Eldakka’s Techdirt Profile


About EldakkaTechdirt Insider

Eldakka’s Comments comment rss

  • Sep 24th, 2016 @ 5:59am

    (untitled comment)

    It's not Facebook or any single .com that is to blame for declining revenues.

    It is because of search engines in general. Services like Google, Yahoo, Alta Vista, hell even AOL, that led to this.

    With the advent of the internet and a practical way to search it, we can now find our own preferred news source on a story-by-story basis.

    The idiom "if you don't like it go somewhere else" is exactly applicable here.

    30 years ago, if you didn't like the news reporting, what were you to do? Depending on the size of the community you lived in, there may only be 2 or 3 easily accessible newspapers, or only a few news shows on TV. Sure, you could always place special order with your newsagent for out-of-town/state/country papers - but that's a hassle, especially if there are only 1 or 2 particular articles or a short period of time you are interested in.

    Now, I can "go somewhere else" at the click of a button.

    Not to mention, the variety. I mean, how many local news papers and TV shows do you need to actually watch to have the significant local news events - or the ones you are interested in - covered?

    Now, now can explore what's happening around the world by viewing THEIR news. Why wait a few days for the news (if it's even regarded as important enough by your local outlets) to worm its way too you when you can go straight to the source country? Something happening in Brazil? Stream a Brazilian TV report, or read about it on a Brazilian website. Something happening in Croatia - go to a Croatian news site. And so on.

    If you want to know what's happening with BREXIT, go read some British newspapers, or blogs, or forums, for THEIR view. Want to know the Europeans views on BREXIT? Read some German, French, Italian, Austrian and whoever else's reports you want. You don't have to wait for the editors politically-motivated, filtered and 'spun' view you get in your own local news.

    The news industry needs to face the fact that 90% of their revenues was derived from a captive market audience. They need to get over the fact that for most news organisations, that is the only reason they were viable businesses.

    We are no longer a captive market.

    So they need to get over themselves. While once they were a useful service, many of them are now nothing but parasites with a sense of entitlement. They need to adapt like any other business to change.

  • Sep 24th, 2016 @ 5:25am

    (untitled comment)

    Aha!, I knew it:

    Facebook’s increasing dominance over advertising is causing the laying off of journalists, the people who produce the news that it transmits to its users.
    And I thought they reported on the news.

  • Sep 24th, 2016 @ 5:22am

    (untitled comment)

    but who is to say what pictures my grown-up son might eventually come to feel is embarrassing? In the age of social media, I would think it's only pictures of our children that out-mass pictures of our food among those we share with our followers and friends.

    Well, perhaps posting it where only actual friends and family can see it, rather than the 1000's of so-called 'friends' and followers people have on Facepalm, twatter, or whatever this decades flavour is, can see?

    If someone isn't a close enough friend or relative that you would have over for 'a cup of tea' and be allowed to flick through the coffee table family photo album, then perhaps they shouldn't be on a distribution list for photos of your children?

    While embarrassing, I doubt that if the photos were only visible to a few dozen people, grandparents, uncles/aunties, close cousins, family friends, etc., that the now grown-up child would be too terribly upset about them. I mean, the chances are that those people have similarly embarrassing photos of themselves or their kids that can be seen - glass houses....

  • Sep 20th, 2016 @ 11:54pm


    Thiel's Fellowship does involve a ring. Each member has to bow before Thiel and present their ring.

    If they are really lucky, Thiel will only put his finger in the ring.

  • Sep 20th, 2016 @ 10:37pm

    Polish law applies.

    This extradition is happening in Polish courts. It is solely a matter under Polish law at the moment. As it is occuring in Polish courts under Polish law, unless Rothken is allowed to practice Polish law in Polish courts, then in Poland he is NOT a lawyer.

    If defendants Polish practicing lawyer wishes to consult a US lawyer on the ramifications of US law, he is entitled to do so, just like with any other expert consultant or witness.

    Do Polish courts usually allow random consultants/expert witnesses access to a defendant that's being held in custody? In this context (Polish law), in this location (Polish courts), all Rothken is is an expert witness or consultant, he is NOT a lawyer. Therefore he should have no greater access to the defendant than any other non-lawyer would have.

