This page aggregates together stuff having to do with Joey from elsewhere on the net.
(Here's the English version: https://zgrimshell.github.io/interviews-with-floss-developers-joey-hess/)
I put up a tor entry node a while ago. It's relaying around 1 TB a month, so I've had to throttle it back to 400 GB/month. Awesome!
I'm in the public library, in the USA, and outgoing SMTP connections are MITM'd, and STARTTLS is filtered out.
joey@darkstar:~>telnet kitenet.net smtp Trying 126.96.36.199... Connected to kite.kitenet.net. Escape character is '^]'. 220 kitenet.net ESMTP Postfix (Debian/GNU) STARTTLS 500 Syntax error, command unrecognized
Compare with the same command run from elsewhere.
Amazing. I don't know where to start. Well, other than configuring my laptop's MTA to force use of TLS so this downgrade attack doesn't work, and bringing up my ipv6 tunnel or tor to bypasses this.
When a politician acts in an apparently stupid way, like claiming that "this snowball disproves global warming!", it's probably more useful to consider why they're doing that, rather than just point and laugh at teh stupid.
They might, for example, be a sociopath who is busy lying to a certain set of people in a carefully calculated way..
Or may be just on the payroll of certain corporations and happy to say anything their bosses suggest. Well, maybe that is pretty stupid, but a lot of generally non-stupid people seem to behave that way..
Managed to get across the mountain to the store and packed back in a week's worth of groceries, ahead of this evening's snow storm.
Four more inches of snow?! I'm getting tired of lentil soup and kilbassa.
15 minutes hike to the car, then 30 minutes shoveling it out (with 2 neighbor's help), and then the half hour+ trudge back up the hill.
Enough of that, back to reading about other people walking. http://carrotquinn.com/pct-2013/
Ah, LambdaMOO! I ran a play server for a while in the late 90's, before I wrote my own 2 MOO engines.
Last time I logged into the server, it felt like a ghost town compared to my brief experiences in the old days.
SPJ talks are the best
Michi makes chittering noises at birds, and tries to imitate their cries. She seems torn between "play" and "kill".
Best when the milk and maple syrup are very lightly folded through.
Was NOT expecting to wake up to over a foot of new snow this morning!
Forecast was a few inches, changing to rain that would melt it.
Still coming down..
Will it reach the ground from the grape arbor?
The latter, since I didn't really think ahead.
On the plus side, my it's nice to use a toilet that's not below freezing! Although I keep seeing beautiful birds sheltering in the outhouse overnight.
Managed to slide the car down the driveway and got to town.. When I return I will have to leave the car by the road and hike the half mile back home.
I've been using sqlite for 2 days and just finished reporting a bug I found in it, complete with a test case.
Seems that early in a database connection, a SELECT can fail with BUSY. This is never supposed to happen in WAL mode, even if there are concurrent writers.
I suppose that will be added to its legendary test suite. http://www.sqlite.org/testing.html
@tekk to avoid write caching, the attacker can hit random urls on the web server. Should work as long as it's serving actual files from disk. May need to make strategic use of subdirectories to avoid VFS caching. Or, just make the period be hours, not minutes, so caches go stale.
I also wonder about attacks involving DMA...
Does LUKS defeat the NSA's IRATEMONK? That depends on what the evil firmware is doing.
It could listen for a particular pattern of traffic. Ie, a write at minutes 3, 1, 4, 1, 5, 9 ... Once it's sure it's detected the traffic pattern, it could destroy the disk. This could be triggered by eg, hitting a web server at specific times and letting it log. LUKS would be unlikely to defeat this unless it writes all the time or delays writes.
It could pretend that the 6 tb drive is a 2 tb drive, and log every write. So things you think you've deleted, are not deleted. While the log would still be of LUKS encrypted blocks, the key can be obtained later. (See relevant xkcd involving wrenches.)
It could listen for a particular pattern of write traffic and then redirect the next read to deliver other data than the OS requested. Use the method in 1. to trigger, and the web server eventually replies with the LUKS header. Which the NSA can then feed into the supercomputer farm which I understand is down the road from me in Oak Ridge TN, and get to work on brute forcing the keys.
It could wait until day N or load cycle N and brick the drive. Hey, if the evil non-US persons are using our technology, at least it should be a worse version than we have, right?
It could generate head movements that allow disk traffic to be intercepted via acoustics by a van in the street with a directional mic. Possibly triggered by 1. Would still be encrypted if LUKS is used, but now you're really a target for wrench-based followup.
It could wait until reboot N and suddenly the computer is booting into HOMELANDOS and becomes a NSA interception point for all network traffic as well as dumping its entire encrypted partition out the network to be retained forever, since only terrorists use encryption. (Note that HOMELANDOS may helpfully run your real system under virtulization, so you can continue to use the computer.)
These all seems doable, and they're what I could come up with in 5 minutes. I guess the NSA has been working on this longer and with more expertise.
~~ To any NSA and FBI agents reading my posts: please consider whether defending the US Constitution against all enemies, foreign or domestic, requires you to follow Snowden's example. ~~
author: Joan Slonczewski
average rating: 3.43
book published: 2011
date added: 2015/02/01
author: Ed Finn
average rating: 3.74
book published: 2014
date added: 2014/12/18
author: Greg Egan
average rating: 3.91
book published: 2002
date added: 2014/11/17
author: Corinne Duyvis
average rating: 3.78
book published: 2014
date added: 2014/11/12
author: William Gibson
average rating: 4.00
book published: 2014
date added: 2014/10/31
List of feeds: