Eldakka’s Techdirt Profile


About EldakkaTechdirt Insider

Eldakka’s Comments comment rss

  • Aug 11th, 2016 @ 9:52am

    Re: Re: IP

    I think it's more likely that what will happen (or what we are aiming to happen here) is it won't be just me with a mesh network spread throughout my house using micro-SDRs (or SDRs built into every device, TV's, microwaves, fridges, light-bulbs or more likely the sockets, toasters, wall-clocks, doorbells and so on). My neighbours, and their neighbours and everyone else will have these mesh networks in their houses, offices, shops, and so on.

    So when I stretch out on the couch and start surfing for pr0n^H^H^H^Heducational materials that I have a License from the copyright holders to access (ahem), there's only a small chance (or perhaps zero if that's how the mesh is configured) that my browsing session will go out my broadband connection. It's about 95% likely to jump from my mesh to my neighbours, and then to theirs, and use some random connection to the internet.

    So any connection to the internet, on a per connection (I'm talking individual TCP/IP connections here, where a single page load in a browser could establish several score separate TCP connections) could either go out my link to the internet, or my next door neighbours, or a link half a city away, traversing a random local wireless mesh network before it finds a suitable (random within your configured QoS guidelines for latency, bandwidth and so on) link to the Internet backbone.

    Therfore you won't be surfing with your ISP-provided IP address, each page you load will be using some random's v4 or a completely random v6 IP address, different every time you load a page (or whatever it is you are doing).

    Of course, if the mesh is implemented badly, or even just poison meshes are involved, ala the Tor compromised exit nodes on so on, then it could still be possible to trace connections.

  • Jul 27th, 2016 @ 5:57pm

    Re: Re:

    Not really.

    As per Article 50, paragraph 3:

    3. The Treaties shall cease to apply to the State in question from the date of entry into force of the withdrawal agreement or, failing that, two years after the notification referred to in paragraph 2, unless the European Council, in agreement with the Member State concerned, unanimously decides to extend this period.
    It requires unanimous agreement to extend.

  • Jul 26th, 2016 @ 6:06pm


    I have some security cameras at home.

    I can access them from the internet.

    First, I have to establish a VPN between my remote device (laptop/phone/computer) with my router, using both a certificate and a (16-character) password. Once I have established this VPN, upon access the DVR that the cameras are connected to, requires another authentication step, a username-password pair, whcih can only be accepted coming via the VPN tunnel.

    Now while anything connected to the internet has a level of security vulnerability, this is pretty secure.

    Perhaps the issues you have are to do with products that require connection to services that are outside your control?

  • Jul 26th, 2016 @ 5:56pm

    Re: IoT Means The Western Nations are Easy Targets

    What's wrong with electronic locks?

    Just because it's electronic doesn't mean it's connected to a network, let alone the internet.

    I have stand-alone electronic locks on 2 external doors. The PINs have to be coded individually on each lock, and the RFID tags need to be associated separately on each lock.

  • Jul 25th, 2016 @ 5:49pm

    Re: Re: The problem isn't...

    I think ACs point is that SOMETHING (whether it be the OS or the firmware of the host computer itself) on the host system has to initiate the running of whatever is on the USB stick, whether that be loading the USB sticks firmware or executing code on a filesystem on the stick (Autoplay), SOMETHING on the host computer has to initiate that. The USB stick's firmware isn't magical and can't just make the host computer start loading the USB stick firmware. The host computer has to in some way allow that to happen.

    So, the problem ISN'T the USB stick, it's the host system that allows a USB stick to run arbitrary code, whether in USB firmware or on a USB filesystem, without any sort of security checks.

  • Jul 21st, 2016 @ 9:13pm


    We are told the autonomous car is safer because it has the ability of a machine to constantly scan and not be distracted - accept when the machine cannot see that which the car hits. Does not matter how well it scans if it cannot see the danger. This the first fundamental rule of autonomous vehicles?
    This is true.

    However, what relevance it has to a discussion about a collision by a non-autonomous vehicle I have no idea.

    Tesla is not an autonomous vehicle. Tesla's Autopilot system is not an autonomous system. It is a suped-up cruise control.

  • Jul 20th, 2016 @ 8:38pm

    Re: Religions featuring Sacrifice

    Some kinds of Satanism involve sacrifice in effigy, often the pope of the RCC, though there are some that like virgin women.
    They may have been a successful cult/religion in pre-modern times with that requirement. But these days? Good luck in finding said virgin. Probably have more luck finding a unicorn ;)

  • Jul 19th, 2016 @ 7:26pm

    Re: Good, but not as helpful as you might think

    I was thinking this.

    Is there anything in the treaties ISDS provisions that establishes the role of precedents?

    Even if Philip Morris has lost this arbitration, could another tobacco company launch the same case against Uruguay under the same treaty and have that tribunal ignore this precedent and give a different ruling?

