topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday November 13, 2025, 10:48 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 112 113 114 115 116 [117] 118 119 120 121 122 ... 264next
2901
General Software Discussion / Re: TrueCrypt alternative
« Last post by IainB on June 20, 2014, 04:23 AM »
Useful ideas from windowssecrets.com newsletter:
(Copied below sans embedded hyperlinks/images.)
Data-encryption alternatives to TrueCrypt
By Lincoln Spector

It seems as if everyone who kept sensitive files secure did it with TrueCrypt. Edward Snowden depended on it. So did I.

But now that the popular disk-encryption app is effectively dead — at least for the foreseeable future — it's time to look for a replacement.

In last week's (June 12) Top Story, "The life and untimely demise of TrueCrypt," Susan Bradley reviewed the application's history and stated, "It's a mystery that we gave TrueCrypt such an extraordinary level of trust. It had dubious legal foundations, its developers were unknown, and its support was primarily relegated to forums that are now missing."

In this follow-up article, I'll discuss my own approach to protecting sensitive files, and I'll explain why I — unlike Susan — typically don't recommend Microsoft's BitLocker. I will recommend two file-encryption programs that might take TrueCrypt's place.

How safe is safe enough — and for what?
Let's use your home as an analogy. You probably keep your front door locked — at least at night and when you're away. You might have an alarm system or even bars on the windows. But your security system most likely doesn't match those used by New York's Metropolitan Museum of Art or the Getty Center in Los Angeles.

Why? Well, for one thing, you can't afford it. But mostly, it would be overkill. Few of us have anything in our homes that would attract the sort of professional thieves who might steal a Van Gogh.

To a large extent, the same rules apply to data. It takes a lot of time and skill to crack encryption, and most criminals are looking for an easy score. Even the NSA, which has the ability to crack all but the best encryption, probably won't bother. It might soak up everyone's cellphone metadata because that's relatively easy. But it reserves the hard work for the few people of interest.

That doesn't mean you shouldn't take precautions. Going back to that house analogy, encrypting sensitive files is like locking your front door — a reasonable and generally sufficient line of defense. (And you must ensure that unprotected bits of those files don't remain on your hard drive.) You also need to protect the encryption key with a long, complex password that's extremely difficult to crack — and be wary of phishing scams and other deceits that might trick you into handing over the key.

Which files should be encrypted and where?
You don't need to encrypt every file. We'll assume that neither the NSA nor criminals are really interested in your collection of cat photos or your daughter's term papers.

Obviously, you do need to protect files containing bank statements, credit-card information, and Social Security numbers — basic data about your personal identity. But you also might want to encrypt any information that you don't want others to see — and anyone else's personal information you might possess. The simple rule: If in doubt, encrypt it.

Your work might dictate different encryption procedures. For example, a small construction company might need to encrypt just a few financial and customer files, whereas nearly every file an accountant handles probably needs encryption.

The safest place for sensitive files is on an encrypted (and fully backed-up) partition or drive. File-by-file encryption can leave temporary, unencrypted copies on the hard drive. But if every sector on the drive is encrypted, these temporary copies will be unreadable as well.

I'm partial to using a virtual drive/partition — what TrueCrypt called a volume. This is typically a single, often quite large, encrypted file. When you open it with the correct password, Windows sees it as a standard drive from which you can launch files, manage them with Windows Explorer, and so on. When you're done, you close the volume and all files inside are once again inaccessible. Temporary and "deleted" files stay within the volume, so they, too, are encrypted.

You can, of course, encrypt real partitions. In fact, you can encrypt all partitions — including C:. Booting and signing in to Windows automatically opens these encrypted, physical partitions. But if someone boots the system from a flash drive or connects your hard drive to another computer, nothing will be accessible.

Arguably, this is the safest type of data protection. Because your entire hard drive is encrypted, even Windows' swap and hibernation files are locked. But full-drive encryption has its own problems. For example, you won't be able to pull files off an unbootable system by using other boot media.

Also, with full-drive encryption, all data files are accessible whenever you're signed in to the PC. They can be stolen by a remote cyber thief via malware or by a co-worker while you're on a coffee break. By contrast, you have to consciously open an encrypted volume, which can remain locked when you're in a not-so-safe environment — such as on a public Wi-Fi network.

