice service was put under that requirment.

Thus whilst you may have a telephone pair to your “demarc” there is no requirment for say data services of any kind to be offered. Back in the mists of the past they even argued that a line suitable for modems was not included, however that did change when it was pointed out it worked within the basic service specification.

So yes modems do work in some places, however I do not know about all. Most modern POTS lines are only good to the local “cabinet” or “exchange” these days before it all becomes digital and runs across a TCP/IP national network.

Interestingly a little known feature of GSM mobile phones is that there is a built in “modem” that will work phone to phone and use the equivalent of an “audio circuit”. I use this from time to time as it can be a way around Internet “outages” in more rural areas but at 9600 equivalent it’s “slower than a two legged dog”.

P.S. With regards the German break of Whatsapp on Android without malware, lets just say “Colour me unsprised” as I could see that coming from several years back 0:)

rrd May 4, 2021 11:05 AM

@ echo

“Words can convey meaning but words cannot convey understanding”

Clive is so valuable here precisely because his words convey his understanding.

They are interesting subjects and I spent years reading and discussing them as a hobby but in all honesty unless your business is building religious palaces or writing books to sell to the gullible there is very little point.

dilettante: a person who cultivates an area of interest, such as the arts, without real commitment or knowledge

The only religious palaces I want to build are comfortable homes housing loving people conscious of how their attitudes and behaviors affect the rest of our world society.

Go outside and stare at a bush and feel the wind if you want a religious fix.

Thanks for Dunning & Kruger data point number eleventy trillion.

Confidence without understanding is a negative attribute. It is destroying America as we speak. Such people explain themselves perfectly without ever saying anything of merit.

echo May 4, 2021 11:05 AM

@rrd

Thank you for knowing more about my life and activities than I do, and trying to flatter and rope in external “authorities”, and “virtue signalling”.

I’m not writing up essays on stuff you need to experience yourself.

I am also not American. Honestly, PAY ATTENTION. <- Zen lesson.

Anders May 4, 2021 11:06 AM

@Clive

Here POTS is dead. RIP. Impossible to get line any more
and therefore modem, as we know it, is unusable 🙁

“Interestingly a little known feature of GSM mobile phones is that there is a built in “modem” that will work phone to phone and use the equivalent of an “audio circuit”. I use this from time to time as it can be a way around Internet “outages” in more rural areas but at 9600 equivalent it’s “slower than a two legged dog”.”

In old days i’ve used GSM data connection for internet access, 9600,
but this required support from GSM network and dialup to provider special number. I’m not aware making GSM data connection between two handset. How do you do that?

echo May 4, 2021 11:06 AM

@Anders @Clive

In old days i’ve used GSM data connection for internet access, 9600,
but this required support from GSM network and dialup to provider special number. I’m not aware making GSM data connection between two handset. How do you do that?

I used a Nokia 3510i to browse and post on web forums over a POTs link via Google in the past. It was more of a “look what I can do” thing than any real need. After a jolly good clear out I threw my old 56K modem out the other week. It’s been crossing my mind to buy some modem cards for my laptops now they are stupidly cheap but this is another “look what I can do” thing.

There’s stuff I can do which I’m shy of talking about because it falls into one of those “not a secret but if everyone else knows they will bandwagon and the phone companies will find out and the price will go up” kind of things.

echo May 4, 2021 11:07 AM

https://nypost.com/2020/07/27/tesla-engineer-retools-sad-old-chocolate-chip-for-max-taste-melt/

Silicon Valley, long obsessed with computer chips, is now disrupting chocolate ones.

I doubt that very much.

https://www.msn.com/en-us/finance/companies/a-tesla-designer-reengineers-the-chocolate-chip/ar-BB178wQc

“The chip isn’t a designed shape,” says Labesque. “It’s a product of an industrial manufacturing process.”

Yes, we know.

Optimisation, and processes, and least cost have done appalling things to a lot of things. One example is the Neopolitan pizza versus the so-called New York pizza. These two pizzas are about as far apart from each other as you can get. Both are designed and both have processes and cost is a factor but what goes in and how it mixes up and what comes out are wildly different because the mindsets and starting points and traditions behind them are very different. Lather, rinse,and repeat for everything from chocolate to CPUs. I don’t see why security is any different.

I’m going off the news aggragator Slashdot quite a bit as it has an American bias and is part of the cycle of search engine and media backscratching to sell stuff.

https://www.osnews.com/story/132146/nvidia-is-reportedly-in-advanced-talks-to-buy-arm-for-more-than-32-billion/

Nvidia is reportedly in ‘advanced talks’ to buy ARM for more than $32 billion.

I am NOT a happy bunny.

Anders May 4, 2021 11:07 AM

@echo @Clive

PSTN modems are currently dirt cheap, you can even
get once top models with very fancy features just for free.
Another question is how to use them today (without the line).

GSM modem could be useful if you can connect two of them together.
But i’m not aware that this can be done, as far as i know, GSM modem
can talk in data mode only to cell tower.

Yes, i can call to another cell phone and then have open audio channel. Then i can use some modulation technique on top of that. For interfacing i could use acoustic coupler like very early modems did or build an interface for audio. But i want to avoid that. So let’s Clive tell us what he had in mind.

Clive Robinson May 4, 2021 11:08 AM

@ Anders, echo,

In old days i’ve used GSM data connection for internet access, 9600, but this required support from GSM network and dialup to provider special number. I’m not aware making GSM data connection between two handset. How do you do that?

The answer is you ask the radio unit in the phone to do it using stabdard extentions of the older modem AT commands. Yes it realy is that simple, the problem is that most handset designers and OS builders try very hard to stop you.

Back before GSM existed I was involved with BT engineers up at “Old St London” and RACAL engineers working in an old manner house just off of a bridge over the A3 going from Kingston to Raynes Park.

The problem was that the original cellular service used “inband signalling” and this caused short drop outs in the audio path. These droppouts caused all sorts of issues with traditional POTS modems especially those that had the ability to “tune themselves” to the audio path to get that extra bandwidth (9600baud is not as nice as the theoretical maximum of ~19.5kbits per second, the much later higher “bis” speeds were actually obtained by data compression that adding microcontrolers to modems made possible).

Any way I proposed and built a working modem using standard modem parts and a little analogue and digital trickery in a Z80 processor, and demonstrated it working… It got the cold shoulder as it suffered from NIH both at BT and RACAL[1]… The official excuse was that it was not delivering full specification data rates… Which as I’d pointed out before even starting was never going to be possible without comming up with a compleate set of brand new signaling systems in custom chips that was going to be way way to expensive… I guess dumb managment had that stupid $$$ shine in their vision and that “kerching” noise in their ears and common sense was never going to happen for them (or the British Government that wanted a big pie to slice up their way, and as I’m sure others can confirm the three specialities of the UK Government are, imbecilic, venal and vidictive behaviours, that would shame a six year old playground bully oh and a side order of grandious dillusions and narcissistic personality disorder at higher levels).

Anyway the large loss of money BT and RACAL had by not delivering became a bit of a joke in the industry and those on standards boards for “Digital Telephony” ensured that when analogue celluler got replaced with digita standards compliant modes were built into the system.

So whilst you might need your mobile service provider to allow you to do cellular modem to POTS modem comms, mobile to mobile modem comms should work OK.

My suspicious mind is that the service providers needed only a little push from the SigInt agencies to stop POTS to mobile, and they in turn would have put preasure on mobile phone manufacturers and OS makers to not support what was actually a requirment in the specifications that went into GSM.

Oh if you want to play with it, Motorola make mobile phone radio units for people to build into products like traffic light control systems. If you download one of their G24 manuals you will have a big chunk (over 500pages) of information on how they do Modem and FAX as well as the data modes used in mobile broadband,

https://www.manualslib.com/products/Motorola-G24-Guide-2812150.html

Whilst the units are not expensive and you can program them to do all sorts of clever things in Java the connector they use is not easy to get hold of so have a chat about getting “developer systems” other than Motorolas.

Alternatively there are a number of “top hats” for both Raspberry Pi’s and Arduinos that have GSM RF heads on them, have a look at the manufacturers data sheets before you buy them though.

Anyway I hope that helps and if you want gives you hours of fun. One project might be to hook one onto the TFC system that Markus designed and pops up hear occasionaly to talk about.

[1] Whilst this was the first time I had come up against “Not Invented Hear”(NIH) syndrom in commercial entities, I ran up against it twice again with BT and once again with RACAL. They both had a fixation on using multiple high end 68000 CPU’s with lots of RAM and custom DSP chips for their projects that usually failed to work on time because their software people were away with the Ivory Tower loonies. I on the other hand used single Z80 CPUs a few kbytes of RAM 32kbytes or less of ROM and one or two diet cheap analog to digital IC’s etc you could get out of any electronics catalogue from basic hobbyist through to the largest. Oh and the software was usually early very early…

Weather May 4, 2021 11:10 AM

@Clive @Anders

I’m sure others can confirm the three specialities of the UK Government are, imbecilic, venal and vidictive behaviours, that would shame a six year old playground bully oh and a side order of grandious dillusions and narcissistic personality disorder at higher levels

Yup. Soe of the stories in the media this week including today which reveal the mindsets and working of the state make my stomach churn. It’s very old and familiar stuff.

Also… among all this earlier Zoom nonsense nobody noticed Jitsi temporarily caches video call data for group calls.

https://www.bleepingcomputer.com/news/security/smartphones-from-11-oems-vulnerable-to-attacks-via-hidden-at-commands/

AT (ATtention) commands, or the Hayes command set, is a collection of short-string commands developed in the early 1980s that were designed to be transmitted via phone lines and control modems. Different AT command strings can be merged together to tell a modem to dial, hang up, or change connection parameters.

Unknown to the common user is that modern smartphones include a basic modem component inside them, which allows the smartphone to connect to the Internet via its telephony function, and more.

Oh, whoopsie.

https://techcrunch.com/2019/11/08/android-baseband-flaws/

The research, shared exclusively with TechCrunch, affects at least 10 popular Android devices, including Google’s Pixel 2, Huawei’s Nexus 6P and Samsung’s Galaxy S8+.

The same news over one year later…

MarkH May 4, 2021 11:11 AM

@Philipp:

From a news report dated 31 July:

Lowndes County in south Alabama has now seen twice as many deaths due to coronavirus than it saw in the last 10 years combined from the flu.

It’s the strongest example in the state of a trend that has now been clear for some time – COVID-19 is not “just a bad flu.”

Lowndes County is presently suffering worse than the rest of the state. However, Alabama as a whole has already recorded more deaths from Covid-19, than have died there from flu in any of the past 20 years. Because the virus is still spreading rapidly in Alabama, total deaths will likely exceed the current tally by a large margin.

Remind me, please, when was the last flu epidemic in which some U.S. cities used refrigerated trucks to store corpses because their morgues were at capacity?

In what system of measuring loss of human lives, is being greater by a factor of twenty classified as equality?

What’s your term for a person who still says that this virus is no worse than ordinary seasonal flu?

SpaceLifeForm May 4, 2021 11:11 AM

@ Weather

I am having bad C+P issues with controlc. When I put it into a file via vim, all kinds of double slash comment lines appear that are obviously not in the code.

Can you try hastebin?

I want to get this built on linux. Obviously, I will have to tweak the includes.

Thanks!

Clive Robinson May 4, 2021 11:12 AM

@ Anders,

I only ever used it from mobile to mobile not to PSTN POTS modems. Also it’s been about a decade now but from memory I used the normal AT commands for GSM/3G which are more or less the same as you would use with any serial modem (+++ ATZ ATDT ATO ATH etc).

The versions of the Motorola G24 I used had the choice between using a standard –inverted 5V– RS232 serial interface or a USB1 interface.

For a terminal device I chose to use a 386 or 486 PC with the 16550AF UART[1] with a meg of memory running Dos 3 or DOS 5 and the Mirror software from a single 720k floppy (the advantage of Mirror was that not only would it do the likes of Zmodem it also had a built in editor that used the same “wordstar” key combos used in the Turbo IDE’s for C and Pascal. It also enabled you to “shell out” and run a DOS command or command line .COM or .EXE file and yes I still use it but with MSDOS 5 [2]. I also ran a modified version of PC-Kermit on a 486 to do remote network and printing and even FAXing via a trick with the FAX software loaded into high mem and looking like a modem it’s self.

I’ve still got some of the stuff in a box somewhere left over from the “Taxi Job”, as far as I’m aware the older units are still working but the newer ones use GPRS and later broadband data connectivity which is effectively free if you change the *#99 to your own network service provision (don’t go there it’s a world of paperwork hurt you realy do not want to get into).

But it would not surprise me if connectivity to POTS modems has gone, because the “modem” in the mobile phone is not a real analogue channel modem, but data channel to the provider MSC where a hardware backhaul card would have the appropriate analogue interface.

