Christopher g iq option
I m strongly opposed to any laws against using smartphones or even blindfolding while walking. Reason Such laws would hamper the process of natural selection. In fact, I m all for opening many covers of manholes on sidewalks. Re War Footing With million of lives nearby at stake, powerful EMP pulse weapons would drastically limit retaliation. The follow-on phases can proceed within minutes.
all models are wrong, but some are useful. the particular model behind LTCM won a Nobel prize, but their wipeout almost took down the financial grid. Clive has done an excellent job of explaining the limitations of various models e. the key to success is understanding the limitations of your models.TOR again and again.
to be fair, the Black-Scholes model almost certainly was applied incorrectly, but there also were errors in modeling of risk, which is the substantially same thing as models of pricing statistics. in Austrian economics, the time value of money is a signaling mechanism from savers to businesses about future demand.
it is quite difficult to make sound business decisions where the time value of money is set by liars, thieves and murderers. I forgot to include these yesterday. distorting those signals via non-market mechanisms essentially is the same thing as disseminating fake news. here s todays crop. I m including the space link because I realized yesterday that offering satellite launch service creates an opportunity to inspect and modify the encryption hardware.
the theme of today s commnts is quality of information signals. that was discussed a lot in the late 1990 s when a failed Chinese launch of a US satellite had the encryption module go missing. Police State Watch. further proof that the FBI are dirty Judge balks at FBI s 17-year timeline for FOIA request Politico.
Hackers break into voting machines in minutes at hacking competition The Hill. Trump Transition Tillerson Mulls Closing War Crimes Office American Conservative. JG4 and others with an interest in alternatives to coal and nuke energy. Unsurprisingly the Koch Brothers get a dishonorable mention, as does Trump and UK PM Therese May. You might find this articles from the UK s Guardian about Al Gore and his new film of interest.
Also Bush and Putin and one or to other well known names. Better 2nd try at 02 33. thoth, more manipulative quasi-reasoning, in this case labeling, to wit, fanboi-ism, defined for your purposes as any statement inconsistent with the Beevis-and-Butthead Golden Stickers huhhuhhuh-huhhuhhuh-huhuhhuh ridicule campaign, which to be fair was funny the first four hundred times or so. Arbitrary state interference with Tor is an inductive question, since it may or may not be succeeding at any given time.
But the notion that acting to defend your privacy just gets you in trouble, or flagged, or something vague and ominous, that s just standard cop-level scare tactics. The fundamental thing that makes you come off like a government propagandist is the fixation on impugning elements in isolation. When you know that reliability is a complex function of parallel and serial components, and that complexity can work for you or against you.
When you know rational persons use multiple social and technical privacy protections in diverse combinations. It may not be bad faith, maybe it s just ego-involved debate stuff, but you re talking like nobody knows that assemblages have emergent properties, so it won t occur to them if you don t say so. That can either be dishonest or dumb. Either way it fails to make the case.
A couple of links that may be of interest. Did you know that the father of information theory, Claude Schannon, also had an interest in using physics to predict where the ball on a roulette wheel would land. Or that he and a graduate built what is possibly the worlds first wearable computer to exploit it. I have an interest in satellites especially micro or CubeSat satellites that get used for scientific tests and act as radio realays for those ordinary citizens who hold Ham Amateur Radio licences.
Well things have got smaller such as large postage stamp size some call NanoSats. Fun as they sound, you have to remember they are moving at a similar speed to flakes of paint that have shot through the aluminium skin of other space vessels, so they are potentially quite deadly. Possibly true. But their computers can t match Narnia and George developed by Kieth Taft.
Shannon and Thorp surpassed Taft in theory, physics and mathematics, but they were no match to Kieth Taft s electronics wizardry and innovation in the field. Only Narnia would fair well against the rigged shufflers of today. I hinted at that to ianf a while back, then again here, but he didn t bite. If you play at casinos, you are being cheated, and legally so. Because regulators aren t well versed on how Random number generators work, or more importantly how the random output is used.