Bottom line: Full-drive encryption makes the most sense if you work primarily and continuously with sensitive information — as in accounting. In most cases, an encrypted partition makes more sense; it's nearly as secure as full-drive encryption and offers more flexibility. File-by-file encryption is the least secure but is worth considering if you can't use drive/partition encryption, as discussed in the May 15 Top Story, "Better data and boot security for Windows PCs," and in a follow-up in this week's LangaList Plus.

BitLocker best for corporate environments
For many, Windows' own BitLocker encryption tool is the obvious TrueCrypt replacement. Susan Bradley put it at the top of her short list, and the infamous TrueCrypt warning on the SourceForge download page provides extensive directions for setting it up.

BitLocker comes with Windows 7 Ultimate and Enterprise plus Windows 8 Pro and Enterprise. It can encrypt real and virtual partitions or the entire drive. In my view, BitLocker has its place — primarily when managed by a PC expert in an office scenario. BitLocker is sort of set-and-forget; non-techie office workers can simply sign in and out of Windows in the normal way without even knowing (or caring) whether their files are encrypted.

But for personal use, BitLocker's password/key system can be overly complex or confusing. For example, when you set up BitLocker, you create an unlock password. (You can also have a BitLocker-encrypted drive unlock automatically when users sign in to Windows — or they can use a smartcard or PIN.) But you must also create a separate key-recovery password that's stored on the system if the PC has a Trusted Platform Module (TPM; more info) chip, or on a flash drive if it doesn't. Setting up BitLocker on a system without a TPM chip can take some time and admin skills.

Basically, if you don't have a newer PC and an advanced version of Windows, BitLocker is simply not a viable option. For an individual maintaining his or her PC, it's just another layer of complication.

Here are two better data-encryption applications for personal PCs.

DiskCryptor: For drives and partitions
Like TrueCrypt, DiskCryptor (info) is free. It's also open-source, though I'm not as confident as I once was that being open-source is an advantage. (As Susan pointed out last week, "There's even debate whether TrueCrypt qualifies as open-source."

DiskCryptor is designed to encrypt partitions. According to the DiskCryptor site, Windows 8 isn't supported. But it seemed to work fine encrypting a separate, nonboot partition on a fully updated Win8.1 Update system.

DiskCryptor's user interface is somewhat unattractive, but it's relatively easy to figure out. The program offers industry-standard AES, Twofish, and Serpent encryptions (see Figure 1). If you're really paranoid, you can combine them, encrypting first one way and then another.
DiskCryptor encryption

Figure 1. DiskCryptor lets you combine encryption technologies for extra security.

A simple wizard helps you quickly encrypt any partition — including C:. If you encrypt C:, you'll have to enter your DiskCryptor password before Windows will load. (If C: is your only partition, you've effectively encrypted the entire drive.) Note: As with all current, third-party encryption apps, you can't use DiskCryptor on a Win8 system's boot (C:) drive that has Secure Boot enabled. For more info, see "Reader disagrees with data-encryption advice" in this week's LangaList Plus (paid content).

Although DiskCryptor doesn't support TrueCrypt-like virtual partitions, you can use a real partition for a similar result. Use Windows' Disk Management program or a third-party partition tool to create a small, separate partition for your sensitive files. Then use DiskCryptor to encrypt that partition (see Figure 2). The result is much like a TrueCrypt volume, except that it's a real partition.
DiskCryptor menu

Figure 2. DiskCryptor's main menu for managing drive encryption

But using a real partition has some disadvantages. For example, the encrypted partition is clearly visible in Windows' Disk Management, though it's labeled as unformatted.

And backups can be tricky. The only way to back up the files when the partition is closed is with image-backup software. Using the default settings for EaseUS Todo Backup resulted in an error message, as shown in Figure 3. After selecting the sector-by-sector backup option, both the backup and the restore worked.
EaseUS Todo Backup

Figure 3. Backing up an encrypted partition with EaseUS default settings generated with an error message.

You can also open the partition and use a conventional file-backup program. But make sure it's one that has its own built-in encryption to secure your files.

On the other hand, backup is very simple with a virtual partition, which to Windows is simply another (really big) file. Keep the file in a standard folder — such as Documents — and it'll get backed up automatically and regularly.

Cryptainer LE: The tool for virtual partitions
If, like me, you prefer a virtual partition, Cryptainer LE (also called Cypherix LE; site) is the better option. The free version doesn't let you create a volume greater than 100MB (see Figure 4), but if you're judicious about what you encrypt, it might be enough.

