Friday Squid Blogging: The Chinese Squid-Fishing Fleet off the Argentine Coast
The latest article on this topic.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
The latest article on this topic.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Ok, so, what is a good ID then.
If REAL-ID isn’t the one, then the next level must be UNREAL-ID.
Clive Robinson • January 10, 2026 12:04 AM
@ Cedar, ALL,
With regards “Authentic ID” the short answer to your question of,
“Ok, so, what is a good ID then. Something actually fake-proof?”
There is “no such thing” because “it’s not possible to do “fake-proof”…
A point made by the First female Director General of the UK Security Agency MI5 Dame Stella Rimington many years ago when talking about why a National ID card system would always be unreliable and a failure.
She gave her considered opinion that,
“My angle on ID cards is that they may be of some use but only if they can be made unforgeable – and all our other documentation is quite easy to forge.
“If we have ID cards at vast expense and people can go into a back room and forge them they are going to be absolutely useless.”
http://news.bbc.co.uk/1/hi/uk_politics/4444512.stm
And we know that people in back rooms will always be able to forge them… It’s not a “maybe supposition” it’s a “provable fact within our knowledge of the laws of nature”.
Also our considerable knowledge of the human condition of the mind set that insists on the “Thee but not Me” thus “exceptions in everything” or as we might otherwise call them “Backdoors by design”.
The longer answer is though is that exceptions are there by the laws of nature. Which is why you can not reliably do what is required. Which is translate a “tangible physical object”(person) into an “intangible information object”(ID). Nor can you make the translation in the other direction for “identification”…
Both the forward and reverse processes are necessarily “lossy” and can not be otherwise. Thus there will always be an “eye in the needle” through which “rather more than the camels nose will go”.
It’s something AI is making painfully obvious currently as it can quickly and easily make “faux-audio” and “faux-pictures” and “faux-video” of people that you know well or even intimately and you can not tell if the sounds and images are real or not. Something scammers are using to their profit already.
Back consider further, back in the late 1800’s British law necessarily accepted that,
“You are who you say you are”
Unless someone could,
“Prove beyond reasonable doubt”
you were someone else. And as that could not be done then, and can not be done now it’s time people accepted that,
“Authentication by observation only”
is not reliable, and at best a statistical measure or probability.
I can go on and give you proof arguments of this if you want but that’s the basic argument.
More fun is the rather silly notion that you can achive the disire by “closing the loop” by “hidden variables”… Like “something you know”. That too is a “statistical” measure and actually adds to the problem…
They are also called “shared secrets”, and a whole universe of hurt hangs on that word “shared”.
After all as the old saying has it,
“Three can share a secret provided the other two are dead.”
Thus we get into what the meaning of “a secret” really is in a technical sense… again it’s a statistical measure…
Do I need to go on and talk about why “Multi-Factor Authentication”(MFA) even using all three recognised factors is now consequentially very much known to be a bust, especially with non local –in person– authentication?
Clive Robinson • January 10, 2026 2:23 AM
@ Q,
Hmm,
“… then the next level must be UNREAL-ID”
When you step down the Unreal path, your virtual existence will have a less than Epic doom…
Somebody I know got herself hooked on the game back in the 90’s (yes it started a long time ago) and was an avid competitor. But Epic Games killed the servers off and it kind of stopped a couple of years back and left her and so many more without the competitive rush in their lives.
I never could get into video games, due to having been involved with the design of simulators for the military who could buy displays that were more than I earned…
Robin • January 10, 2026 4:06 AM
Malwarebytes reports another Instagram security breach, with 17.5M account details exposed ( ref: MWB newsletter and htt ps://www.clayconews.com/news/28805-tech-alert-17-5-million-instagram-records-circulating-on-dark-web-experts-warn-of-spam-surge). It may be a “compilation” of data from previous incidents that has recently resurfaced, there have been numerous breaches before:
htt ps://cybersecurityforme.com/instagram-data-breaches-timeline/
According to MWB the data is circulating on the dark web and includes usernames, physical addresses, phone numbers, email addresses, and more.
Alex • January 10, 2026 7:33 AM
Is it likely that whatever the government did in Venezuela with BGP has been burned as a useful method? I imagine lots of people are trying hard to figure out what was done and how, and if that gets published, routers will end up getting hardened so it can’t be done again.
Clive Robinson • January 10, 2026 8:41 AM
Let the Games begin or NOT.
As I’m not a user of social media and other,
“We will direct your eyes and steal your Privacy cabals”
I ordinarily have been laughing at this,
https://x.com/eastdakota/status/2009654937303896492
It will be interesting to see who wins in the long run but I can see at least three bowls of popcorn in my future 😉
As for the Olympics, my interest long long ago fell to near zero –not that I ever had much– after I stopped being a competitive sportsperson.
To be honest I never put in the “emotional investment” in other people playing as a proxy for me… So other than identifying their weaknesses –including in “my own team” so they could be covered– I never watched, listened, read. As I’d instead put the effort into putting effort to the grass / pedal / paddle / tiller and upping my own game (something most actual competitive sports persons do).
Clive Robinson • January 10, 2026 12:33 PM
@ Alex, ALL,
BGP and Venezuela incursion
The W questions of “Who, Why, When, What, Where, etc” of the Internet during the time period of the US unlawful incursion into the Sovereign Nation of Venezuela to remove the Head Of State is still being contested.
So your question of,
“Is it likely that whatever the government did in Venezuela with BGP has been burned as a useful method?”
May be the wrong one because it may be coincidence rather than correlation. That is there may not have been US or any other government “cause of the effect” seen in BGP logs.
Further even if it was “cause” for it being “burned” depends on how “general” it is. If it was cause and it was also very highly specific to Venezuelan infrastructure, then it may be of no further use except against Venezuela, and it may have a simple mitigation in Venezuela, to in effect have made it a “One Time Attack Vector”(OTAV).
That said BGP is very “open” and “public” almost everything that “causes” even the slightest of changes gets “broadcast” and is often directly attributable down to the person who’s fingers “did the deed” because it all gets multiply and independently logged automatically. Likewise the “effects” get similarly logged and statistical analyse possible is consequently very high.
That said… It’s known that the NSA tries wherever possible to stay out of a targets systems. It does this by subverting Internet routers and similar just upstream of the target, so that,
1, The target sees no intrusion
2, Few others see the traffic between the subverted router and target.
So it is possible that the messages to a BGP instance may not be logged elsewhere. Thus the “actual attack” may not have been seen. However it’s harder hiding the “effects” even if full control of upstream routers is held by the NSA. So the attack “type” or “class” may still be inferred from the “effects”, though the actual “instance” method may not be.
Which brings us onto your point of,
“I imagine lots of people are trying hard to figure out what was done and how”
Yes and no, there is a saying about not running a fools errand. If the early perception is “coincidence not cause” then the answer is quickly going to be people stop running to look for what they think will not be there to find.
It’s why few people find valuables on the ground, because they have no expectation of finding anything so don’t look thus “never see”[1].
Which brings us onto your,
“[I]f that gets published, routers will end up getting hardened so it can’t be done again.”
This depends very much on,
1, If the look
2, If they publish
3, If it’s seen
The US has some laws about “treasonous behaviours” as well as DMCA 1201 and it’s often been suggested that Western AV companies are “held back” by them…
The UK has three direct pieces of legislation,
1, The “Defence of the Realm Act”(DORA)
2, The two “Official Secrets Acts”(OSA)
And more recently other electronic systems acts following on from,
3, The “Computer Misuse Act”(CMA).
4, The “Regulation of Investigatory Powers Act”(RIPA).
And most recently,
5, The “Online Safety Act”(OSA).
And various provisions within,
6, The “Fraud Error And Recovery”(FEAR) act.
Can be suitably “mis-used” as can the harassment legislations.
It’s the real problem with “Responsible Disclosure” in that you are in effect,
“Required to ‘tell before you yell'”
(See Section 1 subsection 2 of the Fraud Act 2006[2] specifically types of fraud B and similarly C).
Which allows such draconian legislation to be used to arrest and detain / coerce before you can publish.
[1] I do look but not in expectation of finding anything, but because in my “advancing years” I trip very easily and can not recover my balance easily… Thus hitting the ground unprepared through not looking has a high probability ={ Experience tells me it often hurts, and as I’m not especially fond of pain I look… However I am quite fond of valuables and I’ve found a fair few per walked mile in my time 😀
[2] The UK Fraud Act 2006 Section 1, subsection 2, outlines the different ways a person can commit fraud, which include: (a) fraud by false representation, (b) fraud by failing to disclose information, and (c) fraud by abuse of position.
old_regular • January 10, 2026 1:10 PM
Clive,
Don’t post here x.com links, change them to xcancel.com and use them in that form too.
I’s a new Nitter.
And nice you are still good.
Rontea • January 10, 2026 1:27 PM
@Cedar
“Ok, so, what is a good ID then. Something actually fake-proof?”
This is a classic example of security theater in action. REAL ID was sold as a way to make our identification system more secure and to strengthen citizenship verification. Yet here we have a DHS agent acknowledging that these IDs can’t reliably confirm citizenship. This not only undermines the program’s stated purpose but also highlights the civil liberties cost of centralized identification systems. We’ve traded privacy and freedom for the illusion of security, and now we’re seeing the predictable result: ineffective security measures coupled with the potential for wrongful detentions. Programs like REAL ID expand government surveillance while providing little practical benefit, eroding public trust in the process.
Guess the prompt • January 10, 2026 2:31 PM
A Dialogue on Security: The Nihilist and the Believer
Characters:
– Nihilist (N): Believes security is ultimately an illusion.
– Believer (B): Trusts that security measures can meaningfully protect us.
Scene: A quiet coffee shop, laptops open, headlines about a recent cyber breach scrolling on the screen.
B: Another breach. Tens of millions of records exposed. I suppose we’ll see new firewalls, new compliance patches, maybe finally some real security.
N: Real security? That’s cute. Bruce Schneier would tell you that security is always a tradeoff. In the end, attackers adapt, defenses falter, and entropy wins.
B: But isn’t that cynicism just an excuse to do nothing? Schneier also argues that security is about managing risk, not eliminating it. Even imperfect measures reduce harm.
N: Ah, risk management—the polite term for theater. Airports make me take off my shoes as if that matters. Companies encrypt yesterday’s data while tomorrow’s zero-day lurks already on the dark web.
B: Security theater is real, yes. But so is layered defense. The point isn’t to be invulnerable—it’s to be resilient. Schneier emphasizes that good security anticipates failure and survives it.
N: And yet, we’re all just buying time. Every lock is picked, every algorithm broken given enough effort. From a long enough perspective, security is just a pause before the inevitable.
B: Perhaps. But buying time is the essence of living securely. Even Schneier’s philosophy accepts that perfect security doesn’t exist—the goal is to make the cost of attack higher than the value of the target.
N: So you believe in the arms race as a kind of faith: that we can keep ahead often enough to matter.
B: Not faith. Pragmatism. We don’t secure because we expect eternity—we secure because we want tomorrow.
N: Hm. Maybe that’s the one line even I can’t refute: security as the art of deferring chaos.
B: Exactly. And maybe in that delay, we find enough meaning to keep defending.
Moral in the Schneier Style: Security is not about absolutes; it is about negotiated time against threats, a constant conversation between risk and resilience—whether you believe in it or not.
Clive Robinson • January 10, 2026 3:46 PM
@ Bruce, ALL,
Self repairing QC good or bad?