Either that, or they re in on it. so they are potentially quite deadly. All you have to do is search for patents of a famous shuffled brand. Learned a few things and a couple of new words. Fascinating topic. So long as the sprites are lower than 400 miles, it s all good so they say. Scientific American and Discover were my two favorite publications until the mid nineties. The golden stickers animus could be based on a particular set of occupational blinkers. Ab proboscis, as the most articulate advocate, makes it clearest.
Joanna Rutkowska distinguished at least three approaches to security correctness, isolation, and obscurity. Ab proboscis is the apostle of fundie correctness. Christopher g iq option would certainly be nice. But Rutkowska, taking the pragmatic approach of a person for whom the computer is a means and not an end, has looked at the world as it is today and chosen to compensate for deficient correctness with isolation and obscurity.
That may be why Snowden, who was pragmatic enough to make fools of the NSA, has chosen to make use of it. Let us hope, for his continued survival, he uses it judiciously and supplements it and complements it and tinkers with it to make its many weaknesses idiosyncratic and harder to exploit. As everyone knows, it would be dumb to rely too much on any one technical expedient.
That brings us to the strange part of this reasonable insistence on correctness the name-calling. Fanboi-ism, humpty dumpty bang bang, incantations, social vodoo. No matter how much you make fun of them, people are going to defend their right to privacy and association and information and expression. That line happens to support DoJ s propaganda campaign of scaring people away from all technical privacy protections.
What purpose is served by ridiculing a caricature. It raises the question, Whose side are you on. I m unclear on what Roger s actual point is. If there are only a few hidden services and thus the dark web is in fact non-existent then a that is very bad for Tor generally because hidden services were one of the main motivating factors for keeping Tor going after the US Government abandoned it. Seriously, come on Roger, do you really mean to suggest that whole game plan all along for Tor was to serve as super secret backdoor into FACEBOOK.
Or maybe Roger means to imply that while maybe Facbebook isn t the past it s the future so everyone should be prepared to kiss Mark Zukerburg s ass as he runs for President. b and if any of those are the case what the hell is the team doing on their much vaunted work to improve hidden services so that they actually work. Is this more frosting on the cake to make the honeypot sweeter. Reading between the lines what I hear Roger saying is people, relax, you don t have to worry about Tor because under my leadership we messed things up so badly the whole project has failed its mission.
If you say so Roger. How immensely funny you are. Maiming my nick and using for yourself the name of a colonia dignidad sadist who is accused i. of child abuse. How cunning. Of course that lends lots of credibility to your trying to paint me as an nsa affiliate. Isolation as a replacement for correct software. Unfortunately, you are less smart wrt. Didn t it strike you that isolation must be based on safe code, too, to work. Plus an attempt at argument by authority.
Rutkowska who all but abandoned the oh so great and secure and game changing project I m impressed. Bend it any way you like, fact of the matter is and stays that IT safety and security are vitaly depending on verifiably correct underpinnings and building blocks. Without that you can incantate your Rutkowska. humpty dumpty bang bang all day long in vain. Have a nice day in your voodoo temple.
We need Voodoo Stickers too besides Golden Stickers. Next Hoilydays inspiration would be Voodoo doll christopher g iq option. It is funny that isolation would do the trick and we have a ton of so-called security isolation and one very good example is ARM TrustZone especially the Qualcomm s QSEE implementation of the TZ. Yes it does security isolation and all that TZ Voodoo and what we have up till now is still holes in QSEE s secure isolation mechanism. We can try to raise awareness of the problems we discover or noticed but nobody cares and some might even start calling us out.
Not worth the effort. Let them continue uninterrupted in their Voodoo Golden Stickers dreamland. I was referring to the historical, current and future security vulnerability of the client devices and the authentication servers. This includes operating systems, applications and the hardware in itself. Patching these is like a whack-a-mole game, as soon as you do one, there s another patch that you ll need to install.
