John May 20, 2022 7:05 PM


My phone needs a ‘turn off the bothersome crap’ switch.

Where is the command line?


ResearcherZero May 20, 2022 8:47 PM


The switch is only accessible after adding 50 pound of Parmigiano Reggiano rinds to soup, then consuming said soup. Afterwards simply scan your stomach, ‘turn off the bothersome crap’ should now be available.

“Parmigiano fraud is actually a serious issue for producers. Like many European products, true “Parmesan” cheese has a protected designation of origin, and according to the Parmigiano Reggiano Consortium (the official trade group for the cheese) the amount of fraud is almost as big as product sales: Authentic Parmigiano Reggiano sales are around $2.44 billion while fraudulent cheese is a $2.08 billion market.”

The Consortium has teamed up with Kaasmerk Matec — a leading producer of casein cheesemarks — and p-Chip — which creates digital tracing technology — to put tiny, food-safe transponders in legitimate wheels of Parmigiano Reggiano.

“The innovation combines food-safe Casein labels with the p-Chip micro transponder — a blockchain crypto-anchor that creates a digital ‘twin’ for physical items. This scannable new food tag is smaller than a grain of salt and highly durable, delivering next-generation visibility and traceability.”

Ted May 20, 2022 10:46 PM

Connecticut becomes the fifth US state to enact a privacy law.

I am trying to read about it, and I think I am excited. Then I am a little confused, and I’m glad I’m not a compliance manager. But I’m still excited.

This seems positive.

The Act gives consumers the right to access, delete, correct, and port their personal data; allows them to opt out of targeted advertising, profiling, and the sale of their personal data; and to prohibit the processing of sensitive data.

The law will take effect July 1, 2023.

John May 21, 2022 4:01 AM


Copyright protected cheese!

Now rig the transponder to stay in your victim’s stomach and you can verify that he must serve prison time for consuming the ‘wrong’ kind of cheese!

A government of the government, by the government and for the government!


Robin May 21, 2022 5:14 AM


What has government got to do with it? Cheese producers try to protect their product and chip away – excuse the pun – at some of the $2 billion dollars made by fraudsters.

If I understand the article the transponder is in the rind which is not normally eaten, so not much risk of being personally microchipped.

Amusing that advanced technology is thrown at protecting cheese, but hey: $2 billion!

John May 21, 2022 5:53 AM

I’m from the ‘government’. I will help you ‘protect’ your monopoly right to ‘your’ magic cheese. Help me get re-elected by ‘supporting’ my campaign.


Q May 21, 2022 6:07 AM

It’s just cheese. If you like the taste then buy more. If you don’t like the taste then stop buying.

Why care about who makes it, or whether they claim to be the “one and only official makers” or something?

Sometimes I think the manufacturers think they are so important that they get to choose what everyone else eats/drinks/thinks/does. Well they aren’t. Keep challenging them to make useful products, not products that only survive by enforcing laws.

Winter May 21, 2022 7:39 AM


I will help you ‘protect’ your monopoly right to ‘your’ magic cheese.

I guess you also buy counterfeit watches, clothing and other brands, counterfeit drugs, parts, and gadgets.

But it is just fraud to lie about your product.

Q May 21, 2022 8:00 AM

“I know American cheese is all a miserable synthetic glob that is only edible after grilling (it is almost as bad as American chocolate). However, real cheese tastes different by origin and even producer, and should be consumed unadulterated. Not much different from wine and beer.”

If you can’t tell any difference when you eat then it doesn’t matter. It is effectively the same.

If you don’t like American cheese (whatever that means) then don’t buy it. No one is forcing you to. I’m sure they will go out of business if everyone hates it.

Find one you like, eat that. But don’t fool yourself into thinking it is “real” or “official” or some other label that makes it look like it is superior in some way. Everyone has different tastes for what they like. No one is correct to think their particular taste is the one-true-taste the all others should agree with.

Robin May 21, 2022 10:26 AM

“If you can’t tell any difference when you eat then it doesn’t matter. It is effectively the same.”

So if I set up a business selling burgers with the name “McDonald’s” on the packaging I’ll be good to go, with no come-back? I think I’d be slapped with a writ pretty damn quick:


The discussion illustrates strikingly different attitudes to food and food quality; whether it reflects a systematic difference between two continents I can’t say, but there does seem to be a hint of Dunning-Kruger about it. But then I live in France.

Andy May 21, 2022 11:10 AM

To be clear, Q’s statements about lacking regard for the integrity of a products bill of materials, place of origin, and process is not systemic or systematic as Robin asks. I read that viewpoint as only considering one attribute (taste) as the meaningful outcome to which any means is justified.

If I for example purchase shiitake mushrooms I (perhaps in ignorance) assume the produce from the United States will have equally acceptable taste but be lower in potentially harmful heavy metals than produce from e.g. China. If I’m at the store and choose the product that says grown in the USA I expect it to not have been infact grown in China. Whether the taste is the same or not does not relieve false packaging of being intentionally deceitful if not unlawfully fraudulent.

&ers May 21, 2022 12:45 PM

@Dear Moderator & our beloved host,

I have a small wish – more than
“100 Latest Comments” link, say, 1000
will be better. I don’t read here
every day and considering also the spam amount
a lot of good communications can be missed
if i’m away…say…a week. Then i need to go
through all the old topics where i remember i
made some postings. This IS painful. Search
is also here half-broken.


&ers May 21, 2022 12:55 PM


“We just released a research on a supply-chain attack against the Rust development community.”


&ers May 21, 2022 1:38 PM


Where to hide things.


JonKnowsNothing May 21, 2022 2:53 PM

@Q, @Winter, @All

re: If you don’t like American cheese (whatever that means) then don’t buy it. No one is forcing you to. I’m sure they will go out of business if everyone hates it.

American cheese will never go out of business because it’s the primary ingredient for “American Style Macaroni and Cheese”.

iirc(badly) tl;dr

One of those Chef Cooking Shows on TV, highlighted restaurants that the celebrity chef said had a particularly good dish.

This one chef picked a small restaurant that served Macaroni and Cheese. The chef waxed about the virtues of this particular variant. It was a long list of imagined ingredients including exotic cheeses and seasonings, to make the Perfect Macaroni and Cheese.

It looked great (to an American).

When the recipe reveal came, the primary ingredient after elbow macaroni was:

* American Cheese, with more American Cheese and extra American Cheese.

American Macaroni and Cheese ain’t Fondue.


Search Terms

Macaroni and cheese

Macaroni pie

The US president Thomas Jefferson and James Hemings, his slave, encountered macaroni in Paris and brought the recipe back to Monticello. [Jefferson’s estates]

In 1802, Jefferson served “a pie called macaroni” at a state dinner.

Yankee Doodle

vas pup May 21, 2022 4:21 PM

Israeli AI startup bets on robotic beehives to save global bee populations

“After closing down his last venture in Seattle in 2017, Safra relocated his family back to Israel and began looking for his next opportunity in the local tech ecosystem.
He had four criteria. “It had to be B2B [business to business], based on a SaaS [software-as-a-service] model, and it had to be a billion-dollar business. I also wanted to be involved in something that would do well by doing good,” Safra told The Times of Israel in a recent interview.
…in 2018, together with three other co-founders, they established Beewise, a startup based in Beit Ha’emek that has since developed what it calls the first automated and autonomous beehive dubbed the Beehome.

=>The Beehome is a solar-powered, converted container that brings together robotics, artificial intelligence, imaging, a software platform, and a mobile application to monitor and care for honeybees around the clock. The device can house up to 24 bee colonies and automatically controls for climate and humidity conditions, detects and eliminates pests and parasites, identifies when a colony is preparing to swarm, sends alerts when human intervention is needed, and even harvests the honey the bees produce.

With a number of “happy and excited customers,” Beewise is now setting its sights on the North American market, targeting commercial beekeepers and growers in Canada, the US, and Mexico.”

SpaceLifeForm May 21, 2022 6:16 PM

@ &ers, -, Moderator, Clive, ALL

re: recent comments at larger set

Bad idea for security reasons. It is already a problem, but there is no reason to make it worse.

Nick Levinson May 21, 2022 6:23 PM

Accessibility for users with disability should not be applied so it conflicts with the security of HTTPS and allows, say, a user’s credit card information to be taken by an attacker because a user uses an old browser. See and scroll to “Security even over accessibility”. The context is that, on the other hand, accessibility is not available on enough websites.

My experience with lowering a browser’s TLS version is that I couldn’t raise it again until I cleanly installed an OS with a clean browser. I don’t know if that was true of all browsers or is still true today.

I’m not clear why a user would use an old browser except for one very big reason: Many users are not tech-savvy or, if they buy software, justifying the expense of upgrading. For many years (no more), I used Windows 98SE including on the Internet, because it was good enough for my needs and I didn’t want to take the time to learn the complexities of Linux at the time. I guess a million installations of outdated unsupported versions of Windows are still running, especially in governments (see (consider local schools), but that’s only a guess and I suspect it should be much higher.

Nick Levinson May 21, 2022 6:32 PM

Putin using Windows XP as late as 2019 (, when end of life was in 2014 (, is remarkable. I doubt Russia would give Microsoft a contract to patch XP post-EOL as needed, even if MS poromises that no way would tbey ever allow the NSA to have a hand in its patches. I would have thought that for someone that important Russia would have developed a flavor of Linux or something. The nation has IT talent, albeit maybe half of it in the criminal underground, but that’s tappable. Anyway, that’s Russia’s choice. And maybe a foreigner would have to go through a secure proxy to get to Putin’s screen and can’t. Maybe.

Spassky May 21, 2022 7:20 PM


If you transmogrify the substitution tables and the arithmetic operations (moves) on such tables you can play the game. but don’t forget chess game is the quest for truth.

&ers May 21, 2022 7:29 PM

@Nick Levinson

Sorry, you don’t know nothing about russia.
This is Maskirovka.
They want us to think they use XP.

lurker May 21, 2022 7:32 PM

@Nick Levinson

Could Putin be using a Chinese version of XP? It’s been a while since I personally bought a train ticket at the station, but in 2014 the Chinese rail ticketing system ran on XP. They would obviously have the means to make it strong enough for their business.

&ers May 21, 2022 7:55 PM

@Nick Levinson

Learn about it, it has a long, LONG history…


Nick Levinson May 21, 2022 9:33 PM

@&ers & @lurker:


I’m not aware of the Russians having a monopoly on deception in war and national security. It’s fair to assume that every nation practices it and that it has been practiced for thousands of years. If you have any evidence that Putin using XP is an instance of deception, please state it. The Wikipedia article does not appear to be such evidence. Without the evidence, you are merely speculating, often a good thing to do as you have done, but not a strong case. Otherwise, we should assume that every claim that an enemy has a weakness is based solely on the enemy having successfully practiced deception giving rise to the claim. That assumption would often lead to paralysis and failure to attack the weakness in case it exists as reasonably thought. Sun Tzu advised, “[y]ou may advance and be absolutely irresistible . . . if you make for the enemy’s weak points” and “in war, the way is to avoid what is strong and to strike at what is weak.” (Lionel Giles, M.A., trans. (1910)) (author a Chinese general of approx. 2,500 years ago). Therefore, a party should seek out a weakness in its enemy, in order to advance. If the Putin instance is not such a weakness but only a deception, please evince this.


Russia using a Chinese XP seems doubtful. They’re friends but only sort of. Microsoft has had an offer called shared source under which they expose source code to a customer or prospect but don’t allow it to be modified and that offer is open to governments, including China’s. Windows has, at least sometimes, has had an opening for a customer, at least a national government, to insert its own encryption system into the OS. Reportedly, China’s politburo was itself using Windows even though Linux was already well advanced and a Chinese distro existed. The train system likely has a national security implication but not as much as a computer used by the head of state, such as Xi Jinping.

&ers May 21, 2022 9:48 PM

@Nick Levinson

Use your brain – if putin uses XP, why on
earth they let us know that?

putin is ex KGB. Do you really thing they
reveal what they REALLY use? Maskirovka is
first thing they taught and lean to use.