And if it isn't enough, you can shell out U.S. $30 and get Cryptainer ME, which comes with a 2.5GB-file limit. Shell out $70, and you can create terabyte-sized volumes. But if you're going that big, you may as well encrypt the whole drive.
Cryptainer volume

Figure 4. The free Cryptainer LE lets you set up small encrypted volumes.

Cryptainer is easy to set up and use; the buttons are big and colorful, and — more importantly — they're easy to understand. Tabs help you use and control multiple volumes (see Figure 5).
Cryptainer main menu

Figure 5. Cryptainer LE has a simple menu system for creating and managing encrypted volumes.

When you set up a volume, the free version appears to offer AES 256-bit and Blowfish 488-bit encryption — but you actually get only 128-bit Blowfish. Again, for most people, that's sufficient. Blowfish 488-bit and AES 256-bit encryption are, obviously, enabled in the paid versions.

The choice: Stay with TrueCrypt or move on
If you don't already have TrueCrypt, either DiskCryptor or Cryptainer should do; it just depends on how you prefer to work with encrypted files. (Or, if your encryption needs are relatively simple, use file-by-file encryption as detailed in the May 15 Top Story.)

On the other hand, if you're already using TrueCrypt, you can probably stick with it — at least for a while. As Susan pointed out, a formal code review of TrueCrypt showed that it "does not have any back doors and still provides secure encryption that can't be easily cracked." (Note: There's still a downloadable version of TrueCrypt, but it's read-only — i.e., you can open encrypted volumes to remove files, but you can't create new ones.)

Currently, I'm still using TrueCrypt. But I don't know for how long. TrueCrypt, like many other public encryption applications, can be cracked with some effort and the right tools. With no updates, it might become more vulnerable over time. If a new version of TrueCrypt doesn't rise from the ashes relatively soon, I'll seriously consider moving over to Cryptainer LE or ME.
2902
I received the same email (circular) from ProtonMail as @wraith808 has apparently received.
The email basically seems to be indirectly advising that there are now strings attached to the acceptance of your request to join ProtonMail.
I'd recommend a healthy dose of skepticism. From experience, introducing/attaching such strings at a late stage, where there were no such strings before, is something that can often precede the execution of a con trick.
2903
General Software Discussion / Re: TrueCrypt alternative
« Last post by IainB on June 20, 2014, 02:32 AM »
@Midnight Rambler: Thanks for that info.
2904
@TaoPhoenix: Yes, ain't the Internet grand!? I too am learning a lot about the US and other countries - things that I probably would not have been permitted to learn if we were still in the absolute thrall of big media/MSM.
I am an exiled Pom and a paper Kiwi, having immigrated to NZ some years back. When I first came to NZ it was like going into a permanent news blackout on international affairs, as the media were (still are to a greater extent) so hopelessly naive and parochial. (There's a word for that, but I can't recall it just now). There also now seems to be almost a complete absence of good investigative journalism, whereas when I first came here there were at least some quite good examples of investigative journalism, but they all seemed to get shut down.
2905
Anything I wrote above was based on the assumption that the ABS was fitted correctly and working properly.
However, I was alarmed to read in GM Recalls: How General Motors Silenced a Whistle-Blower:
...In May of that year, Kelley told lawyers, the audit found three problems, including a vehicle in Flint, Mich., with its antilock brakes improperly attached and a vehicle in Lansing with a fuel leak. McAleer’s lawsuit claimed that as much as 1 percent of all vehicles manufactured by GM during the 1999 model year could be defective, or more than 30,000 North American cars and trucks. ...
(My emphasis.)
Apart from the ABS problem, a 1% defective/unsafe ratio in car manufacture would seem to be a shockingly bad record. Furthermore, reading the article, one would probably have no way of knowing for certain whether they had fixed their QC processes, or just continued to bury the issue.
I'd think carefully before buying a car from that manufacturer, new or second-hand, without doing quite a bit of independent research first and giving the vehicle a complete independent AA safety inspection and certification before accepting delivery. Being paranoid about car safety and a bit of a petrol-head and a reasonable car mechanic, I'd also give it a thorough going-over myself, immediately after receiving it.
2906
@TaoPhoenix: Well, the shirt is one thing - and it makes a pretty definite statement in its own right - but the "champion for the downtrodden" is a little different, because it is something that stems from the context of the American legal system and incentivisation to litigation, which itself is arguably a form of pestilence deliberately unleashed by the Americans.
Thus, to say "...that could change the world..." could arguably really be to say "that could rectify the gross injustices permitted and promulgated by the American legal-political system and inflicting Americans and often people from other nations alike."
2907
Living Room / Re: Ignorance is Strength - Censorship just got VERY real
« Last post by IainB on June 18, 2014, 12:43 AM »
Maybe the principle here is something to the effect that "The quicker we all head back into the Dark Ages, the better", and with British Columbia leading the charge what could go wrong?
Mind you, some people (not me, you understand) might suggest that, for a BC court to make the ruling that it apparently has, they are arguably already in the Dark Ages, but I couldn't possibly comment.
2908
What's the Best? / Re: What's the best Journal (Diary) software?
« Last post by IainB on June 17, 2014, 11:30 PM »
If you're using Windows, there's actually a very good (rich text format, images, searchable, etc.) built-in journal - Windows Journal, and if you have MS Office (see MS Office 2013 US$9.95 Corporate/Enterprise Home Use Program - Mini-Review) there's arguably the best PIM and journal on the planet - OneNote.
2910
I have for years used and currently use ScrapBook to capture and search specific web pages. I have a huge library of such captured material.
ScrapBook
About this Add-on
ScrapBook is a Firefox extension, which helps you to save Web pages and easily manage collections. Key features are lightness, speed, accuracy and multi-language support. Major features are:
* Save Web page
* Save snippet of Web page
* Save Web site
* Organize the collection in the same way as Bookmarks
* Full text search and quick filtering search of the collection
* Editing of the collected Web page
* Text/HTML edit feature resembling Opera's Notes