    Now, whether the Polish custodial system should be routinely denying access to non-lawyers, such as Rothken, or say if the defendant had hired a PI, or whomever is another question. But the fact that Rothken is a lawyer in the US does not grant him lawyer-level access in Poland.

  • Sep 20th, 2016 @ 9:24pm

    Re: Food for Thought

    IANAL, but, as I understand copyright under the Berne convention (I _think_ it as Berne anyway...), copyright is automatic and does not require any sort of registration.

    Writing this message here gives me an automatic copyright (or possibly techdirt if that's it's terms of service etc) in this message.

    I send an email I automatically, without having to do anything apart from writing the message, have a copyright.

    Therefore if the original copyright holder changes a work, adds/subtracts anything to it, whether it's a derivative work or regarded as a new work, they have copyright in it without having to do anything at all. THere's no form to fill out, no agency/body to notify, nothing.

    All that registering a copyright does, is:
    1) gives you stronger evidence that you actually do have a copyright - you might be challenged in court as to whether you really do have a copyight, well, if you can produce the original documents that predate someone else who's trying to claim they have it that's good enough, or you can produce the registration (that predates whatever a dispute's date beginning is) that's even better. But you don't have to have a registration to have a copyright.
    2) If you want to claim statutory (as opposed to actual) damages, you can only claim statutory damages from the date of registration. But you can still claim actual damages pre-dating registration.

    /em waits for a lawyer to blow his argument away.

  • Sep 16th, 2016 @ 2:05am

    Re: Re:

    What, another one? Don't we all already have a hole for law enforcement use?

  • Sep 16th, 2016 @ 1:52am

    It's nothing to do with TCP/IP, or p2p, or any other SOFTWARE protocols

    I haven't read through all the comments, but certainly most of the ones at the top seem to be blaming IPv4, or talking about p2p, ditributed computing or whatnot.

    None of those are relevant. They are all software protocols that lie atop the physical, cabling/satellite, infrastructure. And as I understand it, we are talking about the network infrastructure, the CABLES, where they go, where they concentrate, and so on here.

    Have a look at the submarine cable map. Most of the worlds data goes through a few key landing points. And a landing point is a big datacentre/routing point for massive amounts of data. And beyond that, the main trans-continental (land-based backbones) concentrate through a few key distribution points.

    You 'break' half a dozen core physical cable concetration points, you can break an awful lot of the internet. And I'm not talking physical breakage. All the distribution within those conecntrations of cable termination points is done with gateway routers, core routers, and so on. It is these devices we are talking about breaking. These devices that control all the data flow can be hacked, DDoSed, lobotomised.

    Sure, some of it will be worked around, but those key choke points between them provide the lions share of the available bandwidth, well in excess of 60% of the internet bandwidth throughout their regions. Most secondary backbones that bypass those core datacentres are, relatively speaking, low-bandwidth, like satellite, or links to small regional areas etc. So, break half a dozen key regional concentration points, and suddenly the internet in trying to route around the break, trying to jam 100Gb/s (or more) through links that are only 1 or 2 Gb/s. And with the atrocious way that core routers, border gateways cache too much, flow-control will be broken beyond recognition. Suddenly all these 100GB/s+ are choking, breaking the remaining backbones. It's like a traffic jam, there's so much traffic it all sits there going nowhere. And "poof", there goes the internets across very large regions, national if not continental-scale telecommunications failures.

    And it doesn't matter whether you are using IPv6, IPv4, P2P like torrenting, cloud datacentres, TCP/IP, ATM, IPX, (although IPoA will still work fine unless as long as you don't need to interface with any telco's!) it's all irrelevant. All the infrastructure that carries that data will be inaccessable.

  • Sep 15th, 2016 @ 8:38pm

    Re: Re:

    For freshman. Seniors get coached on how to Steele the game.

  • Sep 12th, 2016 @ 11:56pm

    Re: Zero'th Law

    Laws of Stupidity

    Law 0: Stupidity cannot be destroyed, only deflected.
    Law 1: Stupidity expands to fill the space available.
    Law 2: Stupidity flows from the more stupid to the less stupid.*
    Law 3: Too many laws for the stupid to count.