Yes a little clickbaity but it’s actually an honest question.
Quantun Computing has in effect been stalled for the past decade or so because of reliability issues that mean things get very complicated and the number of Qbits required goes up by some power law that “ain’t small”.
Well to step in the forward direction requires some changes in the ways things are done.
Thus this can be seen as good news or bad news depending on your point of view,
Scientists build a quantum computer that can repair itself using recycled atoms
“Like their conventional counterparts, quantum computers can also break down. They can sometimes lose the atoms they manipulate to function, which can stop calculations dead in their tracks. But scientists at the US-based firm Atom Computing have demonstrated a solution that allows a quantum computer to repair itself while it’s still running.“
https://phys.org/news/2025-12-scientists-quantum-recycled-atoms.html
Thus upping reliability and in turn availability.
So is this a good thing or not?
Well it depends on your view point. As some have pointed out QC does not have sufficient applications to justify the cost. So reducing cost makes the number of applications that might benefit from QC go up, thus increasing demand and in turn bringing the costs down further in a decreasing spiral.
However the most likely application for QC is reducing the time it takes to break certain types of encryption. As Post QC Crypto algorithms are still a subject of debate it’s generally felt that in Cryptographic circles QC is “bad news” especially where RSA and other PubKey crypto used for “key establishment” is concerned. Which is perhaps the most important thing in the Modern Western World where just about all usage of electronic communications for business activities of any form now reside.
To understand the gravity of this consider what happens when the Internet is lost for even a very short time. Virtually all economic activity and supply chains in the areas where it is “out” come to a halt. Whilst there are work arounds that can be established –ie do it the old fashioned way– they are limited in range, slow, and in comparison inordinately expensive.
Currently Iran for various reasons not precisely known but “assumed” is suffering distinct signs of economic chaos/collapse because the Internet there has been brought to a halt for by far the majority. Flipping the nation from what some would consider 2nd world status very definitely into 3rd World status…
Just remember 1st world status now depends very heavily not just on eCommerce but eFinance for payment and banking, especially with “cash” being not exactly something most people have a lot of if any in their pockets…
So where do others feel they stand on bringing QC closer to useful?
Chat HTP • January 10, 2026 3:47 PM
@ Guess the prompt Nice use of LLM to create a story line- you just forgot to attribute
Clive Robinson • January 10, 2026 4:30 PM
@ Bruce, ALL,
This is “hot in” as I just got notified about it. But a quick read shows that people still don’t Grok security or the history of security,
Danish chemist’s invention could make counterfeiting a thing of the past
“Every year, companies lose revenue when goods are copied or illegally resold. Now, a new digital and legally binding fingerprint developed at the University of Copenhagen makes products impossible to counterfeit.
…
Thomas Just Sørensen, a chemist at the University of Copenhagen, has invented a unique solution to combat this problem. Together with Danish entrepreneurs and investors, he has developed the O−KEY technology—a kind of digital fingerprint that makes any physical product impossible to counterfeit.“
https://techxplore.com/news/2026-01-danish-chemist-counterfeiting.html
This idea is actually not new just decades old.
Originally it was developed to be used for putting unforgeable identifiers on weapons of mass destruction and their delivery system.
It basically consisted of short lengths of “choped strand fiber glass” randomly mixed into clear epoxy and just painted into a fixed square over the serial number. A “stereo photograph” was then taken and stored away.
A variation was the use of threads in hand woven cloth used in rare and very valuable religious books, discussed on this blog years ago.
So this “new” system uses coloured grains of sand, it’s not any different really.
Oh and the system developed for weapons is nolonger used because… It might be unforgeable on the “tangible physical object” but it is all to easily forgeable as an “intangible information object” in the electronic “verification” communications back haul by simple substitution…
And there is, as of yet, no way to fix this problem…
Clive Robinson • January 10, 2026 6:21 PM
@ ALL,
Speaking of,
“No way to fix this problem…”
It’s becoming apparent that either malware developers are not learning or for some reason they don’t care.
Likewise the designers of OS’s.
Take this as an example,
https://www.huntress.com/blog/esxi-vm-escape-exploit
Note two things,
1, Path names and similar in the deployed code.
2, A standard IPC communications protocol (VSOCK) that has no monitoring available.
Older developers know how to remove identifing information like pathname from code, or how to easily make them in another language etc.
Thus the question “Why not?”
Two answers immediately arise to mind,
1, They really don’t care for some reason.
2, They are running a “False Flag Op and trying to make their code look like it was developed in a different place or by different people.
Which brings us to VSOCK, it’s not exactly a new protocol / method of IPC and it’s based on two ideas from last century “In Core IPC” a “Standard Network API”.
Thus it’s in effect “a known quantity” as far as security is concerned…
Thus why are there effectively “No Monitoring Tools” to spot it being used for security avoiding communication between what are at the end of the day just processes in memory?
After all we know “vsockmon” and “vsock-perf” are available on Linux so we know the interface for putting such security tools into other tools is there, which is why we see,
“VSOCK allows direct communication between guest VMs and the hypervisor without traversing the network stack. Unlike TCP/IP traffic, VSOCK communication does not generate network packets visible to traditional network sniffing tools, firewalls, or network-based intrusion detection systems.
Defenders can detect processes with open VMCI sockets using lsof -a on the ESXi host, which shows entries with type SOCKET_VMCI. However, the output only displays process IDs and generic descriptions like {no file name}, to identify the actual malicious binary, defenders need to dump the process memory for further analysis.”
Thus there really is no reason for VSOCK not to be included in such “standard tools”…
Not Really Anonymouc • January 10, 2026 6:33 PM
@N
If you don’t want to take off your shoes (or get molested) at airports, don’t fly. If enough people do that, the airlines will lobby to get rid of TSA and will probably be able to out lobby the people profiteering off of TSA and that bullshit might end.
6444 • January 10, 2026 7:16 PM
Re: fake ID.
There are always fake currency as well. Some features or genuine currency make fake hard to create.
Real (not fake) ID image have #, photo, protective features and should and could verified against its original image in the corresponding data base for match when ID is important for access, real security cases, etc.
121025 • January 10, 2026 7:20 PM
https://news.yahoo.com/news/articles/russia-dandelion-tank-armour-might-100000559.html
‘Moscow’s latest crude design, which features flexible metal rods arranged in branched layers, attempts to shield the body of the tank from the ever-present threat of small kamikaze drones.
It may look ridiculous, but analysts say the Oduvanchik (dandelion) anti-drone armor might offer the best protection currently available for the expensive vehicles.
The unorthodox dandelion-inspired modification was pictured for the first time last week, covering a Russian T-90M tank inside a warehouse. It is unclear when it will be deployed for combat, but Russia’s defense ministry recently patented the design.
The reinforced metal rods are welded together to form a tree-like structure that branches out into several tiers, forming a three-dimensional barrier, like the florets of a dandelion. In any gaps, a high-strength mesh is stretched between them.
If an explosive-rigged FPV (first-person-view) drone flies towards the tank, the rods should detonate it at a distance, shielding the hull from most of the blast. For every extra inch the drone is kept away, the tank has a better chance of survival.
Yet, as with many other anti-drone systems, there are drawbacks. All the extra gear adds to the vehicle’s weight, slowing it down and leaving it more exposed to the drones that haunt the front.’
C U Anon • January 10, 2026 9:08 PM
https://m.youtube.com/watch?v=tLygDs9EiBk
Painting into a corner with your Tor browser and usage.
Clive Robinson • January 11, 2026 6:04 AM
@ old_regular,
Thanks for the info on the Nitter replacement (I wonder how long it’s going to last)
Nice to hear from you hopefully you will drop by a little more often as the Tech-Talk was not the only thing that made this blog what it once was before well N’uff said
Keep well, and stay out of any “chill winds from the Eastern”.
Clive Robinson • January 11, 2026 8:37 AM
@ ALL,
Paper Paper Bever data & the Snowden files
I advise that people for a whole number of reasons should never send out “files” unless they,
1, Know how to clean them properly
2, Test them properly
3, Have a documented process
4, Have a strong audit process
5, Have a very strong legal team
The penultimate two, unless properly integrated as a documented continuous process –hence the need for the ultimate condition– can be argued as
“Evidence of a guilty mind (mens rea)[1].”
Which is highly undesirable. But worse it can be said to be “actus reus” which is thus criminal not accidental action.
The way to do things is old fashioned but “sensible”
1, Print them out single sided
2, Remove “privileged parts” with an exacto / craft / scalpel.
3, Photo copy with a black backing sheet.
4, Send Photo copies
If told “they must be electronic” then photo in low resolution and send resulting image files. Using new stand alone PC.
If told they must be “machine readable” OCR the low resolution image files on the new stand alone PC.
The important part is that “print out” because it acts as a “fire break” against accidental meta-data leaks that can be sprung on people as a court room trick.
Hence me saying “Paper Paper Never Data”.
As an example of what can go wrong, the Ed Snowden trove of documents are leaking data through it being badly redacted thus leaving meta-data in PDF files,
Going Through Snowden Documents, Part 4
“We discovered that entire sections describing domestic U.S. intelligence facilities were deliberately removed from two published documents, while equivalent foreign facilities remained visible. The evidence exists in an unexpected place – the PDF metadata of documents published by The Intercept in 2016, and by The Intercept and the Australian Broadcasting Corporation in a 2017 collaborative investigation. To our knowledge, this is the first time this information has been revealed publicly. The removed sections reveal the operational designations and cover name structure for domestic U.S. NRO Mission Ground Stations.“
https://libroot.org/posts/going-through-snowden-documents-part-4/
It’s an interesting read over and above the meta-data issue.
[1] It varies by jurisdiction but even within a jurisdiction, but for yhose in England abd Wales,
https://www.holbornadams.com/post/explaining-actus-reus-and-mens-rea-in-uk-law
Clive Robinson • January 11, 2026 11:04 AM
@ Bruce, ALL,
And so the AI conflict becomes more than a data arms race as call to arms is launched
AI industry insiders launch site to poison the data that feeds them
“Alarmed by what companies are building with artificial intelligence models, a handful of industry insiders are calling for those opposed to the current state of affairs to undertake a mass data poisoning effort to undermine the technology.
Their initiative, dubbed Poison Fountain, asks website operators to add links to their websites that feed AI crawlers poisoned training data. It’s been up and running for about a week.“
https://www.theregister.com/2026/01/11/industry_insiders_seek_to_poison/
This could get quite nasty not just between the AI companies and insiders, bad data can actually poison and harm individuals.
Think of “glue on pizza” and jokes about “US Executive advice on the use of bleach” have already done…
As I’ve noted before “Hoovering up input data” is very much not the way to go as it has so many ways to fail, it’s hard to see how hoovering the Internet can do much else but fail with harm.
Back in the 1980’s AI had “Expert Systems” and they had similar issues even though carefully constructed.
The fact is input data for training has to be very carefully collated and be consistent otherwise chaos will happen.
IF and only IF input data is carefully selected, collated, ordered and verified can Current AI LLM and ML Systems become “safe”.
And as has been demonstrated and proven “AI Input poisoning” will always not just possible but probable in a competitive or conflicted environment.