Open or closed source software makes know difference when it comes to vulnerabilities, it never did. And here we are looking for secure authentication, when the platforms in themselves are not secure. In my view, implementing secure authentication should start with securing the platform first. These vulnerabilities allow program logic errors, buffer overflows, man-in-the-middle, or its derivative of the man-in-the-browser, based attacks that can circumvent any authentication method, including SecurID, PIN, biometric, etc.
I believe Ben A posted a news on the TZ exploit news in the first post above and I have refused to answer since I see no point in discussing it here these days. In which case, the password based authentication could be just as good as any other type of authentication. There s a reason why password had survived any other authentication methods. I doubt that beyond the authentication servers on hand, there s an active effort from either parties to do that.
Especially, when more than a billion stolen UID PWD available on the web for download. A for googling your new nemesis knew you would. another sort of stereotypical Tor user. However, citing Rutkowska is not argumentum ad verecundiam. She s not an authority, she s an example of how engaged users go about their business. So in dismissing her, you assume away all the actual human rights defenders who can t wait for your EAL 8 utopia. What exactly do you do for them, other than making fun of them.
Thoth s very good suggestion of OpenBSD-Tor is a case in point. Why hasn t anyone put an iso up on github. Where are the OpenBSD Qubes templates to go with the unikernel firewalls already in place. OpenBSD is a pain in the ass. The features of OpenBSD that make it catnip for hobbyists make it useless for civil society. That s because if your starting point is not human security, all this perfectionistic work is pointless wanking.
Thiel needs MUCH more public scrutiny. I don t care if they make it illegal or not, jay walking laws have not stopped jaywalking. What I want is like a stand your ground law for anyone the varmints walk into, and then have the gaul to blaim the person who was not beying a jacka55. Obviously I don t want a throw them under a bus law, because that has other side effects. Just a law that alows me to take a bit of indignant action to make them realise that.
A, they were being totaly gormless. B, that gormless behaviour can hurt. Though I do like the idea of open manhole covers, and perhaps a few low hanging branches or signs. If they don t get feedback that certain actions are not to be taken, then there is no incentive for the gormers not to do them. There is that old saying about Children and fools should not play with sharp edged tools. Whilst I would not wish to lop off their texting finger perhaps a little twisting to give a sharp reminder, much like the old story about children and hot things.
After all it is the T sensor that indicate pain when we over reach and cause the autonomic snatch back drop action is we touch something hot. Obviously it follows that pain is part of the natural learning process for dangerous activities. So why should I not administer a little pain to a gormer that walking into a six foot six guy on crutches is not a risk free activity.
Oh and the reason for pain not removal from the genetic pool is so they can show their injuries to their friends who are just as likely to be other gormers and hopefully they will learn with out me having to go to the effort of teaching them the hard way. I am shocked. surplus voting machines purchased in secondary markets like Ebay were made available to security researchers Defcon organizers revealed that many of these machines arrived with their voter records intact, sold on by county voting authorities who hadn t wiped them first.
The Defcon hacking team plugged in a mouse and a keyboard which didn t require authentication and got out of the voting software to standard Windows XP just by pressing control-alt-delete. The same thing you do to force close a program can be used to hack an election. Sometimes technological advancements are due to less celebrated persons. Roger Baldwin, Wilbert Cantey, Herbert Maisel and James McDermott long known by blackjack insiders as the nearly mythical Four Horsemen. BaldwinWilbert E.
CanteyHerbert Maisel James P. Earlier article on Thorp, Shannon, and their computer. Me bewildered. I always assumed that golden stickers are voodoo stickers, albeit glorified ones. Story of four US Army enlisted men who derived the blackjack strategy later used by Thorp. So, I was wrong, and my awsomely sakkure system running in a browser plugin running on lisux-d is not secure with golden stickers alone.
I had expected min. 115 bulletproof sakkurity from your cards. Allow me to guide your attention to the proposition that doesn t christopher g iq option - they will learn. A quick look at a vulnerabilities ticker or db seems to strongly support my doubts. After 2000 years going at it, the smart bulbs should know that only love and education- can save us. Hatred should be outlawed. Peace and cryptos to all. The reason why OpenBSD hasn t been used as the basis for Tails if probably political.