As I’ve mentioned before over the “Jack-Pair” system the GSM CODECS are based on a varient of Code-excited linear prediction (CELP) pushed out by the NSA. The thing about CELP codecs is whilst they work very well with human voices because they are so “predictable” modem signals at anything above around 2100baud are not at all predictable so just don’t work with GSM analogue voice channels. Hence the reason you can not encrypt human speach and send the encrypted data as a modem signal. It’s something the JackPair development team should have known about before they even thought up the outline specification of what they wanted to do.

[1] The original INS8250 and 16450 UART’s did not have RX buffering and thus would not work at 9600. Unfortunately the early 16550 chips had the buffer but you could not use it and some 16550A chips had other problems.

[2] In my view and I’m probably biased 😉 MSDOS 5 was the only version of MSDOS that was any good with 486’s as for MSDOS 6 it got hit by quite justifiable legal challenge from Stac Electronics over “DoubleSpace” which was a rippoff of Stac’s disk drive compression code Stacker. Microsoft got their asses handed to them on a plate and was ordered by a federal court to pay roughly $120 million in compensation. By which time hard drive prices had started to drop and their speeds had gone up removing the advantages of software compression for hard drives. Whilst MSDOS carried on MSDOS 7 along with Windows 4 became Win95, though you could strip out Win4 MSDOS 7 had lost most of the usefull commandline programs that came with MSDOS 5 and earlier.

Stac Electronics, which accused Microsoft of stealing its data compression code and using it in MS-DOS 6.0.[84] Microsoft eventually lost the subsequent Stac v. Microsoft lawsuit and

SpaceLifeForm May 4, 2021 11:13 AM

It uses four bytes and Hash’s them with sha, it then breaks the sha output into four blocks, making seven hashs to a different algo, that has minimal collision, when you get a hash to check you add 32 chars to testy[] and set checkortest to one, after the above table is generated you hit enter for the program to select chars that match testy and the table, which starts bruteforce them.
You have 96^4 table that uses that to select 96^10+ sha hash input.
You can change select to lower values for quickly bruteforce.
It selects the chars to use based on the ones used for sha input and the corspond algo hash.

The algo is differential attack the finds the inverse of byte range and the sha output.
The seven dwords in diffchar are the algo hash that gets tested on testy. The chardiff is the chars of sha input that match the output feed to the algo output.
You can change 92 to 0xff if you want to check 256^10 ,but I’ll would keep select at 50-80 and six gig of ram for malloc and max var value.

echo May 4, 2021 11:13 AM

This is an example of controlling the narrative and a reverse interrigation. It’s an example of a basic technique used in the UK by state sector authoritarians and jobsworths. You hit a wall of rote learned secrecy and lack of communication with a severely restricted bandwidth. Anything you say is pre-filtered, modified, then written down without the opportunity to verify the “historical record”.

The resultant court case often becomes an out of court settlement due to making the challenge as drawn out and horrible as possible and rarely gets to court. Even when it does and sets a precedent the pressure often continues as the state response is modified and the excuses and narrative adjusted just enough to find new loopholes. None of this is necessarily policy or necessarily “bad law” or guidance or “best practice” or professional standards but deeply against change dyed in the wool incompetent ass-coverers with a severe case of NIH and fiercely guarded comfort zones.

https://www.propublica.org/article/the-disinfomercial-how-larry-king-got-duped-into-starring-in-chinese-propaganda

Dolgova’s answers were not in the script. They were plugged in separately. King was expected to tape his questions without speaking to her. His skill at the give-and-take of interviewing, of sensing the moment and asking the right question that draws a revealing response, would not be of any use.

Rovou sensed trouble. The idea of lending the set — and his boss’s reputation — to a potentially controversial video that Ora couldn’t control disturbed him, according to three people familiar with the incident. Rovou worried that King could be helping a foreign government spread false information, reminiscent of Russia’s interference in the 2016 U.S. presidential election — a topic King routinely discussed with guests on “PoliticKING.”

Here is a collection of links from the other day which show how attitudes to the law, organisational flummery, and basic disinterest and cruelty happen on an all too routine basis.

https://www.theguardian.com/society/2020/jul/14/no-dss-ruled-unlawful-after-mother-rejected-by-lettings-agency

https://www.theguardian.com/uk-news/2020/aug/02/mod-asked-why-it-withheld-evidence-on-33-suspected-afghan-civilian-executions-sas-soldiers

https://www.theguardian.com/world/2020/aug/02/hassan-akkad-for-someone-from-syria-the-creeping-authoritarianism-is-vivid-in-britain

echo May 4, 2021 11:14 AM

An insight into the world of professional deception. I don’t doubt security services and political spin doctors have similar bags of tricks.

https://www.popularmechanics.com/culture/a33336282/magic-tricks-explained-steinmeyer/

But even given Steinmeyer’s relative anonymity compared with the Cooperfields and Blaines of the world, magic as a whole exists now in the age of YouTube. Type any trick into a search bar and you can view explainers and deconstructions of its mysteries in seconds—endless variations on invisible wires, trap doors, and rigged boxes. You can find books that lay out the mechanics of most illusions in sonorous detail, down to diagrams with measurements. Some of these tell-alls have existed for generations. Some of the more recent ones Steinmeyer wrote himself.

[…]

“Jim is an expert in virtually every area of magic—in fact, he’s singular in that,” says Richard Kaufman, publisher of the industry magazine Magiiand the author of scores of books about magic. “Nobody else is working at this level. People like Jim come along once every two or three generations.”

[…]

“My secret,” he says, “is that I keep a messy notebook. It has to be all three things: That you keep it, that it’s messy, and that it’s a notebook.”

[…]

Part of the challenge is that a trick has to tell a story, because magic above all is about storytelling. And the stories involve multiple layers of deception. “There are three scripts in a magic show,” he explains. “There’s the script where you ostensibly say what’s happening, which is often a lie. Then simultaneous with that, there’s the script of what you’re actually doing, so there’s a divergent thing where you’re saying one thing and you’re doing something else. And then there’s the script of how you’re maneuvering the audience through the act.”

The story should be both familiar and impossible. Audiences should recognize the magic about to be performed. “You want that thing where people go, ‘Ohhh, they’re about to divide a person into three pieces,” Steinmeyer says. “You want that thing to be very clear.”

Once magicians manipulate audience members toward certain expectations, those expectations can be subverted, and the audience can be dazzled, and fooled.

Clive Robinson May 4, 2021 11:14 AM

@ Anders,

But if you say it’s possible, i’ll give a try.

First off it worked with the Motorola G24 units I used (and I assume it still does). However YMMV dependent on the hardware and the network service provider.

Secondly when you read the comments on the Stackexchange page they appear to be talking at cross purposes.

That is if you read his reply mr “tcrossly” does not appear to understand what the questioner has asked.

He appears to think that the questioner wants to use the GSM modems without the cellular network. That is he thinks the questioner is trying to use the mobiles to talk to each other directly as some kind of mesh network.

Obviously mobile phones are not designed that way, so that will not work that way. Which is why he suggests Bluetooth that can work that way.

So to use the GSM modems you have to go through the mobile network.

It’s why you would actually send to the serial port / USB connection something like,

+++
ATV
ATH0
ATH1
ATDT 044,0800,1234~

That is you give it the number to dial through the cellular network (the commas are supposed to pause during dialing and the tilde to wait after dialling). This is quite different from the *99# used to get a broadband connection.

JoeNowsNothing May 4, 2021 11:15 AM

@Clive Robinson

re: Schrems II you wrote: “The authors of that paper have made a fundemental mistake, which in turn blights much of what they say. Untill they recognise this they are going to keep making incorrect assumptions.

[…]

Is US influence in the world on the wane, well yes, the problem is though that even a toothless tiger is still a danger to all around. The current US leadership are in effect the worst of the worst, they will quite happily destroy the world if it gives them a little more status and they have certainly not learned the lessons of 9/11…“

This topic is not in my lane, but I am glad that your side of the pond appears to be having some legal success here. Without President Trump et al. there may be more hope for the future, too.

It appears that on both sides of the pond, after 9/11 intelligence agencies may have screwed up focusing on foreign terrorists and discounting the white collar criminal, Russian, domestic terrorists, and so on, threats.

One problem with deeply flawed politicians is that they can be bought so cheaply, imo, given the resources of a foreign nation state. For example, please help throw an election my way (what for tens of millions, or less, of USD?).

[1] https://www.schneier.com/blog/archives/2020/07/friday_squid_bl_738.html#c6814848

Anders May 4, 2021 11:15 AM

@all,
People in 1980’s Yugoslavia got their act together for each other. This story is what ‘personal’ computing was all about:

hXXps://readersupportednews.org/opinion2/277-75/64361-the-lost-history-of-socialisms-diy-computer

Also, you should check out HAIKU os. I’m going to try it. It is supposed to be quite usable now. And, it should be more secure than ‘buntu’s.

hXXps://www.haiku-os.org

Enjoy AND STAY SAFE.

@rrd • August 2, 2020 2:33 PM

@ Philipp

Thank you for the James Baldwin quote. I just finished watching the 1965 British University debate between Baldwin and Wm. F. Buckley. Baldwin ran rings around him intellectually and got the only standing ovation!

I have studied the drooling, maskless types at our grocery store. They are indeed incredibly selfish and either truly or willfully ignorant of the fact that they are threatening the lives of others.

“Every Right you execise comes with an equally important Responsibility” a quote of mine.

I have a computer client who

rrd May 4, 2021 11:16 AM

@ Anders

I just finished watching the 1965 British University debate between Baldwin and Wm. F. Buckley. Baldwin ran rings around him intellectually and got the only standing ovation!

He was so very impressive that I’m sure that that debate changed many lives in England, and, likely, England itself, as affluent as that crowd was and as few TV stations existed in 1965.

The deep concepts he so eloquently conveyed still speak to those of us with ears to hear today — and always will — until we remake America (and this world) into what it CAN be: truly free, equal, just, generous, kind and compassionate. For every single human being on Earth, starting with the most destitute and least privileged.

A Frenchman I worked with overseas explained why they gladly pay so much for their social programs: Hitler capitalized upon the hopelessness of the uncared-for poor as his jealously hateful base. My coworker said Europe was committed to not letting anyone ever have such motivation again, as described in another Baldwin quote:

“The most dangerous creation of any society is the man who has nothing to lose.”

Ignorant to the meaning of this wise advice, the wealthy in America are really putting forth a lot of effort to have one heckuva going away party for themselves. Their choosing money over love has utterly blinded them to their predicament.

[ETA: The recent documentary “I Am Not Your Negro” just materialized, via our local library’s internet search and order system’s synergy with my wife’s delivery service.]

@ echo, Sherman Jay, et ALL

Thank you for knowing more about my life and activities than I do

Here’s another of Mr. Baldwin’s quotes I just stumbled upon:

“Whatever you describe to another person is also a revelation of who you are and who you think you are. You can not describe anything without betraying your point of view, your aspirations, your fears, your hopes.”

Seeing through a person’s words to the essence of their being does, however, require having been first broken open from the inside by love itself. Until we seek that heart-rending cataclysm of our selfishness, Love waits patiently, pleadingly, hopefully, knowing that that journey of self-evolution is our responsibility in return for this magnificent human life and robust playground, Earth.

Only when we love someone as our own self can we see them for who they truly are, for only then are the blinders of our prejudices ripped out of our beings, allowing us to finally behold the world and our fellows in their essential truth.

MarkH May 4, 2021 11:17 AM

Sometimes, serious security risks arise from unanticipated public behavior.

The headline from Jalopnik puts it well:

Lots Of Idiots In Private Boats Swarmed Where The SpaceX Dragon Capsule Splashed Down From The ISS

The boats didn’t come close until after splashdown, but their presence was still risky. For example, the recovery team stood off for a while because they detected toxic propellant in the air near the spacecraft.

SpaceLifeForm May 4, 2021 11:17 AM

@ Clive, Anders, Weather

History. Bootstraping. Hardware. Radio. Cassette. 4K Ram.

hXXps://twitter.com/doctorow/status/1289932294023610370

In 1948, Yugoslavia was expelled from Cominform, the Soviet information agency, in retaliation for its “non-aligned” status; deprived of information-processing capacity, the country created its own IT industry from scratch.

Yugoslavia’s high tariffs and uneasy status on the world stage meant that by the 1970s, members of the New Wave” – science and tech enthusiasts who clustered around the sf/electronic mag Galaksija – could only play with PCs by pooling their money to import western machines.

,,,

The normal 30,000 copy run of the mag sold out quickly and that issue was reprinted FOUR TIMES before national demand was satisfied: 120,000 copies sold, and 8,000 subsequent letters from hobbyists who’d built their own computers following the diagrams it contained.