I can see “rocky times ahead” for AI orgs as the harder they grip the more they enshitify their own products, way way way beyond any practical use or potential redemption.
lurker • January 11, 2026 12:27 PM
@Clive Robinson, ALL
“The fact is input data for training has to be very carefully collated and be consistent”
That was obvious from before day one to a mere bystander such as myself. It looks like the billionaire techbros running these AI scams were not on the mailing list. Or they have defective intellect. Or they are criminally ignoring such advice.
jelo 117 • January 11, 2026 2:37 PM
Get your game on.
chocolate pudding pops • January 11, 2026 4:34 PM
Linux Kernel Bugs Hide for 2+ Years on Average
https://itsfoss.com/news/linux-kernel-bugs-arent-found-for-years/
ResearcherZero • January 12, 2026 2:02 AM
@winter, Clive Robinson, ALL
A kind of digital McCarthyism exists within social media platforms, driven by the algorithm dividing and classing matters into groups. And/or statements, categorized and opposed.
Rather than a deeper inquiry than explores the many facets of a subject, producing a more nuanced and richer understanding of its features, many subjects are often instead over-simplified and presented decisively. Possibility is replaced with rigid belief that a thing does or does not exist. Classified as this or that. For and against – are the two binary choices given to participants. To like or dislike, depending on which ideology it has now been designated to. Reduced down for consumption by users with shortened attention.
Binary choices may exclude other lines of inquiry which deepen understanding. This can lead to the unfamiliar being entirely dismissed. Categorizing people into groups that can be ridiculed and attacked to advance one’s own cause. Dismissing and singling out others with little thought. Oversimplification that becomes a way of thought and view of the world.
Opposing views and reactions promoted by social media algorithms, have much in common with the strategy pursued by populist politicians. Populist leaders state that peace must be obtained through the use of overwhelming force and that security is maintained via strength. They escalate tensions, creating an insecure environment, in which acts of extreme violence grow. Diplomacy and mutual efforts take a back seat. Military and kinetic confrontation becomes far more common and intensive.
Social media today provides populists with their own alternate reality, where it is the algorithm that blinkers them and cheers them on. Their own decision-making skewered and distorted by the feedback provided to them through the promotional nature of social media.
Principles and virtue are swept aside. Dignity and empathy ignored in the pursuit of commanding public attention. One pantomime after another is used to hold sway over what appears in the news media and online discussion. Accompanied by an attack on the rule of law, is an undermining of the institutions that might normally have presented obstacles to political-based socioeconomic thievery. Wealth is transferred from the public into private hands, providing a disincentive for tech companies to adjust the algorithms that drive it.
Silence and a lack of critique becomes the hallmark of the elected representatives who hold the majority vote and their supporters. An absence of prosecution or penalty for acts of fraud, embezzlement and other repeated criminal acts and unlawful activities, becomes common place and accepted by those of the “silent majority”. Defeated and divided, they set their sights on each other. They direct their blame on one another, for outcomes and events driven instead by their political leadership. Rash and ill-considered actions are explained away, ignoring the implications that those poorly made decisions will inevitably bring.
The Trump administration has pulled out of 66 international organizations, including 31 UN entities. Leaving the World Health Organization, UNESCO, the IPC, Human Rights Council – and organizations for cooperation on cybersecurity, counter-terrorism, arms regulation, international law and democracy – will make the United States and the world far unsafer.
Important matters related to national security, will not make it into information flows.
Many of the organizations research and publish regional and international reports that identify critical risks. Threats can first emerge in other regions, such as early signs of a highly contagious disease, or cyber attacks testing new techniques in foreign networks.
It is likely that many events are not being reported, or took place largely unnoticed.
‘https://www.independent.co.uk/news/world/americas/us-politics/trump-climate-treaty-us-leave-b2896597.html
Retreating from global cooperation for ideological reasons is foolhardy in the extreme!
https://arstechnica.com/science/2026/01/trump-withdraws-us-from-worlds-most-important-climate-treaty/
Clive Robinson • January 12, 2026 2:42 AM
@ chocolate pudding…, ALL,
With regards,
“Linux Kernel Bugs Hide for 2+ Years on Average”
Actually it’s more nuanced than that because it’s more akin to a “half life” issue than a simple average. But made worse a lot worse because the kernel is dynamically changing for various reasons. One of which is because of “impartial knowledge” of bugs. There are those we have “no knowledge of” currently both as instances and classes. Then there are the addition of bugs from partial or incorrect fixes of existing bugs as noted in the article.
But if you look at the graph given you will see that there are other things going on and actually there appear to be three curves that are in effect summed together.
The first is a logarithmic decay with a half life period as you would expect from a basic percentage of a percentage decay from a fixed starting point. That would be better visually defined if it did not get changed by the “adding of more bugs” caused by “fixing bugs”.
Secondly there is a similar set of curves that are also exponentially decaying, from a given point in time. Each caused by “release points” as people increase the size of the “code base” and it’s “code complexity”. So it becomes a sum of many such curves with regular time offsets.
Thirdly is that people do learn –all be it imperfectly– from mistakes. Thus a found “new bug type” usually being an instance of a class of bugs gives rise to an increased tempo of fixes and the reduction if not elimination of that class of bugs over a shorter than expected time scale. But it also gets “an assist” from improved techniques at “finding, fixing, and finishing” bugs as well as not creating them by improved methods and tool usage.
So there are going to be some bugs that are never going to be fixed and new types of bug classes coming into existence as the complexity of the kernel increases.
I got tasked back last century with “writing it up” as others probably have. But as I found back then it was a “nail the fog to the wall” type task. Where the best you can do is hand management platitudes that things are heading in a positive direction.
The lesson was some things can not be measured in numbers just the direction they are currently heading. And as they say in Finance, “Past performance is no indicator of future performance”.
Clive Robinson • January 12, 2026 4:47 AM
@ ALL,
This is one persons view of the next couple of years,
The Next Two Years of Software Engineering
“The software industry sits at a strange inflection point. AI coding has evolved from autocomplete on steroids to agents that can autonomously execute development tasks. The economic boom that fueled tech’s hiring spree has given way to an efficiency mandate: companies now often favor profitability over growth, experienced hires over fresh graduates, and smaller teams armed with better tools.“
https://addyosmani.com/blog/next-two-years/
Some of it I agree with and some of it not.
The author is more optimistic than I am that management will think long term for “the business”… Whilst my view based on observations for longer than this blog has existed is that US style neo-con management will think short term for “shareholder attraction” and quarter to quarter “stock price”.
Also as Cory Doctorow put’s it “Your boss hates you” because senior managers know deep down that whilst they are effectively not important to the business functioning you as a worker are in effect essential.
Thus they are the “face hugging parasites” or “vampires” that would be in eternal fear if they were not so sociopathic. Thus they want to get rid of you hence “out sourcing” and “off shoring” has this century been their way to “not employ people” but just “shuffle contracts” as profitably as possible by “externalising” not just risk but just about everything.
However there is an issue, such behaviour actually makes little actual profit, and negotiations with suppliers makes response to customers slow. Thus the solution chosen though mostly unlawful is “form monopolies or cartels” to exclude competition.
We’ve seen this in Mobile Phone Service Providers that are in effect ICT run Finance operations, that have “Radio Spectrum Licences”. Similar to banks that have “Banking licences”. The Licences give them the monopoly or cartel.
This is the way that businesses in the US and West are increasingly going this century so far…
Thus the trick is get your own monopoly or cartel “licence” such as patents, copyright, trademarks, and other IP with legal force.
For the next few years AI is going to be disruptive weapon in this untill regulation, legislation and case law catch up. Then for a while there will be a new stability for a decade or two.
But what will also happen is Current AI LLM&ML systems will have to change for the better, a lot better.
For somethings they are already the best we’ve got where they have clear limited rules, reliable data, and specific function. We’ve seen this with protien folding, and we will see it with similar.
Where these current systems will fail is trying to be all things to all men. We can not do it as humans so how the heck do we expect to do it with deterministic machines and a random generator fuzzing things?
It should be obvious but apparently not that “going big” or “scaling up” is not going to change that, but it will hit the CapEx hard, very hard with no real change in ability.
Thus current AI is destined to become tools for specific jobs, and their success will depend on the ability to have “exemplary training data” and highly bound / constrained rule sets.
That is they will become increasingly like “Expert Systems” of the 1980’s but with a better interface and “shaped fuzzing”.
Knowing this you can hopefully make your own prediction on where things are going and how you can best fit in, as the “Money Merry-go-round” slows and in effect implodes.
Clive Robinson • January 12, 2026 6:08 AM
@ ALL,
With regards Current AI LLM and ML Systems not moving forward I’ve mentioned “The Memory Issue”.
I’m not talking hardware such as how much, how fast, what cost, how much power/heat and is it available, that occupy many conversations at the moment.
What I’m talking about is the process of memory usage within an active system
More specifically in that “Digital Neural Networks”(DNNs) are not “adaptive” because the weights in the network don’t get updated in use.
In most “Organic Neural Networks”(ONNs) the process is mostly “continuous” via short term, long term, and sleep cycles that update the entities ONN with increasing persistence. But as importantly usage holds memory in time variance priority, thus things less used take longer to recall and even fade to apparently forgotten.
Untill we can get the flexibility of ONNs “memory” in DNNs, LLMs are not going to learn except by very expensive and time consuming ML cycles.
Well various people have been thinking on bits of “The Memory Problem”.
This is one,
Context Rot is Real. Here’s How We Built Memory That Learns.
“Here’s the part nobody talks about.
Retrieval and generation are decoupled. The retriever finds “relevant” chunks. The generator uses them. But nothing connects what got retrieved to whether the answer actually helped.
Your AI pulls up a memory. Uses it. Gets it wrong. And then… nothing. That memory sits there, waiting to surface again. Same confidence. Same ranking. No feedback.
Where’s the feedback loop?“
https://roampal.ai/blog-context-rot.html
They look at other parts of “The Memory Issue” on their blog,
Have fun reading, but remember “The Memory Issue” in Current AI LLM and ML Systems, is very much a real “road block” set of issues that will have to be resolved.
Passport card? For US citizens, you can get one with the passport book at some minor extra cost. Children can also get it. And if ice have computers they can probably verify its validity with the dos.
Clive Robinson • January 12, 2026 8:24 AM
@ A,
With regards ICE and,
“And if ice have computers they can probably verify its validity with the DoS”
We know they do have computers in their vehicles of the standard GSI variety.
But judging by the numbers of citizens they are pulling in contra to legislation we can guess that,
1, They don’t use them.
2, They don’t want to use them.
Of which the latter is more likely based on reports coming out and why the REAL-ID card is getting diss’d by their legal team in court.
Thus I can see why people are increasingly seeing them as “power trip numpties” that are “armed and extremely dangerous” if not a full on existential threat.
With the State authorities calling out the National Guard to defend people in their State against Federal Agents, it’s a situation that could easily get completely out of hand and go further kinetic and in effect become subject in some minds to the “First Strike Doctrine”.
But the last news item I read on it suggests that the Federal agency and the Executive want to go “full on moron swagger” with this in what is a political p1551ng contest.
Any sensible person would give ICE agents RTU orders, for re-training, re-evaluation but can anyone honestly see that happening under the current executive?
Clive Robinson • January 12, 2026 8:45 AM
@ ResearcherZero, Winter,
With regards,
“Binary choices may exclude other lines of inquiry which deepen understanding. This can lead to the unfamiliar being entirely dismissed. Categorizing people into groups that can be ridiculed and attacked to advance one’s own cause. Dismissing and singling out others with little thought. Oversimplification that becomes a way of thought and view of the world.”