The reason I have stuck with Scrapbook is that there is nothing else quite like it. However, today I came across this:Chrome extension All Seeing Eye indexes all text in your Web history - CNET, and found in the Chrome Web Store:
Chrome Web Store - ALL SEEING EYE
Record All Browsing in Screenshots & Full Text. Search For Anything At Any Time. Never Forget Where You Read Something. 100% Private

How to use:
After installing, browse to a few web sites of your choice (e.g. yahoo.com, facebook.com, etc) so that the browser  creates some new entries  in your web history. After that go to Show All History from your browser's History menu
Every time you see a new page while browsing it will be saved as a screenshot and all its contents will be remembered so you can go to Show All History from your browsers History menu and search for things in your web history, with a visual interface that helps you find stuff.

NEW: you may now use tags in the Options tab to tell the extension not to capture certain sites.

What it does:
If you want to remember everything you see on the web and have a way to search your web history with full content then this extension will help you do just that. The normal browser history does not save the text inside the pages you visit so you can't search for anything except the title and URL. This extension saves and indexes all the text in all the pages you visit so you can find everything in your history with a few keystrokes. It also takes screenshots of all pages so you can locate to the right page with visual memory. It makes it easier to find stuff that you've already come across in your browsing, so you don't have to search for it again on the web.

I developed this extension to help me find information I come across much more easily than having to search for it again on the web. If it's in my history, I can find it. This has given me all seeing powers. You can have that power too, dear user.

This extension does NOT send any of your browsing info to the cloud or anywhere. It keeps everything on your machine. It will respect your privacy and not work in Incognito mode, so all your browsing in Incognito mode is never saved.

This extension is Open Source. If you're a developer feel free to examine the code and ask any questions or submit issues directly on Github: https://github.com/i...bidiart/AllSeeingEye

Currently, only English is supported for searchable content. Other languages will added in the future.

If this were a FF extension, it would be potentially one of the most useful that I could imagine - with the "missing" functionality that I would like Scrapbook to be capable of, to better meet my peculiar requirements.
2912
General Software Discussion / Open Dyslexic font
« Last post by IainB on June 17, 2014, 12:06 PM »
Seriously useful - OpenDyslexic - Firefox Facts

Ergonomically, serifed fonts were apparently the best fonts for recognition, speed-reading and comprehension.
Maybe the Open Dyslexic font changes that. I wonder how OCR copes with it?
2913
Living Room / Re: Interesting Academic Blog: Overcoming Bias
« Last post by IainB on June 15, 2014, 10:23 PM »
And he does seem to be willfully blind to the level of bias displayed in some of his own core set of 'givens' doesn't he? ...
Yes, I wondered about that too. Maybe it is there as a deliberate challenge for someone to argue against and get a bit of discussion going in the blog comments. He does say he likes argument.