These programs spread widely thanks in part to a radio show that broadcast the computer code as audio, intended to be recorded to cassette (the main storage mechanism for the system). Zoran Modli’s Ventilator 202 program broadcast hundreds of listener-supplied programs.

echo May 4, 2021 11:18 AM

@MarkH

Sometimes, serious security risks arise from unanticipated public behavior.

The headline from Jalopnik puts it well:

Lots Of Idiots In Private Boats Swarmed Where The SpaceX Dragon Capsule Splashed Down From The ISS

The boats didn’t come close until after splashdown, but their presence was still risky. For example, the recovery team stood off for a while because they detected toxic propellant in the air near the spacecraft

Yes there’s this and its opposite “by stander syndrome”. I suspect Youtube indrectly has some responsibility in this. There’s a lot of talk and analysis and “citizen journalism” surrounding SpaceX which SpaceX marketing encourages. This makes everything appear open and easy and I suppose lots of usually armchair viewers want to have a look but as you say safety protocols and crowds…

It struck me that the obsession with buying loo rolls during the pandemic may have been caused or encouraged in part by pre-pandemic “prepper” videos on youtube. Some of them had a fair few people commenting on them during the pandemic and some of the more amateur preppers who were second or third hand “experts” banged on about loo rolls. I think this content trended for a time and hapy have played in to the panic buying and made it worse. There’s other youtube content which worries me too whether it’s “confirmation bias” with some of the alleged KFC knock-off recipes orsome of the more calculated rules skirting Alt-Right material which infects movie and television and game reviews.

This is somewhat tangenital but having read “Colditz” by Pat Reid years ago thi week I began watching the television drama “Colditz”. Yes it’s hokum and with a modern and more informed eye can be nitpicked but I have never watched it before. Well packaged material like this with less sugar crazed and edgy and fast edited content has a lot of pluses going for it.

@rrd

Here’s another of Mr. Baldwin’s quotes I just stumbled upon:

Please do not assume:

A.) The person you are talking to is an ignorant idiot.
B.) Is remotely interested in anything you have to say on the topic.

Find another target because you are irritating and boring me.

Hands up who has noticed Boris Johnson hasn’t made the semi-ritual back slapping trip to the Whitehouse?

I’ve been reading up on “presumed loss of citizenship”. As we know Johnson was American born and held both US and UK citizenship. Reading through the law on this it seems Johnson may technically have lost US citzenship depending on whatthe judge thought of the case due to holding public office and swearing allegiances to the crown but this has increasingly not been applied. The real gotcha is that in giving up US citizenship for the purpose of avoiding paying US tax this not only results in loss of citizenship but also a ban on entering the US.

I have no idea what judges or legal experts on this may say. It’s just something which caught my eye.

While the issue of deepfakes whether video, audio, or text are a problem and bandwagonning are problems I’m not at all sure the dystopian future of being swamped in a fake reality and crushed by waves of opinion is the huge threat it is being made out to be. There is a value in “trusted brands” who are simply going to have to implement quality control and time to market restrictions. The more expertise is valued the less marketing has a grip. See rating versus ranking.

We surivived in the world before any of this “deepfake” stuff or social media monopoly platforms existed. Rules evolved to double check and make sure you knew who you were dealing with and professional standards were adhered to. Anyone taking the mickey didn’t last long.

No I’m not bothered by it.

https://www.wired.com/story/ai-generated-text-is-the-scariest-deepfake-of-all/

In the future, deepfake videos and audiofakes may well be used to create distinct, sensational moments that commandeer a press cycle, or to distract from some other, more organic scandal. But undetectable textfakes—masked as regular chatter on Twitter, Facebook, Reddit, and the like—have the potential to be far more subtle, far more prevalent, and far more sinister. The ability to manufacture a majority opinion, or create a fake-commenter arms race—with minimal potential for detection—would enable sophisticated, extensive influence campaigns. Pervasive generated text has the potential to warp our social communication ecosystem: algorithmically generated content receives algorithmically generated responses, which feeds into algorithmically mediated curation systems that surface information based on engagement.

And

Our trust in each other is fragmenting, and polarization is increasingly prevalent. As synthetic media of all types—text, video, photo, and audio—increases in prevalence, and as detection becomes more of a challenge, we will find it increasingly difficult to trust the content that we see. It may not be so simple to adapt, as we did to Photoshop, by using social pressure to moderate the extent of these tools’ use and accepting that the media surrounding us is not quite as it seems. This time around, we’ll also have to learn to be much more critical consumers of online content, evaluating the substance on its merits rather than its prevalence.

MarkH May 4, 2021 11:19 AM

@Anders:

I used to travel often in the former Soviet Union, and I’ve been familiar with ГОСТ (a Soviet standards set roughly comparable to Germany’s DIN) for quite a while, but have never seen the Soviet “quality mark.”

Perhaps by the time I started visiting in 2004, that generation of manufactured products had already been mostly supplanted by more modern goods, often imported.

An experience which gave me great amusement, was a visit to an institution in which most things were “left over” from Soviet days. The rooms had old (but not ancient) dial phones emblazoned with the name VEF TRANZISTORS, a product (I believe) of your neighbors in Latvia …

In Sankt Peterburg, most storm drain manhole covers say either “Peterburg Drains”, or “Leningrad Drains”. But I found one labeled “Petrograd Drains”, presumably dating to the years between the revolutions.

echo May 4, 2021 11:19 AM

https://www.youtube.com/watch?v=k6X_NS_Vkv8

Japanese and Australian farmers are competing for the U.S. wagyu market that will be worth $1.1 billion by 2023. WSJ visits one rancher using traditional methods to produce $200 steaks, and another who has invested in new technology to slash prices.

Yet another “data driven” deep fake. As far as human beings go in the medical sphere things like BMI and even the endocrinological mechanism for body fat are either driven by an insurance sector dogma or simply not fully understood. Yes, things can be done with cows and breeding methods and raising methods but ersazt wagu is still not wagu and no amount of foot stamping or marketing has changed this.

You see similar things happen in the fashion industry or beauty industry. Machine stitching is no substitute for couture stitching. Likewise, there can be some excellent “dupes” around but top end makeup is very much the better product. I routinely wear a particular brand of foundation what is a “drug store” or “high street” makeup which is very close to a premium brand which costs three times as much, and most people would neither know nor care, but there is a quality difference in tone and coverage of the premium brand not replicated in even the best “knock-off”. It’s the same with volumising mascara and pretty much everything else too.

Weather May 4, 2021 11:20 AM

@Spacelifeform,all
I think the medium for data transfer is going more to wireless instead of wired, it has a lot of security impactions, you can send one packet to anyone in range, with more things have rf receives around the house, it doesn’t have to be the standard wlan Bluetooth.
Induction of copper traces, all though not enough to reach 3.3-5 volt might be enough to switch from 1-0,0-1 .
With the audio , a radio or TV could effect a cellphone or computer microphone.

Something I would like to try if I had the electronic skills, would be a copper wire cut to 100mm, one end a square wave generator that is 50% duty cycle from 0-1-0 ,the other end a connection to a comparator ,which it connected to the generator.
And blast it with interference and see if I could make a binary counter by adjusting the interference.

Anders May 4, 2021 11:21 AM

@ Clive, lurker

Yes, you do want Ammonium Nitrate in high humidity conditions, such as can be expected at sea-level. Easy to create explosive gas.

But, here are two things that point to it not being just 50 tons of Ammonium Nitrate, stored illegally and/or improperly.

First, based upon physical damage from the shockwave, the estimated force would be around 240 tons of TNT.

The chemistry-math then would require way more tons of Ammonium Nitrate to reach 240 tons of TNT.

The area of the explosion just east of the grain silo is/was designated for Non-hazmat.

Anders May 4, 2021 11:22 AM

Maybe enduring many different colds over years is a good thing?

hXXps://medicalxpress.com/news/2020-08-exposure-common-cold-coronaviruses-immune.html

The new work builds on a recent Cell paper from the Sette Lab and the lab of LJI Professor Shane Crotty, Ph.D., which showed that 40 to 60 percent of people never exposed to SARS-CoV-2 had T cells that reacted to the virus. Their immune systems recognized fragments of the virus it had never seen before. This finding turned out to be a global phenomenon and was reported in people from the Netherlands, Germany, the United Kingdom and Singapore.

Clive Robinson May 4, 2021 11:23 AM

@ echo,

You can make a “penny stove burner” out of a couple of fizzy drinks (soda/pop) cans, in about half an hour with little more than the two cans, a sharp knife and a large “darning needle” to make the burner holes.

You can also take a large food tin (like the ones boild tats get sold in) and using a pocket bottle/can opener put v shaped ventilation slits in the bottom you can then put a “tea light” or other candle in it and put an ordinary ceramic tile –you’ld grout to a wall– on top and cook food on it (I’ve made bacon and eggs on it as well as frying the bread[1]).

The trick is to not heat / cool the tile to quickly. as a demonstration I have a brown china 2pt tea pot and a fairly thick multi layer cotton “cosy” which is on a stand above an “oil lamp” that can light a large kitchen table sufficient to read a book or do work on. If you fill the tea pot with cold water it slowley heats to boiling point and you can drop a tea bag in. After you’ve brewed you can take a 1/2 pint out and top the pot with a half pint of cold water poured in carefully. You can get about 3-4pints of tea out of one PG bag which lasts me a long winters evening.

But the one that makes most people supprised is a “leather cauldron”. Untanned Leather is pourous and “won’t hold water” that is it seeps out slowly. Now if you have a large piece of leather and you soak it it eventually gets saturated. If you hang this above a small fire and fill it with water after a while the water will be hot enough to cook with. Importabtly you can put clay pots in to heat so you can render down fat and gelatin from pig hide, bones and similar giving you tallow that has many uses and gelatin for making things like jellies but more importantly for preserving food in earthenware pots.

But getting back to larger tin cans you can by putting more triangle holes in the top / open end of the can turn it into a “hobbo stove” such that you can burn twigs etc reasonably efficiently. You can make it more efficient by using two large catering cans or drums. The outer one is used to turn it into a “down draft” burner that like a rocket stove with a long chimney is not just more efficient it produces little or no smoke once hot because it burns the volitile tars that contain over 50% of the available calorific fuel. A variation on this is “gassification” by which you can do two things, firstly heat water, secondly push the “gas” into an engine like that of a motor bike, car or more importantly a generator[2] and also collect the exhaust heat in mass storage.

To have slow release heat you realy need “dry rocks and towels” you heat the rocks up by the fire and then wrap them in towels and use them like a hot water bottle in your bed / sleeping bag. The Hawaiian fire pit that a Luau pig is cooked in for five to twelve hours or so works this way. The recipe is dig a deep hole chuck in dry wood and rocks till about half full light wood and let it burn. When it’s burned right down cover the hot rocks witk palm leaves or similar even tall green grass will work, ontop of this add wet sacking add earthenware pots and the unskined but gutted pig add more wet sacking and fill up with earth. Go and do something for the next few hours whilst it all slow cooks. Then uncover chop up etc and serve to 20-50 hopefully hungry people.

But with regards radient heat you can build a harth on the end of a tent without using a plastic window… If you have a traditional ridgepole tent with openings at either end what you do is dig a shallow fire pit and surround it with rocks to stop the fire spreading. You put the tent up with one end towards the fire pit. Behind the fire pit you build a wall of split logs that act not just as a fire reflector but wind break/chimney. What you do is you alow a small flow of air to come through the bottom of the tent into the harth which causes the smoke and poison gases to rise outside the tent. But the radient heat to shine in and heat the inside of the tent. A friend showed me how to do this but using “fire cloth” which is made from fiberglass or similar but not as it still is in some places asbestos.

But the “fire pit” is not the only way to slow cook without an active fire. You can try this one at home quite safely all you need is a large box and an old duvet or smaller scale a wide necked thermous flask. Put a pot on the stove into which you have added finly choped vegtables and meat add about twice the wight of water. Brink it to the boil and pour into your thermos or put the covered pot into the middle of the duvet in the box so it is well surounded. Leave for four to eight hours either whizz it up in a food processor to make chunky soup or if the meat you used had lots of gelatin in it serve as stew.

It’s known in the UK as “Hay box cooking” and I do quite a bit of it as you can cook a large amount of food in one go without it sticking or burning in the pot. When it’s cooled sufficiently devide into meal sized portions you can put in the fridge or freezer to microwave quickly when you get in from work and it’s cold wet and miserable outside. My gran used to go shoping saturday and prep it all then bring it to the boil slowley whilst getting ready to go out. She would then put it in the hay box and hop of to work down at the local pub. Thus there would be a hot meal on getting back and “food for the week” that just needed bringing back to the boil once a day to stop it going off. She also used to cook large joints of meat this way for sunday lunch just poping the cooked joint in a very hot oven to brown off and crust whilst also doing the “roasties”. She certainly viewed it as a good way to cook because you did not have to stand over the stove cooking for hours.