OpenBSD is OS non grata in the US since the remarks of Theo de Raadt about the Iraq war. He was right of course but that doesn t matter. OpenBSD got black flagged. Since Tails is a US gov financed project they just aren t allowed to use OpenBSD. At the time that Qubes started OpenBSD didn t have virtualization. Err no it s not good, but it is reasonably predictable, which is second best by a long way but usable.
And why OpenBSD hasn t been used in Qubes is pretty easy. Put simply, at 400miles or less there is sufficient atmosphere to have significant orbital drag. Thus the orbital time is short and measured in weeks not years, and the number of orbits is likewise limited. Which means any accumulated error remains small, and they know where they are so they warn the appropriate people so they don t launch a rocket through their their orbit.
Hopefully avoiding all that is up there. Further if there is a Collison and lots of debris, it to does not have time to cascade out before it burns up. I suspect we will see two or three new prefered orbit hights below Low Earth Orbit to alow for experimental satellites like these NanoSats sprites. Such projects will be collaborative between different faculties such as aerospace, electronic engineering, physics.
The data collected will have real research value but will only be for a short lived period. Just to show how daft it could get there is no reason you can not strip the guts out of a modern celular phone, replace the radio with something more appropriate and stick it up in orbit with a bar magnet or similar to stabilize it. The lowest of which will be for vanity CV satellites designed by grads and post grads so they have a project they can talk to prospective employers about.
You would need a mechanism to flip out a couple of solar panels but that is not realy any more dificult than for a coiled wire UHF dipole antenna. The odds are better than even that the electronics would still be OK after a year in low earth orbit. Most modern phones have two cameras which point at. I need voodoo stickers, too. 180 degrees to each other. The lower resolution camera would probably be sufficient to take Star Sights to reasonably accurately identify what point on the earth the other camera is photographing.
If you replace the lense on the earthwards facing camera you could get night time near IR photographs of earth. Thus 500-1000USD of hardware. But youl d still be looking at many times that in launch costs. 4000USD Kg of total weight on the pad, plus a heap of other fees, licences, duty etc. However the sprites NanoSats are around 30g, you still have the launch and deployment hardware to consider. But a casset style launcher, or even heaven forbid one that works like a light weight clay pidgen launcher could be made with well under a Kg of materials.
So you could be looking at launching a sprite or NanoSat for as little as 200USD each, if you know how to avoid the other fees. Which kind of makes student satellite projects viable. Indeed, that no virtualization yet was one reason. Gerard van Vooren. Another reason which is at least very highly likely, is that the gov. like pretty much always see e. After all, it would be rather strange when the worst of all eavesdropper and cracker of all, the state, would provide real security to it s citizens.
And why should he. Most seem to be perfectly happy with some theater and feeling safe. Re texting walkers I m not a fan of texting and I avoid it whenever possible. tsa doesn t want or at least not provide real security but rather security theater; it s not about security but about making people feel secure. Voice can communicate more information in a very short time. I found that some social engineering can reduce the amount of BS texting by not responding immediately, if at all.
The advantage of having text data on ones phone can be useful, but is overshadowed by LE IC love affair with having all that data in machine-readable form. Note Christopher g iq option might be required if the textor is your loving partner spouse. You might try just for laffs carrying one of those compressed-air-powered horns that sailors use. They can be quite small, but -really- loud.
In my case, there d be the Devil to pay, so to speak. You could rig it inside a bag, so it s invisible to others. It needs to be made for daylight use, that is, extremely bright. Another possibility is a hat with a forward-facing flashing light. was this posted last weekend. it s quite a story. I knew that Thorp was in Boston on the MIT campus at some point maybe because one of his coauthors was therebut I missed the fact that he rubbed shoulders with Shannon, Feynman and Buffett, until last week.