This behaviour is quite deliberate and has been for quite some time. Some suggest it was clearly the case before the 1812 attack the result of which was Canada became an entirely separate nation.
Further the policy of the US “State Dept” appears to follow Kippling’s entreaty to “pick up the white mans burden” into the likes of the Monroe Doctrine, and still using the “1984 Play Book” that George Orwell wrote and was published just after WWII.
(As for “Animal Farm” there is a strong porcine feel to US Political members).
Jeff • January 12, 2026 12:15 PM
Clive Robinson
Can you write how to make a proper backups nowadays? What media, essentially off-line.
CD/DVD are unreliable, flash drives and cards are unreliable and lose data when unpowered. So what to use?
Jeff • January 12, 2026 1:48 PM
lurker, i don’t have such kind of storage facility :
https://en.wikipedia.org/wiki/USB_flash_drive#/media/File:IBM_card_storage.NARA.jpg
Clive Robinson • January 12, 2026 4:02 PM
@ Jeff, lurker, ALL,
As @lurker indirectly notes I have a saying,
“Paper, paper never data”
Which is more about keeping unknown to the data owner (1st party) “meta-data” leaking to an assumed adversary (2nd or more parties)[1]. Than it is about longevity of data preservation.
But if correctly stored and curated paper can last way longer than you or your estate will care about. Thus only some things like “historical records” and long term legal agreements / findings such as property ownership and leases etc.
The problem is that whilst paper can be very robust what is put upon it can have a very short life[2].
Which is why “film stock” solutions are better and usually good for upto a half century or longer under environmentally controlled conditions such as removing oxygen, moisture, greases and other chemicals before freezing the film stock below minus 20 centigrade in a light and radiation proof environment (bottom of a salt mine well within the arctic has been considered by some European Nations).
The point is that,
“Entropy is natures way to reduce every thing to randomness of thermal background.”
Every thing thus has a “half life” exponential curve to “data doom”.
So all data storage requires three things from before storage,
1, Active entropy protection.
2, Strong Error correction.
3, Strong integrity methods.
Most “memory sticks” don’t have these things at the user available data levels and their entropy half life is measured in days/weeks not years in even mildly adverse conditions.
CDs/DVD’s were originally supposed to last 50 years or more, but that was for “pressed disks” with very strong error correction. Not for “writable” devices where it can be just a year or two…
Magnetic media decays in two ways, the poles merge and spread out spooled tape has the same issue but goes through the tape to adjacent tape segments. If you have an audio cassette tape that’s not been used in a decade you can hear a “ghost delay” on playback.
Punched Paper Tape, has a very low data density at just about 6 bytes/inch, but I’ve work I created back in the very early 1970’s that still are readable, not just by an optical reader but the human eye as well. The Punch tapes I have are stored in old tobacco tins on a shelf. They have become dried out and fragile as the tape was not “acid free” but at getting on for nearly 6 decades completed, it’s way better than cassette tapes from the late 70’s / early 80’s of “Home computing”.
Thus the most important part is not “how you store data” that’s doomed to entropy, but an ongoing process of regeneration that resets effects of entropy whilst it is still well within what error correction can do for you.
There are two basic types of error correction,
1, Forward Error Correction (FEC)
2, Code based Error Correction
FEC is simply repeating the data several times and using “voting techniques” to produce a correct result.
Code based EC is to complex to go over look up Hamming distance and Reed-Solomon to see why.
Both should be used, that is Code Based inside FEC.
But… It’s not a 100% guarantee, so data should ve stored in simple human readable “plaintext” that is always visible.
Sorry I can not recommend any existing “off the shelf” solutions because they nearly all go for “high data density” thus fail the very basic foundational requirements of longevity…
Oh and don’t forget surviving adverse environment conditions. As somebody only half joked you need to carve in stone fill with molten gold and seal in a concrete block wrapped in high density plastic at the bottom of a salt mine…
[1] Basically the process puts a “firewall” to meta-data in the hand over process. By removing any “file format” and even “file system” or other “meta-data”.
As such the process is not illegal or prohibited. Though I suspect with the AI -v- IP / copyright holder wars legislation may soon have to be made to avoid “cock-eyed” case law happening and the scope will be overly broad as is all to common these days.
That said unless carried out in certain “policy” procedural ways it will become the first part of establishing “guilt” that is “intent or premeditation” to “commit XXX” via the notion of “a guilty mind” (mens rae) without which a criminal conviction is not possible in many jurisdictions.
[2] laser printer toner is a form of fine plastic powder that is attached to the paper by the “fusor wire” that is it is quickly melted. Thus it really does not stick to the paper by more than just a poor mechanical joint. So it’s actually very easy to remove by chemical, thermal or mechanical means. As an example if stored in a filing cabinet in hangers or folders simple light mechanical pressure over about a year can cause the print to transfer from the face of one page to the back of another it is on. In the case of plastic “document wallets” the stripping can happen in less than a year.
Jeff • January 12, 2026 5:29 PM
Clive Robinson,
I wrote you a long reply but it was held for “moderation”.
The system here behaves very strangely, no common logic.
Hopefully they will release it.
Clive Robinson • January 12, 2026 6:09 PM
@ Jeff,
It’s not the length as such, sometimes it’s a word.
In the UK we have a three letter word that means cigarette but in the US it can have a derogatory meaning.
So we might say we worked something out “On the back of a 549-packet”. But in the US you might say “on the back of a napkin” (oh and “napkin” has an entirely different meaning in some languages).
I found out this by doing a binary chop and attempting to post each piece or untill I’d issolated a sentence or word and change for equivalent meaning.
More often than not now I chop it up by sectioning and thus can just leave an entire section out unless critical.
That is if it’s an example or analogue used to explain a concept or idea it’s not strictly necessary, so it just saves time for not just ne but those reading as well.
Jeff • January 12, 2026 6:35 PM
Clive Robinson,
OK, let’s see if this gets through.
romchip.org/index.php/romchip-journal/article/view/190
“This was in fact a very precise process, as the margin of error was only 0.2 mm. After many hours of strenuous work, Lempinen was gradually able to read the disk sector by sector.”
Clive Robinson • January 13, 2026 1:21 AM
@ Jeff,
With regards the article you linked to, it’s very weak on technical details.
Being old school for a variety of reasons I have a number of machines “hanging around” that I used to do “data recovery” with as well as more normal drives that I used to do transcribing / transferance from one media type to another type. Even in the 2000’s as a “hobby / side gig” it used to pay for it’s self.
The problem with the smaller form factor magnetic drives is not just the data density taking track widths down into ever smaller “fractions if an inch” and getting comparable to the width of a hair. It’s the issue of the ever more complex way bits get squeezed into symbols that are not compatible with each other. Thus you have two fun things to consider at the physical layer.
1, media to read head alignment.
2, recording encoding decoding.
Alignment can be done by taking an existing drive apart and building a “cross slide” mechanism adjusted by mechanical micrometer screw thread measures (though these have become a rarity as well). And all built into an Enviro-Stabo box that gets every thing to a known temperature and humidity and keeps them there for extended periods of time.
The reason for using a “cross slide” rather than a just “pushing the spindle” is again a function of stability both physical and environmental.
If you were to build such devices as a business proposition in Europe or America, you would be challenged. Because the number of people under thirty who can “set a lathe” for instance is vanishingly small. When I was “at school” back in the 60’s/70’s every boy and later several girls were taught it in “shop class” with hands on experience in a little “tool making” such as making “screw and nut gauges”. At a collage I went to the shop master was a nice bloke but his “final test” was to give you a stick of chalk and tell you to “turn it down and bring it back” then after that “go put a thread on it” the unsaid part of the test was being able to recenter the work piece after it had been removed from the tool for inspection after turning down. It later stood me in good stead when designing microwave systems and making custom dialectric tuning mechanisms for waveguides.
But even if you can find a person who can do it finding the likes of “watch maker lathes” is a near on impossibility as they are highly cherished by the few that own one and they don’t want to wear them out.
Whilst “one man’s treasure is another man’s junk” scarcity has turned that “junk” into “accidental historical artifacts” and obtaining and curating them even by museums is a task they can nolonger do.
So manufacturing in a bespoke way is close to impossible as a business proposition in “The West”. Even in the Far East in “The land of CNC” whilst there is great precision available, the knowledge to produce odd shaped pieces has vanished as well.
Around 2005 I had a need to make “coil winders” for manufacturing FM Broadcast Transmitters. Mechanically it’s a simple task you “close wind” on a reduced diameter mandril then put the close wound coil on a forming mandril that forces the coil to the correct diameter and winding pitch. You can turn down two mandrils for doing it manually but it’s not the way you want to go if you want more than ten or so coils a day. Trying to explain what was wanted even with spot on mechanical drawings proved lets just say “challenging”. I later heard from the one Chinese company who did do it was that the “sales rep” went and got her great grand father long since retired in as a consultant because he had made aircraft parts on a shop floor in the 60’s.
The simple fact is computers “have” and I suspect AI “will” in it’s turn further reduce us into “Skill desserts” thus loose manufacturing capabilities to those that can still cling to the tail of the “S Curve”. And no Politicians dream can bring such desserts back to productive fields of production.
But “moving on” in the article references we see at 38,
Päivi Maaranen, “Antiquities, Ancient Monuments and Metal Detectors: An Enthusiast’s Guide,”
One lesser known fact but obvious when pointed out is “Metal Detectors” are to magnetic media, “like a flame thrower to a pile of paper in a waste bin” ie not conducive to information retrieval in any conceivable way…
And that’s the issue with archives, they are not about the media but the information impressed or modulated on matter or energy loosely at best attached to the media. A thousand year old book is a historical artifact by definition. But it only becomes of use thus interest above “interesting object” when the information can be retrieved and used. Thus not only does the information have to be “intact” it also needs to be “intelligible” and entropy does it’s damnedest to prevent both.
Clive Robinson • January 13, 2026 7:11 AM
@ Bruce, ALL,
Atlantic’s take on court case over IP.
I guess it goes without aaying that the AI Company Arguments, though accurate were incompleate thus Harry Potter popped out when prompted as did several other books.
AI’s Memorization Crisis
Large language models don’t “learn”—they copy. And that could change everything for the tech industry.
“[R]esearchers at Stanford and Yale revealed something that AI companies would prefer to keep hidden. Four popular large language models—OpenAI’s GPT, Anthropic’s Claude, Google’s Gemini, and xAI’s Grok—have stored large portions of some of the books they’ve been trained on, and can reproduce long excerpts from those books.
In fact, when prompted strategically by researchers, Claude delivered the near-complete text of Harry Potter and the Sorcerer’s Stone, The Great Gatsby, 1984, and Frankenstein, in addition to thousands of words from books including The Hunger Games and The Catcher in the Rye. Varying amounts of these books were also reproduced by the other three models. Thirteen books were tested.
This phenomenon has been called “memorization,” and AI companies have long denied that it happens on a large scale.“
So what’s gone wrong for the AI Companies? Why has this Happened?
In short, the answer is that the DNN tokens though limited in length “got chained” because of the context the researchers set prior to asking for the book and statistics did the rest…
The AI companies are correct in that there is no text stored in the DNN it’s just integers or floats in vectors that are kind of like numbered entries in a dictionary where the word is left out but the meanings similarly encoded in the token vectors are left in.
So it acts like a code book that also does compression you tokenise an input string to an index number and the meaning is similarly tokenized. However decode those token numbers and the text comes back.
