Friday Squid Blogging: Squid Facts on Your Phone
Text “SQUID” to 1-833-SCI-TEXT for daily squid facts. The website has merch.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Text “SQUID” to 1-833-SCI-TEXT for daily squid facts. The website has merch.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
lurker • April 25, 2025 11:54 PM
A quiet little release by the SCMP [1] notes a “dual use” tool developed by Chinese marine engineers. The Conversation [2] takes one extreme use case for a pearl-clutching story.
[1] ‘https://www.scmp.com/news/china/science/article/3303246/china-unveils-powerful-deep-sea-cable-cutter-could-reset-world-order?module=top_story&pgtype=subsection
Clive Robinson • April 26, 2025 2:32 AM
@ lurker,
With regards sub-sea cable cutting, I’ve mentioned it as a major security threat several times over the years on this blog (search for “sub sea” or “choke point”).
https://www.schneier.com/blog/archives/2014/12/putting_nsagchq.html/#comment-235871
Gives an overview of what could be done more than a quarter century ago.
You can see the process is basically little different than the subsea equivalent of “walk up and strap a bomb on”.
Add a bit of fancy electronics as a detonator and you could bring the Western world to a near grinding halt in seconds…
@Clive Robinson
hi hello is this like exploding internet cables my brain too small =(
Clive Robinson • April 26, 2025 8:47 AM
@ d30, ALL,
With regards,
“hi hello is this like exploding internet cables”
Rather more than…
Whilst we hear a lot about the new low earth orbit satellites bringing the Internet to the entire surface of the globe. The reality is nearly 99% of all “data” is hauled across microwave links, copper wires and fiber optic strands of glass. All of which are actually quite fragile and a good hit with the force of a “14lb lump hammer” in any one of a multitude of sensitive places will stop that data moving.
But much of that “data” is not what most would think of as the “Internet” it’s phone calls and other traditional communications like industrial and transportational “telemetry” that controls the flow of human voices, industrial process feedstock, and finalised product in supply chains.
It would not be unfair to say that,
“Next to nothing moves in the physical domain without bit movements preceding it in the information domain.”
Rather more bits of data moved, than there are granules in that big jar of instant coffee you had your morning cup of “eye opener” from, just to get the jar in your hands. Admittedly many if not most of them completely redundant but flow they did.
Whilst it’s all “fairly simple” when you understand enough of the foundations it still has an overwhelming feeling of fantasy about it.
The problem is that back in the mid Victorian days when sending bits of information over wire and even microwaves was starting most European Nations had “Enemies of the State” whilst not all top hat wearing long moustache twirling types of melodrama they did know how to make “Infernal Machines” that was the name given to explosive devices with mechanical fuses. As most surmise the percussive force of such devices in close proximity to fragile equipment oft results in fragile pieces being not just disrupted but spread widely about, thus not working or being easily reparable, thus remaining out of action for quite some period of time.
Well have a thought about it as an asymmetric exercise, of how you protect fragile from percussive and just how crud the infernal devices can be.
If you are unsure what that means in the modern day look up the AT&T Xmas Day bombing in Nashville half a decade ago in 2020,
https://en.wikipedia.org/wiki/2020_Nashville_bombing
Whilst temporary repairs started in days, it’s argued that even now service is not what it once was.
How do you stop what are crude device attacks?
The answer is bluntly “You Can Not” all you can do is design in mitigations to limit damage and bring things up more quickly.
Whilst this is difficult with communications, think just how much more difficult with other utilities such as energy, water, sewerage, roads, railways, aircraft and shipping.
If a ship that looses control can bring a bridge down and close an international harbour, cracks in the runway close international airports, similar damage to roads and bridges stop trucks and cars and firing bulltes into transformers can bring down entire electrical grids
Ask what damage an “infernal machine” could do if placed out of sight and without being detected?
Yes we could mitigate some but how many devices are needed to overwhelm such mitigations.
And it’s not just data/information that flows in wires and pipes… All those other “primary utilities” do as well…
The trick for a mustache twiddling type, is knowing which points will cause most damage. I’ve mentioned before that “power and communications” are intertwined, you need one to bring back the other and vice verser due to,
“Management decisions for ‘Shareholder value'”
So rather than try going for a cascade failure in the power grid with several devices, just two one in power and one in communications could be way more devastating and longer to repair if at all…
Such thinking we know is “Standard Russian Tactics” and by what China has allegedly done theres as well.
This is because modern battles really are not won by boots on the ground but by the information that puts the boots where they need to be at any given time.
As drones can move faster and are a lot less expensive that a pair of boots and what stands up in them it’s not at all surprising that the war that Russia started in Eastern Europe has gone the way it has.
Because drones are small light and mostly inexpensive and can carry an “infernal machine” to just about where ever you want it.
Which is why the Ukrainians not just realised but acted upon the idea that you don’t need to destroy a well protected tank engine or turn it’s turret into a low orbital capsule fun though either might be. You just have to put a small hole in the main gun barrel or just deform it. Because without a main gun a tank is a not very useful metal box and main guns really are a problem to replace.
fib • April 26, 2025 10:44 AM
Digital Squid’s Behavior Shaped By Neural Network
‘https://hackaday.com/2025/04/26/digital-squids-behavior-shaped-by-neural-network/
not important • April 26, 2025 3:59 PM
@lurker thank you for the link on undersea cables.