There was a good book about the kids from MIT who taped wads of 100 bills to their bodies to fly to Vegas. That was much more recent than Thorp s work, but clearly part of the same intellectual lineage. I must have missed the discussion of Taft in 2015, because I would have offered two books by Thomas A. Bass, The Eudaemonic Pie and The Predictors I remember both being entertaining reads, even though I read the first about 25 years ago and the second about 10 years ago.
Just say no to 8u1154it Not sure why I think that I ve mentioned those books before. It could have been under my previous names. I think that there were only two that evolved, John Galt III and John Galt IV, which I eventually abbreviated. It will be easy to see that I ve become somewhat less rabid in recent years. There is little to worry about the boomers rioting over health care and pension payments, because the firehoses are so effective at knocking over wheelchairs.
How hard would it be to make a cell phone that won t work while in motion. If it detects you walking it stops working. IF the GPS senses motion it stops working. Instead of laws to stop stupid behaviors make the tech to make it impossible. Suddenly the streets are safer for pedestrians and other drivers. No longer dependent on political morons to fix the tech, we all can get back to playing Paranoia.
You can easily sell this to capitalism by explaining they are losing valued customers with the death of every cell phoney. I see some have noticed that D T watched a lot of Moussolini newsreels for pointers on body language and gestures. albert, Rachel, Clive Robinson. one of those compressed-air-powered horns hat with a forward-facing flashing light.
For a lot less weight to carry around, trail hikers use little whistles that can be heard for miles if blown hard. Besides their come-rescue-me primary purpose, they make great anti-rape whistles that can stop a big, strong attacker without violating weapons laws. Blown more gently, they might say Look up from your fondleslab and get out of Clive s way. tyr, Clive Robinson. Enforce rather than delegate or regulate. I m an advocate of that. Isn t gonna happen, though. Bass, The Eudaemonic Pie and The Predictors I remember both being entertaining reads.
No rule that says you can t post to old squid threads; I do that all the time. Well, you could still do that. Taft s book is really fascinating. A recommended read. The engineering problems he faced and solved are impressive software, hardware, control systems, RF and antennas, digital and analog I may read the other books you recommended, just not sure when. Thorp s research is based on a single deck that s randomly shuffled.
His work was extended to multi-decks. However, nowadays the shuffle is anything but random. Basic strategy won t work. Card counting won t produce the expected results either unless you are part of a very well funded team with replenishsble bankrolls that can sustain protracted heavy losses. Even then, winning isn t guaranteed. It s not like the designers of these shufflers don t know about basic strategy and card counting. They employed some very sophisticated algorithms that.
Besides, there are other secrets. Perhaps I ll share one day. Running a Tor Relay on an Apple computer is relatively straight forward. Yes this will probably attract scrutiny, but so might searching for the word tor, visiting or reading a linux journal, or visiting schneier. After Trump was elected, I figured this is the least I could do. With China and perhaps Russia banning tor and VPNs and the Snooper s Charter in the UK, etc.things are trending down.
modifications to torrc; use at your own risk ORPort 9001 ExitPolicy reject no exits allowed Nickname ididntedittheconfig Log notice syslog Log notice stderr RelayBandwidthRate 400 KBytes Throttle traffic RelayBandwidthBurst 400 KBytes Throttle bursts AccountingMax 20 GBytes each way per period AccountingStart day 00 00 day period starts at midnight SOCKSPORT 0 relay only. not the brightest bulb July 30, 2017 9 38 PM. usage tends to be about 4 Gig in and 4 Gig out per day with the above settings; around 240 Gig Month total.
Finally, allow incoming connections to tor through your firewall, if prompted. As standard user tor watch Terminal feedback and Activity Monitor feedback periodically titrate by doubling or halfing Bandwidth also adjust AccountingMax based on your ISP plan; you may find actual usage is fairly linear within a range optional use computer or network for other stuff too, of course. I think Tor says this themselves, so I don t see the point of the argument Thru some identifying stages if you re really good, you can avoid even this for most part, but I think it s impossible to not show up on some radar these days, too much surveillanceyou should be able to get yourself to a point that you can make a connection to the internet that s mostly devoid of PII.