...I always worry a little when these cross-disciplinary types start enthusiastically applying the tools of one discipline to an area they're not specifically designed or intended to he used in. ...
Yes, and then in many cases what happens is they seem to apply those tools incorrectly too - e.g., the abuse of stochastic method by people who have never been trained in it. I reckon a lot of the blame for that can be laid squarely at the feet of SPSS. Suddenly, everybody's a half-baked wannabe statistician using half-baked methods, attempting to "prove" their irrational pet half-baked theories, and correlation becomes causality. Next, they go on to prove that black is white and get killed on a pedestrian crossing...(HHGTTG).

...Regardless, i always appreciate reading a thoughtful unique perspective on things.
Yes, me too, though I much prefer it if I also learn something new from that unique perspective - a good example would be Number Watch:
Number Watch 
 All about the scares, scams, junk, panics and flummery cooked up by the media, politicians, bureaucrats, so-called scientists and others who try to confuse you with wrong numbers.

Working to combat Math Hysteria.

"It is a pleasure to stand upon the shore, and to see ships tost upon the sea: a pleasure to stand in the window of the castle and to see the battle and the adventures thereof below: but no pleasure is comparable to the standing upon the vantage ground of truth ( a hill not to be commanded and where the air is always clear and serene), and to see the errors, and wanderings, and mists, and tempests, in the vale below."
From Of Truth, Francis Bacon.

- it is a site set up by one Professor John Brignell, an engineer and mathematician. The discussion forum is pretty good with some lively rational discussion - and humour.
2914
... It wasn't particularly dramatic...I also tried to get it [ABS] to trigger on a regular road, but a hard stop at 35mph did not trigger it -- despite giving me whiplash and throwing baby cody from the back seat to the front seat, and so i gave up on that.
______________________________
It shouldn't be obtrusive ("dramatic") if it is working properly. It's pretty much idiot-proof and doesn't require any special changes to your driving for it to work effectively. Just forget about it.***
Probably too much friction when you were on the dry road, so there would be no wheels locking up. Try it in the rain on the same road when it is wet and you will probably find it engaging. Try braking in the wet whilst you are turning and see what happens.
Then go and ask your insurers for a reduction in your car insurance premiums because, statistically, your chances of having an accident have been reduced by this technology. On the same principle, I was promptly given a 10% discount (after I had asked) by my AA (Automobile Association) Insurers on my annual all-risks car insurance when I passed the Institute of Advanced Motorists driving test (statistically, IAM members have a reduced risk rating - i.e., a lower risk profile).

***Note: But for goodness' sake remember it when you get in to drive a car that has no ABS fitted.
2915
Living Room / Re: Reader's Corner - The Library of Utopia
« Last post by IainB on June 15, 2014, 09:58 AM »
I had recently been thinking "Why the heck don't Microsoft think to make it easier to export their documentation?", after having had to copy copious amounts of their info using the FF add-in ScrapBook.

Surprise!:
Taking TechNet Offline: Build Your Own Personalized Documentation
(Copied below sans embedded hyperlinks/images.)
Posted on: Jun 11, 2014
by  Ben Hunter

IT pro’s live and breathe information. You need accurate data at your fingertips all the time.  That’s why we are constantly creating new content just for IT pro’s to help you with tasks like Windows Deployment or Planning for App-V 5.0. We publish this information via TechNet Library which is a great resource when you are online but is not so great when not connected to the internet.  Our technical writers and support teams are frequently asked for downloadable versions of documentation from TechNet. Well you are in luck, TechNet has a little-known feature that allows you to create your own custom downloadable documentation from TechNet  with the click of a link.

Every page of the TechNet library has a link up at the top-right of the page that reads “Export.”  Click it and you’ll go here: http://technet.micro.../library/export/help. This page explains how to build your own pdf or html document (.mht) from topics you select in the library.  That’s right, you roll up the content you want and download it.

Click the “Start” button and you’ll be taken back to the page you arrived from – the assumption being that’s a topic you want to export.  From there you can select all the topics you want to include in your personalized downloadable file.  Note there is a functional ceiling to the number of pages you can export at 200 topics.

Save your new doc set to any device and you’ll have it when you need it.  It’s that simple!