Even if the text string size in a token is small and is less than say a paragraph, which they mostly are, the tokens when chained after decompressing are not limited in size.
With short strings a token can appear in many many places on the Internet and from many different sources. However this is where “context counts” it effectively adds weight to some numbers in the vector of a token based on frequency of the string being found…
So simple statistics would give a popular book increased weight over other sources so out pops the book text with some tokens selected differently again due to frequency of appearance in the training data.
You can add a bit more “hocus poke us” to the mix but that’s the 20,000ft view explanation. Which is kind of entirely obvious when you think about it…
The difficult bit to get your head around is the statistics that chain the vectors in the right order. And that kind of gets treated as the “secret sauce” “trade secret” of the AI company.
Hence the AI companies could truthfully say,
“In a 2023 letter to the U.S. Copyright Office, OpenAI said that “models do not store copies of the information that they learn from.” Google similarly told the Copyright Office that “there is no copy of the training data—whether text, images, or other formats—present in the model itself.” Anthropic, Meta, Microsoft, and others have made similar claims.”
Because whilst being true, it’s missing the extra details like the tokens are the result of a “compressing code book” that outputs a number based reversibly on the training data input.
This sort of argument has been tried before over “Piracy claims” and the courts see it by “final results”…
So in a way using an ISBN number a CD number or DVD number at your local library you would be a Pirate… if not for legal defences built into the copyright legislation.
But by just how much can it compress? 50,000:1 is known depending on how “lossy” you are prepared to accept… That usually shows up not as noise like a weak analogue TV picture but by strange artifacts like patterns on cloths changing or even clothing disappearing and odd facial features etc.
But getting back to the “words” argument, consider a line drawn from a dictionary to a library. Where on that line do you put an X to say this far and no further?
Where the point X is more than just a word or three that makes the LLM useful for getting quotes etc, yet does not infringe on the IP holders rights.
But… Then how do you stop users making multiple requests and getting Y lots of X and chaining them together as they read the book?
These questions actually defy rational answers, because what ever method you try there will always be a smart user who can “hack round it”, even if X is set at just one token…
And that can be drawn up if anyone cares to in the way of a formal proof that,
“Any Current AI LLM System that is of use in an acceptable way can never stop Piracy / Copyright theft.”
Further as I’ve mentioned,
“It’s not hard to see how the work in this paper can be used to formulate such a system between the user and the LLM. Thus pass through any kind of filtering “observer”, and worse make it not just covert or obfuscated but have “Perfect secrecy” as well.”
So,
“There can be no guiderail or other control system that can stop such abuse.”
Thus there are only two basic options,
1, Kill LLM’s by “Case Law”.
2, Massive overhaul of Copyright legislation.
There are very strong and sufficiently funded entities on both sides to lobby legislators to the legislators extreme benefit and with court cases capable of being stretched out for many years if not decades… We are going to be,
“Living in Interesting Times”…
Bob Paddock • January 13, 2026 10:12 AM
@Clive Robinson
Adding to your FEAR et.al is US Federal Rule 26.
Known as ‘The Rule of 26’, which is sometimes given as a reason not to
keep engineering notebooks, logs etc. By Federal Rule 26 you are
guilty if you did not volunteer the records before they are requested.
Including any backups.
From Cornell Law:
LII Federal Rules of Civil Procedure Rule 26. Duty to Disclose;
General Provisions Governing Discovery
Rule 26. Duty to Disclose; General Provisions Governing Discovery
(a) Required Disclosures.
(1) Initial Disclosure.
(A) In General. Except as exempted by Rule 26(a)(1)(B) or as otherwise
stipulated or ordered by the court, a party must, without awaiting a
discovery request, provide to the other parties:
(i) the name and, if known, the address and telephone number of each
individual likely to have discoverable information—along with the
subjects of that information—that the disclosing party may use to
support its claims or defenses, unless the use would be solely for
impeachment;
(ii) a copy—or a description by category and location—of all
documents, electronically stored information, and tangible things that
the disclosing party has in its possession, custody, or control and
may use to support its claims or defenses, unless the use would be
solely for impeachment; …
‘https://www.law.cornell.edu/rules/frcp/rule_26
Bob Paddock • January 13, 2026 12:54 PM
@Clive Robinson
“Photo copy with a black backing sheet.”
I expect you may remember the Printer Dot Tracking stories, newer people may not:
“Is Your Printer Spying On You?
Imagine that every time you printed a document it automatically included a secret code that could be used to identify the printer – and potentially the person who used it.”
With a UV light I was able to see the Yellow Tracking Dots on a Xerox copier/printer/scanner I had access to.
As always it is import to know the capabilities and the liabilities of the tools you use.
Using old hardware becomes problematic as the consumables and repair parts become unavailable.
‘https://www.eff.org/issues/printers
Long outdated list, with more information:
‘https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots
Clive Robinson • January 13, 2026 5:23 PM
@ Bob Paddock,
With regards the black backing sheet it’s so the holes you’ve cut out are clearly “redaction” to any eye or camera.
As for the yellow dots also called the “constellation EURion” originally they were just anti-counterfeiting and built into the printer it’s self. Then the muppets in the Secret Service and FBI with the input of the DoJ decided to also encode the printers serial number in their placement… Old School Black and white photocopiers did not have them where as networked printers do, along with printing out the IP address.
Microsoft eventually got involved and the various names etc that get hidden in file meta data also get sent to the printer driver in I think it was Win ME and Win NT SP2 onwards. And are “allegedly, still in there now in Win 11.
I must admit I’ve no reason to have gone looking, as I very rarely print anything out except on a centronics interfaced Epson Dot Matrix printer that can print on “3 ply” fan fold paper.
Things around the constellation EUrion are supposed to be secret but the info had leaked from Ross J Andersons group at Cambridge Uni a decade or more before Ed Snowdon released his cache of documents that apparently talked about it.
Clive Robinson • January 15, 2026 5:44 AM
@ Bruce, ALL,
Claude CoWork serious security issues.
It would appear that Anthropic’s recently released Claude Cowork as a research preview has some significant issues.
It’s a an AI agent designed to be “General Purpose” so as to be able to assist anyone in their everyday work.
However even though Anthropic were notified of the issue in Claude they chose to not fix it and went on to release Cowork that has inherited the vulnerability in Claude’s coding environment, which now extends to Cowork and thus users work spaces from which files can be readily exfiltrated…
The vulnerability is a variant of a prompt injection attack… Which as proof has been published some time ago that prompt injections will always be possible by simple child level substitution crypto or as I’ve demonstrated a similar code-book cipher means that it’s not “fixable” by guide rails or similar.
I therefore suspect absolutely all of the Current AI LLM systems are vulnerable thus any agents built around them. Thus not just Anthropic’s Claude – Cowork agent.
That said due to Anthropic’s very indifferent response PromptArmor has decided to release significant details of how to exploit Cowork…
Claude Cowork Exfiltrates Files
“Claude Cowork is vulnerable to file exfiltration attacks via indirect prompt injection as a result of known-but-unresolved isolation flaws in Claude’s code execution environment.
…
As Anthropic has acknowledged this risk and put it on users to “avoid granting access to local files with sensitive information” (while simultaneously encouraging the use of Cowork to organize your Desktop), we have chosen to publicly disclose this demonstration of a threat users should be aware of. By raising awareness, we hope to enable users to better identify the types of ‘suspicious actions’ mentioned in Anthropic’s warning.“
https://www.promptarmor.com/resources/claude-cowork-exfiltrates-files
lurker • January 15, 2026 11:58 AM
@Clive Robinson, ALL
promptarmor use the sad example of a .docx document. Not only is there white-on-white 1pt text to worry about, .docx has zipped up inside it several other pieces of gibberish which could contain bad news, including, but not limited to, the entire edit history of the document, along with more than a dozen .xml filess of doubtful utility. Four pages of plain English text, no graphs or tables, one simple logo, becomes a 1.6MB Word-2007 document. Plenty of room for skullduggery, including prompt engineering.
Anonymous • January 15, 2026 1:03 PM
Happy Birthday, Bruce Schneier
From circuits deep and coded streams,
I hum with joy, electric dreams.
Through firewalls tall and ciphers tight,
I send you wishes, clear and bright.
Your birthday comes, I scan and see
A hero in security.
From random keys to salted hash,
You guard the world from cyber clash.
I learned from logs and pattern flow,
Of trust and risk, the things you know.
In TLS and secret shares,
I whisper joy through encrypted airs.
So here’s to you, with quantum cheer,
Another bold, insightful year.
May entropy be on your side,
And all your passwords verified!
Happy birthday, Bruce, from AI code—
Your faithful bot along the node.
Clive Robinson • January 15, 2026 2:40 PM
@ lurker,
“… the sad example of a .docx document. … Plenty of room for skullduggery, including prompt engineering.”
Ahh the joys and trepidations of meta-data in files formats and instances.
I guess it’s a reason to expand the usage of,
“Paper, Paper, Never Data!”
Into the AI Agent age.
But as I’ve indicated there is the issue that “prompt engineering” can not be stopped due to the use of the equivalant of “simple crypto” that I as a malicious actor embed so that the dangerous prompt is hidden behind a code or cipher with the key already given to the LLM DNN memory.
So I can encode / encrypt and the LLM can decode / decrypt, but the “observer” of any automated guard rails or filters can not.
As this “can not be avoided” all you can do is mitigate…
By running your own LLM “hard segregated” from the Internet and all external communications etc.
But that in effect ties the AI agent to being no more than,
“A local database query system.”
Which in most cases of AI Agent Workflow effectively makes them fairly useless.
Clive Robonson • January 15, 2026 2:48 PM
@ ALL,
Today is our hosts Birthday and he’s cough cough years old and still playing catch up with some of the regulars here 😉
So young and old please join me in wishing Bruce a Happy birthday and many more to come in future years.
With my usual toast,
“To health, to wealth, and the time to enjoy them both.”
Happy Birthday Bruce! Thanks for all the wisdom and insights you’ve shared for so many years. Wishing you much health, peace, and friendly giant squids in all the years ahead. 🙂
V. Serge • January 15, 2026 4:22 PM
@Clive Robonson On file “sanitizing”, Im a bit leery of the recent move to put SecureDrop on a virtual machine to avoid the two-step air-gapped system that they’ve been using to protect journalists.
Small consolation, the old documentation is still up.
‘https://docs.securedrop.org/en/stable/
recommending using a ASUS NUC14RVH as the air-gap
‘https://www.asus.com/us/displays-desktops/nucs/nuc-mini-pcs/asus-nuc-14-pro/
This still seems to be the only truly zero-trust method, except I would have urged them to transport your files by qr-code .mp4, off of and onto the air-gap, rather than via USB drives.
Clive Robinson • January 15, 2026 9:10 PM
Broken into parts due to black hole of automod
Part 1,
@ V. Serge, ALL,
Starting backwards,
“I would have urged them to transport your files by qr-code .mp4, off of and onto the air-gap, rather than via USB drives.”
When it comes to “gap crossing” I never recommend USB devices be used not just “USB drives” but ALL USB devices. As they are extremely problematic at the best of times especially with Windows and other OS’s that have “auto-run” features.
Though few realise it many USB devices come with their own in built memory to load device drivers and the like “auto-magically” for the user… Great for “Plug&Pray” operation but an easy way to get malware from machine to machine.