You may like this on China:
Who will win the race to develop a humanoid robot?
https://www.bbc.com/news/articles/c62jxdxng7do
=Standing at about 4’3″ (130cm), G1 is smaller and more affordable than other humanoid robots on the market, and has such a highly fluid range of motion and dexterity that videos of it performing dance numbers and martial arts have gone viral.
“The problem you get as a European or American company, you have to buy all these sub-components from China in the first place.
“So then it becomes stupid to buy your motors, buy your batteries, buy your resistors, shift them all halfway around the world to put together when you could just put them all together at the source, which is in Asia.”=
What about program running robot not hardware?
@Clive
Could modern drones put unnoticed ‘listening’ devices remotely on fiber optic underwater cables to spy not destroy?
not important • April 26, 2025 4:35 PM
@Researcher Zero – just got to Your post
https://www.schneier.com/blog/archives/2025/04/friday-squid-blogging-live-colossal-squid-filmed.html/#comment-444790
Thank You! Application of basic common sense for planning and conducting security could be helpful for such events.
ResearcherZero • April 27, 2025 2:20 AM
The cables themselves do not need to be cut to control information.
Information is power as they say. If you can control the flow of information you can control the narrative and shape public perceptions of who deserves dignity and who does not. In a debate, negative stories are often used to deliberately create conflict and henceforth shape the focus of public debate and its key talking points or views.
Diverting public attention away from one subject to another can also be used to cut off conversations about persistent government failures to address longstanding and unaddressed problems. The usual problems of poverty, homelessness, health and education.
Governments are tightening their control over media under the guise of public interest.
‘https://perryworldhouse.upenn.edu/news-and-insight/mastering-the-paradox-how-governments-fight-and-feed-disinformation-at-once/
Who shapes the narrative and what effect does it have on public perceptions?
There is a consistent correlation between public perception and political outcomes. Politicians are keenly aware of this.
https://meetingatthemargins.substack.com/p/how-narratives-shape-power-and-public
Do Politicians Knowingly Create Conflict to Gain Media Attention?
https://journals.sagepub.com/doi/10.1177/10776990241312150
ResearcherZero • April 27, 2025 2:24 AM
Did anyone read this story about how not to prepare a legal defense using AI?
‘https://arstechnica.com/tech-policy/2025/04/mypillow-ceos-lawyers-used-ai-in-brief-citing-fictional-cases-judge-says/
ResearcherZero • April 27, 2025 5:24 AM
Funding has been restored for Radio Free Europe/Radio Liberty after the courts ruled Trump cannot dismantle the news organization established by Congress.
‘https://www.nytimes.com/2025/03/27/us/politics/trump-radio-free-europe-funding.html
You have all read “”Doctor Zhivago by Boris Pasternak, about the October Revolution in Soviet Russia the consequences for the individual? The Soviet Government banned the book.
Those in power believed it undermined the idea of Soviet Collectivism and the ability of those in power to shape the public narrative, as they believed Doctor Zhivago promoted the idea of the fate of the individual over that of the fate of the whole of society.
https://newbookrecommendation.com/summary-of-doctor-zhivago-by-boris-pasternak-a-detailed-synopsis/
There are important lessons to be learned from why the Soviet Union failed:
“…a spectral image of the totalitarian state, whose jealous political control over the economy leads it to trample over all that which ought to be private.”
Gleaning for Communism: The Soviet Socialist Household in Theory and Practice
https://academic.oup.com/cornell-scholarship-online/book/55375
Uaf • April 27, 2025 7:05 AM
Story about law enforcement seemingly using WiFi jamming/deauthentication technology to disable home surveillance cameras.
https://radleybalko.substack.com/p/the-courage-to-be-decent
United Surveillance of America • April 27, 2025 12:14 PM
When I arrived in the USA in the Nineties, legally, I stated truthfully in my immigration papers that I was employed with the German government. I was vetted properly by US Intel in Germany who were employed at the US Embassy at Frankfurt am Main. The BALKANOIDS in ideho, operating IP Theft websites while also working in the various government agencies, connected with their NON-BALKANOID buddies in the government wanted to destroy me so they had to have this FAKE FELONY conviction so they could perform WARRANTLESS 24-7 SURVEILLANCE of me and my family. They bugged our home, our cars are being tracked. They brought a inoperable SUV and unloaded it on the public road/street in front of our home. In it, they had a StingRay which they operated remotely from a house in our immediate neighborhood. The bugs they planted in our home are also activated/deactivated remotely.
Couple of weeks ago, a truck was idling on the side of the road, just outside our front window. A guy inside it was using a laptop and sending all kinds of extremely powerful signal bursts, turning on Wi-Fi on my laptop, scanning my Hard Disks on the Desktop PCs that weren’t even connected to the Internet. It was so powerful, like some extreme magnetic field, I couldn’t even control my PCs with USB/WIRED mouse. After he drove off, everything went back to normal. I went outside to confront him. Tinted windows on the truck and the whole 9. I asked him what the hell he was doing. He said, oh don’t worry, I am just scanning the green boxes and he pointed at the Communication Boxes in the neighborhood. I do know that the ISPs call those green boxes “Pedestals” but NONE of those are located in my front yard, and not even in the yards of my neighbors next door to the left of us, or to the right of us, OR across the street of us. The guy was LYING HIS ASS OFF. I told him that he was full of shit and that I know what he was doing.
I did have around 40TB worth of data that was used to train some Legal-related AI/ML for my own needs since the government has deployed their fixers to interfere with ANY lawyer I tried to retain and they always talk them out of taking my case where I am suing the government for my wrongful conviction. The whole 40TB was wiped clean using a DoD standard a few months ago and it took several months to complete, on several PCs concurrently. So if this operation was to “flip my bits” well, they are a bit late to that party.