[1] the trick is to cook the bacon first and as the fat comes out lift the bacon and drop on a slice of bread to soak it up then remove it and drop the bacon back on the tile till you get more fat repeat as necessary turning the bread over so both sides get fat. Then take the bacon off and using a small tin as either a cookie cutter to take out a circle from the bread or like a muffin ring on top of the tile drop the egg in to cook.

[2] A piece of “madness” for you, have a look at the back of your “energy bills” and see what you are paying per kWh for gas and electricity… In some places the price difference is way more than “generator losses” thus using a generator run off of gas is less costly than getting it off the grid… And that’s before you think about capturing the heat from the exhast gas for heating water / mass storage. Another friend that has a large solar and wind generator system actually pushes out nearly all they generate from that to the national grid because the pay pack they get more than covers the gas for generation at peak times and to provide hot water to top up their “ten ton slab” under the house that acts as a “storage heater” good for a week or so of home heating even in winter[3].

[3] For my friend the biggest running expense is actually the “fridge / freezer”… If people actually measured it they would be shocked at just how expensive they are to run. Worse they are usually in the hottest room of the house so are facing an uphill battle… And due to the way the “energy efficiency” ratings are measured it’s now hard to find freezers in the UK that will work in environmental tempratures of below 10C / 50F which is ridiculous but true (they had to go there “chest freezers shipped in from Sweden…). They don’t use a fridge very much but an “evaporator cool box” which also acts as a form of “air conditioning” in essence you blow air across a wet surface and thr evaporating water cools not just the air it humidifies it, it also cools a secondary water system that takes heat out of the cool box. You can get upto 10C differential that way. In an emergency you can do the same trick with a wet towel and a large shalow dish. Just wrap up what you want to keep cool in the towel put it in the dish and get the towel wet but not dripping as the water evaporates it lowers the temprature inside the towel. You see people doing this in the mediterainian a bottle or flask is filled with a drink, this is wrapped in a wet cloth and put in a shady but breezy place after an hour or so you have a cool drink.

Anders May 4, 2021 11:25 AM

@ MarkH,

CNN has an “ex CIA” guy saying it couldn’t have been ammonium nitrate, because of the orange color of the fireball. Color me skeptical, of this self-anointed “expert”.

The colour of burning gives spectral information on the atoms involved. Much like flicking table salt into a gas flame (try doining it with normal sodium only table salt and the potassium mix used as “low salt”[1])

In a similar manner smoke an vapours also reveals information about the chemicals involved.

Think back to school chemistry where you poured con nitric acid on copper turnings.

[1] Yes it’s the same potassium compound as is used to make the “leathal injection”…

@all
AN is normally stored with 1-2% boric acid to stabilize it, sodium nitrate can’t detonate but AN because of excess fuel in the chemical.
NOx makes a orange cloud, NH4NO2 can make that.
Grain soilos can explode, but its more the fine Grain size that makes FAE.
Not sure whether it water or chlorine that can make AN spotanise detonate.
Can we change the subject..

Another sad angle of the blast.

And the massive shockwave that blows away buildings.

The building on the right is supposed to be an office building
for the power company. Was.

Reports are that the person taking the video did not survive.

Probably died instantly from the shockwave. Not debris.

2020 just flat out sucks.

hXXps://twitter.com/majdkhalaf1993/status/1290756807909089280

I didn’t see video from Beirut until a couple of hours ago.

Ye gods!

Poor Beirut.

CNN has an “ex CIA” guy saying it couldn’t have been ammonium nitrate, because of the orange color of the fireball. Color me skeptical, of this self-anointed “expert”.

reaperfeed.com/how-did-the-casio-f91w-become-a-terrorist-icon/

Interestly, wikimedia is very helpful here.

commons.wikimedia.org/wiki/Category:IED_timers_that_use_Casio_F-91W

The grain silo was basically empty.

But whomever was responsible for the construction, wow.

Pretty much the only thing still upright at port.

hXXps://twitter.com/Natsecjeff/status/1290896133141729280

@SpaceLifeForm

I just saw a photo of someone being blown up by a landmine. Yay for algorthmic suggestions. Fascinating though it was it wasn’t the first thing I had in mind when I woke up this morning.

Rodalco May 4, 2021 11:25 AM

echo

good observation on BoJo not making a trip to the US to be replaced with a replicant like Blair was, at that critical juncture in war developments

I had the understanding one is required to complete outstanding tax obligations in the US before renouncing citizenship. so it’s not as simple as attempting to dodge the tax that way otherwise it may be a very popular option for the wealthy.
One note on the travel ban to the EU, for the US passport holder.
This won’t mean anything to those, for example the billionaire class, who surely have at least one more passport and residency, to spare. ?

Also, one serious hazard of those types of ‘wildernes survival’ shows is the total disrespect for the environment they can promote. Wildcrafting one well known example. Every idiot goes out and starts foraging, decimating species.
I recall one recent iteration of the SAS survival manual, by a more recent author. There was a chapter with photos of the author eating raw zebra in Africa, to show it can be done, before returning to the safety of the UK and his local McDonalds.
Oh, bravo, big man. What a waste of precious life just for ego and show.

MarkH

Latvia was renowned for inventing a certain cast bronze mini-camera designed for covert photograph, used by many agencies of that era.
heavy in the pocket! the name escapes me. The country remains proud of it.

Driving Irwine May 4, 2021 11:26 AM

More from NIST
General Access Control Guidance for Cloud Systems SP 800-210

RFC – hxxps://csrs.nist.gov/publications/detail/sp/800-210/final

Control Baselines for Information Systems and Organizations DRAFT SP 800-53B

RFC – hxxps://csrc.nist.gov/publications/detail/sp/800-53b/draft

I would suggest that both publications are of interest to InfoSEC practitioners. The first document is for final release, the second is in draft form and still a work in progress. I cannot speak to the qualitative value at this point until a thorough read is done–or some else bets me to the punch.

just to comment on the ‘women in charge of Co Vid do a better job’

Two of the female premiers in Australia are responsible for the biggest and 3rd biggest States in the country. (NSW and Queensland respectively)
Their policies, world view, emotional quotient, and general status on the sociopathic spectrum, all put them fairly shoulder to shoulder with someone like Thatcher.
The Queensland premier is wholly supportive of the Adani coal mine operation in Queensland, including funding Adani via hundreds of millions of dollars. Despite them being proven to be acting illegally, and Adani stealing local water supplies while the state both suffered outrageous drought and bushfires, and stealing Indigenous land.
so, in context of broad brush comparisons – let’s not be so unkind to women

Clive Robinson

Thankyou for your great response about document submission.
Now, I am aware you have discussed this subject here before in detail. I’m aware that most of us grok the technical components of that particular offering.
I am wishing to present that post to friends and colleagues who are 0-3 on the technical scale. Their OpSec comprehension is roughly equivalent or lower.

So, it’s easy enough to explain to such folks about OCR and why to defeat it. Forcing the adversary to deal with paper submissions or an electronic submission they can’t convert into a searchable database.

Someone else here asked why an IMG file doesn’t suffice. Putting aside the concept of certain software able to extract text from IMG – are you able to
break down the reasoning behind your strategy?

What is the problem with the probable fingerprinting/bread crumbs occurring with the source ‘dirty ‘ computer ?

Why the need to manually identify each page by hand – is this just as not to do it electronically? It means your unique identifier can’t be scrubbed yet can’t be included in the catalogue?

There are probably some other questions but that covers the basic gist of it.
Just for the purposes of explaining the process to the non-literate

Oh, there is software that applies a transparent GIF over a file. It’s invisible and non detectable via ordinary means. However any attempt to print the file will result in a very black page of A4. I’ve seen this work with
email. It’s not indomitable, some advanced software can defeat it but for general use in situations like legal submissions it’s kind of helpful.

name.withheld.for.obvious.reasons May 4, 2021 11:26 AM

California Dreamin’
On Sunday, 2 August 2020, ran across an electronic California vehicle license display, not a plate.

Has an e-Ink type display, quite legible, with a state issued license number (not a plate) and a registration date displayed. Did not go into the technical issues with the owner but it was obvious that the data on the plate is mutable. The driver said that there would be customizations available to the owner, kind of like a running vanity plate. Also some form of amber alert and/or stolen vehicle capability.

If I guess right, there is either a zigbee or 802.15 network interface for remote access/programming (could be 802.11 but that would seem heavy). I would hate to think it is blue tooth enabled. Have to look into it further, just throwing it out as there would seem to be; “Oh, we forgot to encrypt any channels that communicate with the plate so session hacking or duplication might be a thing.” I would assume some sort IMEI/serial number interlocking mechanism, and if they wen’t heavy then maybe an IPv6 addr.

MarkH May 4, 2021 11:27 AM

@Clive:

No chemist I …

What I do remember from my pyromaniac school friend, was that adding a small amount of material (essentially, a contaminant) could visibly alter the color of a high-temperature flame.

The human eye is a very poor spectrometer, inferring color from the relative responses of 3 types of cone cells … as you well know, all sorts of techniques related to lighting, decoration, film and electronic displays rely on people perceiving some particular color while looking at sources with extremely disparate spectra.

I don’t know what color AN flames are supposed to be … I looked up photos of AN explosions and fires, and they looked pretty orange to me.

The CNN source inferred the presence of ordnance. Maybe there was a vast weapons dump at the port, but it seems a slender thread from which to hang the conclusion.

@David8:

That tiny camera was the Minox. Its first few years of production were by VEF, maker of the phone I saw …

bushmaster May 4, 2021 11:28 AM

Hope that all’s well, other than the inconveniences. Things are excellent here, which continues to be a pleasant surprise. The gravity of the unfolding humanitarian crises isn’t lost on me.

It will be omniviolence if the 96% of people who aren’t psychopaths or sociopaths get dragged into a conflict. I’d guess this ends with every drone carrying an IFF transponder that somehow demonstrates that the code hasn’t been hacked. The equivalent for human cells is displaying snippets of DNA for the police to inspect. Any cells showing signs of a bad attitude get a hardwood shampoo.

I’ve been superbusy, which isn’t as much fun as writing long and tedious screeds. I don’t recall seeing this posted, but we’ve definitely touched on this topic and many others. The Swiss have made some progress in drone regulation. That is the tip of the iceberg of projected intent.

I’m pleased to see the occasional mention of NakedCapitalism here. They do a good job of cutting through the disinformation screen put up by the anarchocapitalists.

Omniviolence Is Coming and the World Isn’t Ready – Nautilus
http://nautil.us/blog/omniviolence-is-coming-and-the-world-isnt-ready
Oct 21, 2019 – Emerging bio-, nano-, and cyber-technologies are enabling criminals to target anyone anywhere and, due to democratization, increasingly…

As always, today everything has it’s own wiki page.

en.wikipedia.org/wiki/2020_Beirut_port_explosions

“A security source stated that the initial fire was caused during welding work on a hole in a warehouse.”

So welding was the initial “spark”.

echo May 4, 2021 11:28 AM

@Clive

You can make a “penny stove burner” out of a couple of fizzy drinks (soda/pop) cans, in about half an hour with little more than the two cans, a sharp knife and a large “darning needle” to make the burner holes.

Yes I looked into those “can stoves”. One advantage of the Trangier is it has a felt wick on the inside. Another point to note when building a pan stand either out of flat pieces of metal or coat hangers (the equivalent of a Trangier mini stand) or whatever is at hand is the height above the stove. I think the Trangier is one inch… The height can make a significant difference to temperature and time to boil and fuel use.

Burning in cold weather can be problematic which is why Trangier sell a winter kit. This is a plate plus a small stand with an absorbant pad. You prime the pad and light it with the burner attached on top. This warms the fuel so it can ignite and also burn more efficiently. A less expensive method is to take a strip of loo roll (sigh) and make a wick. Place this in the burner and light one end. The burning of the wick warms the fuel and then ignites it.

I used to use meths but decided to move to bioethanol. It produces less smoke and is less toxic and has a higher energy content.

Here’s a page with a list of tests done with a Trangier. For thiskind of contraption it seems windshields make quite a difference to efficiency.

http://www.diamondspirit.net/adunk/trangia.html

But the one that makes most people supprised is a “leather cauldron”. Untanned Leather is pourous and “won’t hold water” that is it seeps out slowly. Now if you have a large piece of leather and you soak it it eventually gets saturated. If you hang this above a small fire and fill it with water after a while the water will be hot enough to cook with. Importabtly you can put clay pots in to heat so you can render down fat and gelatin from pig hide, bones and similar giving you tallow that has many uses and gelatin for making things like jellies but more importantly for preserving food in earthenware pots.