Nathan Barnett, Technical Writer, Microsoft Corporation
2916
Living Room / Re: Interesting Academic Blog: Overcoming Bias
« Last post by IainB on June 15, 2014, 09:45 AM »
Yes, it is an interesting find.
Generally, I would recommend one looks at what a person's reasoning is in what he/she states in a written form, and the rationale, validity/truth of same.
One does not necessarily have to like the person or the way he/she puts things in order to appreciate their rationale (or lack thereof).
However, if a set of reasoning leads up to and/or supports a statement of belief, then that usually sounds the warning bell for rationalisation. It would be interesting if one found rationalisation in that website.
2917
Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage.
« Last post by IainB on June 14, 2014, 10:13 PM »
^^ Can surveillance be addictive? I hadn't known that.
To be snagged by something addictive - like a drug - one generally needs to have some susceptibility to it, a sort of innate natural dependency - e.g., smoking cigarettes, or alcoholism. Maybe there is something within us - a natural proclivity - to spy upon others. Maybe it is a survival thing - I mean, if one is spying upon others - potential enemies/competitors - then they can't be spying on oneself, and one knows more about them than they know about oneself, so one might have some kind of "powerful" feeling about it. Or maybe it's a form of voyeurism.
The nosy "twitching curtains" syndrome in small communities comes to mind.
2918
Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage.
« Last post by IainB on June 14, 2014, 07:25 AM »
I spotted this headline just now whilst skimming through the unread slashdot posts in my Bazsqux reader. I don't think this is "new" news, but the brilliant suggestion to help the NSA at the end of this was something I hadn't seen before:
US Secret Service Wants To Identify Snark
(Copied below sans embedded hyperlinks/images.)
Unknown Lamer posted about two weeks ago | from the bound-for-success dept.
Privacy 213

beschra (1424727) writes
"From the article: 'The U.S. Secret Service is seeking software that can identify top influencers and trending sets of social media data, allowing the agency to monitor these streams in real-time — and sift through the sarcasm. "We are not currently aware of any automated technology that could do that (detect sarcasm). No one is considered a leader in that,'" Jamie Martin, a data acquisition engineer at Sioux Falls, SD based Bright Planet, told CBS News.'

Why not just force Twitter to change TOS to require sarcasm tag?"

Oh wait...that's sarcasm innit?
2919
Living Room / Re: Peer Review and the Scientific Process
« Last post by IainB on June 14, 2014, 06:41 AM »
I recall having read something about this "new discovery" earlier this year with considerable skepticism, and wondering whether it wasn't just another case of rushing something newsworthy/marketable (good for raising research funds) into print in Nature before properly peer reviewing it - especially as some of the media reports had pictures of this attractive girly-girl Japanese PhD student in a white lab coat, surrounded by Hello Kitty memorabilia or something, in her lab/office. She had apparently made the discovery and was grateful that her professor had "believed" in her despite the rest of the department's scientists apparently thinking she was a harebrained crackpot, or something.

So I was somewhat unsurprised to read in slashdot.org:
Japanese Stem Cell Debacle Could Bring Down Entire Center
(Copied below sans embedded hyperlinks/images.)
sciencehabit (1205606) writes
Shutting down the research center at the heart of an unfolding scientific scandal may be necessary to prevent a recurrence of research misconduct, according to a report released at a press conference in Tokyo today. A committee reviewing conduct at the RIKEN Center for Developmental Biology (CDB) in Kobe, Japan, found lax oversight and a failure on the part of senior authors of two papers in Nature outlining a surprisingly simple way of reprogramming mature cells into stem cells. The committee surmised that a drive to produce groundbreaking results led to publishing results prematurely. "It seems that RIKEN CDB had a strong desire to produce major breakthrough results that would surpass iPS cell research," the report concludes, referring to another type of pluripotent stem cell. "One of our conclusions is that the CDB organization is part of the problem," said committee chair Teruo Kishi Kishi. He recommends a complete overhaul of CDB, including perhaps restructuring it into a new institute. "This has to be more than just changing the nameplate."
2921
Living Room / Re: Movies or films you've seen lately
« Last post by IainB on June 14, 2014, 04:48 AM »
The Illusionist (2010 film) - Wikipedia, the free encyclopedia
Super little French-English animated film. Watched it with my 12½ y/o daughter (but was tired and fell asleep, so had to watch the rest later). I came across it in the "International" section in the video rental store, but she chose it as she had seen clips of it on YouTube and in searching up the art used in the film thought it would be worth watching.
2922
Nice to see that Dan McCall's parody T-shirts have been allowed by the establishment, though not without a fight, it seems.
I think they are rather clever and make their point well.
It’s OK to parody the NSA | Ars Technica
Man who beat NSA in T-shirt parody case wins against Ready for Hillary | Ars Technica