But seriously, isn’t it extremely strange for even the FBI to ignore all this wrongdoing, hell – A FAMILY GOT DESTROYED! I barely escaped an attempt on my life and they blamed me for everything just so they could use WARRANTLESS SURVEILLANCE OF AN AMERICAN FAMILY. Forget about the CALEA and the Court ordered Wiretap and a dozen of GAG-ORDERS, including the FISA Court ABUSE on an American Citizen/Family – this is so bad I am expecting them any day now to implant a bug up my butthole since I don’t even use/carry my cellphone with me anymore and this behavior/habit isn’t just because of the government but every single company that has any of their apps residing on my cellphone. Everyone wants to market our GPS/Cell data so I leave my cell at home always. When you have your own private LOYA missing filing deadlines for any appeals and a ton of other stuff – then you know that THEY’VE BEEN BOUGHT AND PAID FOR by the government fixers.
America – WHAT THE HELL HAPPENED TO YA?
There’s a saying in the US Military: “FUBAR”
I’m afraid we’re going back to the time of the Wild West again,
that’s what happened to America, everybody does whatever they please,
and they don’t have to answer for it.
https://drive.google.com/drive/folders/16GB5NiUu4Zb07RD6B3ai08qerHbHxJhI
Revolution is Almost Here • April 27, 2025 12:43 PM
@United Surveillance of America,
quite fascinating, who knew a HDD could be either cloned or accessed Over-The-Air.
That’s some scary $hyte. I wonder if those Solar Storms that can destroy data, can be replicated for malicious intent, of course with targeted approach and in a somewhat controlled environment, for a deliberate act of wiping a nearby HDD OTA?
Sabotage?
Rontea • April 27, 2025 3:24 PM
“A book is finished when is due.”
A book is finished when you can no longer improve it.
not important • April 27, 2025 5:24 PM
@Uaf – I followed link you provided. Interesting!
Couple thoughts:
1. LEAs and its operatives including IC folks like CIA within US (the letter is basically illegal but how You could prove they did it) could utilize any modern technology to passively monitor/snooping kind of internal SIGINT against real criminals not political opponents for future parallel construction for collecting evidence based of rules of criminal procedure, and never used directly and never active interfere like Stingray – listen, record, not interrupt/block except imminent danger for life, health – e.g. time bomb cases.
2.When LEOs search Trump’s lawyer office during his first term, they basically take out all assumed protections and open flood gate for cases like in Your link.
3. Congress must set up clear rules by Law when and under what circumstances such activity of LEOs against lawyer is legitimate, and who should authorize it – not Magistrate of low level but Federal Judge.
cls • April 28, 2025 12:44 AM
Paranoia takes hold and runs deep. It can be unshakable. Fortunately medicine is available and it helps.
GeekDad • April 28, 2025 8:57 AM
This came across my feeds over the weekend.
It’s newly published and has yet to undergo peer review. If it’s proven to be correct, then encryption will be due for an overhaul.
Clive Robinson • April 28, 2025 9:09 AM
@ Uaf, ALL,
With regards,
“law enforcement seemingly using WiFi jamming/deauthentication technology to disable home surveillance cameras.”
They don’t have to be “law enforcement” to cause WiFi or BlueTooth or any other modern RF based communications system to fail.
In fact an eight year old child could do it long long before WiFi etc or even the start of the 1970’s, I know because I was such a child.
All you need is an old electromechanical bell ringer or buzzer and remove the “spark suppression” likewise the cap on the rotor arm of an old fashioned car.
At school we used to have to sit and listen to a “Schools broadcast” by the UK BBC it was dull tedious and uncomfortable as we had to sit on the assembly hall floor.
I made up a “spark gap” transmitter that covered the “Medium Wave”(MW) band that the BBC transmitted in. All it was was a “toilet roll inner” with a coil of wire wrapped around it to make an “auto transformer” with a length of wire from the HiPot end of the transformer. A variable capacitor across from the tap to the ground end of the autotransformer to form a parallel tuned circuit.
The auto transformer tap was coupled to the “hot end” of a low voltage relay wired up as an oscillator that generated quite a “back EMF kick” from the coil of the relay[1] and it a ran off of a 6V radio “filament battery” (back then tube/valve portable radios that used them were still around).
As a jammer the range was not great maybe 60-100ft but that was enough to make really painful on the ears bursts of interference.
The thing about WiFi Bluetooth and most other low power data networks is that they use one of the “Industrial Scientific or Medical”(ISM) bands of which the most well known is at two and a half Gigs which is the same band your home microwave probably works in.
Because of the way these network protocols work, all you have to do is jam the “ACK packets” at the data source (ie the camera). You need very little power to do this a couple of milliwatts will do it from a resonant antenna which you could easily run down the lapel or arm of a jacket.
You can buy such jammers from a Chinese Electronics site, or just by the components to make one yourself for a few dollars.
Thus the sensible game plan is to use a WiFi camera like a “ring doorbell” and a Wired camera from the likes of Swann in Australia that is built into the bottom of a “porch light”.
Those surveilling the place will find the Ring WiFi signal but not the Swann wired signal. They will jam the Ring WiFi signal giving away their intentions. Meanwhile you can watch and record them on the Swann wired signal…
It’s a “cat and mouse game” if you want to “double down” Swann also make concealed battery powered cameras that hid behind jacket buttons and the like…
If you have an old mobile phone it’s easy enough to rig it up to record through a shirt breast pocket button hole.