Ted May 21, 2022 10:31 PM

Colonial Pipeline is facing a fine of $1m for non-compliance issues that hampered their ability to recover from a 2021 ransomware attack.

Colonial Pipeline had been notified of several probable violations of Federal pipeline safety regulations following inspections conducted in 2020.

failures to adequately plan and prepare for a manual restart and shutdown operation contributed to the national impacts when the pipeline remained out of service after the May 2021 cyber-attack.

ResearcherZero May 22, 2022 1:00 AM


The cheese rind is the best bit!

“WA Health does not adequately log and monitor who has accessed information to detect inappropriate changes or snooping, and has provided an external vendor with inappropriate access to personal and medical information.”

“In November 2019, the New South Wales government (ServiceNSW) introduced the digital drivers licence or “DDL” for short, as a means to make it easy for people to access a digital version of their driver licence.”

It’s easy to forge

A 4-digit application PIN is the encryption password used to protect or encrypt the licence data.

Local governments and businesses are slated to gain access to the FVS following passage of the long-delayed identity matching service bill, rejected by the Parliamentary Joint Committee on Intelligence and Security in 2019 over privacy concerns.

…proposed amendments to the bill, which will also see the creation of a national drivers licence facial recognition service, were referred back to the PJCIS in July 2020

Any use of facial biometrics and FVS “should require a person’s choice or consent, or be authorised by law, the review said, adding that there would need to be a “genuine alternative” for those that require it.

the biometrics used in identity documents are of “varying quality”, depending on how they were collected and the different International Organisation for Standardisation (ISO) and International Electronic Commission (IEC) standards used.

The review therefore recommends that a “new high standard of ‘proofing’ identity for the purpose of issuing a core credentials”, with different levels of identity – gold, silver and bronze – be set out in a new Code of Identity.

Credentials would also be “bound” to an individual’s birth certificate, visa or citizenship, so that it is “not possible for anyone else to pretend to be that person by using the birth certificate”.

For this, the review has recommended that state and territory Birth, Death and Marriage registries “cooperate to develop a national data exchange so that for every citizen there is a complete comprehensive and accessible record of life events”.

The report also recommends the government create an Office for Identity Protection and Management (OIPM) in Home Affairs to lead national identity policy, including protection and recovery following compromise.

The OIPM would have responsibility for developing and coordinating strategies for the “restoration of identity” and “identity resolution” – “key gaps in the identity system in Australia”, according to the review.

formerly secret review obtained under FOI

- May 22, 2022 2:16 AM


re: recent comments at larger set

1, #comment-405162
2, #comment-405166

To quote a song,

“The games people play, every night…”

Clive Robinson May 22, 2022 3:47 AM

@ ALL,

Re : Putin and XP

Two questions to consider,

1, Does it matter what OS Putin runs?

2, And if so why?

Think about XP and what it can do, and perhaps more importantly what it can not do… Especially as it crossed a watershed at MS.

As I’ve mentioned before I run several pre-1995 computers that do not have USB, WiFi, Flash ROM, microphones, WebCams, and so much other hardware that you get “built in” these days, that is a direct security threat “by design”. Every MS OS beyond XP has real nasties built in in terms of kernel, drivers etc, that you just can not pull out any longer.

Have a look at the history of USB support it being one such security disaster.

If you know where to look you can find documents on line that tell you how to “gut XP” of many nasties such as background services you don’t want or need. You could do it on XP fairly painlessly, because at that point MS had not built them in as required large binary blobs.

Also Win XP is from a user perspective not just comfortable to use, it does not have a whole load of junk in it that MS started to build in that made your life slow and inconvenient.

But there are a lot of people still running XP that are not aware of it. Hospitals for instance have it built into medical equipment, they still use. Lots of older high end electronics test equipment likewise. Even your local garage may have engine diagnostic kit that runs XP.

XP was also kind of the last place most DOS software especially some early games would run without issue.

I still regularly use a “net-book” stand alone, that has a reduced version of XP and Microsoft Office, also WordStar and several older programing language systems with those early IDE’s that Borland made popular, and a lot of my own software, that runs in DOS including a C-Compiler I wrote.

It nicely “dual-boots” with a much much more recent 32bit Linux…

There are many valid reasons to still run XP and earlier MS software one is to still be able to run other software you just can not get to run on later OS’s and that the developers either never upgraded or for various reasons are nolonger in business, but you still need to run the software (some “reverse engineers” may remember IDA-Pro and Win2K issues).

The fact the ICT industry works on an 36-54month to obsolescence lifetime model does not mean the end users do. Some authors and script writers still use the DOS version of Word Perfect, and I still use WordStar 4… It’s the same reason emacs and vi are still used.

I own and use test instruments that are over half a century old. Some like the AVO’s because they have the advantage of “no batteries required” that corrode etc, others because of their real analogue displays. Most of which I can not just maintain but importantly repair. I’ve a couple of Oscilloscopes made by HP, one of which is a,

The other it’s big brother an analogue storage four channel 100MHz that was “a gift” from the UK’s National Physics Laboratory back in the 1980’s.

I also have a couple of “tube”/”valve” scopes on trolleys that are very probably EMP proof by the way they were designed. So might be usefull in the not to distant future 😉

Remember “new is not always better”, often it is worse a lot lot worse especially when it involves security.

John May 22, 2022 5:10 AM


I too like Wordstar and have several pieces of tube equipment.

Hi value resistors in CRT designs seem to be a major source of problems.

Sometimes I remind myself that HP’s first product had complete documentation even down to sources for replacement parts.

Where is that sort of design today? It is still around. Older John Deere tractors can still be maintained and often sell for more than their new equipment! BCS walk behind farm equipment is still maintained. I am using one that is 20 years old.

The formula for long term success seems to be really open source designs.

My production tester runs on an old PC with 5 1/4 inch floppies and a homebrew multi-point serial bus running under DOS 3.3 and is written in PowerBasic.

Just works….

What a concept!!


&ers May 22, 2022 8:18 AM


In Soviet Union with every electronic
device came full schematics, even with
oscilloscope graphs for some devices.
Radios, tape recorders, vinyl record
players, calculators – they all came
with schematics.

One example for you:



This is how we learned and repaired the stuff.

Today all those manuals and schematics are scanned
and available on the net.

Nick Levinson May 22, 2022 9:50 AM

@&ers, @Leon Theremin, & @Clive Robinson:


I don’t disagree on the existence of deception or on Putin’s having been in the KGB, but you’re making the same analytical mistake you made above and that I already showed is erroneous. Your latest post does not show an error in what I last posted to you.

Any nation that is a high-value target of an enemy nation is likely sometimes to reveal, inadvertently or otherwise, what they really use or do.

@Leon Theremin:

There are other ways of compromising a Putin XP computer.

@Clive Robinson:

As far as I know, every well-known OS is provably vulnerable, if in different ways. If, say, the NSA has its own OS for internal use and we don’t know much about it, it may not have externally known vulnerabilities, but I doubt it can get the degree of examination that Windows gets from hackers, although I’m sure some try.

If, say, Russia does its own reverse-engineering and patching and adds modern features to support hardware and other technology that XP never supported (whatever that might be), that could make Putin’s XP better than anything anyone else has. Russia could also decide not to permit any of its improvements, even those not likely to affect security, into the commercial marketplace and build a better OS that many customers would pay good money to buy in competition against MS. They could do the same with cars, agricultural fertilizers, Covid-19 treatments and vaccines (putting aside the debate on whether any vaccines are good for us), and large commercial passenger aircraft. I think I can buy an American flag that was made in China but I don’t remember buying anything made in Russia except maybe Russian-language-labeled retail food (I probably saw it and didn’t buy it but don’t think I’ve seen English-language-labeled retail food made in Russia imported into the U.S.). Russia has for many years wanted hard foreign currency and would likely have increased its exports if they could. It seems they don’t make much that hard-currency issuers want to buy except extractables and electricity. So, I doubt they have an OS even at Putin’s desk that’s all that great. They likely patch it without MS’s help or permission (and may not need permission if it’s part of Russian self-defense within the norms of international law) and they may believe it’s good enough for Putin’s desk, but they probably don’t have a collection of many patches that could be part of a better OS overall.

&ers May 22, 2022 11:50 AM

@Nick Levinson

No, you are constantly making mistakes
here, not knowing russian military doctrine
and blindly believing putin (deliberetly written so)
uses XP.

I showed you the path. You don’t want to take it.
I have no time arguing with you and turning you path
if you don’t want to understand. If you want blindly
believe to the end of your life that putin uses XP,
believe so.


John May 22, 2022 12:45 PM


Hard to get excited about buying anything ‘foreign’ from ANY source.

What ‘no extra cost’ virus or other pathogen is included?

Today, that seems to even include foreign program libraries and programs !!

Crazy world!!


Nick Levinson May 22, 2022 1:02 PM

@&ers & maybe others:

I asked you to provide evidence and now you have, so your comment before it was off-point.

Analyzing the evidence, for the sake of anyone interested:

— It apparently conflates public revelation with all revelation, such as revelation induced by a foreign spymaster being told inside information by an informant.

— It doesn’t address whether knowing that it is XP (if it is) and knowing nothing else about his IT security actually provides a vector for attacking Putin’s computer, a point I’ve already addressed on this page.

— Repetition of what is inadequate evidence, the existence of Maskirovka, does not make it adequate evidence; I’m sure most intelligence agencies are familiar with deception under any name. Sun Tzu, long before there was a Soviet Union, also wrote on spying ( and the existence of deception by an enemy is at least implied. It’s likely that many people who do national security work have read Sun Tzu or been taught on Sun’s principles and use a reflection of it, e.g., turning it around.

— If the press or public was fooled, that doesn’t mean that the people who want access to his computer and have heavy-duty tools that might do the job were also fooled.

Unless the press reports were known wrong, should we ignore them? Your argument implies that we should, but that could prove to be a bad idea. To say that they were proven wrong simply by the existence of the doctrine you cited would mean that nothing uncovered by, say, an anti-Russian spy could have any validity. I don’t think historians would agree with that.

Clive Robinson May 22, 2022 2:17 PM

@ Nick Levinson,

If, say, Russia does its own reverse-engineering

Whilst the Russian’s are some of the worlds best RE’ers and they are very strongly protected by Russian law, they don’t need to RE XP.

We know the XP source code was made available, so what the Russian’s chose to do with it is upto them, as I doubt they care one iota about “licensing”… As they have laws in place that automatically negate any such thing.

Russia has for many years wanted hard foreign currency and would likely have increased its exports if they could.

You have to seperate out the parts of Russia for that statment to make usable sense (it’s a bit like saying “plants need water” but not how much or when).

It’s complicated to go into but Russia’s needs for “Hard Currency” are fairly different from many nations, and much of it is never destined to actually go into Russia it’s self. After all Putin did not become the worlds richest man by putting $100 bills/notes under the mattress. Nor did his cronies and their hangers on.

As for,

I don’t remember buying anything made in Russia except maybe Russian-language-labeled retail food

What Russia produces mainly is what industry calls “feedstock” not “finished product”.

This is mainly down to Putin and Co, syealing what they can. Whilst it makes them rich it actially beggers Russia, as there is not realy any profit in “feedstock” compared to “finished product”.

But one thing that is more than likely is that you have eaten food grown in Russia, Heated your home or driven around on Russian gas/oil, got products using plastics, and metals that came out Russia. And surprising for many a fair amount of software that is developed by Russians, through various third parties (including untill fairly recently, czechoslovakian, Polish and Ukranian “cut-out” companies owned by US companies).

Which is why,

I doubt they have an OS even at Putin’s desk that’s all that great.