But getting back to larger tin cans you can by putting more triangle holes in the top / open end of the can turn it into a “hobbo stove” such that you can burn twigs etc reasonably efficiently.

Yes I’ve heard of the leather cauldron. Easily forgotten but as you note waste not want not.

Mors Kochinski designed a survival kit around a “billy can”. Everything you need fit inside the can. He also explains at length why he thinks the billy can solution is so good. One reason he doesn’t directly explain is his focus is Canada which has large areas containing not a lot and tends to get cold and has a lot of snow. Like a lot of things I suppose Mors solution is no better or worse than anything else just tuned to the environment he is expecting it to be used in.

Another form of the horribly inefficient “rocket stove” is the “Dakota stove”. You carve out a large circle and a smaller circle of ground and lift it out and set it aside. You then dig down to make one large hole and the chimney hole and join the two with a small tunnel at the bottom. It creates little visible light from the fire and can be filled in and the discs of soil can be replaced leaving no sign anyone has been there.

You can make it more efficient by using two large catering cans or drums. The outer one is used to turn it into a “down draft” burner that like a rocket stove with a long chimney is not just more efficient it produces little or no smoke once hot because it burns the volitile tars that contain over 50% of the available calorific fuel. A variation on this is “gassification” by which you can do two things, firstly heat water, secondly push the “gas” into an engine like that of a motor bike, car or more importantly a generator[2] and also collect the exhaust heat in mass storage.

This is a secondary burn? I think I’ve seen garden firepit designs and commercial products with secondary burn both set in the ground and freestanding.

It’s known in the UK as “Hay box cooking” and I do quite a bit of it as you can cook a large amount of food in one go without it sticking or burning in the pot.

A hay box is useful for storing potatoes over the winter in a pinch. You can use other materials too. Apparently, slaked lime is the best.

She certainly viewed it as a good way to cook because you did not have to stand over the stove cooking for hours.

Making stock by bringing a pan of chicken bones to the near boil or boil depending on the stock you want to make and popping it in a preheated oven is easier than standing over it too.

They don’t use a fridge very much but an “evaporator cool box” which also acts as a form of “air conditioning” in essence you blow air across a wet surface and thr evaporating water cools not just the air it humidifies it, it also cools a secondary water system that takes heat out of the cool box. You can get upto 10C differential that way. In an emergency you can do the same trick with a wet towel and a large shalow dish. Just wrap up what you want to keep cool in the towel put it in the dish and get the towel wet but not dripping as the water evaporates it lowers the temprature inside the towel. You see people doing this in the mediterainian a bottle or flask is filled with a drink, this is wrapped in a wet cloth and put in a shady but breezy place after an hour or so you have a cool drink.

My mum did this when the fridge broke and we were waiting on the repair man. She had grown up in the pre war days when not everyone had a fridge.

A large clay pot inside another clay pot lined with sand and filled with water forms an evaporative cooler too. Apparently this is a thing in the Middle-East.

echo May 4, 2021 11:29 AM

@David8

I had the understanding one is required to complete outstanding tax obligations in the US before renouncing citizenship. so it’s not as simple as attempting to dodge the tax that way otherwise it may be a very popular option for the wealthy.
One note on the travel ban to the EU, for the US passport holder.
This won’t mean anything to those, for example the billionaire class, who surely have at least one more passport and residency, to spare. ?

The US isn’t a signatory to any of the UN stateless or preventing stateless perons treaties. A fair few people were caught out by FACTA which is another example of the US exporting its law abroad. Since the IRS went after people owing taxes a few people discovered they were “accidental” US citizens without knowing it. Due to FACTA increasing numbers of US citizens who have settled permanently abroad have renounced their citizenship.

Also, one serious hazard of those types of ‘wildernes survival’ shows is the total disrespect for the environment they can promote. Wildcrafting one well known example. Every idiot goes out and starts foraging, decimating species.
I recall one recent iteration of the SAS survival manual, by a more recent author. There was a chapter with photos of the author eating raw zebra in Africa, to show it can be done, before returning to the safety of the UK and his local McDonalds.
Oh, bravo, big man. What a waste of precious life just for ego and show.

From what I can tell arguments and differences of opinion exist among SAS and ex SAS, as well as Royal Marines and I daresay other ex military. One issue is you have a gang of (almost exclusively men) with a lot of energy and sometimes idle hands and the excess energy has to go somewhere. It doesn’t always go into officially approved directions nor directions their colleagues or ex colleagues would necessarily approve of.

They appear to be able to tell the difference between reality and something for televisionad don’t always approve of what is in books or on television but appreciate people may have “issues” and need to make a living.

I’m not a fan of this kind of behaviour myself but people are human and have their worldviews and mental health issues. Book publishers and television producers have some responsibility for this too. “What is interesting to the public is not necessarily in the public interest”. UK officialdom in policy and practixe has a nasty nasty habit of writing people off and devaluing them, as we have seen during this pandemic if nothing else, and has little to no clue about chronic health problems. Ultimately this does not reflect well on the fantasists and cardboard warriors and sneaky nasty disgustly selfish and greedy people in Downing Street.

vaspup May 4, 2021 11:29 AM

@MarkH,Clive other interested bloggers
Beirut blast: What makes ammonium nitrate so dangerous?
https://www.dw.com/en/what-makes-ammonium-nitrate-so-dangerous/a-54452221

“Ammonium nitrate is a white crystalline salt that can be fairly cheaply produced from ammonia and nitric acid. It is soluble and often used as fertilizer, as nitrogen is needed for healthy plant development.

Ammonium nitrate in its pure form is not dangerous. It is, however, heat sensitive. At 32.2 degrees Celsius (89.96 degrees Fahrenheit), ammonium nitrate changes its atomic structure, which in turn changes its chemical properties.

When large quantities of ammonium nitrate are stored in one place, heat is generated. If the amount is sufficiently vast, it can cause the chemical to ignite. Once a temperature of 170 C is reached, ammonium nitrate starts breaking down, emitting nitrous oxide, better known as laughing gas. Any sudden ignition causes ammonium nitrate to decompose directly into water, nitrogen and oxygen, which explains the enormous explosive power of the salt.

As ammonium nitrate is a highly explosive chemical, many countries strictly regulate its use. Over the past 100 years, there have been several disasters involving the chemical.”

Read the whole article if interested in more details.

Clive Robinson May 4, 2021 11:30 AM

@ Anders,

i didn’t know yet about “The Great Explosion” in UK

There is not much to know about it as much of the information was hidden away as the UK was at war.

Even the press did not report on what was a major catastrophe that killed many men and boys (it happened on a Sunday a day that even women doing war work did not work). They were buried in a mass grave quietly.

I had expected more information to become available under the “100 year rule” at the National Archives Office in Kew SE London, but no. It looks like any information if there was any kept has “been mislaid” at some point. Which probably means that no real investigation was carried out, as War Production would have been given significant priority. Apparently whilst only about 200 tons of TNT exploded some by “sympathetic detonation” there was another 3000 tons of various explosives that could also have gone up in the immediate area.

It happened close to Faversham in Kent claim by those that live there to be the oldest “Powder mills” in England, it’s compleate twaddle. As I’ve mentioned before during the late 1960’s and early 1970’s my mother helped out by myself worked out where the Ewell Gun Powder Mills were and it was my ability to squirm through dense decades old undergrowth that found the remains of the foundations.

There is a rather famous painting William Holman Hunt’s “Light of the World” of Jeasus knocking at a very overgrown door of what many think is a gardeners hut or some such. It was actually one of the Ewell Gun Powder mills near the River Hogsmill close to Henry the VIII’s hunting park around Nonsuch palace (of which only the foundations survive). Just to make life dificult the whole hunting park area was once known as “Worcester Park”, which has shrunk over the years before and after WWII. Worcester Park is now just a small area in what would have been the North East of the Park. A less famous but way more controvercial painting of Hunt’s was “The Hireling Shepherd” painted a little further down stream on the Hogsmill at the same time.

Another very famous painting is “Ophelia” by Hunt’s good friend and painting partner John Everett Millais which was painted just a short distance from where I was born (and later with a friend rearanged the landscape with fertilizer from a local farm that has the oldest barn in Surrey on it’s land 😉

A less well known friend of both Millais and Hunt was Charles Dodgson mathmatician, logician and failed priest and keen photographer better known for his two books adout Alice Lidell and even Queen Victoria was a fan of “Lewis Carroll” and apparently read all his books even those on logic.

Oh I’d advise people planing on a career in programing or security to read “Alice through the looking glass” as it will teach you as a minimum things about objects names and references that you had probably never even considered let alone thought about seriously.

beaver May 4, 2021 11:30 AM

Contact Tracing – doomed to failure?

The current lock down in Melbourne is due to the inability to trace the sources of COV19 infection using “Contract Tracing” (CT).

It was obvious from the outset that if seriously challenged CT would fail, and it did.

So why was such a scheme used in the first place.

Lets start by comparing CT with its Government and business cousin “Big Data” (BD).

BD is a massive global machine for harvesting information (data) and processing it for “its required use (or abuse)”.

Here we define BD to be one or all of the following:
– Mobile phone cell tower data.
– Mobile phone “location services” (wifi hot spots, bluetooth etc)
– Social media data (mobile and otherwise)
– Clicks on a smart tv
– IOT dvices
– Any data using tablet/phone/etc
– Mapping services
– Any sort of computer with an external connection
– Credit, loyalty, cash, gift cards, etc
– etc etc etc etc

A look inside CT.
CT follows very traditional methods with detailed interviews/surveys collecting as much data as possible.
But how many “data points” can actually be collected in an interview?
Even the best interviews contain inconsistencies, gaps and redundancies, how are such resolved.
Unsurprisingly it is also plagued with traditional difficulties such as “people not answering the phone”, a “partial” solution to this involved the army.

How well does this compare to BD?
BD is not short of data, its quality or quantity and is not hampered by “human aspects” such as “disclosure may be embarrassing/unfavorable”.
So why not use BD for contact tracing?

Big tech companies are in business, so cash will make their data available.
Alternatively if they are presented with a problem (CT), they could easily provide the “answers” without revealing their methods or data.

The above costs real money but there is an alternative, our own government.
We have any number of state and federal entities that both own and can access BD without restriction.
Their function is to collect, analyze and use the data for “government activities”.
They can and do perform CT (or variations) every day.

These entities exist purely to support us, the people, but are they?

Is the problem that by assisting the people at this time might reveal their capabilities; something that they might regret later?

But equally, is the inability to CT, leading to failing businesses, rising unemployment and a treacherous economy in our interest?

An ensuing debate about this will include the words/phrases including: difficulty, reliability, confidentiality, etc. in the hope of “muddying the waters”.

To this we simply repeat our basic point:
– phones and surveys
vs
– BD and all the related engineering and sciences that create, maintain and further develop it.
Is it take make good use of the BD Monster and Government entities we have created?

echo • August 5, 2020 10:14 PM

Simon has a few videos on reconstructing Old English and other intereting things about language. This video contains a spread of things about language. I wondered how much bearing the topic had on decrypting stone tablets from forgotten languages and cryptanalysis.

Southern US Accents & Shakespeare’s Accent
https://www.youtube.com/watch?v=4rb0HPDnc8Y

MarkH May 4, 2021 11:31 AM

Now that the causes of the Beirut disaster seem to be clarifying, there may be little reason to comment on it in this forum moving forward.

So, a few closing thoughts:

I heard tonight that 300,000 residents are displaced. I suppose this would include those whose homes are:

• destroyed
• too damaged to occupy until repairs are made
• closed off pending structural inspection
• inaccessible by dint of debris
• unlivable because utilities are not functioning
• blocked off by emergency operations

If this figure is accurate, I suppose it to be comparable to the numbers of “dehoused” persons in massive WW II bombing raids.

If most of the ammonium nitrate exploded, and a conversion factor I found is correct, the explosive energy was nearly 1000 tons TNT equivalent.

This is similar to the largest mass bomber raids ever undertaken, and falls within the range of U.S. “battlefield” nuclear warheads (e.g. W54 and W45).

Although its “spine” remained stubbornly vertical (and perhaps shielded some people from shock waves), the grain elevator (called silos by some) next to the hypocenter was, of course, comprehensively wrecked. It held about 85% of Lebanon’s grain inventory 🙁
Lebanon was already in severe economic distress, with a large fraction of families unable to pay for basic necessities.
The pain of this situation — and the appearance of government incompetence or corruption as a key cause — might trigger popular overthrow of the ruling regime.
The leader of a powerful country, on both Tuesday and Wednesday, described the disaster as an “attack.” Because this person’s statements are known to be fanciful, this bizarre claim has had no evident effect.

The chaotic manner in which Russian businesses often operate — startling to those used to Western practices — forms one link in the chain of causation.