[1] I used the same circuit and components to power up a three foot florescent tube a few years later to make a “light saber” as a “inventor project” for the local Boy Scouts. The tubes are really quite efficient when you don’t have to drive the “heaters” to keep the mercury in vapour form to become plasma.
Clive Robinson • April 28, 2025 9:50 AM
@ GeekDad,
The position of Primes on the number line is well known and can be predicted up to just about any sized Prime you want.
But it’s not what mathmeticians want…
I’ve mentioned it befor on this blog, and it’s very simple to understand.
Hopefully you know how the “Sieve of Eratosthenes” works?
https://en.m.wikipedia.org/wiki/Sieve_of_Eratosthenes
Well if you look at the result you will se “twin primes” that is a prime immediately adjacent to either side of an even number.
If you look carefully you will see that if that even number is a factorial then it may well be straddled by a pair of primes that form a twin.
Now instead of ordinary factorials that are based on all integers, consider those based only on primes. These are called since the 1980’s as “primorials”
https://en.m.wikipedia.org/wiki/Primorial
Look the first few Primorials that are 2,6,30,… And you will see they are straddled by twin primes.
This holds true for all primorials with the exception of when a twin gets “struck out” by a multiple of an earlier prime.
You can see this if you think of the Sieve of Eratosthenes not using integers but primes.
You can see each prime starting like a wave and moving up the number line striking out where it crosses.
Look a little harder and you will realise that the pattern they form reflects at either side of a primorial or it’s multiple.
This gives the diminishing number of primes as you go up the number line.
For those a little more sophisticated you can treat each prime wave as a “complex number” forming a spiral up around the number line.
This will then give you a feeling for some other fun stuff to do with primes.
But…
If you produce a table of the first set of primes upto a suitable primorial you can just “reflect the table and quickly get the next set of candidate primes for testing.
The thing is even if your table only has a thousand primorials in it, you can very quickly find a very high primorial and then start reflecting around it…
Is it of much practical use?
Well that depends on what you want to do with the candidate primes you find and how fast you can check them.
But I thought this all up in the 1970’s whilst at school whilst thinking about how you might use it to solve the “twin prime conjecture”. Sadly though my “teachers” were not upto it and rather than encourage, discouraged…
Clive Robinson • April 28, 2025 10:49 AM
@ GeekDad, ALL
Just to prove my above and explained in different words I said it back on 21st Sept 2018,
https://www.schneier.com/blog/archives/2018/09/new_findings_ab.html/#comment-327038
And almost a year later,
https://www.schneier.com/blog/archives/2019/09/the_doghouse_cr_1.html/#comment-340617
And going back to at least 17th March 2016 you will see me talk about it,
https://www.schneier.com/blog/archives/2016/03/financial_crypt.html/#comment-268878
So not whilst,
“It’s newly published”
By them it’s most certainly not new in the slightest.
As for “and has yet to undergo peer review” it’s kind of failed that as it’s effectively plagiarism from a public “publishing” on this web site and other web sites…
You would be quite surprised just how often this has happened with my comments posted to this blog. I can usually show that it was being talked about hear ~8years before hand…
It kind of amused Ross Anderson and some of his PhD students that I “got in first” as did @Nick P and others.
As I’ve said in the past I don’t mind people taking my ideas and working on them two rules,
1, Be polite and acknowledge me.
2, Buy our host @Bruce two drinks.
Why two drinks, well the first for his hosting this blog as a publicly available resources for ideas to be swapped, and the second should he ever meet me, so he can buy me one or three cups of tea 🙂
ResearcherZero • April 28, 2025 11:30 PM
Marko Elez deleted his repo of insecure code after story went up, but it had been archived so if anyone wanted to look at said insecure code that is entirely possible.
Given the backgrounds of some of those that Musk hired, if departments end up with webshells and backdoors within sensitive systems, it should be entirely predictable.
‘https://krebsonsecurity.com/2025/04/doge-workers-code-supports-nlrb-whistleblower/#more-71075
–
Spectre RAT
SCATTERED SPIDER is part of a broader community of cyber criminals dubbed The Com.
‘https://www.silentpush.com/blog/scattered-spider-2025/
ResearcherZero • April 29, 2025 12:41 AM
@ALL
Everyone should be extremely careful downloading random files from Google Drive and have an up to date antivirus/internet security package with active scanning that detects malicious files are watering hole attacks when visiting dubious websites.
@United Surveillance of America
You have a virus/malware on your laptop. StingRays are Cell-site Simulators , i.e. for cellphones or what is more commonly referred to as an IMSI Catcher.
That bloke probably was just scanning telecom equipment. Plenty of services scan electricity meters and other connected devices from vehicles as part of their job.
The chap probably referred to the cabinet as a “green box” as he assumed as an ignorant member of the public, you would not understand the telco lexicon (jargon, terminology).
‘https://apnews.com/general-news-5ae1021db1b341b68477fa61672ab718
See image at the following link of a commercial grade Cell-site Simulator:
https://www.eff.org/deeplinks/2024/06/next-generation-cell-site-simulators-here-heres-what-we-know
–
The Com has a prolific record of social engineering related fraud, theft and threats of violence. Threatening investigators who were looking into the Com – at their homes – is one of their tactics. The cyber criminals also frequently employ SIM swapping and BYOD attacks.