Is probably wrong. Whilst Russia can not make chips due to the hierarchy, software they can squeeze more than you would think out of it. The thing is I run MS-DOS 3 which is 16bit on 32 and 64bit processors via various pieces of open source software. The result is 8-16 windows that look like just like individual machines, any one of which can be made “full screen” so by looking at the screen you could not tell what base OS was running and what “containers” or “VMs” are running on it. Such systems can actually be made quite secure by anyone bothering to read the documentation…

Which brings me back to my original two points…

@ &ers, article

Go look at the Forbes article the “TechTimes” article was not exactly coherantly chopped from…

The Forbes article (turn cookies and javascript off),

It is written by Davey Winder, a UK Journalist I used to know through the work I did for a number of years. And I tend to trust the stuff he writes.

In there you will find these quotes from Ian Thornton-Trump,

“I would have thought Putin would be rolling with some high-security Linux distribution with extra FSB cybersecurity sauce.

With a defense in depth approach, and system hardening work, Windows XP can be a very tough nut to crack.

Millions of XP boxes still exist in industrial control system environments, if the FSB cyber defenders know this OS the best, then they can probably lock it down tight.”

Which is pretty much my thinking as well, as from a technical security point of view it makes sense.

For other reasons such as “user software” that is also insecure, it actually makes sense to have an XP VM/container under another host OS that enables things to be locked down hard but still function. What the host OS is is a matter of prefrence, but as a general rule I would expect it to be different to the hosted OS.

In fact you could lock such a system up much tighter than a drum, compared to using any later MS-OS, especially those with a built in needs to leak/haemorrhage info onto the Internet any which way they can in their poor imitation of Google’s behaviours.

As for “Maskirovka” Russia has been expert at doctoring images for around a century if not more. Also with regards the potential of the use of a “staged office” well Stalin used to do that all the time as well. So as we know Putin is a Stalin fanboy, we can assume he has atleast a passing knowledge of Stalin’s security behaviours.

vas pup May 22, 2022 3:59 PM

Russia’s laser weapon in Ukraine: Does it exist?

“In a conference aired on the state media Channel One on Wednesday, Yury Borisov, Russia’s deputy prime minister, said the country’s state-of-the-art laser weapon, called “Zadira,” is being used to shoot down Ukrainian drones.

“Zadira” could be part of an intercontinental ballistic missile system, which includes a laser component called Peresvet, Reuters news agency wrote on Wednesday.

Borisov said that Peresvet was already being widely deployed and ==>could also blind satellites up to 1,500 km (930 miles) above Earth.

“If Peresvet blinds, then the new generation of laser weapons lead to the physical destruction of the target … they burn it up,” Borisov said, according to Reuters.”

Q: Could Starlink satellites be only temporary blinded above war zone by this weapon?
Q is exclusively technical and answer expected in same direction.

SpaceLifeForm May 22, 2022 4:27 PM

@ &ers, Nick Levinson, Clive

IIRC, Putin’s XP machine was always airgapped.

Ted May 22, 2022 9:34 PM

Google and Apple both announced plans to remove apps from their respective app stores that haven’t been updated in two years.

Early in April, Google announced a two-year cutoff plan that would kick-in in November, and later in the month, Apple started emailing developers, giving them 30 days’ notice to update or be removed.

It’s been estimated that this would remove around 870k apps from Google Play and around 650k from the App Store. It’s not a bad idea. I wonder where this is coming from.

lurker May 22, 2022 10:08 PM

@Ted, “It’s not a bad idea.”

As the article says,

Not every two-year-old app is broken. Not every app in the world is a live service that will be updated forever, and a model like that doesn’t work for a free project.

I have four apps on my phone, over six years old, never updated. They are read-only databases of small flat text files. Two have parallel audio files to play on demand. If they were on my linux desktop, they’d be in ~/Documents and read with some suitable app. But the smartphone paradigm is to bundle it all into an “app”.

Next time some other app decides it can’t run on my old hardware it’ll be a right fernangle to transfer if the appstore has cancelled my subscription. The last time the backup/restore software on the old and new devices refused to talk to each other. I don’t feel like running a museum of old devices just to run orphaned apps . . .

Ted May 22, 2022 10:55 PM


Re: Older apps

You’d probably enjoy reading the comments on that article. Someone mentioned a point found in a linked article about Google’s changes:

Users who previously installed an app will still be able to find and install it again, but new user acquisition will be shut down.

I put the linked articles for both platforms below. If these changes could impact anyone, I’d read the articles more closely.

re: Google

re: Apple

JonKnowsNothing May 22, 2022 11:07 PM


re: It’s not a bad idea

I think its not a good idea at all.

There are many apps that never need updating because they don’t use crappy interfaces and they don’t use crappy coding and some are simple in design and use. There’s nothing to update. (1)

IM(Not)HO Generally the demand for “update” has more to do with the platform fudging or altering some aspect of the build package, shuffling files and resources into a different tree or flat file system. Really very little to do with anything about how the app is coded (1).

There is a constant churn to make things work with the latest rounded window frames or square buttons or notched or not notched display or Dark and Light themes. Depending on the simplicity of the app, often you don’t need to do anything at all as if falls under “default”.

So, some 600-900 apps that they won’t bother to check to see if they actually work as is, will get toasted because of a date timestamp.(2)

What great System QA….


1) I have one that’s been floating along just fine for years. I check about every 5 years or so, to see if it’s still available. The biggest hit will be if the platform collapses and then it will hit the bit-bin.

2) Over on Marcy Wheeler’s site the email timestamp business is really monkey business.

The short version for popcorn time: The one side presented a witness with a long listing of email subject headers and timestamps. The timestamps on the form had nearly nothing to do with the real timestamps on the documents and a few were just made up. The one side asked the witness if they recognized the emails. That person said they recognized some of the subject headers. That entire list with including the bogus timestamps is now “on the record”. The witness who acknowledged the subject lines fell into a “perjury trap” which might slam their door shut for a few years.

You can’t even trust your own side …

ht tps://www.empty wheel. net
(url lightly fractured)

SpaceLifeForm May 23, 2022 12:04 AM

Use Firefox folks.

It’s not often that bug fixes get deployed in 4 days.


He demoed the bug on Wednesday, Mozilla fixed on Friday, and I just installed the Debian Stable version.

SpaceLifeForm May 23, 2022 1:57 AM

@ JonKnowsNothing

re: non-public DNS information

I hope next week, that a jury learns about 13 and Anycast.

Because I guarantee you, the non-expert DNS witness has no clue.

JG4 May 23, 2022 8:07 AM

It will be interesting to see how this lines up with fMRI and PET.

Can Humor Preferences Reveal Who Has a Dark Personality?
Psychologists offer a new way to tell if one has undesirable personality traits.
Posted April 30, 2022 | Reviewed by Vanessa Lancaster

Examining whether dark personality traits predict who will find entertainment media humorous.
Six out of the seven dark personality traits were associated with a tendency to find humor in violent entertainment.
Prosocial games may teach people to devise nonviolent solutions to conflict and result in improved interpersonal relationships.

A new study published in the academic journal Psychology of Popular Media shows a strong connection between watching a lot of violent media, finding media violence humorous, and having dark personality traits. Importantly, the research predicts how this connection might lead to actual violence and aggressive behavior.

Ted May 23, 2022 10:16 AM


Re: “Untouched” apps

Surely it wouldn’t be too tall of an order for a software developer to at least check and see what’s changed in the environment and respond accordingly. Do you have any apps your worried about? Maybe someone else will be so kind as to pick it up.

Leon Theremin May 23, 2022 10:47 AM

ICCL report on the scale of Real-Time Bidding data broadcasts in the U.S. and Europe

16 May 2022: Real-Time Bidding (RTB) is $117+ billion industry that operates behind the scenes on websites and apps. It tracks what you are looking at, no matter how private or sensitive, and it records where you go. Every day it broadcasts this data about you to a host of companies continuously, enabling them to profile you.

This report presents the scale of this data breach for the first time.

Winter May 23, 2022 12:28 PM

@Leon Termin

This report presents the scale of this data breach for the first time.

That will not help in the case of IAB Europe against the Belgian Data Authority. Note that the decision of one Data Authority will be taken up by all the other countries.

tldr: It looks bad for the industry.

Has the decision of the Belgian Data Protection Authority against IAB Europe shaken the ground on which the adtech industry stands in Europe?

Based on these findings, the Belgian Data Protection Authority imposed on IAB Europe a fine of EUR 250’000.00 and the obligation to undertake corrective measures. These measures included the establishment of a valid legal basis for the processing and sharing of users’ preferences within the TCF. In this regard, the Belgian Data Protection Authority also made it clear that the legal basis of legitimate interest is prohibited for the processing of personal data by an organisation that participates in the TCF. Moreover, it included the obligation to strictly vet all participating organisations to ensure that these organisations meet their GDPR requirements. The Belgian Data Protection Authority also required the deletion of personal data already being processed under the TCF system.

More explanations here:

lurker May 23, 2022 3:51 PM

@Leon Theremin, @Winter

How does the default status of those cookie consent pop-ups conform to GDPR? Most present the choice “Accept All” or “Manage Preferences”. The second takes the user to a panel where they must select which cookies to accept. Without exhaustive logs I have to observe that most seem to have the default set to OFF for ads and tracking. But the user has to have already made the effort to go into this level of self-preservation. By clicking “Accept All”, or by doing nothing and letting the pop-up time out, you get the full plate.

I assume these preferences are stored in the site cookie. So every time a user purges cookies – often for me, never for the rubes they are tracking? – the game starts again from square one.

I wonder if Tim Berners-Lee ever imagined his web would be used by consent management platforms and adtech vendors.

JonKnowsNothing May 23, 2022 4:52 PM


re: Untouched App: Maybe someone else will be so kind as to pick it up

The app is Open Source. Anyone can take it and make changes to it or alter it to their own desires.

There are lots of changes that happen during a career in tech, and I have no illusions that any of the code I’ve ever written, for any company, still exists, unless someone has a massive archive of defunct software from defunct companies.

There are people who do buy exactly those items because they can invest a few $$$ and maybe they can find something cheerful, provided they can recover the source code from the systems backups.

The issue isn’t whether the app needs maintenance but that the platforms are arbitrarily de-platforming things without CHECKING if they work or not.

I’ve not delved into the latest update process, however, I think the real issue is not app maintenance, it’s app-data theft, app-cash theft and app-in-app cash outs.

Once the platforms opened up their APIs to allow more access, than a thoughtful person would even consider appropriate, they landed themselves with a whole lot of Bad-Asp-Apps. That, and the desire to lock-down all cash paths to their own pockets.

lurker May 23, 2022 5:53 PM

@Ted, “security and privacy?”

An app that’s had zero vulnerabilities in six years can’t be allowed to run on an OS that’s forever being patched?

SpaceLifeForm May 23, 2022 7:36 PM

@ lurker, Ted, JonKnowsNothing

Let me fix that for you.


An app that’s had zero vulnerabilities in six years can’t be allowed to run on an OS that’s forever being patched?

You must upgrade to the latest API and OS that has the latest and greatest backdoors. Sales of new hardware is important to our bottom line.


SpaceLifeForm May 23, 2022 8:05 PM

@ JonKnowsNothing

The Metadata is rich

Timestamps R Us


Besides 13 and Anycast, maybe BGP will come up.

lurker May 23, 2022 8:20 PM

“Sales of new hardware is important to our bottom line.”

What is G’s percentage of total hardware sales in this market? Like @JKN I get that it’s not about app maintenance, it’s about monetisation. And curmudgeons like me run our six year old apps offline. Heck, we even make once only upfront payments for the pro versions so we can run them offline, and avoid the bad guys, which includes G’s ads. I wonder what percentage of software sales is to curmudgeons?

JonKnowsNothing May 23, 2022 11:28 PM

@ SpaceLifeForm, @All

re: The Metadata is rich Timestamps R Us

It’s a good thing that there is ample explanation of the LEGAL side because from the technical side there’s a lot of compost in the bags.

M & Co, give us non-beagles some bagel holes to connect the empty spaces with.

It’s rather appalling what’s taking place but per the negative spacing described it’s good lawyers vs bad lawyers: Situation Normal.