    *Because there is more of it, and it's armed with more clubs.

  • Sep 12th, 2016 @ 2:47am

    Reasonable Effort?

    Apple to FBI:

    "Sure, we could break the encryption on that message. It'll be a brute-force attack, take 18 months and it'll be $6.3Billion dollars in Amazon AWS fees for the compute power. Where should we send the bill?"

    FBI: "This is a really important case, this person's been leaking that the director spits his chewing gum on the sidewalk rather than into bins! We can cover that, send the bill to our head office. We'll indicate the 150 text messages we want decrypted."

    Apple: "150? The quote we gave was for ONE message decryption."

  • Sep 12th, 2016 @ 2:34am

    (untitled comment)

    There are many specific jobs/tasks that fall under the umbrella of journalism.

    Like many professions, a simple descriptor like journalism or journalist is a high-level description of the types of task one may accomplish.

    Like saying someone works in medicine - they could be a medical doctor, a surgeon, a specialist (brain surgeon, oncologist), a nurse, a chemist (pharmicist), and so on.

    Therefore journalist covers several sub-type areas, who each have their function. And of course, the same person can be performing different aspects, or different roles (wearing different hats) depending on the circumstances (or their job at that particular point in time).

    To me, the basic different roles covered under journalism are:
    1) reporting (e.g. news reporter);
    2) Investigative reporting;
    3) Analyst.

    == Reporter ==
    A reporter is exactly that. They are reporting what is happening, the facts. They report what the police said, or witnesses, or what they saw, he said-she said, and so on.

    This is what I expect from the nightly 6pm news shows. A recounting of the facts. I would not expect any personal opinions or analysis of what's going on.

    == Investigative Reporter ==
    This is where we get into someone who 'chases' a particular in-depth story. They interview many people over a period of time, building up a major report. These are the types of situations where I'd expect fact checking, comparisons, calling people out on lies and so on. The ones getting in people's faces to find out the 'truth'.

    == Analyst ==
    Like the title says, analyse intelligence. Where in this case it's getting the reports from reporters, and building up a bigger picture, tasking investigative reporters to root around for them and get them information. A "bigger picture" sort of person.

    Different types of businesses undertake the different types of journalism. The nightly news is mostly just 'reporting'. The current/breaking news in newspapers also.

    The current affairs businesses (60 minutes, Foreign Correspondent, time magazine, wired, TechDirt, all these types of businesses) are of the investigative reporting/Analyst type businesses. Expose's, and so on.

    All of the above ARE journalism, they are just different aspects of it.

    And the same person on different days could be undertaking different aspects. Someone could be known as a hard-hitting investigative reporter, but gets hired by a local TV station freelance to quickly grab a news report of a local event for that night's nightly news.

    Or they could be doing a completely different job. Say, as a moderator at a debate.

    In general, a moderator at a debate is just a referee of the debate, to make sure the debaters stick to their time limits, to pass the questions around, and so on. It is not a moderators job, unless it has been explicitly listed as their job, to analyse, report on, the statements made by the debaters. They are not performing journalism, they are performing debate moderation, which is a different job.

    Hiring a journalist to be a moderator at a debate is no different to hiring anyone else famous, a movie star, a sports star, local celebrity or what have you. The purpose is to make it look good by having someone famous in the mix. And for something like a debate, it just looks better if that famous person is a journalist or similar rather than a front-rower. It's a publicity stunt.

    If you wanted journalism, analytical/investigative-type journalism, you wouldn't hold a debate. You'd hold a series of interviews.

  • Sep 12th, 2016 @ 1:21am

    Re: Re:

    That's what a telephone, postal mail, instant messaging or email are for. Or hell, a drink down at the pub WITH those friends.

    Using facebook to keep in contact with friends is like putting a notice up on the notice board at the local library and expecting your friends to have read it.

  • Sep 11th, 2016 @ 5:28pm

    Re: Re: Proven Resourcing Strategies

    I doubt there's any such restriction on CIs, so put them all on the books as CI's.