‘https://www.sans.org/blog/defending-against-scattered-spider-and-the-com-with-cybercrime-intelligence/
Edward Coristine is part of DOGE sent to OPM and connected to the Com.
https://arstechnica.com/tech-policy/2025/04/government-it-whistleblower-calls-out-doge-says-he-was-threatened-at-home/
Coristine ran a CDN named DimanodCDN providing network services for data leak sites.
https://www.reuters.com/world/us/doge-staffer-big-balls-provided-tech-support-cybercrime-ring-records-show-2025-03-26/
ResearcherZero • April 29, 2025 12:42 AM
or watering holes 😀
ResearcherZero • April 29, 2025 1:22 AM
Banking passwords stolen by info stealer malware is being traded online.
‘https://www.abc.net.au/news/2025-04-29/australian-bank-customers-passwords-stolen-by-malware-hackers/105196976
Remediating an infected device requires scanning and identifying the malware infection, then full disinfection – which means full formatting and re-installation of a device. Any recent backups may also have become infected, so determining when a device was infected is crucial. Do not backup an infected system and then re-infect the device using the backup.
With the malware running on your device, if you change your passwords, the info stealer can still retrieve the new password and send it to the malware operators.
free software and free apps
Info Stealers can arrive via free apps which later update and install the malware.
Infections can also be bundled with pirated warez, such as games, cracks, movies, music and hidden in software installers, or arrive through social engineering (phishing/smishing).
The downloaded free game or software may work and operate correctly, but may come with a hidden surprise – that silently installs and steals your passwords and other sensitive details. If your banking details are obtained – your account can be emptied.
Uaf • April 29, 2025 1:51 AM
@Clive Robinson
Thanks, informative as usual. I have subsequently read about someone’s wifi dropping out whenever their neighbour uses a power saw, so a lot less resilient to interference than I assumed. Your teachers might have noticed that easier than your toilet roll 😉
Clive Robinson • April 29, 2025 7:18 AM
@ Bruce, ALL,
South West Europe went dark
At the time I write this, much of the power grid has been brought back up.
However as of yet little is known of the cause and all “the usual suspects” from “Space Weather” down to terrorists has been guessed at by the MSM press
There is a live Wikipage for those that want to keep their eye on it,
https://en.m.wikipedia.org/wiki/2025_European_power_outage
If I had to guess I’d suggest three things need to be looked at,
1, Solar and Wind “feed in” to the grid.
2, The requirements for frequency and phase synchronisity.
3, Recent rapid growth in power needs (not just for AI).
European Politicians are “Going Green” as fast as they can, in part due to what is happening to the East of Europe that I’ve mentioned before. Letting VVP have control of the “off switch/valve” gives a lot of “leverage” not just politically, economically, and socially…
The problem with “going green” is that the entire grid becomes fragile. Part of it is that as items become up in the 85-95% and above efficiency what is known as “base load” drops and what is known as “peek load” goes up, thus the gap between them can get to large and things become unstable.
If a heavy load gets thrown on the grid, then the generator frequency drops. Protection circuits see this an “throw off load” etc and this reduces generation capacity, thus a “cascade fail” can start.
Not many realise that “sell back” from their home solar etc generation actually makes it worse, a lot worse.
Some utility corps rather than do the required and very expensive maintenance, have been cheating and using peoples home generation to power other peoples homes etc at a very small fraction of the cost it would have been and thus massive “Shareholder Value”.
Thus when the line frequency goes out of spec even more generator capacity gets shed.
Thus any 1/1000 weather event like heavy clouds causing solar generation to tank, and lots of people to turn on lights and electric kettles can “kill the grid” that is now “to fragile”.
Now imagine if you can all the current AI LLM’s getting “thrown off” to protect the grid…
At the moment the use of such AI is not “critical” but lots of people are “Moving Fast and Breaking things” to cash in on the current AI bubble. I suspect they have not thought long and deep enough about what gets broken and how and what the cascade effects are…
jelo 117 • April 29, 2025 1:09 PM
@ GeekDad @ Clive Robinson
How do these spiralling conjectures relate to the result (the MRDP theorem) [1] which as a corollary exhibits a polynomial of low degree (~ 5) in several variables whose positive values are exactly the primes ?
https://www.math.umd.edu/~laskow/713/Spring17/Diorepofprimes.pdf
lurker • April 29, 2025 2:27 PM
@Clive Robinson
Red Eléctrica’s operations director Eduardo Prieto said preliminary findings suggest “there was no kind of interference in the control systems” to imply an attack
…
Mr Prieto said during a news conference on Tuesday that there were two “disconnection events” barely a second apart in the south-west of Spain, where there is substantial solar power generation.
The article also notes that when more generating systems are added to a grid, with faster and more accurate “stability” monitoring, it can actually lead to instability.
‘https://www.bbc.com/news/articles/c209yrl3258o
not important • April 29, 2025 4:56 PM
=and you have no idea how corrupt the government and justice system are in Idaho.=
Unfortunately, not in Idaho only – every corner of the country and the globe.
Now there is general trend to hate everything from China, but just fyi as journalist how they really fight corruption: they executed several years ago 40 thousand corrupt officials. Then some years thereafter – number of executed was dropped just to 5 thousands.
They may be not model of democracy but currently have prison population in absolute numbers and per capita less than US.