On the even worse side is the SCOTUS ruling preventing redress to the Federal Courts from specific State Cases. (3)

  • If you are found guilty at the State Level. Enjoy the Room With No View forever.

This is going to quickly become an issue as “criminal” convictions come in many formats, including Plea Agreements. (1) If you take a deal, or wish to challenge your situation, the tether is shorter now.

If Redress to Federal Courts is blocked from State Cases, this may not bode well for the upcoming criminalization of 50% of the population who will have no redress past the State Level, should they run afoul of the Timing. (2)


1) Getting out or avoiding death by signing a fabricated confession, happens in every jurisdiction.

Search Terms


Foreign Office


UK accused of agreeing to Iran’s ‘unlawful’

sign false statement as condition of her release

2) Timing will vary by state. Some will be more lenient and some start the clock at the moment of intimacy. For those who can be counted in the targeted groupings, half face no legal threats while the partner faces a long haul sentencing. It will make crossing State Lines as dangerous as crossing International Lines. It will give US LEA Guard Labor another rabbit to chase.

Conservative majority hollows out precedent on ineffective-counsel claims in federal court

https://www. scotusblog. com/2022/05/conservative-majority-hollows-out-precedent-on-ineffective-counsel-claims-in-federal-court/

(url lightly fractured)

ResearcherZero May 24, 2022 3:29 AM


Moscow has turned to its cadre of diplomats, government spokespeople and ministers — many of whom have extensive followings on social media — to promote disinformation about the conflict in Eastern Europe… the level of disinformation, including the promotion of Russia-owned state media and potentially doctored images, now being shared by Moscow’s official accounts, represents a paradigm shift in how Russia pushes its false narratives.

“Warfakes is a popular Russian language telegram channel that, along with its English language website, emerged in the first few days of the current Russian invasion of Ukraine. The channel and the website present themselves as debunking fake news, in the familiar style of fact-checking websites like PolitiFact and Snopes.”

…their content is systematically promoted by the Russian state via the Facebook pages of foreign embassies and other Kremlin-sponsored cultural institutions.

We found that the main promoters of warfakes content were Russian embassies and Russian houses of culture, both of which are under the jurisdiction of the Russian Ministry of Foreign Affairs. We had found evidence of the Director of the Information and PressDepartment of the MFA RF Maria Zakharova’s connection to the warfake channel.

Leon Theremin May 24, 2022 5:11 AM

Even if the GDPR forces “bidding for ads” out, users shouldn’t expect to be any less targeted.

“The latest is “smart shopping ads”, it’s a great big magic black box, and all advertisers are being agreeably pushed towards it, all calls with google advisors are basically sales calls push it on you. Advertisers have basically no control of when their ad is shown, it’s all down to AI/ML. They have also folded the display network and re-marketing into this, you can’t turn that bit off.

I am pretty sure the old keyword bidding is on its way out will not be available in a few years.

In order for all these new ML based advertising work we have to send google a lot of data, there is no option. They know everything about your business, all revenue numbers, they no exactly how much every business that uses their advertising is making. The level of “spying” on advertisers is frankly amazing, I wish it wasn’t necessary, just as I wish I wasn’t being spied on as a user.”


Google (and its cronies) will try to deceive by saying the infallible artificial intelligence is so smart it picks the right ad to show by making connections from data legally obtained, but it won’t allow anyone to look under the curtain and see the troves of illegally obtained data that it feeds to the AI. (But if they think they will get away at this forever, they will learn otherwise.)

Sumadelet May 24, 2022 6:39 AM


The short answer is that they don’t, but getting redress is a long drawn-out process which will cost an individual more than they benefit, thus tipping the scales of justice in the direction of the transgressor.

The GDPR is quite plain.

h++ps:// [intersoft consulting]


Recital 32:

Consent should be given by a clear affirmative act establishing a freely given, specific, informed and unambiguous indication of the data subject’s agreement to the processing of personal data relating to him or her, such as by a written statement, including by electronic means, or an oral statement. This could include ticking a box when visiting an internet website, choosing technical settings for information society services or another statement or conduct which clearly indicates in this context the data subject’s acceptance of the proposed processing of his or her personal data. Silence, pre-ticked boxes or inactivity should not therefore constitute consent. Consent should cover all processing activities carried out for the same purpose or purposes. When the processing has multiple purposes, consent should be given for all of them. If the data subject’s consent is to be given following a request by electronic means, the request must be clear, concise and not unnecessarily disruptive to the use of the service for which it is provided.

See also the working paper on Guidelines for consent:


Footnote 41 on page 16

“As also pointed out in the opinion adopted by WP29 on consent, it seems essential to clarify that valid consent requires the use of mechanisms that leave no doubt of the data subject’s intention to consent, while making clear that – in the context of the on-line environment – the use of default options which the data subject is required to modify in order to reject the processing (‘consent based on silence’) does not in itself constitute unambiguous consent

SpaceLifeForm May 24, 2022 11:39 PM

As long as the barcode scans…


Who reads the fine print anyway?

Clive Robinson May 25, 2022 1:10 AM

@ SpaceLifeForm,

Re : As long as the barcode scans…

Another fine example of what Douglas Adams wrote about toothpicks and it causing “Wonko the sane” to build the inside out Asylum house[1]… I mentioned just a week or so ago.

I was chatting to a friend over the weekend about an issue of “house work”. It had started with a phone call from their grown up twenty-something child about how to wash clothes…

Apparently their washing machine had broken down and could not be fixed in a reasonable time (parts and the new supply chain issues[2]). So they had to go use somebody elses washing machine that had different controls that alowed you to select several types of pre-wash, main-wash, rinse-cycles and drying-cycles… Rather than just a dial with “40 degrees wash”… It turns out that the “confident young adult in charge of others in the office” had never ever in her life actually “washed clothes” by hand, so actually had no real idea how to use a washing machine either (which is why theirs had probably broken[2]).

We are turning into a “push button society” where the simplest of life skills are now “automated away” behind the push of a button or touch screen… As a result we have no idea how to actually do something as “It’s all done in the box”…

We used to joke about “Kids setting the VCR for their parents” now it would appear the shoe is on the other foot…

But we are loosing basic everyday skills, because ask yourself what happens when mum/dad don’t know, so can not be asked?


[2] It had broken down “under warranty” and the repair-person had told them it was a “drum replacnent” job as the drum shaft had bent… What many people apparently do not know is you just can not stuff a front load washing machine full with clothes any old how, you have to lay them in so you do not create a massive “off balance load” that wrecks the bearings and shaft.

why so serious? May 25, 2022 1:28 AM

Serious security vulnerability in Tails 5.0 (2022-05-24)

“Tor Browser in Tails 5.0 and earlier is unsafe to use for sensitive information.

We recommend that you stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).

A security vulnerability was discovered in the JavaScript engine of Firefox and Tor Browser. See the Mozilla Foundation Security Advisory[1] 2022-19

This vulnerability allows a malicious website to bypass some of the security built in Tor Browser and access information from other websites.

For example, after you visit a malicious website, an attacker controlling this website might access the password or other sensitive information that you send to other websites afterwards during the same Tails session.

This vulnerability doesn’t break the anonymity and encryption of Tor connections.

For example, it is still safe and anonymous to access websites from Tails if you don’t share sensitive information with them.

After Tor Browser has been compromised, the only reliable solution is to restart Tails.

Other applications in Tails are not vulnerable. Thunderbird in Tails is not vulnerable because JavaScript is disabled.

The Safest security level of Tor Browser[2] is not affected because JavaScript is disabled at this security level.

Mozilla is aware of websites exploiting this vulnerability already.

This vulnerability will be fixed in Tails 5.1 (May 31), but our team doesn’t have the capacity to publish an emergency release earlier.”


SpaceLifeForm May 25, 2022 2:10 AM

@ Clive

The difference between a cutting board and a chopping block is that if you use a cutting board as a chopping block, you may end up with toothpicks. That would be Wonko.

It’s in the fine print somewhere.

What many people apparently do not know is you just can not stuff a front load washing machine full with clothes any old how, you have to lay them in so you do not create a massive “off balance load” that wrecks the bearings and shaft.

That can happen to a top load washer also. And also do not overload it. That would be Wonko.

It’s in the fine print somewhere.

Probably few these days have ever seen a wringer washer.


Winter May 25, 2022 2:55 AM


What many people apparently do not know is you just can not stuff a front load washing machine full with clothes any old how, you have to lay them in so you do not create a massive “off balance load” that wrecks the bearings and shaft.

Modern washing machines can handle just stuffing in clothes. They have programs to reshuffle the clothes. [1]

The main reason they break is that people just stuff in too many clothes [2]. A washing machine needs room in the drum to reshuffle the contents. If it is overly full, that won’t work.

The main problem is that you need someone to tell you that you should leave room in the drum. If no one tells you that, or if you are wont to simply consider this a washing machine industry conspiracy to sell bigger machines, then your machine will break eventually.[3] And if it is a cheap/bad/American one, it will be sooner rather than later.

[1] ht-tps://

[2] ht-tps://

[3] Unless you forget to remove the transportation bolts, then it will break very, very soon. Someone has to tell you that too, and you have to listen to this “technobabble”.

Clive Robinson May 25, 2022 6:48 AM

@ SpaceLifeForm,

Re : wringer washer

I might actually be younger than that SpeedQueen by a half decade or so 😉

I also remember my grandma’s (born in 1800’s) wash-tub, wash-board, and mangle (wringer) and during the 1970’s when we had the “black-outs” they were draged out of the –white asbestos– garage and we “youngsters” were given the physical part of turning the mangle with it’s wooden rollers, and heavy enamel paint cast iron gear wheels S shaped arm and large two hand wooden handle. The interesting thing about the wash-board is unlike most people think, it was made of heavy glass with the ripples cast in.

If people listen carefully to the video you link to, they will learn some important leasons about using not just the water but a few other things…

One thing people do not realy realise is that “washing” in all it’s forms is a “dilution and settling” process the soaps and detergents do make the gung that is dead bio-matter and other hydro-carbons (lipids) more attractive to water, but you still need enough water to dilute it… Speaking of “chemistry” don’t forget the usefulness of “white table salt” in washing[1].

@ Winter,

Re : Auto balance

If just “chucked in the drum” the cloaths need to be at most 1/3rd of the drum hight. Howrver if you fold them into “logs” that lay parallel to the axis with heavy stuff put in first then work up to lighter then you can fill to halfway up the drum. Also the folded logs also wash better than just “pushed in the drum”.

Way to many people just “ram it in” till the drum is full, then wonder why,

1, Their cloths don’t wash well.
2, Their machine breaks down very quickly.

[1] I’m not going to go into the why, but… also urine was once used in washing and “bluing agents” were once very finely ground blue stone. You can make laundry soap with the white ashes from a very hot hardwood fire converted into a weak lye of mixed carvonates that you filter concentrate and precipitate out unwanted contaminates,

The resulting liquid is boild up with hard ox or pig fat/grease to make the soap.

However it works better for making some soaps if you convert one caustic to another, and makes a harder longer lasting bar if you add salt to it. Yes before abyone asks I have practical experiance of doing this. One advantage of such soaps is they do not lather very much, oh and provided you’ve used up all the lye, tend not to cause allergic reactions as they do not have all those nasties in them.

Winter May 25, 2022 9:17 AM


It advocates for a public health approach to guns. Very helpful infographics.

I have had quite some online discussions with (quite radical) Americans about gun violence. I also heard from others who did so in person in America.

My conclusion: Americans want to have guns so they can shoot other Americans[1].

The “target Americans” are generally described only very vaguely, but included representatives of the Government and Criminals (self-defense). When I am honest, it felt to me that the “Government” part was only “Democratic party government” and the “Criminals” were people with a congenitally colored skin.

[1] I always wondered about the popularity of Zombie movies. I have a hunch that one attraction is that it makes it a moral imperative to kill everyone. It used to be Indians, Nazi Germans, and (Vietcong) Communist that could be murdered ad fundum. But in modern times, that is accepted less. So the public resorted to Zombies as the universal target for massacres.