  • Aug 31st, 2016 @ 12:01am

    (untitled comment)

    And what happens if I don't login Whatsapp for 6 weeks?

    Because I haven't logged in, does it mean I have accepted the sharing of the data?

  • Aug 25th, 2016 @ 10:24pm

    Re: The Trolley Problem Would Never Happen on a Real Railroad.

    You are getting caught up in the technicalities of the imlementation of a thought experiment, as opposed to what it is asking.

    The thought experiment has set up an analogy to try to explain the experiment that is, admittedly, not fully applicable to the experiment.

    Forgetting the analogy, the thought experiment is asking this:

    If you had 2 exclusive choices, i.e. you could only do ONE of the two choices, which would you choose out of the 2 following options:
    1) take an action that would save the life a number of people (usually 5 or more) but result in the death of 1 person, or
    2) take NO action and allow the number of people (5+) to die, while saving the life of that 1 person?

    Which choice would you make?
    1) take the action, save 5, kill 1, or
    2) take no action, let 5 die, let 1 live.

    Variations on this assign a personal relationship to that single life that could live/die, thus making a personal link to the decision, reversing the no action vs action results (no action 5 live, 1 dies), adjusting the size of the group of people who will be saved/killed.

  • Aug 11th, 2016 @ 9:52am

    Re: Re: IP

    I think it's more likely that what will happen (or what we are aiming to happen here) is it won't be just me with a mesh network spread throughout my house using micro-SDRs (or SDRs built into every device, TV's, microwaves, fridges, light-bulbs or more likely the sockets, toasters, wall-clocks, doorbells and so on). My neighbours, and their neighbours and everyone else will have these mesh networks in their houses, offices, shops, and so on.

    So when I stretch out on the couch and start surfing for pr0n^H^H^H^Heducational materials that I have a License from the copyright holders to access (ahem), there's only a small chance (or perhaps zero if that's how the mesh is configured) that my browsing session will go out my broadband connection. It's about 95% likely to jump from my mesh to my neighbours, and then to theirs, and use some random connection to the internet.

    So any connection to the internet, on a per connection (I'm talking individual TCP/IP connections here, where a single page load in a browser could establish several score separate TCP connections) could either go out my link to the internet, or my next door neighbours, or a link half a city away, traversing a random local wireless mesh network before it finds a suitable (random within your configured QoS guidelines for latency, bandwidth and so on) link to the Internet backbone.

    Therfore you won't be surfing with your ISP-provided IP address, each page you load will be using some random's v4 or a completely random v6 IP address, different every time you load a page (or whatever it is you are doing).

    Of course, if the mesh is implemented badly, or even just poison meshes are involved, ala the Tor compromised exit nodes on so on, then it could still be possible to trace connections.

  • Jul 27th, 2016 @ 5:57pm

    Re: Re:

    Not really.

    As per Article 50, paragraph 3:

    3. The Treaties shall cease to apply to the State in question from the date of entry into force of the withdrawal agreement or, failing that, two years after the notification referred to in paragraph 2, unless the European Council, in agreement with the Member State concerned, unanimously decides to extend this period.
    It requires unanimous agreement to extend.

  • Jul 26th, 2016 @ 6:06pm


    I have some security cameras at home.

    I can access them from the internet.

    First, I have to establish a VPN between my remote device (laptop/phone/computer) with my router, using both a certificate and a (16-character) password. Once I have established this VPN, upon access the DVR that the cameras are connected to, requires another authentication step, a username-password pair, whcih can only be accepted coming via the VPN tunnel.

    Now while anything connected to the internet has a level of security vulnerability, this is pretty secure.

    Perhaps the issues you have are to do with products that require connection to services that are outside your control?

  • Jul 26th, 2016 @ 5:56pm

    Re: IoT Means The Western Nations are Easy Targets

    What's wrong with electronic locks?

    Just because it's electronic doesn't mean it's connected to a network, let alone the internet.

    I have stand-alone electronic locks on 2 external doors. The PINs have to be coded individually on each lock, and the RFID tags need to be associated separately on each lock.

More comments from Eldakka >>