T-shirt - The NSA actually listens (2011).jpg

T-shirt - Im ready for oligarchy (for 2016) 2014.jpg
2923
Living Room / Re: Favorite Sci-fi movies?
« Last post by IainB on June 13, 2014, 07:00 AM »
For those who aren't sure whether they have seen all those Planet of the Apes movies/TV serials:

Planet of the Apes movies-TV - release dates (IMDb).png

I've just seen the 1968 one (it's hard to beat) for the nth time (refer "Three Wise Monkeys" as posted above).
The 2001 remake of that wasn't too bad and is probably worth watching.
(The planned 2016 remake might be worth watching too.)

From memory:
  • The 1970 one was quite a good sequel and good SF, and flowed on from the 1968 one quite well.
  • I think I've seen most of the others (including most of the TV series) excepting 2011 and 2014, and what I saw was pretty nondescript but good fun if you are a fan.
2924
  Aaron's Law sounds like some good legislation, if it gets passed....
The Internet and all those who care about Aaron Swartz took a big step forward today
Rep. Zoe Lofgren and Sen. Ron Wyden just introduced "Aaron's Law", which would fix some of the worst parts of the Computer Fraud and Abuse Act (CFAA), including those which make it a potential crime to violate terms of service agreements -- that fine print that nobody reads at the bottom of a website.
The CFAA is the law under which Aaron and other innovators and activists have been threatened with decades in prison. It is so broad that law enforcement says it criminalizes all sorts of mundane Internet use: Potentially even breaking a website's fine print terms of service agreement. Don't set up a MySpace page for your cat. Don't fudge your height on a dating site. Don't share your Facebook password with anybody: You could be committing a federal crime.
It's up to us to keep the Internet open, a place for sharing ideas, exploration and activism -- not for stifling creativity and criminalizing innovators.
As the bill's sponsors put it in a Wired.com Op-ed, "The events of the last couple of years have demonstrated that the public can speak loudly thanks to the Internet. And when it does, lawmakers will listen."
Let's make sure they hear us. Join us in calling on Congress to pass "Aaron's Law."
http://act.demandpro...ign/aarons_law_intro

Related to the above, I received an email today from Lawrence Lessig, DemandProgress.org <[email protected]>:
Go to http://www.demandprogress.org/ if you would like to follow this up with your contribution.
(Copied below sans embedded hyperlinks/images.)
More than seven years ago, Aaron Swartz, the cofounder of Demand Progress, convinced me to give up my work on copyright and Internet policy, and take up the fight against corruption.
 
That fall, we started Change Congress, and for the next five years, we conspired on the best way to build a grassroots movement around this issue — because we both realized that was the only way we could ever win. Washington will not fix itself. We have to fix it for it.
 
Then a federal prosecutor distracted him. And then destroyed him. And the hope that I had — that someday he would return to this fight, and help us win it — was over.
 
All of us know how difficult that loss was. But when I had recovered enough to think, I resolved again to do everything that I could to win the fight that he had started me on.
 
I spoke at TED 6 weeks after he died, laying out the argument as clearly as I could for the reform we needed. And last March, again at TED, I announced the most ambitious plan this reform movement has ever had: that by Aaron’s 30th birthday — election day, 2016 — we would win a Congress committed to fundamental reform.
 
I’m writing you today to ask you to join this movement — now, because we now face a critical challenge that we must meet if this plan is going to work.
 
Our idea is to run this campaign in two stages — in 2014, with a pilot to test the strategy and prove we can win, and then in 2016, with a full scale campaign to win.
 
We estimate the cost of the 2014 plan will be $12 million, and we decided to raise at least 1/2 through a kickstarter-like campaign.
 
I set the initial goal at $1 million in 30 days.
 
We raised it in 13 days.
 
Now we have launched a second, and insanely more difficult campaign to raise $5 million by July 4. If we meet that goal, and I get it matched, then we have the funds we need to win the campaigns we need in 2014, on our way to winning in 2016.
 
We need your help. If you can pledge, please do. We will only collect you pledge if we hit the $5 million goal. And just as important, if you can spread this, please please do.
 
Very few believe we can do this. But I do. If we can get a million people to view our site, we will meet our goal.
 
You are part of the million person army that Aaron helped to build, and that the Demand Progress team now continues to grow. Aaron pushed me to make this my cause. Let me push you now to at least pledge.
 