Ted May 25, 2022 10:10 AM


My conclusion: Americans want to have guns so they can shoot other Americans[1].

Interesting. The NYT’s article had this stat.

US gun deaths in 2016:

  • 22,000 gun suicides
  • 11,760 homicides
  • 589 self-defense homicides
  • 456 mass shootings

I don’t know if this alters your conclusions slightly?


Winter May 25, 2022 10:45 AM


US gun deaths in 2016:

What they want with it is not they do with it. People buy home trainers to exercise, but they generally use it to clutter their homes and collect dust.

They buy guns to prepare for the revolution/collapse of society/civil war, but they use it to kill themselves or their spouses.

Quantry May 25, 2022 11:52 AM

Since the “RCMP does not accept reports of crime via e-mail” [2], nor by securedrop [1] evidently, (and anyway it’s pointless to use TAILS here at the college library), and since CSIS clearly and openly mocks “certain sources”, and since the local Telco also avoids anonymous tips, and since the CRTC clearly avoids any meaningful online reporting of breaches…


“lately, it seems the ‘disused’ POTS land-line hanging on our building is being used as a back-haul now that the Optical modem just energizes the original shared wiring”, AND

having found a long pair of 30ga copper wires hanging out of the supposedly disused POTS telco pedestal down the street, which could reach thru the fence in the area of the yard of the one of the local radio operators… color me paranoid, I care not. EOS

[1] h–ps://
[2] h–ps://

lurker May 25, 2022 1:00 PM

@Ted, Winter

Why does the Second Amendment still exist? Didn’t the raison d’être in the preamble cease in 1865?

JonKnowsNothing May 25, 2022 1:15 PM

@Clive, @SpaceLifeForm, @Winter, @All

re: Washer Ramming: “ram it in” till the drum is full

RL Anecdote tl;dr

My family did not own a mechanical “modern” washer & dryer for the majority of my lifetime. We did have a mechanical hose filled wash-tub, with optional wash-board, and mangle (wringer). The last good for finger removal.

However, after a certain point, Public Coin-Op Washer Dryer Laundromat establishments started and every Saturday was spent hauling baskets of laundry there and running many machines (25cents per load) and dryers (10cents for 45 min dry) until the week’s worth was done. Sheets, towels then clothes, so the folded clothes would be On Top to be put away first. The rest might go back on the bed directly (nice warm sheet on cold nights) and the towels back on the bar in the bathroom. Not a lot of linen closet material then.

When I spent time in Europe later, I was stunned there were no Coin-Op Washer businesses at the time. I was expected to use a wash board and bar soap and freezing cold water from a well to clean up both my clothes and for showers.

It didn’t take me long to hunt up the only coin op in that part of France and I took my grungy clothes to that Laundromat.

When I went in there was a person with a long 4ft 2×4 standing near a washer. I went on by figuring that one was broken and I found a free one to do my duds with suds. I watched the person with the 2×4 ramming it into the machine. Certainly there was something really stuck, so I watched to see what they pulled out of the drain.

Ram Ram Ram Ram

Hmmm. Nothing was coming out.

So I made up a mental excuse to walk to the front of the building and peek into the washer to see what was so stuck.

As I walked by I realized the washer was filled to the brim with “washable items”, filled with foaming suds and the person ramming the 2×4 into the barrel.

Then it clicked…

The person was using the 2×4 as an agitator and was ramming their clothes clean the same way we did in a wash tub.


* they didn’t know the machine would do that for them

* they only had funds for 1 load and had to get it all-in-one-go

* wanted their money’s worth by stuffing as much as they could into the machine

* the 2×4 Ram became the agitator, as the mechanical one wasn’t going to be
able to move that much of a load

* they were convinced that the machines didn’t work because they had to use several machines to wash the same quantity of items their old wash tub did with a liberal application of HUP RAM HUP RAM HUP RAM.

FYI, in one place we lived, our hose filled wash tub water came from a heavy red clay water area. You might have had a white Tee when you put it in the wash tub but you got a nicely dyed clay-red one when you took it out.

Clive Robinson May 25, 2022 1:49 PM

@ Ted, Winter,

Re : The NYT’s article had this stat.

Note it is missing to other very important stats,

1, Police shootings.
2, US forces,”friendly fire”[1].

The make a significant difference to the usual quoted figures of “mass shootings” and alleged “self defence” killings.

Some things are just too controversial even for the NYT to publish.

[1] Without naming names, there are stories about a US commander so sick of blue-on-blue he threatend to do a 180 with his forces and attack the US Air Force… Then there are others about the US Air Force killing the most senior US commander in the field… I know of some who only half hartedly joke that the reason the US drone pilots are stationed outside Las Vagas, is so they are out of range of US ground forces…

SpaceLifeForm May 25, 2022 2:37 PM

@ JonKnowsNothing, Clive, Winter, ALL

The first washer I ever saw was a wringer washer, certainly built in early 50s. IIRC, there was no emergency release on the wringer. So, mangle was aptly named which always led to the warnings about watching your fingers.

Remember the old wooden clothes pins?

You know, the ones with no spring?

That did not perform so well in very windy conditions?

Winter May 25, 2022 3:13 PM


Why does the Second Amendment still exist? Didn’t the raison d’être in the preamble cease in 1865?

It was needed for lynching black people?

Ted May 25, 2022 3:14 PM


Note it is missing to other very important stats

Sorry @Clive. I left out “Other Causes” to make it simpler. There may have been 3,500 of these. In the graphic each bullet represented 500 people, and there were seven bullets under other causes.

The Gun Violence Archive website breaks down these numbers a little more. But maybe the CDC site is better?

Some things are just too controversial even for the NYT to publish.

Oddly enough, there was a podcast on the NYT’s The Daily a few weeks ago about a drone pilot. I forget if the NYT’s articles are blocked for people.


Why does the Second Amendment still exist?

I don’t know. Did you see this tweet though?


They buy guns to prepare for the revolution/collapse of society/civil war, but they use it to kill themselves or their spouses.


lurker May 25, 2022 4:37 PM

@why so serious,
“Serious security vulnerability in Tails 5.0”

s/’Tails 5.0’/javascript/

there, fixed that for you.

vas pup May 25, 2022 4:45 PM

China must destroy Elon Musk’s satellites with ‘hard kill’ weapon, say academics

“Researchers from the Beijing Institute of Tracking and Telecommunications Technology called Starlink a threat to China’s national security because of its “huge potential for military applications”.

Starlink is Elon Musk’s global connectivity project, consisting of thousands of satellites in a near-Earth orbit paired with ground terminals giving its users high speed internet access.

In a paper published in China’s Modern Defence Technology journal, the five-strong team of academics say Starlink could be used by the US military and called for China to develop weapons to destroy the internet connectivity network. The paper said: “It is necessary to further develop related technologies and form disposal capabilities.”

They add that China should “vigorously develop countermeasures” and be prepared to “use a combination of soft kill and hard kill” techniques against the satellite network.

A translation of the paper’s conclusion said the anti-Starlink push is needed for China “to maintain and obtain space advantages in the fierce space game”. Starlink’s unique selling point is its ease of deployment, which has seen the technology rolled out in Ukraine as the Russian military bombed the country’s conventional phone networks.”

SpaceLifeForm May 25, 2022 5:39 PM

Check the onion today

Check on the brainwashed parents also


Clive Robinson May 25, 2022 7:03 PM

@ JonKnowsNothing, SpaceLifeForm, Winter,

I was expected to use a wash board and bar soap and freezing cold water from a well to clean up both my clothes and for showers.

Ahh well water for washing yourself… Not my favourit activity especially when you have to put a big heavy rock in the bucket, an “pull up and drop” several times to smash through the ice, at 0500…

I learnt to heat ~20 fluid Ounce (imperial pint) to boiling use half of it to make a mug of tea, the other half to mix bit by bit with well water an ounce or two at a time to wash “the cracks, crevices, n pits” as well as wash out a pair of socks and “undercrackers”…

Then shave as “Her Maj’s orders” required and present my self with a nice shiny clean face and hands to do “garbage duty” at the “cook house” (better than latrine dury). But it was not a house in reality it was a couple of ponchos buttoned together with a rope support under which was a ditch dug down about 18inch in which a fearsom beast of a preasurised petrol cooker was used to make all sorts of strange things that had three saving graces,

1, It was hot
2, It was sweet or savoury
3, It stuck to your ribs.

Rumour had it, it was made with all natural products… But then so is rodent poo =O

Then it was out doing the rounds of the fields along the boarder…

Supposadly happy days from fourty one and a bit years ago doing a “field excercise” in the “early spring” when you found places so cold that even snow dared not go there…

Worse though was when it warmed up and rain came in from the sea… Where no matter what you did, the damp got in all those important little places you would rather be dry…

JonKnowsNothing May 25, 2022 8:48 PM

@SpaceLifeForm, @Clive, @Winter, @ALL

re: Remember the old wooden clothes pins?
You know, the ones with no spring?
That did not perform so well in very windy conditions?

LOL indeed I do!

RL anecdote tl;dr

When able to totter about on my own, I was sent out with a load of sheets to hang them on the clothes line to dry. Outdoor Sun Dry.

I hung them up incorrectly.

I didn’t want the nice clean sheets that everyone worked so hard to get white, from their previous greige color (nice new term that), to have a big long rust mark running down the middle of the sheet after it was thrown over the wire.

That and I was too short to actually reach the wire easily.

So I hung them from the edges with all the no-grip wooden pins I could reach. I couldn’t reach the wood pin bag either so I had to jump to grab what I could.

Well… soon enough the older ones came to check on me and I knew it was time to Run The Other Way when I saw their faces exploding from pink to red to purple.

Hanging the sheets by the edges had twisted and warped the shape of the sheet. They became somewhat rhomboid with noticeable bulging in other areas.

After everyone calmed down enough to talk with me, and I explained about the rust mark worry, they all took stock of that. A few days later there was a new wire on the clothes line.

Nick Levinson May 25, 2022 9:36 PM

@Winter, @lurker, @Leon Theremin, & @Sumadelet:

What happens under the GDPR or European Union law in general is not the last legal word. The GDPR cannot have worldwide applicability even though the EU has claimed global jurisdiction for it. Only general international law (norms of international law), of which the GDPR is not part, or an international agreement agreed to by all (not just most) nations (I don’t know of one) can have worldwide applicability. The EU can exercise jurisdiction over anyone with nexus in the EU, i.e., nationality or presence, probably more than trivial nexus to qualify, and Google almost certainly has sufficient nexus. However, not all companies or entities that supply advertisements for websites to run have nexus in the EU. Thus, whatever the EU does may be ignored by ad suppliers that don’t have nexus in the EU. Thus, Google has competition not subject to EU/GDPR jurisdiction, although not much or none for websites that have few visitors.

SpaceLifeForm May 25, 2022 11:06 PM

@ lurker, why so serious

re: Tails

This vulnerability will be fixed in Tails 5.1 (May 31), but our team doesn’t have the capacity to publish an emergency release earlier.

Mozilla fixed in two days. But that is because they are set up to do nightly builds. And I am sure that the bug report was very detailed and pointed them immediately to the problem.

Building Firefox from source is a huge headache. Seriously, it it easier to build a minimal Linux OS with a toolchain in less time. Sans GUI. You want a GUI? There be dragons in dependency hell.

SpaceLifeForm May 26, 2022 3:19 AM

No Hat, No Cattle


Sumadelet May 26, 2022 10:59 AM


Bert Hubert is a good writer, and produces some very good articles. Thank you for highlighting that one.

What I would say, regarding the picture, is that the Grand Unified Boot (GRUB) loader used in many Linux systems can be configured to display any image as a boot splash screen, so someone wanting to make an effect could easily make it appear to the non-professional eye that any chosen operating system was being used. You could almost call it security by misdirection.

I am not saying this is what is happening in this case, but it is always well to be aware of the possibility.