Whatever you use anonymity for, hopefully it s a good purpose, not scummy. My main purpose was escaping grasps of attackers terrorizing my life, for brief periods of time. Unfortunately these discussions involve little evidence and devolve into name-calling bar-room brawl-type talk. Most of my security and homebrew projects I post fully online. I don t really have a use for it anymore, like any truly secure workstation it had to be ever-changing, mobile and under the control of a truly paranoid being.
Anyway, draft, as-is, instructions for a tor relay neither exit node nor bridge on a MacIntosh from the command line. I want employers to see my paid work to show them what I can do but can t. It s conceptually simple but practically hard, very hard, and there is no way to make it reliable in action in human terms. Such a product exists and is called a pedometer.
To see why invert the premise and make the operating function a counter. Untill recently there was no point in cheating a pedometer because there was no value in doing so. However insurance companies have changed the game and there is now value in cheating a pedometer by way of reduced normally way over priced health care policies. With the advent of an incentive to cheat a pedometer lots of inventive minds have got to work. In effect the insurance companies have stupidly invented an arms race they can not win.
RE tor discussion As we ve discussed a million times, just using some tool won t be a magical silver bullet. People will think up simple ways to cheat those pedometers, the insurance companies will think up counter measures to catch the cheaters and so that loop goes around each time some cheaters will find a method to beat the counter measures. We ve seen this before with ECM ECCM ECCCM and commercialy with the subscription service Sky Satellite Broadcasting.
Mean while the insurance companies get locked into a second ECM war with other insurance companies playing follow the leader. Worse by legislation Obama Care every citizan has to have health care insurance You can see where that is going to go, as was said in the film, the only sensible move is not to play. Flipping the premise back up you will see that if their is wriggle room then people will cheat the system because they see value in doing so.
But worse still if only one company put in an anti-walk-n-talk option it would quickly go out of business because such a feature has negative value for a purchaser. Thus the only way to attempt to get it would be by legislation, which will fail as reliable technology does not yet exist. Which as we know with Smart Guns legislation is likely to have a perverse effect on the manufacturers. The problem is there is two much wriggle room, and two or more types of movment detection required thus there will be not just edge cases but corner cases, and each attempt to improve detection will double up at minimum the number of courner cases and more for the edge cases.
That is they will find ways to ensure the idea never becomes reliable, so never gets put on the market to become a legislative market killer. The two current movment detectors are tuning fork gyroscopes and satellite position fixing GPS. Neither is reliable or even suitable for the application. You could average out by integration but to tell the difference between ordinary hand body movment whilst sitting or standing will require a long integration time.
GPS is slow and has an inacuracy margin short term greater than you would get with walking or dancing. Likewise the gyroscopes have a sensitivity issue in that they are band pass detectors and will not detect absolute position, as movment above a certain speed or below a certain speed will either not register or will register inaccurately. password It makes perfect sense to anyone alive, why dragon is a popular password for 2016. I don t even watch television and I can tell you about a cultural phenomena known as Game of Thrones.
I could go on at further length but I think you both know enough to fill in the rest for yourself. I forgot to say that The Eudaemonic Pie tells the story of a group of students who built wearable computers to beat the casinos at roulette. They put a lot of work into the effort, but only transiently made money. Later some of them went on to found The Prediction Company, which used pattern extraction recognition to beat the markets.
I have the impression that Wall Street in the 1990 s hired the best and brightest of a generation of physicists to build adaptive systems for computer trading. Today most of the stock volume is the descendants of their machines arbitraging frctions of a penny per share.
Coments:24.04.2020 : 18:57 Kagall:
Hier sehen Christopher g iq option also, wie Sie Mikrofonhintergrundrauschen in Windows 10 einfach filtern können. Wir haben viele suggestive Artikel zu einem ähnlichen Thema und Sie können eine Suche nach diesem Thema durchführen. Die wichtigsten Schritte, die wir unternehmen müssen, um solche Hintergrundgeräusche zu vermeiden, werden im Folgenden erläutert.