Another example is President of Salvador who reasonably claimed that human rights protection of crime victims is higher priority for him than criminals. Now country have real law and order, and dramatic economic prosperity as result.
not important • April 29, 2025 5:21 PM
What is bug hunting and why is it changing?
https://www.bbc.com/news/articles/c99n8r38rdlo
=Andre Bastert, global product manager AXIS OS, at Swedish network camera and surveillance equipment firm Axis Communications, said that with 24 million lines of code in its device operating system, vulnerabilities are inevitable. “We realized it’s always good to have a second set of eyes.”=
Clive Robinson • April 29, 2025 5:45 PM
@ jelo 117,
I made two points above,
1, But it’s not what mathmeticians want…
2, Is it of much practical use?
Back then I was looking for a way to get a better understanding of what years later got called primorals and their relationship to twin primes.
Back then the Internet did not exist in the way it does now, and there was no ready access to mathematical papers outside of one or two dusty University libraries to far away for me to get access or even be allowed into[1]….
[1] I later discovered the way was to be “bright eyed and bushy tailed” and ask a librarian face to face not ask a faculty office via letter from my teachers.
Marconi • April 29, 2025 5:59 PM
@Clive, All
An update from someone in Portugal regarding comms resilience.
The tree main mobile operators in the mainland (Vodafone, NOS, Meo) showed drastically different up-times. Seems like the most impacted ones were Vodafone and NOS and MEO being the last one standing. This raises some questions about power backups at the base stations and along the core network.
SIRESP [1], that is our Tetra here, failed once again (along the years several failures have been reported) mainly because of the power failure and subsequently the unavailability of the satellite link redundancy. Accordingly with some TV news the operator NOS is the company responsible for that link. There were reports of firefighters using the old UHF systems for comms.
From first hand and leaving in a major city mobile communications (regarding vodafone users) were severely impacted after 15/30 minutes after blackout.
The only communications that lasted during the entire blackout was the Radio Broadcasting Systems. Seems like they are still the last hope in “apocalypse”.
Besides that it was a good opportunity to surf the short-wave electromagnetic spectrum with my old shortwave radio with minimal electromagnetic interference. The noise level was something I’ve never witnessed.
Clive Robinson • April 29, 2025 7:26 PM
@ Marconi, ALL,
I’m going to upset a lot of people who used to be in the US and some are now in Israel…
You comment,
“SIRESP [1], that is our Tetra here, failed once again (along the years several failures have been reported) mainly because of the power failure and subsequently the unavailability of the satellite link redundancy.”
In there you will find the technical incompetence of “Motorola”…
In the UK Tetra has such a bad reputation it’s being ripped out and replaced with 4G LTE as a “shared service”.
Put simply somebody in UK Government –who should get a medal– realised that the only way to get “universal coverage” for both the public and guard labour forces was to pay someone to put in 4G base stations where it’s unlikely to be economically viable for either “public or guard labour”. They would also get the benefit of “commercial services” rapid upgrade etc for the guard labour.
Marconi • April 29, 2025 8:39 PM
@Clive, ALL
Also something I forgot to mention, and also part of the critical infrastructure was the failure of the city water pumping systems. Something I’ve never realized, the very few water facilities used to feed an entire urban system and their lack of power redundancy.
Gas stations couldn’t be used for refueling. I’m not sure if this was because of the actual power failure and thus it’s pumping systems, or because of some government restriction so that fuel can be used primarily for critical tasks, like for fueling hospital generators or something alike.
Other thing to notice was the failure of the traffic lights system. With lots of people rapidly moving from work to their homes this could have gone badly.
Lastly something to think upon is the cashless society some advocate to. Most payment systems were down and you could only buy stuff with money.
Clive Robinson • April 30, 2025 6:47 AM
@ Marconi, ALL,
The issues you highlight are just some of those that will have happened and that others will follow on. And as annoying as many might appear they could also be making people sick and killing some of them.
To see why,
“Consider water pipes.”
We know the joints are not perfect and they leak. In London it’s said that 1/4 of the water “Thames Water” push into the pipes leaks out of them. I’ve no reason to believe that a similarly as large metropolitan water supply system that has been in the hands of “for profit” ownership for a similar length of time would leak any less.
Now consider the water “leaks out” normally because of the pressure of the pumps. Turn that pressure off and it’s no longer normal and in some places water from the surrounding soil/ground etc will leak back in. At the very least this will happen because of the vacuum, water leveling will cause on a hill or valley side.
Now ask yourself what will come into the water supply pipes with that dirty soil / ground water?
If you are not certain just remember that potable water supply pipes are often in effect co-located with sewers simply because of the fact the only place they can put them in a city or urban area is “under the street” within feet or inches of each other.
That’s why the CDC in the US used to recommend keeping at least
“A gallon of bottled water per person per day for half a week”
That is just for drinking and cooking (not washing or flushing the toilet etc).
A US gallon is a little under four liters so say 15l/person in bottles or other containers…
The thing is that “half a week” is now well out of date when it comes to fixing and cleaning up after emergencies…
Some people point to the fact that recent emergencies in the US are “still in repair” phase a third of a year later and that FEMA etc either took to long to supply or removed way to early supplies of bottled water…
So others are now sayying storing a fifty five gallon drum per person for drinking and having the materials to do rainwater harvesting available is a bare “minimum” families should consider.