Clive Robinson May 26, 2022 1:29 PM

@ SpaceLifeForm,

Re :

Appart from a few specifics, it’s effectively the same talk I give over and over, as do one or two others who have come into ICTsec in Industrial Control Systems(ICS) via the less traveled route…

But of such talks, blog posts, papers, etc, few hear, or read, let alone take on board, anything but the conclusions…

Which is actually where the author and I differ. So lets pull them up in the two paragraphs they are given in.


“When formalising a partnership, be sure to mandate that suppliers undertake to install security updates in a timely fashion, or where they can’t do so, make sure to disconnect systems from the outside world (entirely).”

My view is firstly “segregate” by design, which rarely if ever happens. Then and only then, when that is not just achieved, but ensured moving forward, do you consider the entirely seperate “maintainence” issues of “patching”, “updating”, “upgrading” and how you support, moving forward.

In between the design of “segregation” and design for “maintainence” there are a number of other considerations, just one of which is the required communications of “data into and “data out-of” the system as no practical system works in issolation.

Which brings us onto,


“In addition, be aware that devices like data diodes are available to export data from otherwise isolated networks. These too can be mandated in legal agreements.”

As I mention from time to time “Data Diodes” are very very rarely “one way” as most assume. They are almost always “bi-directional” in some mostly infrequently or unconsiderd way.

This Data Diode bi-directionality is due to trying to achive “reliability”, “availability”, and “efficiency” in the face of the more obvious forward “errors”, and “exceptions”. All of which normally require some form of fast “feedback” signaling channels. Such signaling channels are actually a “communications path” from the “insecure side” of the data diode into the “secure side”. Which are normally left wide “open”, “uncontroled”, and “unmonitored” thus potentially a significant security risk.

But moving on in both the first and second paragraphs we see weasel wording of “formalising” and “legal agreements”, which are effectively the same and are actually “remediation actions”. In part this is due to them being presented atva “Lae Seminar”.

But even legal Folks, need to remember that starting with “formalising” is a little like jumping into things half way through. There is a lot that goes before[1] in a project, and even more before that which is fundemental to the process.

Because the design of “effective systems” is not the same as “efficient systems”, “fast systems”, “low cost systems”, etc it is about knowing past and present “sweet spots” and predicting future sweet spots and desigbing for them as they change.

I guess it should go witgout saying but, almost always the real sweet spots, are not where an industry goes, unless sufficiently regulated to do so. The fact that most unregulated markets end up in “A race to the bottom” downward spiral, an unlawfull behaviour spiral, or both, should realy be a “wake up call” to the legal folks in particular.

Especially when you see what the “efficiency for profit” mantra did to wreck, and is still wrecking, supply chains and creating real hardship, economic instability, actual harm and death (Abbott infant formular being but just one of many).

There is a sigbificant underlying problem behind this, and it’s something that especially in the ICT industry we need to realise and come to terms with, before we cause further “hardship, economic instability, actual harm and death”.

Back in the first banking crisis, it became clear that there were three effects in play,

1, Focus only on “Up-side”.
2, Play “Follow the leader”.
3, Ignore “Down-Side” or “Contradictory” warnings.

I won’t go into the game theory behind it but note that, whilst high risks “can” produce high reward, significant harm is more probable. But, if everyone takes the same high risks, then both the rewards and harms are spread equally.

So if you are playing with others money, then the “follow the leader” mentality works out best. As it’s a very short term herd mentality of “we all do well or we all do badly” but we get payed either way as we all look like winers… when in fact we are in reality, all just followers. Whilst for an individual playing with their own money, the best longterm aproach is to do the down-side analysis and not ignore the contradictory warnings…

The ICT industry that coincidently actually lacks objective measures by which it can be measured, has fallen into not just “Up-side” but increasingly very “short-term” strategies with a resulting boom/bust behaviour.

This is not the way you go about designing reliable, let alone secure systems. You want, or more importantly need, to have robustness, availability, reliability, and longevity.

These are especially essential for what are infrastructure systems, be they “utility”, “raw stock”, “feed stock” ICS, and logistics systems. They are all essential to the “Supply Chain” not just finished goods, but the supply chains of all the steps in every process.

Anyway I’ve said this over and over for more time than this blog goes back for, so you’ve heard the rest of it before.

[1] I’ve mentioned before that there are steps that need to be in place before any project ever gets started, in fact fully functional before you even know there is a need for a project. These steps can be lumped together as the “Quality Processes” in design, manufacture and maintainance. Most think “QA” when they hear “Quality Processes” but it is just one of many which also includes “security”, and another “safety” that frequently go unrealised in the ICT industry. But the reality is all the design quality processes are built on other more fundemental processes. Perhaps the most fundemental are,

1.1, If it’s not written down it never happened.
1.2, Backups are memories, not just snapshots and tapes.

From the first you start to realise the importance of record keeping[2]. From the second, you should realise that it’s not just “what’s in the computer”… In fact it’s what you “see”, “hear”, “do”, and importantly “think”, along with probably most importabtly “why”, that need to be recorded[3] as well. Unfortunately of more recent times it’s become obvious that the leagl folks see them as “amunition left for the enemy” rather than “seed corn for the future”. With all to often the predictable results we see over and over…

[2] Record keeping in the modern age appears very odd to many. We have at one end the industrialised “Record it All” of the intelligence agencies, and increasingly corporations, and more recently law enforcment agencies, who grab at all our electronic communications and records. At the other end the “record nothing” not just of lazy behaviour, but the paranoia behind “deniability”. Which as it establishes, behind which unlawful behaviour of all sorts is attracted and hides.

Life and human progress are not “all or nothing”, it’s said “We are the product of our experiences” but actually “We are the product of history and what knowledge we take forward into the future”. Hence the old saying “Those that fail to learn from history are condemned to relive it”. A failing the ICT industry and ICTsec in particular, appears to specialise in.

This lack of carrying forward of knowledge, especially in most project files is not just lamentable but harmfull. With even those few, in the ICT industry, who ever write project “History Files”, generally confining themselves to little more than “When, Who, What” entries in a sequential log of some kind. Much valuable and expensively earned information is lost so rapidly, to outsiders it must appear like some collective amnesia.

[3] One thing both scientists and engineers used to get told during their early training is you need to develop certain good habits[1.1/2]is that you need five things at hand at all times[4], to even have a chance to function effectively,

3.1, A Diary.
3.2, A log book.

And you “write, draw and note in them” otherwise you “forget”.

But to do this you also need,

3.3, A watch (with second hand and date)
3.4, A pencil (several and an eraser).
3.5, A ruler (actually a slide rule).

Importantly all of which work by human power, not unreliable electricity or electronics.

[4] I’ve also found a few basic hand tools on the belt, or in the pocket to be usefull over much of my life including “chalk”, “cordage” and “fuse wire”. Sadly whilst this was common and unremarkable into the 1980’s, in less than an adult lifetime it has been vilified and turned into a suspicious behaviour or crime…

Clive Robinsom May 26, 2022 1:43 PM

@ SpaceLifeForm,

Re : No Hat, No Cattle

And if you check the hips / legs no “lefties” either…

It’s very often a bad sign to find no left handers in such groups, as it reflects certain other characteristics.

For instance Apple used to publish info on it’s hardware, software, and other “creative thinkers”, which showed left handers were way way over the general population norms. Likewise studies of artists, architects, even poets and writers.

There are other studies which show certain thinking behaviours have a higher than expected right handedness. But as I suspect you know what they are, I won’t mention them.

Winter May 26, 2022 1:48 PM

@Nick L

What happens under the GDPR or European Union law in general is not the last legal word.

If you obtain PII of a EU citizen or do business, in any way, in the EU, you are bound by the GDPR. You collect store or process PII out of your own free will. So if you do not want to obey the law, you should stay out of the EU, and do not store data from their citizens.

It like if you steal money from US citizens from US banks. The US will drag you in court if your company has any business interests in the US. The EU does see PII like money

SpaceLifeForm May 26, 2022 5:51 PM

Re: No Hat, No Cattle

They are lying. This was a premeditated and coordinated op that was allowed to proceed. FBI needs to immediately secure the scene.

100 minutes. A parent drove 40 miles and managed to get their kids out, while the police just stood around.

WTF is a town with a population of 16K doing when they are spending 40% of their budget on police, and those police are worthless?

That swat team looks like drug lord gang members to me.

Seriously, WTF?

@ FBI, get your [redacted] [redacted] together.

SpaceLifeForm May 26, 2022 6:19 PM

Slow walking hawks


This should have happened long ago.

Clive Robinson May 27, 2022 3:10 AM

@ SpaceLifeForm,

Re : That swat team looks like drug lord gang members to me.

As I said,

“It’s very often a bad sign to find no left handers in such groups, as it reflects certain other characteristics.”

As for the 40% it is odd for an odinary town, even for a small town which 16k is not. But is it,

1, 40% of next to no income from the town.
2, 40% of a town with many lawless issues.
3, 40% of the income because there is undue influence with the town council.

But I rather suspect we are not going to get told the truth, even if it does get investigated.

As I understand it,

1, The school board has it’s own police force.
2, The town has it’s own police force.
3, The state has it’s “Rangers”.

But it was an off duty U.S. Border Patrol agent who brought an end to the situation…

But apparantly the attacker event time line started with the 18 year old shooting his grandmother in the forehead at close range wounding her. He stole his grandmothers pickup and on ariving at the school crashed it and having got out shot at two people down the street at a funeral parlor. He then spent 10-15mins outside “shooting it up” then went inside unchallenged through an unlocked door, and over the next five minuits shot most of his victims. It was during this five minuites that the police arived and the attacker shot at them. He then spent the next hour inside the school shooting others whilst more or less ignoring the police who had set up outside to negotiate.

During this hour apparently a number of parents including other police officers entered the school and got their children out. However the police outside turned on other parents using “non-leathal” weapons and restraints and arresting one mother fairly violently.

It’s very difficult to establish what else went on as various police statments are either deliberately opaque or have been contradictory.

Of concern is why a detachment of apparently off duty Boarder Patrol agents were doing in the area, and turned out to be the ones who stopped the 18year old attacker, who apparently had never owned a firearm untill just a few days before, and did not have a driving license either. But had the money to buy atleast two semiautomatic rifles and around four hundred rounds of amunition for them.

Of course it’s turned into a political bun fight with unsurprisingly those taking hundreds of thousands from the various pro lobbies making the most noise about others “Politicizing the tragedy”. Basically the first line off of the standard pro lobby PR sheet.

Sadly it is the innocents in this that are being not just forgotton but having their memories actively trampled upon, which is not just wrong, it is evil. I dred to think what their families and friends are going to have to go through over the rest of their lives, if the events of the past are played out again.

Winter May 27, 2022 4:12 AM


However the police outside turned on other parents using “non-leathal” weapons and restraints and arresting one mother fairly violently.

Maybe the police is not there to “Serve and Protect” the public?

JonKnowsNothing May 27, 2022 12:23 PM


re: for Ukraine: Cede territory to end the war

note: I have no opinion on the merits of the war UKRvRU. That is the province of the survivors, globally, to determine and to review the history as it will be recorded.

However, from my Farm Reports early on, the conflict is, will and continue to cause massive damage globally. The fields are unplanted, there will be little harvests, the global food supply chain is already fluttering with swings of increasing magnitude.

This loss of farm production, cannot be recovered in 1 or 2 years. The farms are destroyed, the barns are gone, the livestock gone, the machinery ruined, the seed stocks in question, the reliance on chemical fertilizer and pest retardants will need to be addressed. The fields are full of ordinance, exploded and unexploded, landmines, miscellaneous tank parts and contaminated fuels and oils seeping into the land and water systems.

There are farms that will never recover financially because there is not enough money available. Some can never be recovered due to Forever Contamination. It takes a lifetime and/or generational lifetimes, to build and make a farm work, waiting for 20-60-80 years is too long for modern economic outlooks.