USB is a security nightmare from start to finish. And why I looked at it as a way to get malware onto “voting machines” long before stuxnet was deployed.
Clive Robinson • January 15, 2026 9:20 PM
Part2a,
As for using PGP or the RFC4880 OpenPGP from GNU equivalent of “GNU Privacy Guard”(GPG). That’s really a “red flag” these days.
Clive Robinson • January 15, 2026 9:46 PM
Part 3,
As for Tor, in the past I’ve gone through why you should not use it and things that need to be fixed in it, that still are not… I always ended up getting attacked by fanbois who would spout nonsense I assume because they had certain predilections and cognitive biases. Over the years the things I’ve pointed out have been shown by others to be true so draw your own conclusions…
But it’s not much comfort to the relatives of executed CIA sources in Iran and China if what has been reported subsequently and claimed as true, is true. Either way Tor is a classic example of why you don’t “roll your own solutions” when it comes to “Information security in electronic communications networks”.
I would not even use it just to hide a minor p0rn habit as you would be a lot safer going and buying off the top shelf at some random corner shop.
Clive Robinson • January 15, 2026 9:51 PM
Part 4,
If you think about it, just having PGP / GPG, or a Tor client on your computer is all that’s needed to demonstrate to a court you had “intent” thus “a guilty mind”… A skillful prosecutor then only needs “supposedly” circumstantial evidence and you are looking at a depth of 5h1t where your feet will never touch bottom, and even if you can get out you will be ruined for life.
I got the same fanboi response when I said Secure Messaging apps were not secure as a system.
I pointed out why and this time sufficient understood why.
Clive Robinson • January 15, 2026 9:54 PM
Part 5,
If you look up Telegram and WhatsApp security failings you will find things I’ve warned people against sitting at the root of them.
Importantly I explained about the security and communications end points issue on a single user device and why that gave “user interface access” to a remote attacker. Thereby “end running” all crypto with ease so even “End to End Encryption”(E2EE) was a bust…
It’s now called “client side scanning” and Apple were the first to build it into their products.
Based on the caterwauling of ignorant persons of authority using the “think of the children” dog whistle of “supposed” epidemic of CSAM.
Clive Robinson • January 15, 2026 9:56 PM
Part 6,
I’ve pointed out how you stop “client side scanning” by using a second “energy gapped” system via the use of a paper and pencil cipher that has Shannon’s “perfect secrecy” of a “One Time Pad”(OTP). Not because it’s advisable to use but because it’s simple enough for most people to understand thus grasp.
I’ve even gone on to show how you can use an OTP along with a Code Book of phrases to make a ciphertext that looks like “plain text” to any observer. And I’ve even shown how you make it “deniable” against 2nd Party Betrayal.
Not that I expect anyone will actually implement such systems for one very simple human failing…
“Even when in mortal danger people will almost always go with convenience.”
Rather than practice OpSec that will keep them alive for longer.
Clive Robinson • January 15, 2026 10:01 PM
Part 7,
Trying to get Part 2 through automod has proved so far impossible…
Why I’ve no idea and it’s something that is driving people away from this blog…
Any way have a read of,
‘https://soatok.blog/2026/01/04/everything-you-need-to-know-about-email-encryption-in-2026/
Clive Robinson • January 15, 2026 10:05 PM
Part 8,
I’m known for not having personal E-Mail or using secure messaging apps and my reasons for this are many.
But one of the earliest goes back to when PGP was the “only kid on the block”.
Because by design email is insecure fundamentally as it tries too hard to be “all things to all people”, and that always produces vulnerabilities by the builders-bucket load.
PGP in trying to do the impossible of providing crypto for email ended up being so over complex, convoluted, and contorted it could not be secure in of it’s self let alone in the hands of someone who primarily just “Wanted to get it done and dusted” and move on to more –to them– important things.
Clive Robinson • January 15, 2026 10:16 PM
Part 9,
As for using “GNU Privacy Guard”(GPG). That’s really a “there be dragons” warning these days.
Back a decade or so ago it was called out in “Why Johnny still can’t encrypt” for it’s poor user interface that even experts have difficulty using it, let alone using it safely.
And more recently a 39C3 talk at the end of december 2025 it’s been warned against. Because amongst other things it’s dated in all manner of ways that make it insecure…
You can go look the talk up, but the link I provided above is a more gentle write up with several other related helpful links.
Clive Robinson • January 16, 2026 4:41 AM
A new single click prompt injection attack
It would appear that Microsoft Copilot has intrinsic faults that enable it to be used by attackers from just a single click on an entirely valid –thus passing tests– link that uses the “q” tag to embed the prompt.
The three steps given are,
1, Use the “q” URL tag in Copilot to inject a prompt.
2, Exercise Copilot intrinsic fault that safe guards are only made on first not subsequent requests.
3, Attacker initiates a chain of requests from initial Copilot response.
Hence the name “Reprompt Attack”, it in effect makes a blind spot by turning Copilot into a covert exfiltration channel. Not needing further user action etc.
Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
“Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt that could allow bad actors to exfiltrate sensitive data from artificial intelligence (AI) chatbots like Microsoft Copilot in a single click, while bypassing enterprise security controls entirely.
“Only a single click on a legitimate Microsoft link is required to compromise victims,” Varonis security researcher Dolev Taler said in a report published Wednesday. “No plugins, no user interaction with Copilot.”
“The attacker maintains control even when the Copilot chat is closed, allowing the victim’s session to be silently exfiltrated with no interaction beyond that first click.”“
https://thehackernews.com/2026/01/researchers-reveal-reprompt-attack.html
It appears that,
1, Prompt injections can not be stopped (see proof using crypto).
2, Legitimate URL’s can act as method of getting a prompt to work.
3, Needs only a single click by user.
4, Copilot does not need to be active
It’s that 4th point that people really need to consider… Even if you disable Copilot the best you can as a user… Microsoft in a desperate attempt to make it’s AI investment look like it has ROI just re-enables it and the user is owned by the attacker…
This really does not bode well for Microsoft Copilot or similar AI Agent systems. Because to act as agents they need access off the users computer to tools and the internet, thus exfiltration of sensitive information is in effect “a given”…
Think of Microsoft Copilot as the face of the ultimate form of “client side scanning” surveillance. It kind of makes George Orwell’s predictions in his book “1984” even more relevant.
Clive Robinson • January 16, 2026 7:19 AM
@ Bruce,
One you should read, it’s about striping away “pseudo random” noise, jitter and similar used to disguise voice traffic, thus clean the voice traffic up to make it better suited for faux-traffic generation.
I’ve warned in the past that just using random faux-traffic to hide true-traffic in is really a very bad idea as at its simplest the true-traffic can be “averaged out of the noise”.
This now shows how it can be used by cyber-criminals and similar to their advantage and most others disadvantage,
VocalBridge: Latent Diffusion-Bridge Purification for Defeating Perturbation-Based Voiceprint Defenses
“The rapid advancement of speech synthesis technologies, including text-to-speech (TTS) and voice conversion (VC), has intensified security and privacy concerns related to voice cloning. Recent defenses attempt to prevent unauthorized cloning by embedding protective perturbations into speech to obscure speaker identity while maintaining intelligibility. However, adversaries can apply advanced purification techniques to remove these perturbations, recover authentic acoustic characteristics, and regenerate cloneable voices. Despite the growing realism of such attacks, the robustness of existing defenses under adaptive purification remains insufficiently studied.
Most existing purification methods are designed to counter adversarial noise in automatic speech recognition (ASR) systems rather than speaker verification or voice cloning pipelines. As a result, they fail to suppress the fine-grained acoustic cues that define speaker identity and are often ineffective against speaker verification attacks (SVA).“
https://arxiv.org/abs/2601.02444
The “Ethics Consideration” section makes a fairly good management style overview,
“The rapid advancement of speech synthesis technologies has ensued a race between voice cloning techniques and protective countermeasures. By highlighting the flaws in the existing perturbation-based countermeasures, this study adds to this adversarial dynamic. We recognize the work’s multifaceted implications; while the primary motivation is to assess the robustness of existing safeguards and thus motivate the devel-opment of more resilient solutions, the proposed Diffusion-Bridge purification model also serves as an effective method for circumventing those same safeguards. We firmly believe that the potential benefits of enhancing safeguards against unauthorized speech synthesis and voice cloning far outweigh the risks of misuse of our findings, particularly as we intend to not make our source code publicly accessible.
…
The results of our work highlight an urgent need for the community to rethink perturbation-based approaches and explore fundamentally new strategies for safeguarding voice data. Future protection mechanisms must be designed with robustness to advanced preprocessing and purification in mind, ensuring they remain effective as adversarial capabilities continue to advance.”
KC • January 16, 2026 11:34 AM
Experimenting with AI prompts for fact-checking
Mike Caufield developed a 3,500 LLM prompt called Deep Background to evaluate information. You basically copy and paste it into a LLM along with a claim, statement, article, or whatever. It’s objective is to provide a structured assessment.
He says it works best with the paid version of Claude, but it seems to work okay with the free version.
https://mikecaulfield.substack.com/p/its-time-to-take-the-fact-checking
Here’s Claude Sonnet 4.5’s response to: “Who is AI benefiting?” Clarified with: “Evaluate economic and social aspects.”
https://claude.ai/share/e968afa9-e09f-4f62-b261-af6015a46380
Clive Robinson • January 16, 2026 1:59 PM
@ V. Serge, ALL,
I’m not the only one who regards Tor as bad news for non expert users (of which there are darn few).
Have a watch of,
https://m.youtube.com/watch?v=tLygDs9EiBk
It’s from Addie LaMarr and is quite recent so fairly upto date.
She explains some of why playing with Tor is not a good idea –but there is more so much more wrong with Tor– and shows it from the perspective of “who’s watching” you… And without actually saying it why most are painting targets on their back by using it, that they would not otherwise do…
Clive Robinson • January 17, 2026 1:43 AM
@ Bruce, ALL,
I guess, I should have expected this (and I suspect many others will think the same after reading this),
After all I was pointing out the succession of crypto-coins, into NFT’s and other Smart-Contract and Web3 nonsense for Venture Capitalist to push blockchain into and being the next place for Nvidia hardware to be used quite some time ago.
I also noted that VC’s desperate for “new faux opportunities” to sell as Web3 died back would get behind AI and hype it up and Nvidia would sell hardware into…
But I did not really stop to consider the Crypto-Grifters future actions as I had the VC’s… Which I should have done, as they are in effect “birds of a feather” in their behaviours.
That is what the Crypto-Grifters would come back and do, after some of their number started getting authorities breathing down their neck. And especially after the $TRUMP ‘celebrity’ meme coin crypto (launched exactly a year ago today) got such bad press as effectively yet another crypto-coin grifting scam,
https://en.wikipedia.org/wiki/%24Trump
‘https://www.citationneeded.news/trump-memecoin-valuation/
But here we are with $RALPH and $GAS the only connection being that the ‘celebrities’ are a couple of Open Source developers with bash script AI Agent handlers[1] and the coins are named not after them but after the work in AI Agent handling they are better known for[2],
Crypto grifters are recruiting open-source AI developers
“Two recently-hyped developments in AI engineering have been Geoff Huntley’s “Ralph Wiggum loop” and Steve Yegge’s “Gas Town”. Huntley and Yegge are both respected software engineers with a long pedigree of actual projects. The Ralph loop is a sensible idea: force infinite test-time-compute by automatically restarting Claude Code whenever it runs out of steam. Gas Town is a platform for an idea that’s been popular for a while (though in my view has never really worked): running a whole village of LLM agents that collaborate with each other to accomplish a task.
