What does it say that there are potentially hundreds of undocumented instructions on your processor? What does it say that many common attacks are a result of too much emphasis on performance or a result of laziness? Some wifi routers crash if their session table is exhausted. The Mirai botnet wouldn't have happened if a good common library was used. What good is a computer if you can't allow it to be accessed by untrustworthy people without null result? Invisible Things Labs had put out two papers on how x86 and state is both harmful. Nevermind that the original computers used relays, switches, and wires to be programmed. Basically anything more complex than a clock is a computer, although those were called sequencers by NASA. Maybe we should return to literal fuses for microprocessors (or just substitute NOT gates on one layer of the processor). We are moving into a future with cameras, microphones, and manually set clocks in everything. No idea why everything needs a clock that you have to set after the power goes out. If anyone thinks consumer choice is a thing, point out the clocks. No idea why TAILS automatically sets the clock. https://www.theregister.co.uk/2017/08/29/intel_management_ engine_can_be_disabled/ I have paid for a security feature that the government demanded and I cannot use? On the other hand, a disproportionate amount of die area was allocated towards AES-NI right after side channel attacks were discovered. In the end, you can only trust something you can understand, otherwise you are trusting the word of someone else. What is a good future to work towards? Corporate call centers using thin clients with two VMs; one VM allowed access to the intranet, and the other only to the DMZ and the internet? Binney-grade privacy protections of consumer data? It doesn't matter. Privacy is gone. Although for past decades, private detectives were always able to get others to look up information for them, Pellicano is a great example. The set of information available to the powerful has always been different to those of the plebians. It just simply got worse. But if you just use this Tor exit node run by Romanian organized crime... you will be much more secure. But I have good news everybody: https://news.ycombinator.com/item?id=11407536
1: I asked someone involved with WebRTC. They suggested "maybe a page wants to communicate with your fridge directly" as a serious use of WebRTC data channels.
http://www.webcitation.org/6FnFZK9LU?url=http://larry.masinter.net/ RFC 2324 "Hyper Text Coffee Pot Control Protocol (HTCPCP/1.0)." L. Masinter. April 1, 1998. This has a serious purpose -- it identifies many of the ways in which HTTP has been extended inappropriately. ??? are you all victims of fetal alcohol syndrome ???
On 09/10/2017 12:53 AM, Ryan Carboni wrote:
No idea why TAILS automatically sets the clock.
Because Tor requires a properly set clock, especially for hidden services. HTTPS also requires a properly set clock to validate certificates. If you start Tails and tell it not to connect to the network at all, I don't think it tries to set the clock. Almost everything Tails does with networking goes over Tor, so if Tor is broken on Tails, networking is broken. (If it sets the clock over NTP, that doesn't, but it's no more incriminating than anyone else's use of NTP.)
RFC 2324 "Hyper Text Coffee Pot Control Protocol (HTCPCP/1.0)." L. Masinter. April 1, 1998. This has a serious purpose -- it identifies many of the ways in which HTTP has been extended inappropriately.
Okay, why does everything use HTTP/HTTPS if it possibly can? Because there are so many birdbrained administrators that block just about every other protocol. You'd think they think the Internet is only ports 80 and 443. Not that long ago, I was on a hospital's public wifi and I could not even connect to my PC back home on SSH port 22, much less over OpenVPN or even Iodine (IP tunneling over DNS requests). Now, OpenVPN and SSH work from the Starbucks locations around me... for now. In the future I may have to tunnel those over HTTPS as well. I shouldn't have to; you're right. But blame the birdbrained network admins that block everything else. -- Shawn K. Quinn <skquinn@rushpost.com> http://www.rantroulette.com http://www.skqrecordquest.com
Such a thing does not exist. The closest I believe is the Lemote Yeelong. "I am using a Lemote Yeelong, a netbook with a Loongson chip and a 9-inch display. This is my only computer, and I use it all the time. I chose it because I can run it with 100% free software even at the BIOS level." From: http://www.hardwareanalysis.com/content/topic/75740/ -- x9p
participants (3)
-
Ryan Carboni
-
Shawn K. Quinn
-
x9p