Whilst others have been saying for years that US Water Treatment is so poor in some areas (Flint Michigan) that you would be safer drinking bottled or harvested water and taking vitamin tablets…
Then when you include other domestic uses for water even the Federal Gov via the EPA says,
“Each American uses an average of 82 gallons of water a day at home (USGS, Estimated Use of Water in the United States in 2015).”
https://www.epa.gov/watersense/statistics-and-facts
That’s ~300liter/person/day which sounds a lot but,
“As for where the water goes, a survey conducted by the Water Research Foundation revealed that toilets use 24 percent of the 300 gallons of water used per day by the average American family, 20 percent is used for baths and showers, 19 percent is from the faucet, 17 percent is used to operate washing machines and dishwashers, 8 percent is used for various activities, and a staggering 12 percent is from water leakage.”
https://www.springwellwater.com/how-much-water-average-american-use/
These were based on 2015 figures gathered by the EPA, so don’t expect any more recent figures to come out.
Recent events in the US and other continental American countries suggest that those apparent “doom sayers” might not be wrong…
jelo 117 • April 30, 2025 12:27 PM
@ Clive Robinson
I made two points above,
1, But it’s not what mathmeticians want…
2, Is it of much practical use?
They seem to want anything that will give them a better handle on primes. E.g. see the many videos where various spiral presentations of the integers result in a propensity of primes lining up on straight lines or curves. Perhaps the polynomial function whose positive image is all primes is connected to this through taking sections of the image surface. Or other properties of primes such as the twin primes conjecture or more generally systems of affine functions of an integer variable containing infinitely many primes.
The computations are currently generally unwieldy but may eventually simplify, or there may be partial results that are feasible.
Clive Robinson • April 30, 2025 7:03 PM
@ jelo 117,
With regards mathematicians and their wants, you note,
“They seem to want anything that will give them a better handle on primes.”
It’s an interesting paradox…
Yes they want, but they want it in a certain way, and that might be the very reason they are not getting there…
We know from first principles of the successor number that the integers must be infinite. We also know from that, that factorials must be infinite.
But we don’t know that the same logic applies to primes. Though I can not see any good reason –ie one that is predictably testable– why it would not be.
My reasoning for this is that I think of each and every prime as being a fundamental frequency that goes to infinity along the number line just as the integers do in the sieve.
I also know that you can consider each primorial as a point where all the waves come into phase and cross the number line in the same direction. Much like happens with a squarewave and it’s harmonics.
I also know that for that reason every primorial acts as a reflection or mirror point. That is if all the waves come in from above the next time they will all come in from below as they do with a squarewave.
But I also know that the reflection is as though in a mirror. The positions of primes as an offset from a priomorial up the number line is also the same as the offset down the number line (the missing numbers being those that have been sieve like struck out as you go up the number line).
I can further go on to say that the reflections also happen at the priomorial sub harmonics.
You can see all of this by drawing up a number line from zero to one hundred and twenty and mark all the primes and the primorials and draw them in connected by their harmonic components.
I could go on and say it’s the basis of a fully deterministic algorithm (which it is).
But the question arises as to if “all primes” make it from the algorithm or if their are any anomalies…
Prove there are no anomalies you will be famous, and I’ll hunt you down and buy you a drink 😉
Back when I was at school in the mid 70’s that’s as far as I got because not only was the concept of a primorial not named/accepted I did not have access to further information[1].
You go on to note that,
“The computations are currently generally unwieldy but may eventually simplify, or there may be partial results that are feasible.”
I see them graphically as being unwieldy like the roots of a tree or fractal. Close in they have a simple reflective or mirror like property far out they form an interesting pattern like a half root system that is dense close in but becomes sparse by a clearly seen curve or function. In the mid range they appear as though chaotic, and that I see as the Gordian Knot of the problem.
I think that what I see is “fully deterministic” but I can not say if it is fully representative of all primes. It’s one of those things where you have to switch from visualisation of lines on a surface or in a space to understanding how “all the points” are formed by clean mathematical forms that have a form of symmetry that conveys aesthetic beauty.
Look at it another way, you and I both know how the “pin board” produces a normal distribution curve as the balls roll down and bounce from side to side. But think back to when you first saw one or it’s equivalent at a “Try your luck” stand at a circus ground / fair. Would you have been able to see the curve and realise why the odds were against you?
[1] So the claim if you like for naming primorials happened in the Journal of Recreational Maths in 1987 from an article by Harvey Dubner.
https://en.m.wikipedia.org/wiki/Harvey_Dubner
Thus now named searching for related information is now oh so much easier.
Further although “graphical proofs” are now back as being accepted these days as a tool, back in the 70’s “all proofs had to be by mathematical theory hurumph hurumph”…
The experience of being effectively shunned by the snobish attitude of those teachers who might have helped me, put me off of studying mathematics (I had a similar experience with the Music Master which is in a way even funnier). So I went into engineering instead, because even as a just teen I was showing significant design skills in sailing vessels with composite material structures and I was getting not just help but respect from those I respected as hands on engineers. Computers then “happened” and so despite the disrespect from those in charge of the computers at school –the same maths/physics masters– I quickly developed skills beyond their capabilities (which was an ego boost). So I went into electronics and communications with a healthy side order of computers and took to it all better than a fish to water. I managed to stay “out of trouble” in the 1980’s because I had a degree of pure stubbornness, did not trust certain types of people we now call “authoritarian followers”, and the fact there was no applicable legislation. Not that that, stopped Maggie Thatcher UK Prime Minister from trying to have me turned into a criminal as I’ve mentioned before.
lurker • May 1, 2025 7:53 PM
re: Signal-gate
The perp has apparently been
Sate Dept spokespersonn Tammy Bruce credits “the miracle of modern technology and social media.”