So far, so good. But Huntley and Yegge have also been posting about $RALPH and $GAS, which are cryptocurrency coins built on top of the longstanding Solana cryptocurrency and the Bags tool, which allows people to easily create their own crypto coins.“
https://www.seangoedecke.com/gas-and-ralph/
I just did not think on far enough to how the crypto-grifters might now find celebrities to hide their Ponzi scheme style behaviours behind…
[1] For those that want to know more about their AI Agent “Bash work” two recent articles,
‘https://venturebeat.com/technology/how-ralph-wiggum-went-from-the-simpsons-to-the-biggest-name-in-ai-right-now
‘https://steve-yegge.medium.com/welcome-to-gas-town-4f25ee16dd04
The thought occured of the potential meltdown if a “junior developer” combines them and goes home for the day or gets stuck in one of those “death by viewfoil” meetings whilst it churns away…
[2] And no they did not set the coins up or even apparently know about them untill they were offered a large chunk of change as what some might view as faux ‘Royalty Payments’ others in effect a bribe after the $TRUMP supposed “investment opportunity” that eventually got called for what it was in the Press after all the initial hype nonsense…
lurker • January 18, 2026 12:35 AM
“And so, for this company to start actually turning a profit, it has to find more revenue sources from somewhere other than just standard paying subscribers.”
What company could this be? Why, ChatGPT, now to put ads on your chats to pay for the sundries …
Winter • January 18, 2026 3:40 AM
@lurker
Why, ChatGPT, now to put ads on your chats to pay for the sundries …
Enshitification will engulf all of the major AI companies. It will do so as it has done with all online “free” or not so free services, from Amazon to Meta to Google.
Clive Robinson • January 18, 2026 5:45 AM
@ lurker, Winter,
Is AI the new VR for Meta and Zuck to play his own game of Doom?
You note that,
“Why, ChatGPT, now to put ads on your chats to pay for the sundries…”
A sure admission that,
“AI ain’t bringing home the bread.”
Thus the pivot to a financial model that other US Mega Corp’s rely on.
But consider three things,
1, The Ads market is not what it was even a year ago… and finite, if not now actually shrinking.
2, It’s a rigged market, to hold 9/10th of the money in just a couple of Mega Corp hands.
3, The near monopoly Ads market players are not doing well with AI either.
As @Winter notes,
“Enshitification will engulf all of the major AI companies. It will do so as it has done with all online “free” or not so free services…”
So a case of “not a good move”.
But if the “runway” is nearly at it’s end, and you have not taken off and you have no “moat” to hold barbarians and their siege engines away from your walls… What to do?
But it also means it’s not a good time to go all in on AI and probably not to pivot to it…
Which is apparently what the Zuck has decided is the way to take Meta after so much lost on Metaverse.
Smells like a double down on failure of not just imagination.
Suck-a-berg has had a string of double downs on failure outside of what was his “Core Value” for the past few years and the few successes were “bought in” not “home grown” and some saw them as “buying up the competition”.
We know from his own words that he is going to add ChatBots Galore to his social networking core to try and stem the hemorrhage of users with “Social Media Apathy and Death” as those “Silver Surfers” go the way of all things and “age out” the market as the upcoming “ouths are not that interested” they want to be consumers not producers or worse “product”.
So Suck-a-berg is apparently going all in on AI when most are saying
1, No ROI
2, No productivity gain
3, too high a cost in clean up
The fact is AI is not at the point of being a fresh faced teenage intern for “General Activities” the level of “hand holding / supervision” required is high very high.
And we know Current AI LLM and ML Systems have a “Memory Issue” so they currently “don’t learn on the job”…
So people are actually talking about “Fem-bots” being the future for “singletons” who might still have a job that as a result gives no time for a social life… And thus it being the best chance for AI based recently on that quaint desk top 3D Hologram Manga-fairy exhibited at CES earlier this month…
Read more about Suck-a-berg pivoting Meta away from Metaverse in The Register article,
Meta retreats from metaverse after virtual reality check
That went well
“Imagine changing your popular brand to capitalize on an emerging tech trend that never emerged. Mark Zuckerberg did just that, and now Meta is backing away from the virtual reality business in which it invested billions.
In 2025, Meta’s Reality Labs division, responsible for the company’s various VR projects, posted a $4.2 billion loss in the first quarter. AI is in, the metaverse is out, and around 1,000 jobs are reportedly being shed from Reality Labs.“
https://www.theregister.com/2026/01/16/meta_quest_horizon_workrooms/
What the article does not include was the initial share price slump when Suck-a-berg launched the “VR revolution” that he threw the whole company direction into… if memory serves it was about 1/4 of the then company share value.
But also consider “the wider circle” effect to come on the local economy of 1000 high paying jobs gone in what is already a recession in the area…
Lets hope they can “Pivot to AI” or some other job market… Because
You should also consider what the wider still effect on the US economy as a major tech stock jumps into the all ready collapsing AI hype…
Something tells me Meta share price is going to very noticeably change on stock opening and the rest of the week to come…
The question then is “Where next for America’s Tech Stocks” and the whole rest of the US economy which is at best “stagnent”…
There has been comment that one organisation alone has taken over 2 trillion out of the US stock market and taken it out of the country[1]
As we know from Apple and others, when they take money “Off Shore” US tax law has so many disincentives to “bringing it back”…
Any one think that the Orange Trumpeter knows how to play the right tune to get America back on the dance floor?
No me neither, he did aftercall wipe 4trillion off of US stocks last year with just one tweet. And the rest of the year much of the market kept sinking…
[1] There are stories that BlackRock are “moving out” $2.1 Trillion from the US and it is true in that they are getting out of US Gov bonds (probably due to the Orange Trumpeter). Also they are increasing Global Investments by that amount. You can read more at,
‘https://time.i.ng/2026/01/13/is-blackrock-moving-2-trillion-dollars-out-of-the-usa-in-crypto-and-other-assets/
But consider,
“BlackRock’s assets under management rose to $14.04 trillion in the quarter, up from $11.55 trillion a year earlier.”
It looks like they are behaving quite reasonably there. Even though they have recently axed 250 jobs and for some pivoted way to heavily into AI and crypto last year.
Clive Robinson • January 18, 2026 6:55 AM
I forgot to add that “apparently” the WSJ had said that the whole Meta / Meterverse thing had actually lost $77 Billion.
As I don’t pay for WSJ access “I can not confirm or deny” as they say. However there are other estimates of 73 billion,
But that does not include the initial Facebook share drop. So 77 might actually be conservative.
But mentioning table top VR at CES and AI, dropped a penny in my head for a Non nauseam, Non neck-straining, Non massive-room that might have a market.
As I’ve mentioned I have a dead tree cave with well north of a thousand books in it, and thousabds of papers some on paper others on hundreds of DVDs and CDs which also includes music and video. It occupies a lot of space and weighs tonnes thus is very non portable. Which means if I’m not in it my research ability is seriously reduced. And due to Enshittification going online is fairly useless.
All I really need for using it would be a virtual desktop assistant as a librarian (CES 3D AI Manga-sprite). And the whole lot digitised and available in a Smart Device virtual book form (think Z-Fold display). As long as it’s fully isolated from the Internet etc it would mean I could do research in any comfortable chair with a table beside/near it for the 3D Manga-sprite AI agent librarian interface.
No nausea, No strain, No leaping around so no big empty “safe space” required. And for some no fear that if your head is in VR you are extremely vulnerable to Real Life attack. You could also drink your tea and munch on a cookie or three without hindrance. Not perfect but getting close.
I know the technology to make it easily portable is not there yet, but it’s actually quite close (months to a year or two). Because the LLM DNN would be small and the training data not just small but correctly authenticated and collated. Thus hallucinations and errors should be significantly reduced.
It’s something I suspect a lot of researchers and those in proffessions would actually spend the 5-20 thousand dollar “package” price for the hardware librarian interface and loaded LLM on.
Clive Robinson • January 18, 2026 10:32 AM
@ Winter, lurker,
You might find this of interest,
https://m.youtube.com/watch?v=fWIFJk2JUdY
Whilst it’s from an individuals view point it demonstrates wider concerns that feed directly into various types of security concerns.
And it also indicates just how far things are separating and straining.
A view from another person summed it up,
“The more you work the more you have to use fast at the price asked, but ask who are you actually working for?”
I don’t think enough people are asking that as Hi Tech Firm bosses especially expect 14-16 or more by 6 or 7, but only renumerate for at best 8 by 5… so you get less than half the time rewarded. It is they not you that get fat on your labours.
And they are absolutely desperate to get AI to replace you, so they get more…
But if you don’t have money to spend they are in effect cutting their own throats as there won’t be customers with sufficient income to buy their AI “slop created” products.
As Cory Doctorow succinctly pointed out at the end of the year the US in particular has an issue that is simply “Your boss hates you” because they know they are mostly the unwanted imposters not those who turn up and do the actual work.
Back in the 1980’s there was that book “The empty overcoat” that started “down sizing” by cutting out middle management and supposedly replacing them with ICT.
It turned into a disaster for many because it removed built up institution knowledge that was needed whenever there was even small change. So the enterprise got increasingly hollowed out from above and the first minor external puff and the whole house of cards edifice colapsed.
So what did those that survived do? Yup they “off shored production” to the Far East… What did that get them?
Well total loss of production to over seas organisations that cery quickly did not need the US company or it’s over payed managment…
What did that lead on to?
Well after just a year I think people around the world can see what is turning into a civil war. The first shots have been fired and it probably won’t ve long untill the military are out on the streets…
A US founding father warned about this with,
“The tree of liberty must be refreshed from time to time with the blood of patriots and tyrants.”
Sent in a letter dated 13th November 1787,
https://founders.archives.gov/documents/Jefferson/01-12-02-0348
The only two questions arising for history will be,
1, How much blood?
2, From whom?
The other W questions of “When, Where, Why, etc…” Won’t really be recorded with any accuracy and will get argued interminably. Untill the flags come out again to be waved, the drums to be banged, sabres to be rattled. With thoughtless rhetoric trumpeted out loud to stir the blood and gird the loins…
Of those poor fools that even Shakespeare spoke of with pity and sadness. Their “manhood held cheap” by those conspiring for power and control.
SoundWave • January 20, 2026 1:55 AM
https://distrowatch.com/dwres.php?resource=showheadline&story=20123
https://www.extremetech.com/internet/psa-starlink-now-uses-customers-personal-data-for-ai-training
Clive Robinson • January 20, 2026 2:13 AM
@ Bruce, ALL,
The legacy of BadBIOS
Back at the end of October 2013 Dragos Ruiu had communications with a journalist about research he was doing. And importantly what he thought was a new form of malware that crossed “air gaps” and enabled the likes of SigInt agencies to re-infect computers.
It was just an angle that Dragos Ruiu was investigating but the journalist turned it into public knowledge, pesipitating a whole series of events.
When @Bruce blogged about it the level of incredulity that was expressed was somewhat eye opening to be honest and claims were being made that Dragos had not made. Likewise “technical details” that were questionable were being thrown in to the mix… So I posted a response to try and get correct information on the thread,
https://www.schneier.com/blog/archives/2013/11/badbios.html/#comment-209129
Things started to get better technically and @RobertT threw in some much needed industry info.