The ship, crew, and payload were abandoned in Beirut by a Russian-owned shipping firm. The captain says that crew payroll was so far in arrears, and the ship so short of provisions, that he sold the ship’s fuel load to raise some cash.

echo May 4, 2021 11:31 AM

Given two deletions in another topic I’m not sure Bruce totally gets security when it isn’t about hardware or software.

https://www.theguardian.com/commentisfree/2020/aug/06/sanctions-china-politics-us-showdown

Are sanctions the way to go? A foreign ministry spokesperson in Beijing recently remarked words to the effect that the US and China are so economically interlocked that they would amount to self-sanctions. The US, moreover, would be no match for China in its ability to endure suffering. And there he was correct: in dictatorships, sacrifices are not borne by the rulers. In the 1960s Mao said: “Cut us off? Go ahead – eight years, 10 years, China has everything.” A few years later Mao had nuclear weapons and was not afraid of anyone.

The west needs to reconsider its systems, its political and cultural prospects, and rediscover its humanitarianism. These challenges are not only political, they are intellectual. It is time to abandon the old thinking and the vocabulary that controls it. Without new vocabulary, new thinking cannot be born. In the current struggle in Hong Kong, for example, the theory is simple and the faith is pure. The new political generation in Hong Kong deserves careful respect from the west, and new vocabulary to talk about it.

“Sanctions” is a cold war term that names an old policy. If the US can’t think beyond them, the primacy of its position in this changing world will disappear.

David Jude May 4, 2021 11:32 AM

Echo
Clive Robinson

Used a ghillie kettle?

i won’t link directly to a company site
But this wiki link has some fascinating info about the history of the kettle including as standard issue kit for infantry

https://en.wikipedia.org/wiki/Kelly_Kettle

perusing pictures for some reason my memory has them with a single vertical spout with no cap!
and single long chimney, and a smaller, shorter chimney alongside again with no caps, branching off at an angle a bit like a teapot

no cooking but boiling water takes one a long way

echo May 4, 2021 11:32 AM

@David8

<

blockquote>Used a ghillie kettle?

I’m very unlikely to use anything more than simple pots or heat sources. I have no need to boil large quantities of water rapidly or with anything too specialist in purpose but I imagine the cost/benefit will work for others.

The issue with water is it weighs a lot and water purification takes time. The other thing is the volume and weight of equipment and carrying or sourcing fuel. Anything which increases energy expenditure and/or time takes away from something else. Personally I’m undecided whether I want to buy a camping kettle or not. It’s nice but more weight when you can use a pot or simply a metal mug.

Clive Robinson May 4, 2021 11:32 AM

@ Last Post,

Your comparison has two underlying assumptions,

1, Contact tracing does not work.
2, Big Data tracking does work.

From this you argue that we should use Big Data Tracking instead of Contact Tracing.

Whilst you give some evidence for your former assumption you give no evidence for the latter.

Personally I would suspect that Big Data Tracking is no more effective than Contact tracing in a large “aware” population.

That is there is an “awareness” issue you have to address in your argument you’ve not mentioned.

For instance, an “aware” person will rather than turn their phone off leaving a clear action record, they could leve the phone at work which is less suspicious or even less still let the battery run down to the point that watching a long Utube or similar music video etc will cause the battery to go flat whilst on their journy home. Thus their phone turns it’s self off, with a record it’s gone flat which is even less suspicious and stops it’s tracking ability.

Your actions depend on how thoughtfull you are and how much you are “aware” of.

As we now know from the CarrierIQ debacle several years ago the Service Provider you got your phone through will log the difference between “turning off” and “running down” as a matter of course as a “third party business record”. If you think it unlikely we have also seen battery usage information used with Tesler cars when a journalist made apparently misleading statments about battery life, Tessler pulled out the charging and use records to rebut, showing the journalists driving pattern was anything but normal.

Thus an “aware” person will take this into account but a thoughtful person will take it further and will limit their exposure like not wearing “Fit-bits” and the like to minimise thus can control of what signals they emitt. Then build in “wriggle room” or “plausable deniability” with those that remain.

So they could put their phone on charge at work and simply leave it in their desk draw whilst going out to lunch etc. The trick is to distinguish between behaviour and actions. You could for instance establish a “behaviour” of putting your phone into silent and on charge at work, but have the actions of doing different things every lunch time going to different outlets sometimes paying by credit card others by cash. And have the habit of keeping paper till recipts and writting them up in a paper diary for “recording expenses” and the like. What used to be called prudent financial behaviour.

If you think this is a little outlandish, as the Korean use of Big Data tracking showed, quite a few cheating spouses were taking even more extream measures but failed because they were not sufficiently “aware”.

We’ve had a couple of recent cases of insuficiently “aware” with criminals with both EncroChat and Blackberry phones respectively. Thus you can be sure that those criminals that are a little more thoughtful will invest a little time in coming up with other communications techniques.

For instance it is known that in South America those involved with the drugs trade have used older US military satelites that were “frequency transponders” not “coded repeaters” likewise it’s known that other transponder satelites have had “unknown” spread spectrum signals putvthrough them much against the owner/operators wishes since the 1980’s.

To do such satelite comms you need to know three things,

1, Satellite uplink band.
2, Satellite downlink offset.
3, Satellite orbital parameters.

From the first two and a little freely available knowledge you can build your “earth stations” and the third will enable you to track the Satellite over time. Tracking satellites without orbital parameters is actually a hobby for some people and they regularly find new satellites by simple radio observation (because satellite up and down link frequencies are in “known bands” that avoid interference from terrestrial system “spill over”).

Thus “awareness in targets” is not something “watchers” want known because it enables them to defeat the “watchers” all to easily with a little forethought. Thus multi billion dollar Big Data Tracking systems can be rendered usless by the application of a little low cost low tech “field craft” or at moderate cost alternative untracked communications systems can be deployed. Thus Big Data Tracking is actually quite fragile and their success reliant on people being “unaware”. In the case of South Korea, I suspect cheating spouses will now be a little more thoughtfull about ensuring their tracks are covered, divorce is after all an expense most of them would wish to avoid otherwise they would not be cheating. Likewise I suspect that by a simple evolutionary process criminals will also get a little smarter at what they say and how and when they say it, as it’s not just the “genetic pool” a long prison sentance takes you out of.

But the other thing you need to remember is by and large those eye wateringly expensive Big Data Tracking systems actually do not earn their keep. In the case of commercial systems only very few make real money and that is more by illusion or myth which is why those that run them are diversifying their activities rather rapidly. As for the covert IC systems they are limited to mainstream central control not ad hock peer to peer communications systems. Thus they are primarily “Empire Builders” and realy only of use against the average citizen or unknowing or incautious person and then only after some event has triggered their records to be looked at. As has been seen in various parts of the Middle East and West Asia “terrorist” organisations with few real resources have been able to run rings around sophisticated Big Data Tracking systems.

A point those holding the purse strings should remember is one that has been made since the US went all high tech ElInt and SigInt in the post WWII early phase of the Cold War. Which is, such remote systems do at the end of the day only tell you “what your enemy wants you to hear”, thus you need “Boots on the Ground” to “sanity check” what SigInt and ElInt are giving you.

Thus the IC and LEO agencies will find that as with CCTV Big Data Tracking only works against those who are unaware of it… It is just one reason why “Parallel Construction” is put to use, but even that fails because LEO members especially are just a subset of society and thus they “flap their gums” and in some cases “betray for money or favours”, thus knowledge of “methods and sources” gets out, with expensive methods being countermeasured by simple field craft and sources eliminated and in some cases recycled at a pig farm etc…

JonKnowsNothing May 4, 2021 11:33 AM

@Clive @All

re: Future and Near Famine / Beirut Explosion

The grain silos destroyed at the port held the National Strategic Supply of wheat. Reports indicated that not that much was in the silos at the time of the explosion because much had been given out due to on-going economic and COVID19 situations.

The “golden” stuff on the ground near the silos is the wheat. It is contaminated and not edible by humans. Rats, mice and other grain eating vermin won’t be as picky.

Possible Outcomes

The grain is so contaminated it kills the rats, mice outright.
The contaminated grain only partially poisons the rats and they return to their various nests and die there.
The grain provides an enormous population explosion of rats etc.
Other grain pests and bugs proliferate causing additional problems.
Large quantities of dead-anything have public health repercussions.

Australia had a many year explosion of rats, mice when it had repeated bumper crops with large grain supplies and food sources available. Once the supply runs out there is a famine in the rat population and they begin aggressive food seeking.

In New York during the major COVID19 lockdown 2020, the rats began to starve as their food sources dried up. Supermarkets, restaurants, bars, garbage systems no longer supported the rat population. They began to cannibalize other rats.

Once the “economy opened” and people began to eat out, there were reports of aggressive rats challenging humans over food. (In coastal cities, sea gulls are noted for food theft.)

The Lebanon grain silos had the capacity for 120,000 metric tons of grain.

Lebanon imports the majority of their wheat from Ukraine and Russia and uses 35,000-40,000 metric tons every month.

There is a one month supply of wheat in country.

Official report more is on the way and could be presumed to part of their normal import cycle of 1.2 million metric tons of wheat.

echo May 4, 2021 11:33 AM

https://blog.documentfoundation.org/blog/2020/08/05/announcement-of-libreoffice-7-0/

The most important new features are digital signatures for documents and OpenPGP-based encryption of XML documents, with improvements in areas such as change tracking,

[…]

Better compatibility with DOCX, XLSX and PPTX files. DOCX now saves in native 2013/2016/2019 mode, instead of 2007 compatibility mode, to improve interoperability with multiple versions of MS Office, based on the same Microsoft approach.

[…]

In fact, LibreOffice – thanks to its mature codebase, rich feature set, strong support for open standards, excellent compatibility and long-term support options from certified partners – represents the ideal solution for businesses that want to regain control of their data and free themselves from vendor lock-in.

I like LibreOffice because it’s a step away from a monopolies treadmill. Give my document creation needs are simple I don’t need an application which chases lock-in feature creep. One thing I would like across the industry are full compliance with genuine open standards for a lot of reasons from security to being able to direct the money saved into investment not keeping someone else in bonuses or passive income. Last but not least I cannot for the life of me think of one good reason why so-called “cloud” applications for things like office suits or anything else are so popular. Or are they?

MarkH May 4, 2021 11:34 AM

Re Contact Tracing:

I don’t know what happened in Australia … but epidemiologists say that contact tracing is one of their best tools, based on real-world experience.

It is extremely labor intensive, and the tracers must be properly trained. It’s also necessarily imperfect.

It may be that tracing by “app” hasn’t worked as hoped. In urban environments, the proliferation of contacts (especially when people aren’t trying to be careful) is a hard challenge with respect to pathogens spread through the air …

echo May 4, 2021 11:34 AM

https://www.tomshardware.com/news/massive-20gb-intel-data-breach-floods-the-internet-mentions-backdoors

Massive 20GB Intel IP Data Breach Floods the Internet, Mentions Backdoors
Anonymous hacker promises more to come soon, too

Somebody just had a bad day. As for who is behind this and their motivations and whether “backdoors” means anything in practice there is no clue.

https://www.theguardian.com/business/2020/aug/06/social-distancing-in-the-skies-becomes-a-perk-in-post-covid-travel

But despite there being row upon row of completely empty seats, we found ourselves sat right next to complete strangers. This was the closest, physically, I had been to someone outside of my household in months.

Without any hope of maintaining social distance, a few bemused passengers, including myself, queried our seating arrangements with the sympathetic flight attendants. The response? That unless we had paid for a reservation then we had been placed in seats at random.

One can only assume, therefore, that to absolutely ensure a socially distanced flight, Ryanair passengers must pay extra (between £3 and £7 each way for my flights).

[…]

Without firm instructions from the government, policies differ significantly from one carrier to the next, and blocking seats to encourage social distancing is not yet a blanket policy.

In a recent webcast American Airlines chief executive Doug Parker said that the carrier would be “blocking 50% of standard middle class seats onboard”. Emirates has introduced a pre-allocated seat system so that vacant seats are placed between individual passengers or family groups in observance of social distancing protocols.

Back to Ryanair and its chief executive, Michael O’Leary, says there are no plans to socially distance in the skies. In fact O’Leary said the airline would not be looking at keeping the middle seat free, describing the idea as “mad”, “hopelessly ineffective” and unaffordable. Instead, he shifted the responsibility for passenger safety on to the government calling for temperature checks at the airport.

So recent headlines that Italy’s aviation regulator has threatened to ban Ryanair, alleging that the airline has not complied with rules brought in to tackle the coronavirus pandemic, are not at all surprising.

This looks like a case of “corporate made law” by Ryanair as well as a few sloppy tricks so they can blame the passengers and push for outsourcing the loss.