‘https://www.bbc.com/news/videos/cwy6zj48ky3o
lastofthev8's • May 2, 2025 5:00 AM
@Bruce @All>Just on the Australian banking breach/exposed P/W fiasco,
Telegram Is Now Infrastructure for Cybercrime — And Still Denies Responsibility
Telegram’s bot API is increasingly being used as command-and-control infrastructure by infostealer malware families like RedLine, Raccoon, and Vidar. These tools exfiltrate browser-stored credentials, cookies, and crypto wallet data directly into Telegram chats or channels — in real time.
This is not a one-off misuse. It’s at scale.
Researchers across the industry — CERT-UA, Check Point, Cyble, Re security, Kaspersky, and others — have detailed how malware campaigns are leveraging Telegram’s infrastructure because it’s fast, free, anonymous, and entirely un-moderated.
Telegram still offers:
No public transparency reports
No technical rate-limiting on bot abuse
No commitment to mitigate malware operations
Compare that to Signal or even Mastodon — platforms that are privacy-first, but not willfully blind to malicious abuse.
Telegram isn’t just a passive victim of misuse. At this point, it’s part of the kill chain.
🔍 Primary Sources:
1. Resecurity – “Telegram-Based Infostealers Targeting Australia”
🧠 Explores malware logs shared via Telegram that included 14,000+ CommBank, 7,000 ANZ, 5,000 NAB, 4,000 Westpac credentials.
🔗 https://resecurity.com/blog/article/telegram-used-by-cybercriminals-to-distribute-australian-banking-data
2. Check Point Research – “Raccoon Stealer 2.0 returns”
🧪 Deep dive into how infostealers exfiltrate to Telegram bots.
🔗 https://research.checkpoint.com/2022/raccoon-stealer-returns/
3. Cyble – “Telegram as Malware C2 Infrastructure”
🧬 Technical analysis of how Telegram bots are used for command and control, log exfiltration, and drops.
🔗 https://blog.cyble.com/2022/09/06/telegram-as-an-infostealer-command-and-control-platform/
4. CERT-UA Warning – “UAC-0099” Campaign
⚠️ The Ukrainian CERT flagged malware groups using Telegram channels and bots to control malware and leak credentials.
🔗 https://cert.gov.ua/article/4201555
lastofthev8's • May 2, 2025 5:49 AM
@All (off topic)…I apply this to whether im learning linux or goin shopping or talkin to the community in here…here’s where it works for me in looking after my (soul mate) every fiber in me now is dedicated to keepin him with me my k9 we call him ‘GITMO’..my 15 yr old Shih Tzu and that is>>>>>>>>>>>>>>>>>>>>
“if you cant make the judgment call 120 metres into a 1000 KM to be a little bit sensible dont start the Race”
Attribute: (Mark Larkham)
Peace and love everyone ☮✌
jelo 117 • May 2, 2025 10:57 AM
@ Clive Robinson
The proof in Euclid that given some primes there is always another uses what is essentially primorials.
…
When we have right, that is the scientific definitions, results are obtained straightforwardly. Otherwise, results are special cases with extraneous details obscuring the causal structure.
For example, the Pythagorean theorem is not really the scientific result, because it is a special case of a general construction for any triangle and any parallelograms on the sides. “right angle”, “squares” are extraneous details and not part of the “real” question.
Perhaps similarly, primes are not the truly scientific object of study, but rather the greatest common divisor [1], since the primes change with the ambient field whereas the GCD does not. E.g., 7 is a prime in the rational field, but it is not prime in the extension field obtained by adjoining √2.
[1] Edwards, Harold M., Divisor Theory, Birkhauser, Boston, 1990.
Subscribe to comments on this entry
Sidebar photo of Bruce Schneier by Joe MacInnis.
Clive Robinson • April 25, 2025 11:30 PM
@ Bruce, ALL,
More “Internet Of Things”(IoT) being “tanked”
Some may remember “Nest” from before the Big G consumed them like a greedy child with a chocolate bar. As it really was not that long ago.
Well come this Sept Google is totally dropping support for the UK & Europe Nest Thermostats and the US is loosing support for the thermostats but Google are allegedly offering discounts on “upgrades”.
https://arstechnica.com/gadgets/2025/04/google-ending-support-for-older-nest-thermostats-will-stop-selling-nests-in-europe/
This IoT “End Of Life”(EOL) by corporate Dictate” is reducing product life times towards the span of the warranty or less (Amazon I’m looking at you…).
I’ve been asked in the past why I don’t do “Voice Assistants” and electronics controlled from a mobile phone… Well aside from Amazon killing an IoT device within 6 months and the entire lack of security in IoT, I oft mention the European Directive on “Waste Electronic and Electrical Equipment”(WEEE). Which is supposed to stop what Cory Doctorow calls “Enshitification” of such goods.
But consider on a couple of walls in my home I have Thermostats to control the pumps in my central heating that follow an electrical timer switch. As an independant pair for the upstairs and likewise the downstairs they have both been working quietly and unobtrusively for over 40years and still work today… I can not remember how much I paid for them it was probably less than 10UKP, so they have more than paid for themselves in that time.
But I do remember they only took a half day to replace the original downstairs untimed thermostat with a new timer and thermostat and install a “back box” and timer and thermostat upstairs with the hard part “pulling through and splicing in” a “frost override” from a thermostat in the porch (technically you are nolonger allowed to do a “wired OR” with mains wiring in the UK so I’d have to rewire if I ever upgrade). It’s been suggested to me that I should replace with a “Smart Heating” device to which I giveca hollow laugh and shake my head sadly, because,
“New does not imply better.”
More accurately these days it actually means “worse” a lot worse…