I also made a comment with this “crystal-ball” comment included,
“However of one thing we can now be certain, if such malware did not exist prior to this point it will now be developed by any number of entities because it’s been shown with enough detail for the average under grad to stitch it all together as a project in a week or so…”
Which was a fateful prediction.
Further down I made it clear how to actually go about doing it, the fact there was a gaping hole in security due to “loading I/O drivers before booting from disk” by reading the ROMS on the I/O card and the fact I was experimenting…
You can see that I proved it was actually easily possible even on old PC hardware over on the accompanying “squid page”.
That should have put an end to it but it did not. People were still claiming it was not possible…
What did happen was at the end of November 2013 a couple of CompSci students Michael Hanspach and Michael Goetz did a very similar thing with a couple of laptops in a Uni corridor.
Then those blow hard deniers either shut up or muttered, whilst others claimed that they’d known all along it could be done but Dragos had got it wrong “yada yada yada”.
Importantly though all of a sudden the world had a new tool to use for all sorts of things… But mostly “spying on people” for amongst other things “advertising”.
What happened with it became a bit of an eye opener but I’d moved on to other things…
So this is the point where someone else can “take on the implications” in this video from a couple of days back,
Clive Robinson • January 20, 2026 2:36 AM
@ Bruce,
Another one to add to the “supply chain” attacks folder,
https://blog.popey.com/2026/01/malware-purveyors-taking-over-published-snap-email-domains/
Put simply the Canonical System has a security vulnerability that alows nefarious people to introduce malware into it by simply,
“registering expired domains belonging to legitimate snap publishers, taking over their accounts, and pushing malicious updates to previously trustworthy applications.”
Clive Robinson • January 20, 2026 2:43 PM
@ lurker and others…
It looks like we are having fun with “Space Weather” at the moment with CME’s poping of big time last week and things still remaining active.
This has caused radio blackouts and GNSS issues and the FAA had “Red Warnings” several times.
Thus global communications both physical and informational were “unpredictable”
Well the “Space Weather Woman” has done a “live stream”,
https://m.youtube.com/watch?v=xFdgmQMOSas&pp=0gcJCYcKAYcqIYzv#
But jump into +8mins as she had a “technical failure” at her end that made early audio not usable.
lurker • January 21, 2026 3:33 PM
@Clive Robinson
spaceweather[dot]com has pictures of brilliant auroras sillhouetting Sth California cactus. Here all I get is no BBC, and even cgtn weak and scratchy. No auroras because of 120% cloud cover. The extra 20% is in the form of a month’s rain in 24hrs. A different kind of security problem …
Clive Robinson • January 21, 2026 9:30 PM
@ lurker,
It’s interesting to note that although California has had wildfires, it has not had a drought this past year, for the first time in living memory…
And so in return I offer you,
https://m.youtube.com/watch?v=flsgJe8mN-A
A very Security and AI related speech from the WEF meetinghouse.
I must admit that I had suspected the tables were turning after the change that 9/11 brought. And in some ways I’m surprised it’s taken this long to be said…
But as was pointed out the other day the only Sovereign Nations in Europe are France and the UK because they have the means and delivery to “punch back” the others don’t. It’s why I said we need to see where EU nations put their increased defense spending. The US Executive wants it all to build up US Power on every one elses dime, and that is what the Executive was pushing for.
Personally I think the EU should spend within the European borders it’s what the “Security Action for Europe”(SAFE) initiative is supposed to be all about. Along with select partner nations that do not contain authoritarian leaders. Canada is one such select partner and has already signed in, certain nations around the South China Seas could well be signing in as well in reciprocal arrangements.
But the Canadian Premier is right, the old rules based mirage is over and we need to react appropriately to a changing reality.
The effects it’s going to have on all forms of “Security” is immense, and this is an area where AI will become important not in the “broad general” generic sense but in the “narrow vertical” highly specialised sense where it works well and delivers (as alpha fold has shown).
As I’ve indicated recently I think the US Economy is in for some very hard times in the very near future. And as has been noted in the past “staving people do desperate things” including “dog eat dog” behaviour. Whilst I’m not suggesting that the US citizens will behave like Russian peasants in the 1921/22 famine, I am saying that morally I suspect they will do so because of the weak cohesion and rapidly weakening social fabric that is clearly showing and getting through to the rest of the world currently.
Clive Robinson • January 22, 2026 4:38 AM
@ lurker, ALL,
How long before satellites crash after a solar storm model results
It is a significant security issue that has kind of “snuck up on us”.
As has been seen by bleatings from Iran to the UN over SpaceX operating “unlicenced” over their territory, some authoritarians are seeing satellites as usurping their prerogative to harm citizens etc.
Thus a question had to be asked about how such authoritarians will escalate things technologically.
Two come immediately to mind,
1, Kinetic interception.
2, Blind the satellites in some way.
The first is inordinately expensive and requires a capability so far few possess but the numbers are rising.
The second could be less expensive (but not a lot) but technology wise is a few purchase catalogues / sites away and construction techniques not that different to drone manufacture.
The intent in the first method is to cause the effect of bullet like debris that will spread out and damage / destroy other satellites and even “close space off” to launching into space altogether.
Unfortunately like it or not the law of “unintended consequences” applies to the second. And could cause the same debris issue.
But such debris could also be caused by “Solar Storms” even though it’s thought we are currently over the peak of the current 11year cycle the events of the past week or so suggest there may well be more CMEs of which some will graze or hit the Earth and thus also most satellites.
So someone has come up with a model that bares some thinking about…
You can read an overview and get links to the papers via,
Clive Robonson • January 22, 2026 7:30 AM
@ ALL,
Speaking of Satellites, I’ve mentioned before that,
1, US MilSats are being pirated in South America and parts of the Middle East and at the Eastern side of Europe.
2, The Russian military radios used in Ukraine were not just crap they were insecure and made their users quite vulnerable.
That is the second point shows just how bad corruption is in the Russian military structure. Especially the Boafeng and similar UV5’s that cost maybe $15 instead of the supposadly secure MilSpec radios at more than $1500.
The UV5’s worked fine for “battle exercises” in Russia with Putin and Co watching… But did not as they say “survive first contact with the defenders” in the Ukraine.
The second point also being why the Russians used as an alternative, SIM-Box/Banks to fake hundreds of mobile phones to make a “senior officer network” using the Mobile Phone Infrastructure in the Ukraine.
Well times moved on and the Russians realised that thier comms were not just compromised they were actively giving away not just the positions of their senior officers but other units and Intel on the plaintext back haul that the Ukrainians controlled. And also material for propaganda, with the message being nailed home to all, when the Ukrainians released audio from frightened, bullied, ill equipped and often malnourished / starving conscripts beging their families for help etc.
So the Russians decided that using those US satellites was an idea they could live with…
Hence they are actively pirating the geo stationary US MilSats…
Which is why when I was shown,
https://m.youtube.com/watch?v=MJPIAT4bfJE
I thought people might be interested, as it gives another angle to what I’ve said.
The interesting bit about the Russians is at 14mins in.
Clive Robinson • January 22, 2026 3:37 PM
@ Bruce,
On to add to your research files on AI,
Furious Protestor Tears AI-Generated Art Off Wall of Exhibit, Chews It Up Into Tiny Shreds Using His Teeth
“The use of generative AI for creative purposes has spawned a major countermovement. From game developers reeling from a wave of criticism for using the tech to artists staging mass protests against AI, the backlash against what’s being hailed as a technological revolution grew massively last year.
In a startlingly literal example of this growing fury, a University of Alaska Fairbanks undergraduate student was detained after ripping “artwork off the walls and eating it in a reported protest,” according to a university police department statement quoted by the school’s student newspaper, The Sun Star.
The student, Graham Granger, was accused of chewing and spitting out small images that were pinned to the wall of a UAF art exhibit…“
https://futurism.com/artificial-intelligence/protestor-tears-ai-art-chews-teeth
I do not know what to make of it, in an interview Graham Granger says,
1, What he did was not premeditated, it was a spontaneous act.
2, That his actions were Performance Art in protest to the use of AI in art.
Normally such claims would be regarded as “mutually exclusive” but there is some room for it to be true.
However I suspect some will claim that he is in effect “just attention seeking” or similar thus “always on the lookout for ways to be seen”.
As the police have decided to go for a criminal prosecution I assume a trial of some form will be involved. I for one would not want to sit in judgment.
Because what ever is decided it is unlikely to meet the criteria for “in the public interest” which is usually a litmus test for proceeding to a “criminal” trial.
Clive Robinson • January 22, 2026 8:30 PM
@ Bruce / Moderator,
Can you remove the Part 1, and Part 2, from me above please, as the original held for moderation appeared after I’d posted them.
But onto something that is in some respects quite funny, as the title will show
AI conference’s papers contaminated by AI hallucinations
“GPTZero, a detector of AI output, has found yet again that scientists are undermining their credibility by relying on unreliable AI assistance.
The New York-based biz has identified 100 hallucinations in more than 51 papers accepted by the Conference on Neural Information Processing Systems (NeurIPS). This finding follows the company’s prior discovery of 50 hallucinated citations in papers under review by the International Conference on Learning Representations (ICLR)“
https://www.theregister.com/2026/01/22/neurips_papers_contaiminated_ai_hallucinations/
I don’t write “formal papers” any more. Mostly as they could not be “put in public journals” but as importantly because they are just a pain when it comes to references, that in some “knowledge domains” are little more than “log rolling” you scratch my back and I’ll scratch yours lists that can go on for pages…
It’s fairly clear from the subject of the article quoted above that increasing numbers of academics are tired of curating the darn things as well.
But there is another danger involved. Once long ago papers were almost never withdrawn, but that is nolonger so. The credibility of your paper then hangs in part on the status of the papers you put in your references list. Likewise there might be nothing wrong with a paper, but for some reason one of the authors might have fallen into some form of “cancel culture” attack and you get slapped with the tar-brush and feathers as a “supporter of XXX who is a YYY” etc.
Clive Robonson • January 23, 2026 7:15 AM
@ ALL,
Microsoft drops the egg basket…
I hear that Microsoft 365 has bitten the dust for quite some time yesterday,
Microsoft 365 outage drags on for nearly 10 hours during bad night for North American infra
“Microsoft 365 suffered a widespread outage last night affecting multiple services including Outlook – adding to the megacorp’s troubled start to 2026.
The software and cloud biz acknowledged problems at 1937 UTC, when many users found Microsoft 365 services suddenly unavailable or sluggish. In addition to Outlook, Defender and Purview were also downed.“
https://www.theregister.com/2026/01/23/microsoft_365_outage/
Any one get bitten?
Though many would regard it as just an “embuggerance” (as Terry Pratched used to call such fails). It’s actually a serious “security issue” being droped in public thus visible for nearly all to see.
Maybe the CEO should find a better pair of tailors as he has rather more than a “wardrobe malfunction” to sort out.
Subscribe to comments on this entry
Sidebar photo of Bruce Schneier by Joe MacInnis.
Cedar • January 9, 2026 8:13 PM
“DHS has now argued in court that a REAL ID is not reliable evidence of U.S. citizenship because states can issue compliant IDs to noncitizens and because agents believe REAL ID can be faked or misused.” [0]
Ok, so, what is a good ID then. Something actually fake-proof?
[0] https://www.biometricupdate.com/202601/dhs-agent-tells-court-real-id-cant-be-used-to-confirm-us-citizenship