Personally I think Ryanair and any other airline trying it on should be immediately grounded until the health and safety, and human rights issues are firmly established.

Jonknowsnothing May 4, 2021 11:35 AM

@MarkH @Clive

re: Contract Tracing vs Superspreader Targeting

An interview with German parliamentarian and health expert Karl Lauterbach indicates a shift in their approach to “contact tracing”. There have been several reports of similar views.

Instead of individual tracing, a focus on “large gathering” or “superspreader” events with mass tracing.

[The current] approach is totally inefficient; we’re on the wrong track. Instead of contacting each individual contact by phone, the authorities should focus their efforts on so-called super-spreaders, those few highly contagious cases that often infect dozens of people in group situations. They alone are the driving force behind the pandemic. We now know that individual transmitters have almost no effect on the exponential growth. If we don’t change course on this issue, the second wave will be intense.

His major point is that COVID19 is infectious many days before the first symptoms and it takes many more days to get a test result. By the time the result comes in, that person is no longer part of the dynamic.

By concentrating on areas where a super spreader event is likely to happen and treating all participants as if they are already infected will have better efficiency.

He references it as the Japan Strategy.

There will be some issue in “less disciplined” societies where spontaneous or clandestine groups form. There won’t be any advanced notice for officials.

AirBnB rave parties were pre-COVID19 common, rent-a-mansion invite 3,000 friends from FB, depart leaving the trash and trashed site behind, contracts signed with forged names and IDs.

The current COVID19 incarnation is Large House Parties.

“These large house parties have essentially become nightclubs in the hills,” … arguing the events can become “superspreaders” of coronavirus as bars and nightlife in the city remain shut.

Also for those who are interested:

My area is still Under Surge
The area clocked the First Child Death in California on 07 31 2020.
Our local death count is soaring with 1/3 of our total deaths occurring within the last 10-14 days.
California State Data Systems are overloaded and updates erratic.
We are one SuperSpreader Area of 1,000,000 people.
We are one SuperSpreader State of 40,000,000 people.

ht tps://www.spiegel.de/international/germany/german-health-expert-karl-lauterbach-the-authorities-should-focus-their-efforts-on-super-spreaders-a-1ed7f195-c2e7-446d-903d-51766d544a65

ht tps://www.theguardian.com/us-news/2020/aug/06/los-angeles-parties-covid-19-water-power-shutoff
(url fractured to prevent autorun)

Clive Robinson May 4, 2021 11:35 AM

@ SpaceLifeForm,

Bleeping computer is behind the arsehat Cloudflares “must have cookies enabled so we can data rape you” great firewall…

So I’m not going to be looking at it any time stat.

But with regards,

If there is a comm channel, it’s probably backdoored.

As you know I take that as a given, and also there is no “On Consumer Device” way to fix it.

Yet there are simple “Off Consumer Device” methods to get message security in a comms channel, but people will not use them…

The hard part is avoiding “traffic analysis” which is something I was working on but again I doubt anyone will use it so I “back burnered” the whole thing.

How do I put it tactfully, the only people who appreciate “security” are not the sort of people you want any contact with… because whilst it can be profitable you can be in a whole world of hurt as Encrochat as just one tiny example demonstrates.

MarkH May 4, 2021 11:36 AM

@JonKnowsNothing:

In the past 24 hours, I read that Los Angeles has announced a new deterrent: buildings (including private houses) hosting big parties will be disconnected from electric power and water utilities.

I’ll be interested to see how this fares against the inevitable court challenges … but it’s likely to encourage some folks to stop and think for a while.

Clive Robinson May 4, 2021 11:36 AM

@ MarkH, JonKnowsNothing,

a new deterrent: buildings (including private houses) hosting big parties will be disconnected from electric power and water utilities.

Well remember that in North California people are now used to the idea that for “profit protection” reasons the Power utilities have been creating power cuts when ever they can…

Which has knock on effects to other utilities.

Also cutting of water would actually be a very very bad idea, because that could kill people very quickly that is three to fourteen days due to dehydration or disease from insufficient sanitation…

One dose of cholera appearing when water has been cut off could be the start of some very serious litigation and if somebody dies like a child the bad press alone will kill many political and corporate careers dead…

Some poor sanitation related disease information,

https://borgenproject.org/five-diseases-that-thrive-in-poor-sanitation/

Most will cause you a premature death one way or another[1] even with medical aid to get over the initial infection.

[1] The old saying of,

What does not kill you makes you stronger

Is provable nonsense, as is the stupid notion of “powering through” infections, that is part of the bodies defence system is to make you feel weak and tired and fighting that is realy realy stupid.

Worse science is showing that life expectancy is related to viral and bacterial infections long term. It’s been known that some viruses increase your probability of getting less well known cancers from near zero to quite significantly statisticaly probable compared to those that do not get the viral infection. It’s even assumed these days that Type I diabetes is triggered by a disease and research is closing in on it.

The simple fact is we now know each time your immune system gets significantly challenged or activated then there is a risk of some form of autoimmune disease or damage to organs like the heart lungs and even brain will be involved. I suspect that this research will eventually show that immunisation as we currently do it via vaccines that significantly challenge the immune system will have to be carefully administered, that is single vaccines in a specific order over a specific time frame to minimise autoimmune system risk. Some scientists are actually researching replacing current vaccination with other methods. For instance a large amount of child hood immunity comes from “first breast milk” consumption. That is via colustrum, this would appear to be a lot safer way than current vaccination methods as it’s via a process that is built in for dealing with disease, which just injecting into the bornaky sterial body is not. Another way which is a bit of a hot topic due to COVID is “serum transplants”. Other apparent diseases appear to be better handled via such unpleasent sounding methods such as phages and fecal transplants. All however closely mimic processes that have been natural to human living for many tens of millennia if not hundreds or thousands. Thus the thinking in science is turning to what is in effect “Work with, not against the way the body works” and it’s fairly clear to many that vaccines are “work against” techniques with high risks (thus high rewards for big Pharma).

MarkH May 4, 2021 11:37 AM

@Clive:

Good Heavens!

I suppose that “lockdown fever” must be affecting your perspective … we’re talking Los Angeles, not Somalia.

The median house price is three quarters of a million dollars, a tiny crappy house with a “garden” consisting of a few inches of dust on each side is about $200K, and virtually everyone has a car because life is almost impossible there without one.

Most likely, people would relocate somewhere else for a while, drive to the shop for some bottled water, drive to another shop with a public toilet … but cholera?

People almost never contract cholera in the U.S., even in the most wretched places (like the Bantustan “reservations” for native Americans).

Anyway, as JonKnowsNothing observed, the typical offenders are rental properties (via AirBnB, for example), so the most likely effect of such shut-offs (if indeed any occur) is that some wealthy landlords will lose revenue. I’ll try to squeeze out some crocodile tears, for their bitter misfortune.

Clive Robinson May 4, 2021 11:37 AM

@ MarkH,

Disease is no respector of wealth or property values, and most sanitation related diseases are part and parcle of everyday life at low levels.

Thus probably right now you have over several million sanitation disease related pathogens on you skin just looking for a way to get repkicating. Nearly everyone in the first world that gets an upset stomach or other gastrointestinal upset it’s down to sanitation related diseases.

In fact the current SARS-CoV-2 is like all corona viruses directly related to gastrointestinal diseases in other creatures. For some reason we are not realy sure about yet the very very few corona viruses that humans can be infected with exhibit as respitory not gastrointestinal disease.

Usually for a sanitation disease to get going it needs a disease nexus or reservoir for an outbreak to occure, California due to political reasons is “street people central” with “tent cities” and even cardboard box towns in many places and their sanitation disease are fairly rife.

Whilst diarrhea deaths are falling in most parts of the world due to Oral Rehydration Therepy and vacination of babies, the death rat in the US is apparently on the rise and was due to cross the 5 in 100,000 people this year or an estimated 17,000 deaths. It would be higher if not for healthcare. The fact that healthcare is now saturated in many parts of the US suggests the number of diarrhea deaths will go up unless the message about Oral Rehydration Therapy gets through to people.

ORT has to be about the least expensive treatment in the world. In essence it’s just clean water with a little sugar and basic salts. However you need clean water and driving to get it when you are folded up on the floor in pain with diarrhea coming out of you almost as fast as you put fluid in means you are not going to be going anywhere any time soon.

On average nore people die a year of diarrhea than just about any other disease at an estimated 1.6million people and it can and does happen almost anywhere when clean water supplies are interupted.

Personally I think anybody claiming that cutting clean water off from properties is a good policy needs their head looking at, preferably with something hard and heavy.

Just remember that the reason the US is in such dire straights over COVID-19 is because politicians willingly chose to ignore basic medical advice. You can ask any doctor you like and I think they would tell you the same basic thing,

Cutting off of basic sanitation is a very very bad idea and can not be justified.

Ignore such advice at your peril…

JonKnowsNothing May 4, 2021 11:38 AM

@MarkH @Clive

re: Infectious Diseases in High Class Urban Areas in USA

There are a good number of such outbreaks in wealthy neighborhoods as well as poor ones. These rarely make MSM reports.

Lack of toilet facilities for the homeless have been linked to outbreaks of serious contagious diseases in San Diego and other cities. By closing down public toilets and prohibiting private port-a-potties and other sanitation options like portable showers and portable wash basins through Anti-Homeless Laws enacted throughout the USA, have caused clusters of outbreaks of nasty-stuffs.

Taking a poop between cars means the car owners trod on the leavings and carried the illnesses back to their multi-million dollar mansions. Once the 3% got sick they cleaned the streets and opened some public toilets for limited access.

Farm workers have had to fight a long time to get such facilities while working harvesting food stuffs. They now get a tow-rig of portable potties, portable wash basins, a towable lunch bench with umbrella and fresh cold water. Well, that’s what they are supposed to have, whether the labor contractor supplies it is another issue.

iirc(badly)
A number of years back there were reports of Orthodox Jews getting Trichinosis. This is a parasitic worm carried by pigs and it causes some serious damage in humans. Orthodox Jews do not eat pork. The outbreaks in the wealthier communities were traced to household help coming from locales where such infections are common. The infections were passed along during their normal working day tasks.

Additionally in the USA and elsewhere where COVID19 has impacted slaughterhouses and farms, the responses to fewer workers has been to speed up the kill and processing lines to make end-of-day targets. Fewer people doing more work.

A unpleasant by-product is the lack of inspection and proper cleaning of the stuff going to the market. Inspections were not that good before but now barely time to do more than a quick. What that means is all the stuff cows, chickens, pigs can have, can be passed down in your hamburger, chicken legs and pork chops. Cook everything well and then some.

another iirc(badly)
An outbreak of some serious bad stuff was traced to Parsley. This herb is commonly added to a plate as a color garnish but also chopped up as a food enhancer. It caused a huge recall in the USA. The offending parsley was eventually traced to a very high tech farm. They triple washed the parsley prior to shipment. They had all the recommended sanitation in place and no evidence of any contamination was found on the farm. Further investigation and tracing found that the source was the Local Water District.

Water Districts typically filter and sanitize water for delivery to homes and businesses. In that situation the Water District stopped sanitizing the water and even though the farm paid for “clean purified sanitary” water, they got contaminated water instead.

The farm installed their own water purification system.

There are legions of stories in the USA now of contaminated water as well as other unhygienic practices that end up in the Supermarkets and in homes. Water shutoffs have been used in poor neighborhoods for decades. Lots of places have no clean water, contaminated wells, or no water at all (dry camp).

Wealth alone doesn’t protect you.

ht tps://en.wikipedia.org/wiki/Trichinosis

ht tps://en.wikipedia.org/wiki/Parsley
(url fractured to prevent autorun)

Anders May 4, 2021 11:39 AM

@Singapore Noodles

I wouldn’t be surprised if there was formal work in these areas. Certainly stuff in computer science and systems theory I guess. There is a load of other work psychologists and sociologists could comment on too. (Forget virologists and most of the medical profession as they are brains on rails habit fuelled ass-covering careerists when you start getting funky.) Kinda interested in where your question may lead.

Myself I blagged my ideas off pretty much everything which wasn’t nailed down from the Cold War to grabbing stuff off the Chinese and rest of Asia, Germans, French, some American stuff, historical stuff bac

@echo

zoning, airlocks, and invasive measurures

This and similar suggestions can perhaps be viewed as intuitive solutions to a control theory problem. Has anyone looked at a more formal approach via dynamic programming à la Bellman etc. ?

@echo

I should have done a bit of web searching, there seem to be numerous articles on optimal control and epidemics, e.g. a random example

http://www.sciencedirect.com/science/article/abs/pii/S0025556413002356

@Singapore Noodles

That looks casually interesting. It’s also on Sciencedirect. They’re a really well curated website.