Adding on to the miserable farm forecast is the ongoing livestock pandemics that have no end in sight.

For the pork industry, which is large in EU, ASFV continues to decimate large pig farms there and anywhere pigs are farmed globally. Small farmers are at the mercy of events when huge farm factories, where hundreds of thousands of pigs are culled at one time, and the cull reaches out to small farms within the killing zone. So small farmers are not going to be able to pick up the slack from ASF outbreaks.

Avian Flu continues to decimate flocks globally. It mutates quickly and one of the current versions is causing huge losses in eggs and meat production. There isn’t any cure for this either and it’s often carried by wild birds migrating and “sky pooping” a viral load along flight paths. Free Range Eggs are now on “temporary hold” because the definition of Free Range requires the birds go outside. Outside is a death sentence for the birds. One sick bird means the entire flock gets culled.

There will be Disaster Capitalism in play when the carnage and damage stops. That will be focused on the cities where large investments will reap enormous profits. The focus will be on housing (upscale), roads, bridges, demolitions of damaged buildings and perhaps some Monument of Remembrance.

Farm economics will favor buy ups by multinational BigAg corporations which will convert the lands into large factory style mega size fields. What is grown in these fields will not be determined by the local villagers but by global commodity trade prices. BigAg can silo products and cold store items until the price is right for their ROI expectations.

Ending the war, however distasteful that might seem, will save hundreds of thousands of lives globally. Many will still die because they are dependent on the output from the UKR-RU and it will take years before UKR can fully contribute as they did previously. The output from the RU is now sanctioned from world access, effectively cutting off that supply source. It might take decades before the RU supply is re-established globally.

There are a number of “named” important folks who are now looking down the next decades of reduced food supplies even though some countries are having boom harvests (as well as wiped out harvests). They can count the numbers of hungry.

But more important to them is the numbers of replacement workers. (1)

As the SARS-CoV-2 pandemic continues to roll along, the early part seemed to be a boon when it primarily killed the older generations, relieving governments from having to deal with their aged population. As it mutated and continues to mutate, the virus is now known to affect younger demographics.

Global economics and demographics are concerned about the age ratio of their populations. It’s one thing to kill off the older members of society, but another to restrict, an already restricted resource, of replacement workers.

If people do not have enough to eat, globally, they won’t have families. It won’t matter if the laws demand that they have children, if there isn’t any food the children die. These are the replacement workers and it takes 18 years to get one big enough to work in the factories although some as young as 3-4yo work in child labor industries.

When people at DAVOS and other gatherings of The Elite, indicate that some event should happen or not happen, it is not due to their ethics or moral stance on a topic. It’s about the economics and costs and future costs of that activity.

The “Local War” in UKR-RU has never been “local”. It was and is Global. The shells might be falling in UKR but the resulting dead are worldwide.

It is already WW3.


1) see posts on the Bank of Mom and Dad which might be found in the archives or on the way back machine.

Clive Robinson May 27, 2022 1:26 PM

@ All,

Re : Cede territory to end the war

This notion is a nonsense and should be shot down as such.

History shows that “rewarding an agressor” just has deleterious outcomes. Not least it just encorages the agressor to continue over and over.

Eventually people wake up to the fact they have to give the agressor a message, which basically means not just heavy sanctions but decapitation of the agressor government.

People who think you can pacify an Empire hungry dictator/tyrant are not living in the world of reality.

The West needs to realise that there is now only one way to deal with Putin, and that is be not just removal of him and his clique but also significant reparations to those attacked.

SpaceLifeForm May 27, 2022 5:16 PM

Re: No Hat, No Cattle

They are still lying

Some notes:

CBP has jurisdiction within 100 miles of border which includes Uvalde.

FBI now has 200 agents in Uvalde.

The following is speculation or questions that must be researched by FBI using info I have already learned. Of course, in the Fog of War, I may be reading misinformation.

Ramos probably bought the guns with his grandmothers credit card, online, 5 clicks.

Since the on-school officer was not there, was he/she the one to leave the door ajar?

Was the Crack SWAT team that was a few miles away having lunch?

Why, apparently, did the police switch to encrypted channel for 18 minutes?

I think that Ramos killed himself, and after the shooting stopped, they finally decided it was safe to get the key and open the door.

I am sticking to my theory that this was a coordinated op.

Winter May 28, 2022 3:07 AM


I am sticking to my theory that this was a coordinated op.

Don’t ascribe to malice what can be plainly explained by incompetence.

Or maybe cowardice, in this case.

Clive Robinson May 28, 2022 4:07 AM

@ SpaceLifeForm, Moderator,

Re : It was designed to defend against the Crown.

I tried replying inoffensively but I got the held for approval page…

Clive Robinson May 28, 2022 4:27 AM

@ Winter, SLF,

Re : Or maybe cowardice


A slavish devotion to training, by authoritarian followers.

Most non educational training is actually about teaching the use of “plan based processes”. And is why there are sayings such as,

“Listen up folks, lets get this right, lets do it by the numbers.”

But… as the old military observation has it,

“No plan survives first contact with the enemy”

The reality of life is “play book” behaviour only works against “entities without agency” that behave in known ways. An entity with “agency” can if they know your “play book” play against it as a “counter play”.

To be able to deal with counter-play requires certain atributes. Firstly the ability to recognise the counter-play, then the independence of thought to “break with the plan” and be able to think up creative solutions on your feet, yet stay within certain rules.

That sort of “independent creativity” is not common in “guard labour” for various reasons.

Winter May 28, 2022 4:36 AM


That sort of “independent creativity” is not common in “guard labour” for various reasons.

Mostly because of low pay and cost cutting on training. Guards is all about increasing head count (fire power) and decreasing costs.

Clive Robinson May 28, 2022 7:49 AM

@ Winter,

Re : Mostly because of low pay and cost cutting

What you realy mean is they, Don’t have the brains to…

1, Earn a better living.
2, Get upset by the lack of humanity.
3, Get upset by the total mindlessness of the job.
4, …

They are in effect “Toy Soldiers” that you wind up to make them strut on a fixed plan “TikTok, TikTok”…

Leon Theremin May 28, 2022 8:32 PM

Eric Schmidt: However, our report says that it’s really important for us to find a way to maintain two generations of semiconductor leadership ahead of China. Now, the history here is important. In the 1980s, we created a group called SEMATECH. We had a bunch of semiconductor manufacturing in America. Eventually that all moved to East Asia, primarily Singapore, and then South Korea and now Taiwan through TSMC. The most important chips are made in Samsung and TSMC, South Korea, and Taiwan. China has had over 30 years to plan to try to catch up. It’s really difficult.

Eric Schmidt: We don’t want them to catch up. We want to stay ahead. We call for all sorts of techniques to try to make sure that we rebuild a domestic semiconductor and semiconductor manufacturing facility within the United States. This is important, by the way, for our commercial industry as well as for national security for obvious reasons. By the way, chips, I’m not just referring to CPU chips, there’s a whole new generation, I’ll give you an example, of sensor chips that sense things. It’s really important that those be built in America.

What are the chips that “sense things” and that Schmidt wants so much to prevent from being available to China and any other country?

Short answer: electromagnetic sensors used to spy on everybody so Google can show them “relevant ads” and profit. You will find them embedded on your CPU, on the nearest cellphone tower’s transmitter and on Starlink satellites.

Slightly longer answer: since the 1980s, Silicon Valley has used semiconductor radars to collect data about what you think (your inner speech) by means of machine learning with data extract from wireless imaging of your face and body. It has proved very convenient for them, as this enables blackmail, extortion, theft, sabotage and murder like nothing else. They can do this because they design the semiconductor used on your phone, computer, TV, car and for your telecom supplier’s network equipment, which makes possible to embed silicon trojans everywhere.

Don’t underestimate what machine learning can do. e.g. Study shows AI can identify self-reported race from medical images that contain no indications of race detectable by human experts.

Also, don’t underestimate the number of people Silicon Valley is willing to kill to maintain a monopoly, as you may be the next victim.

lurker May 29, 2022 1:03 AM

@Leon Theremin
The impression from the podcast is Schmidt wants a centralised command economy; more Government is hardly what we expect Silicon Valley will swallow. I’ve downloaded the full report but I’m struggling trying to read the lightweight low contrast sans-serif font.

Clive Robinson May 29, 2022 4:03 AM

@ SpaceLifeForm, Winter, ALL

Re : Occam vs Hanlon

Yes… But don’t discount,

“The perfidious nature of agency”

Of the hand that holds the razor…

Clive Robinson May 29, 2022 6:20 AM

@ SpaceLifeForm, ALL,

Re : Matt Blaze on Number stations.

There are some things said there that are more “mantra” than fact.

For instance,

“One time pads are a generally impractical encryption method”

Not true they might be labourious to use but have you ever tried doing a single block of AES or DES by hand?

But sadly there is one property few ever talk about, which is the “unicity distance”. Even then they talk about it in a way that hides one major advantage that the OTP has over the short key ciphers.

That is “deniability” no matter how long the message sent by OTP you have very easy deniability of the entire plain text message in part or whole. The deniability of short key or block ciphers is often as short as two or three blocks. Worse trying to come up with an alternative key with a meaningfull message is extreamly difficult bordering on impossible in a reasonable time/resource frame unlike that of the OTP which a child could do in minutes as a “game” with pencil and paper (and yes I’ve tested this with Scouts doing their “communicators badge”).

The only real complaint against the OTP is “Keying Material”(KeyMat) size. That is you have to send as much KeyMat securely in advance as the total length of messages you are going to send later or untill the next secure shipment arives. Whilst this was problematic with “paper pads” or “paper tapes” the advent of high density storage reduced this arguments validility. Because at the end of the day to be secure you still have to ship “random KeyMat” regularly. These days solid state technology can put terabytes in the palm of your hand as easily as a few AES or similar keys…

But one thing Matt said was not true, and is still mostly not true today,

“Second, while it’s easy to tell where they’re being sent FROM, there’s no way to tell (from any distance) who’s listening”

There are three basic types of radio receiver,

1, Tuned Radio Frequency (TRF)
2, Hetrodyne
3, Numerical

For various technical reasons and the basic laws of physics most Radio Receivers untill very recently used the “hetrodyne” principle which needs an oscillator tuned to a frequency that directly relates to the frequency being received. In effect the oscillator is a low power transmitter[1], and even microwatts of power can go almost unimaginable distances.

During WWII the German Radio Service could find and direction find an SOE suitcase radio set from several miles away. During the “Cold War” period the UK Inteligence Services used to fly light aircraft up and down the UK looking for signals from radio oscillators tuned to frequencies that indicated that the radio was tuned to the likes of Numbers Stations. Oh and not all “TV Licence Detector Vans” were looking for unlicenced televisions…

These days “Find, Fix, Finish” is both easier and harder.

You can now buy numerical based radios that use “Digital Signal Processing”(DSP) techniques some in part, some in whole. These are often but not always called “Software Defined Radio”(SDR) of which only a few do not radiate signals that indicate what frequency they are receiving.

However such recievers are very uncommon as “consumer receivers” and very expensive. Normally they are found either in Ham Transceivers or in devices that connect to computers.

For obvious reasons a $10,000 ham transceiver is a bit of a “luxury item” and “stands out”. Of the devices that connect to computers whilst they do not radiate much if any signals that indicate what frequency they are tuned to, the same can not be said for the computer it is connected to…

One commentator makes the mistake of repeating the VHF mantra of short range which is unfortunate. As I’ve mentioned the radio line of sight horizon on a medium sized hobby drone is around 80km and you can put a gumstick SBC and USB SDR on them with a WiFi downlink, that gives you the capabilities of SigInt airplanes like Rivit-Joint that started in the early 1960’s based on the C-135 Stratolifter airframe and are still in service and being upgraded today.

The advantage of using hobby drones is not just cost or very small radar profile, but that the bulk of the computing power is out of range of conventional field weapons.

A lesson the Russian’s are learning the hard way.