Thank you for all you have done. And thank you especially if you can help us to do this critical bit too.
 
-Lawrence Lessig
Paid for by Demand Progress (DemandProgress.org) and not authorized by any candidate or candidate's committee. Contributions are not deductible as charitable contributions for federal income tax purposes.

One last thing -- Demand Progress's small, dedicated, under-paid staff relies on the generosity of members like you to support our work. Will you click here to chip in $5 or $10? Or you can become a Demand Progress monthly sustainer by clicking here. Thank you!
2925
General Software Discussion / Re: TrueCrypt alternative
« Last post by IainB on June 13, 2014, 05:41 AM »
It would generally be easier to set and conceal backdoors in proprietary encryption software, and for it to remain "undiscovered" because the software would not usually be open to scrutiny/audit by third parties who would thus effectively need to trust/use the software on blind faith.

Let's be speculative:
  • As above, maybe:
    ...the TrueCrypt takedown was the result of being nobbled by the NSA (e.g., like the two encrypted email services over the last 12 months), then the TrueCrypt developers may have been left little option but to shut down, rather than be obliged to leave TrueCrypt fitted full of NSA backdoors like Symantec and Microsoft encryption have been rumoured to be.
    _______________________

  • Or maybe that's not the case. Maybe the backdoors had already been established for some time in TrueCrypt, so the unknown developers pulled the plug realising that discovery could be imminent in the aforementioned TrueCrypt audit project.

  • Maybe the developers and/or the auditors are effectively the NSA. Who knows? After what we have been allowed to learn or led to believe from the public dripfeed out of the SnowdenGate theatre (bring your own popcorn), anything's possible, but skepticism would seem to be recommended. One thing that was learned/perfected in WWII was that good military intelligence and the skilful dissemination of misinformation were essential ingredients to a winning strategy in a war, with the Nazis arguably setting the initial standards to be met. Out of this sprung our modern-day advertising, marketing and PR - even the terminology used employs military terms. And be in no doubt that we are involved in some kind of a war - a war in which every citizen is apparently a potential enemy and thus not to be trusted, so surveillance and the manipulation of public perceptions by whatever means deemed necessary would be mandatory (QED). This was where Mao's Revolution was so successful. Maybe the book "1984" does form an authoritative set of rules and guiding principles for the kind of increasingly totalitarian states that we seem to be finding ourselves inhabiting.

I had always been a fan of PGP (Pretty Good Privacy) encryption methods, but lost interest when PGP was acquired by Norton/Symantec as I figured it was thereby probably irretrievably lost as a definitively secure/trustworthy encryption approach/software - I mean, how would one know?

However, in the interesting case of Ramona Fricosu (January 2012) in Peyton, Colo., USA, Fricosu had been charged with conducting a fraud (a mortgage scam) and it was deemed necessary to access her Toshiba laptop to discover details about the fraud and her associates - but the laptop was secured using PGP Desktop Professional | Symantec, which the FBI apparently claimed to be unable to unlock.
So a federal judge ruled that she had to:
...decrypt the hard drive of a Toshiba laptop computer no later than February 21--or face the consequences including contempt of court.
Refer: Judge: Americans can be forced to decrypt their laptops | Privacy Inc. - CNET News

(Out of this came the use of a legal defence concept of "Plausible deniability".)

This was a civilian matter, not a defence matter. Maybe the FBI did have the ability to crack the encryption key, but were not about to reveal that potentially strategically and militarily important fact if it did not have to be revealed, and so forced the issue (apparently successfully) through the judicial system.
Maybe this started people looking with increasing interest at the backdoored Symantec PGP product, or maybe it wasn't backdoored. Either way, it wouldn't matter, because the public perception set by this display was that Symantec PGP is unhackable, and maybe that was desirable/necessary/intentional.

So the alternatives to TrueCrypt could be:
  • TrueCrypt software - presumed to be unhackable.
  • Symantec PGP software - "proven" to be unhackable.
  • Microsoft BitLocker software + hardware - presumed to be unhackable.

So maybe the NSA or other SS (Secret Service) cannot hack these things. Then again, maybe they can, or have already done so some time ago.
And don't forget that it has apparently already been established that the NSA would seem to have already nobbled the so-called "random" keys used in PKE (Public Key Encryption).
Pages: prev1 ... 112 113 114 115 116 [117] 118 119 120 121 122 ... 264next