MarkH May 4, 2021 11:40 AM

@JonKnowsNothing, Clive:

Cholera is a particular infection, not a blanket term for some set of digestive illnesses.

According to my reading, in the U.S. cholera is rare (about 1 case per 30,000 population per year), and in practically every instance contracted abroad: it is seen in people just arrived from countries where cholera is common. I’d guess that the picture is similar in other developed countries.

In much of the former Soviet Union, outages of heat, hot water, water supply altogether, and electric power range between frequent and regular.

Multi-day heat outages in temperatures below -20 C, stiff winds, and 19th-century wood-framed windows would distress me greatly, but I’ve met Russians who not only cope with this often, but accept calmly as their normal lot.

With some adaptability, people who have greater resources than (say) the poor of sub-Saharan Africa, or whatever can be found in endemic war zones, demonstrate a good ability to manage temporarily without essential services.

It’s my observation that those of us lucky enough to have spent our lives in industrialized countries struggle to grasp how much greater is the misery of the poorest 25% of humanity, as compared to typical poverty in our homelands.

JoeKowsNothing May 4, 2021 11:40 AM

@MarkH

Cholera is one of many diseases that comes from lack of toilet and sewage treatment. As you indicate it is mostly associated with “3d world” economies.

The other shoe drop is that “1st world” economies can and do fail at preventing outbreaks of many illnesses. Most are hushed up fast.

The vast majority of USA trained MDs and health workers have never seen some diseases or parasitic infections because they are so rare in the USA. These are at the bottom of the list or not on the list at all.

You can see that aspect in the Early COVID Days when tests were only given to people who “traveled from China”. It never occurred to MDs or Public Heath workers that it was spreading from New York to California.

  Well, maybe it did occur to them but Herd Immunity Policy may have gotten in the way.

In relation to Cholera

The bacterium’s natural habitat is brackish or saltwater where they attach themselves easily to the chitin-containing shells of crabs, shrimps, and other shellfish.
V. cholerae can be spread by eating contaminated food or drinking contaminated water. This illness is also spread through humans making skin contact with contaminated water from human feces.

Regularly California Sewage Plants get overloaded and raw untreated sewage is dumped into the Pacific Ocean. It can also happen during mechanical breakdown in plant equipment or when treatment pond levies collapse.

This happens in major beach areas all along the coast line. Warning signs are occasionally posted about the high bacteria content.

personal anecdote:

During one such over flow event in the Monterey California Beach area, warning signs were posted to not touch the water.
The signs were in English.
A non-English speaking family was at the beach and the adult was holding the toddler while they splashed in the water.
I translated as best as I could. Pointing to the sign and the water -&gt; “Muy Peligroso”.

Oyster Farming is particularly sensitive to having raw sewage as part of their shellfish diet and that “dozen oysters on the half shelf” might pack more of a wallop than you expect.

Sometimes the results are attributed to “local suspects” which in Texas is Flesh Eating Bacteria.

Wealth does not and will not protect you when “trusted systems” are no longer “trust worthy”.

ht tps://en.wikipedia.org/wiki/Necrotizing_fasciitis
(url fractured to prevent autorun)

JonKnowsNothing May 4, 2021 9:13 PM

@All

re: Johnson & Johnson/ Janseen COVID-19 shot update

24 hour update: No reactions at all. (1)

The home bound team did a great job, took about 20 minutes to set up the paperwork etc. Then 15 min monitor. All done.

1, A friend had it the same time. They had duck egg size swelling at the injection site. Only sore to the touch, no problems with movement or use. Swelling gone after 24 hours. No other issues or problems.

echo May 5, 2021 4:08 AM

@moderator

I have not posted on this blog for a long time. #reasons. The earlier posts in this topic are not me posting. They are recycled from somewhere else. Someone is trying to be funny funny or it is a system glitch.
.
Because of this I have began using a fake email address as a hidden identifier beginning with this post.

Winter May 5, 2021 4:52 AM

@echo
“Because of this I have began using a fake email address as a hidden identifier beginning with this post.”

Very bad idea. Now the moderator, and the rest of us, might think you are an imposter. Better use your old address.

echo May 5, 2021 5:34 AM

@Winter

I never used an email address before. I know, slack of me, but Swiss cheese and all that. Anyway, I have views and my own signature people can pick up on. I also know background stuff to things discussed here in the past if someone wanted to rubber hose me in concrete basement with a bare lightbulb. Not that it would get that far as nobody treats me seriously anyway.

Winter May 5, 2021 7:12 AM

@echo
“I never used an email address before. I know, slack of me, but Swiss cheese and all that.”

Then it is indeed a good idea. These are desperate times that require such precautions.

Winter May 5, 2021 9:19 AM

AI has all the problems of normal software, and then some.

How to hide a backdoor in AI software – such as a bank app depositing checks or a security cam checking faces
Neural networks can be aimed to misbehave when squeezed
hxxps://www.theregister.com/2021/05/05/ai_backdoors/

V May 5, 2021 11:58 AM

Japanese town spends COVID emergency money on a squid statue.

ht tps://www.theguardian.com/world/2021/may/05/japanese-town-spends-covid-funds-on-huge-squid-statue

vas pup May 5, 2021 5:08 PM

Disconnected: How phones affect our relationships

Our phones keep us connected and help maintain relationships, but in some ways they drive a wedge between us, too. Phubbing, or snubbing someone in front of you in favor of your phone, has become a big problem.

https://www.dw.com/en/disconnected-how-phones-affect-our-relationships/a-57433757

“Communicating with someone is much more than just the verbal aspect, Nazir told DW.

“We forget that when we are communicating with someone we need to pay attention not only to the verbal part, but we need to focus on his body language, his body cues,” Nazir said.

When we choose to prioritize our phones over the person in front of us, we are sending them a subliminal message, Nazir added. “When someone is phubbing in front of you the subliminal message which you are getting is: He is giving priorities and that priority right now is to his mobile.”

When a person is sharing an emotional story with someone who starts checking their phone, this can cause them to feel that the other person doesn’t care about what they have to say.

“It will definitely make him feel that: ‘I’m not important, I’m not worth [it], my story, whatever pain I’m having right now, whatever I’m sharing now, for this person it doesn’t matter, it doesn’t count,'” Nazir told DW.

For people who want to use their phone less during face-to-face interactions, there are some creative solutions out there.

Some people use app or internet blockers, while others lock their phones in a container with a timer.

One company has even designed a physical band that can be placed around your smartphone with a reminder to “look up.”

But Brown said her recommendation for phone etiquette would be communication.

!!!!She suggested reflecting on why it is that you’d rather be on your phone than spending time with your friends or partner.

If it’s your friend or partner who is often on their phone, start a conversation with them and ask why they’re doing it, Brown said.

“You could then share how their smartphone use makes you feel and try to work on a solution together.”

Joe K May 5, 2021 7:00 PM

@vas pup

For people who want to use their phone less during face-to-face interactions, there are some creative solutions out there.

Yeah, you can always fall back to the classics. Check the time on your wristwatch instead.

Winter May 6, 2021 12:18 AM

@vas
“When we choose to prioritize our phones over the person in front of us, we are sending them a subliminal message, Nazir added.”

In what way is this subliminal? I find the message very obvious and in your eye. The solution is too: you look at your partner (and remove earphones). Always works for me.

Clive Robinson May 6, 2021 3:17 AM

@ SpaceLifeForm, ALL,

also, is there piezoelectric to keep the battery charged?

It’s one way but… Have you thought about the battery techbology?

As they are “performance clogs” it has to be like ‘lifestyle milk’ ‘lite and tight” thus “Lithium”[1] known to all the world through fires in aircraft holds and Smasung “but burner” phones.

So do not be surprised if you go running in the rain and come back with a hot foot or worse…

[1] Actually it’s not much talked about but whilst you can discharge lithium batteries bellow freezing, it’s highly inadvisable to charge them when they are at or below freezing… So they would be “fair weather” shoes at best…

SpaceLifeForm May 6, 2021 2:35 PM

@ Moderator, ALL

Speaking of fake comments…

https://www.protocol.com/amp/fcc-net-neutrality-fake-comments-2652899137

In a new report, New York Attorney General Letitia James found that of the more than 22 million public comments the Federal Communications Commission received in 2017 regarding the repeal of net neutrality protections, a whopping 18 million were fake. Millions of those comments, the report says, were funded by the broadband industry.

Clive Robinson May 6, 2021 4:39 PM

@ SpaceLifeForm, ALL,

Regarding,

“regarding the repeal of net neutrality protections, a whopping 18 million were fake. Millions of those comments, the report says, were funded by the broadband industry.”

Whilst I am not surprised, it does raise two questions,

1, Of those regarded as “fake”, how did they know, and how dod they know which were “funded” effectively illegally.

2, I’m assuming Ajit Pai, was informed of this, thus why did he not take action against the “broadband industry”? In the large number of ways open to him?

Maybe it has something to do with,

“In October 2014, Pai wrote an op-ed in the Washington Post criticizing a government-funded research project named “Truthy” at Indiana University which was studying the spread of “false and misleading ideas, hate speech and subversive propaganda” online. Pai questioned the value of the project, writing, “should taxpayer money be used to monitor your speech and evaluate your ‘partisanship?'” Truthy researchers defended the project, writing, “we do not monitor individual people. The tweets we analyze are public and accessible by anyone.”

JonKnowsNothing May 6, 2021 8:09 PM

@Clive, MarkH, SpaceLifeForm, Winter, All

re:COVID-19 mutation P681

It may be that this mutation point is becoming a new global marker for COVID-19. It now appears in many genomes and is associated with the prevalent set of COVID-19 Muts including the 3 subsets of B.1.617 India Variant / aka 2x or 3x Mutant.

  • P681R Membrane Fusion / increase transmission (India)
  • P681H Membrane Fusion / increase transmission (India/Hawaii)

While my lineage notations are not on any official method, the pathway is:

  • WUHAN -> D614G -> N501 -> P681

MarkH May 7, 2021 1:15 AM

@Clive:

Perhaps the article wasn’t readable with your browser configuration.

Though the article offers no technical detail, it seemed clear to me from the Attorney General comments that they did back tracing to commercial firms whose business is to deliver (in internet terms) what their clients are hungry to eat.

Plain old investigation, which is what AG offices are supposed to know how to do. In addition to those commercial operations, an astronomical number of comments were attributed to one youngster.

One of my country’s two parties knows that it would lose almost every battle decided by majority support, simply because most people don’t like most of their policies.

They lie that elections were decided by fraud to destroy public confidence, and to set the stage for stealing the 2024 presidential election — which they transparently intend to do.

Similarly, they made a cynical attack on public comment, rendering it meaningless. They can say, “we tallied the comments, and our side has more support.” In their lizard kingdom, this is what “democracy” means.

The New York AG is interested in compliance to law. The FCC chair represents ultra-wealthy corporations.

Winter May 7, 2021 6:09 AM

AI = Artificial Idiocy?

Researchers say objects can hide from computer vision by seeking out unusual company that trips correlation bias
Algos guiding self-driving cars don’t expect to see a STOP sign next to food. So if someone put a pic showing apples at a busy intersection …

In their speech, the pair said that one way computer vision systems recognise objects is to consider them in context, and said their work has detected odd outcomes resulting from that practice. An image of a plant on a t-shirt is hardly ever identified as a plant because algorithms focus on people and don’t expect a plant to be on your abdomen. Anything round pictured near a dog, they explained, is often identified as a frisbee because computer vision systems corelate dogs and flying disc toys.

hxxps://www.theregister.com/2021/05/07/computer_vision_correlation_bias/
(URL fractured for your safety)

SpaceLifeForm May 7, 2021 4:11 PM

@ JonKnowsNothing, Clive, MarkH, Winter, All

As I always suspected, aerosol. Brownian motion. Ventilation is key.

Also, finally, CDC, and WHO have bought a vowel.

via @zeynep

https://www.thelancet.com/journals/lancet/article/PIIS0140-6736(21)00869-2/fulltext

Third, asymptomatic or presymptomatic transmission of SARS-CoV-2 from people who are not coughing or sneezing is likely to account for at least a third, and perhaps up to 59%, of all transmission globally and is a key way SARS-CoV-2 has spread around the world, supportive of a predominantly airborne mode of transmission. Direct measurements show that speaking produces thousands of aerosol particles and few large droplets, which supports the airborne route.

Fourth, transmission of SARS-CoV-2 is higher indoors than outdoors and is substantially reduced by indoor ventilation. Both observations support a predominantly airborne route of transmission.

Seventh, SARS-CoV-2 has been identified in air filters and building ducts in hospitals with COVID-19 patients; such locations could be reached only by aerosols.

Eighth, studies involving infected caged animals that were connected to separately caged uninfected animals via an air duct have shown transmission of SARS-CoV-2 that can be adequately explained only by aerosols.

Leave a comment

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.