[1] Actually the power of this oscillator can be up to +30dBm (1 Watt) or more in receivers with high dynamic range for “Strong Signal Handling” which is the desirable norm in most commercial HF receivers where “close in signal handeling performance” is important. As I’ve mentioned before 1/10th of a Watt from a VHF/UHF handheld radio will reliably get your signals into space and out to satellites in geo-stationary orbits depending on your modulation type and error correction methods. Remember the NASA Voyager spacecraft? Well it puts out a little over 20watts of power, but is now out at twenty light-hours or 22billion kilometers distance. I also mention the use of “Very Long Baseline”(VLB) receivers for picking very weak signals at much greater distances than most consider, well around a decade ago this kind of brought the two together,

Remember that radio signals as they are radiant fall off at the square of distance, and as they also travel through an environment that absorbs or scatters signals there is a distance related antenuation as well.

SpaceLifeForm May 29, 2022 3:16 PM

@ Clive

The Hubble Variable

there is a distance related antenuation as well.

This is why I have never entertained the Big Bang Theory.

It is all an illusion on the part of the Observer. The apparent Redshift may have nothing to do with movement at all. The apparent Redshift may be due to distance only. The light frequency degrades over the distance (and therefore over time also).




Clive Robinson May 29, 2022 5:47 PM

@ SpaceLifeForm,

This is why I have never entertained the Big Bang Theory.

Nor did Fred Hoyal, and why he coined the term as an insult…

But this sort of thing where physics gets re-written is not new, hence the line about teaching physics of,

“You get taught a series of lies each more accurate than the one before”

And we are over due a shake up any way. Most physicists are card carrying members of the “Shut up and calculate” club, and we are seeing increasing disparity so as the old line has it “Somethings gota give”.

Oh and why I say things have to be explainable by,

“The laws of physics as… We currently understand them…”

Winter May 30, 2022 2:45 AM


The light frequency degrades over the distance (and therefore over time also).

Could you add a physical principle that would explain such behavior? As I understand it, all of quantum Mechanics comes crumbling down if this is happening.

Winter May 30, 2022 4:13 AM


Nor did Fred Hoyal, and why he coined the term as an insult…

Fred Hoyl’s model did not predict nor explain anything. The Big Bang does explain/predict almost every observation in astronomy. This includes direct distance measurements.

I do understand why astronomers prefer the Big Bang over Hoyl’s alternative.

SpaceLifeForm May 31, 2022 2:18 AM

@ Winter, Clive

Could you add a physical principle that would explain such behavior?

Not at this time. It is speculation on my part. Thinking outside the box.

As I understand it, all of quantum Mechanics comes crumbling down if this is happening.

I would not come to that conclusion. I am just saying that there is a lot to be discovered.

“The laws of physics as… We currently understand them…”

This includes direct distance measurements.

I don’t have a problem with all distance measurements. See Cepheid stars. What I have a problem with is the jump from apparent Redshift to expansion.

Consider this: If the Cosmic Microwave Background is so consistent, maybe it’s because it just appears that way to the observer. What if, that which appears to be the CMB is just formerly higher freq EM that has been attenuated due to distance? Maybe we can not observe what are allegedly farther away galaxies is not because they do not exist, but that due to distance, all of their light has changed into CMB or Radio? Also the consistency of the observed CMB has a factor that the low freq EM will diffract very well making it appear smoother overall.

SpaceLifeForm May 31, 2022 6:27 PM

@ Winter, Clive

The Hubble Variable and the Planck Variable

Kids in car: Are we there yet?

Maybe photons just get tired of traveling and lose their energy.

If the photons get tired, and lose their energy, then according to Planck, their frequency must degrade, I.E, Redshift.

Remember, Space is not really empty, it is not a vacuum.

Hubble bubble, toil and trouble.

Measurements of the Hubble constant vary, with recent figures typically ranging from approximately 64 to 82 Mpc — a difference considered too significant to be explained by chance and too persistent to be explained by error.[8] Measurements of the cosmic microwave background tend to result in lower values than measurements by other means, such as photometry and cosmic distance ladder. For example, cosmic background radiation data from the Atacama Cosmology Telescope implies that the universe should be expanding more slowly than is locally observed. The scale and amplitude of this underdensity could resolve the apparent discrepancy between direct local measurements of the Hubble constant and values calculated from Planck’s measurements of the cosmic microwave background.

It all depends upon what you can Observe.

Clive Robinson May 31, 2022 8:08 PM

@ SpaceLifeForm, Winter,

Re : Maybe photons just get tired of traveling and lose their energy.

The current conventional spoken wisdom is that photons have no mass, actually that is at best a half truth, it is assumed they have no “rest mass” even though they can not be at rest. The fact they have energy and move at the speed of light implies they must have a mass equivalence[1]. Also that photons are a side effect of the movment of charge at a local point complicates things via relativity.

As such photons clearly have energy and it can be demonstrated with simple laboratory equipment. But that they can not give up energy except by intetaction with either energy or mass as a vector or force.

Einstein’s definition of what two decades later became called the photon kind of sufferes from circular reasoning,

1, A particle without rest mass can only move at the speed of light.
2, A particle moving at the speed of light can not have invarient / rest mass.

The concequence of which is that photons have constant frequency based on their energy.

However there is a theoretical “soft photon”[2] that can not be measured because it’s energy is to small. It is of interest that it is probably not theoretical.

What we may say about the three massless particles in the next decade might be as changable as it has in the past decade… I guess we will just have to wait and see.



Winter June 1, 2022 2:13 AM


If the photons get tired, and lose their energy, then according to Planck, their frequency must degrade, I.E, Redshift.

That is fundamentally at odds with quantum mechanics, and general relativity. Both have been tested to ~20 decimal places. That is a rather high bar to clear for a new theory.

SpaceLifeForm June 1, 2022 5:52 PM

@ Winter, Clive

I am surprised that I forgot about this having been in Compton Hall. There is too much to remember over time.

But, I followed the advice of Einstein, and did the research and refreshed my memory.

Compton scattering, discovered by Arthur Holly Compton, is the scattering of a high frequency photon after an interaction with a stationary charged particle, usually an electron. If it results in a decrease in energy (increase in wavelength) of the photon (which may be an X-ray or gamma ray photon), it is called the Compton effect. Part of the energy of the photon is transferred to the recoiling electron.

As I mentioned, Space is not empty, and virtual particles (with charge) can spontaneously appear. I.E., Protons and Electrons and the corresponding Anti particles can come into existence from Nothing! See Heisenberg and Feynman.

It is interesting that GRB (Gamma Ray Bursts) always appear to be far away from the Observer. That may be due to Inverse Compton scattering. Or, it may be that we live in a relatively quiet neighborhood in Space.

Clive Robinson June 2, 2022 3:28 AM

@ SpaceLifeForm,

Re : Compton scattering

It is one of several ways a photon can loose energy there are others, and it is likeky others will be found in time hence the use of “currently”.

But as I said further above, as far as we currently know,

“But that they can not give up energy except by intetaction with either energy or mass as a vector or force.”

And I do not think that is likely to change. It’s one of the reasons “soft photons” as an idea make me a little uneasy, much as “rounding errors” do when performing certain maths functions.

Winter June 2, 2022 10:39 AM

@Clive, SLF

Re : Compton scattering

It has been established that the redshift measured cannot to a redistribution of energy.

With Compton scattering, energy is redistributed, ie, over the particles involved. But redshift does not cause photons to redistribute energy. The dopplereffect is the process that describes this.

As for soft photons, I do not really understand them, but it seems to me they do not carry energy, but are used in calculations to solve IR (low energy) infinities. But I never understood how these infinities were cancelled out anyway.

SpaceLifeForm June 2, 2022 6:04 PM

@ Winter, Clive

Re: Compton scattering

Assuming my edit is correct…

It has been established that the redshift measured cannot [be due] to a redistribution of energy.

I am not familiar with this argument. Got a link?

But redshift does not cause photons to redistribute energy. The doppler effect is the process that describes this.

Two issues I see.

Assuming photons can actually be Redshifted by Doppler effect, that does not preclude any given photon from never encountering Compton scattering on it’s travel.

As photon emmision occurs at the quantum level, I have seen no evidence whatsoever that an atom can emit a photon at a different frequency than the energy levels of the electrons would dictate.

How does the atom know how fast it is moving, in what direction, and at which angle it should emit the photon?

It makes no sense at the quantum level.

Once the photon is emitted, the photon has no knowledge of the prior state of the emitting atom. It is free to travel.

There is no reason to believe Doppler for sound actually implies that Doppler can apply to light.

Winter June 3, 2022 1:42 AM


I am not familiar with this argument. Got a link?

Errors in Tired Light Cosmology

It also points to a tutorial about cosmology:

SpaceLifeForm June 3, 2022 3:53 AM

@ Winter, Clive

Re: Compton scattering

Thanks for the link which led me to:


I was not familiar with John Kierein and his writings. Obviously, he and I are thinking the same way.

Even if you and me disagree on this, you must agree that the scientific process is a wonderful thing. The beauty of it is, that even if your theory ends up being disproved, you still learn something. It is ok to be wrong.

Sometimes, you can be Copernicus.

Winter June 3, 2022 5:59 AM


I was not familiar with John Kierein and his writings. Obviously, he and I are thinking the same way.

The Big Bang theory might be wrong, for some meaning of wrong, but I know from astronomers that they can calculate everything, from He and Li abundances to stellar compositions and evolution to the cosmic background radiation and its angular correlation peaks, using the Big Bang and inflation. Anyone claiming there was no Big Bang nor inflation has to explain all these aspects of the universe with an alternative theory.

I have not seen anything even remotely convincing yet.

Winter June 3, 2022 7:27 AM


Re: Compton scattering

Case in point, Compton scattering.

If a photon loses energy due to Compton scattering, it also changes direction (exchanges momentum). This means that a photon that lost a lot of energy also has changed direction a lots of times.

Winter June 3, 2022 7:45 AM


Re: Compton scattering

Due to the scattering, stars and galaxies with high redshift should be blurred as in a fog. However, that is not observed. No matter how far away a source is, it remains sharp in view.

Clive Robinson June 3, 2022 9:39 AM

@ Winter, SpaceLifeForm,

If a photon loses energy due to Compton scattering, it also changes direction (exchanges momentum).

Not in all cases, but consider, that if it does change direction it will not actually arive at the sensor where as coherant waves will.

Such scattering will result in a decrease of the number of photons at the detector, not “blurred as in a fog”.

The very very few that will be off, will be down in the noise threshold, to the point of being imesurable from other “stray” photons.

Also not immediately obvious is that they will go down in frequency.

Take microwave energy it is EM photons of a very low frequency. They however cause OH molecules to vibrate, which in turn radiate EM photons in the IR range which is of significantly higher frequency.

You can derive a formular for this, but interestingly it ends up similar to that you get in laser systems.

As I understand it matter not just photons have a wave duality.

What the implications of this is yet to be determined.

As I said their are reasons for me saying “as we currently understand them” with regards the laws of nature.

But one thing for you to consider how do you tell the difference between an infinitely small original point of origin and an infinitely small hole acting as a pin-hole projector of energy?

That is how do you know if the “big bang” was singluar, or one arising from a “string of pearls” of big bangs followed by big crunches and so on?

One where the individual perls might only inherit part of the previous perls energy?

Therefore how would you know how far along the string we are?

The answer is we don’t and apparently probably can not. So arguing that our perl is somehow special because of some apparent constant becomes at best circular reasoning.

As I’ve indicated, I see not logic or reason in the arguments that are presented by both sides. What I see is a belief in being right… Well history suggests both sides are likely going to be disapointed, the dust and fur will settle and we will move on, to something altogether more curious.

Winter June 3, 2022 10:51 AM


Such scattering will result in a decrease of the number of photons at the detector, not “blurred as in a fog”.

In addition, you see photons that were heading in a different direction but we’re scattered in your direction. That is how a fog works.

Leave a comment


Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via

Sidebar photo of Bruce Schneier by Joe MacInnis.