    Even if the treaty does specify precedents as binding, what effect does this have on ISDS provisions of OTHER treaties? For example, would this precedent be binding on TPP ISDS tribunals? If Uruguay signs up to TPP, could Philip Morris launch the same action again against Uruaguay under TPP and have that tribunal ignore the precedent set under this treaty and rule differently?

  • Jul 17th, 2016 @ 9:07pm


    He knows content based restrictions on speech won't pass Constitutional muster.
    Are you sure of that?

    There are laws that, based on the plain reading of the constitution, are unconstitutional, but have been implemented and survived constitutional challenges. Usually by the Supreme Court declaring some special state interest, or introducing new legal principles that don't previously exist to make an exception of something.

  • Jul 17th, 2016 @ 9:02pm

    Re: Freedom

    You can believe in anything you want.

    You are free to practice any element of a religion as long as that element doesn't break a law.

    You are freee to believe in a death cult, say a cult that as part of it requires sacrificing 1 human every week.

    You can follow that religion, as long as you don't perform the illegal act of murdering someone. You can WANT it to happen, and complain about the fact that if you do do it you'll be arrested for murder. But as long as you don't actually do that (or any other) illegal act, you are free to believe in, worship and perform the rituals of that religion.

  • Jul 14th, 2016 @ 8:00pm


    Playing Devil's advocate, what they are trying to say is that these services have become a social necessity and first amendment protections should apply. I kind of agree.
    I disagree.

    Faceboook is not a social necessity.

    Facebook is basically a big social club, a REALLY big social club, but just a club nonetheless. It'd be like saying that the YMCA is a social necessity, therefore they have to allow you to post anything (that isn't illegal) on their bulletin boards.

    The Internet is a social necessity. Many of the proocols that are used on it, SMTP, HTTP/S, TCP/IP, SIP, are necessities. For example, email (SMTP) is a necessity. Interfering with email, deleting email messages in transit passing through your mail relay would be actionable under this theory (it's a necessity so first amendment protections apply). However, providing a particular email SERVICE, e.g. gmail.com, outlook.com, other free email providers, is not a necessity.

    If Facebook disappeared, then we'd just go back to Bulletin Boards or maillists. I mean, Facebook is basically just a glorified BB service/portal that's been hacked by spammers to spam you with unwanted advertising.

  • Jul 5th, 2016 @ 5:28pm

    2 words.

    Eminent Domain.

    Utility poles are critical public infrastructure and as such perhaps should be owned by the state rather than the utility companies, as it is likely, as in many places, that the poles themselves are erected on public land or other land that is not actually owned by the utility pole carriers.

    Other alternatives: start charging rent to the utility pole companies, with a rent-waiver or reduction if they allow the access as per the "one touch make ready" requirements.

  • Jun 22nd, 2016 @ 5:31pm

    (untitled comment)

    Zero rating also is seeing support from companies that historically supported net neutrality (Google, Netflix) because these companies are benefiting from the additional traffic and ad eyeballs these programs send their direction.
    The other benefit these companies receive is blocking competition. Buy paying a, probably small, or at least by these companies standards relatively small, amount of money to the ISP, they can block their start-up and other small competitors from competing with them because the small competitors can't afford to be zero-rated. And best of all, it's not GOOGLE's or NETFLIX's fault that start-ups can't compete, can't afford to be zero-rated, oh no, they can point the finger at the ISPs. it's the ISPs fault for having zero-rating.

  • Jun 13th, 2016 @ 11:05pm


    It's ridiculous to ban people from sharing their legally purchased newspaper with other people. What's next?
    Well, I guess you can substitute anything else that currently has some sort of control on it's poseession and/or use:

    It's ridiculous to ban people from sharing their legally purchased firearms with other people.

    It's ridiculous to ban people from sharing their legally purchased explosives with other people.

    It's ridiculous to ban people from sharing their legally purchased drugs with other people.

    It's ridiculous to ban people from sharing their legally purchased smallpox virus with other people.

    It's ridiculous to ban people from sharing their legally purchased plutonium with other people.

    So banning sharing newspapers isn't the thin end of the wedge, the precedent for banning other things later. Governments have been banning (or restricting via requiring licenses/permits) the sharing of things for, well, forever.

  • Jun 6th, 2016 @ 9:17pm

    Windows Update?

    Why didn't they include an analysis (or link to) of Windows Update as well?

  • May 8th, 2016 @ 6:19pm

    Could I also suggest...

    That TD ask some other like-minded sites, EmptyWheel, Popehat, etc, to COPY this story to their sites so that if a supoena with a gag order and a requirement to remove this story arrives...

  • May 8th, 2016 @ 5:30pm


    Login information is circumstantial evidence. It is not proof of anything apart from whose login details were used, not who actually did the logging in.

  • Apr 26th, 2016 @ 9:09pm


    This is a dick-waving contest,
    If he has to resort to legal suppression of free speech to prove he has a big dick, rather than just showing off his dick, then logic would conclude that he must have the dick the size of a newt.

  • Apr 6th, 2016 @ 7:02pm

    Re: Not necessary to create a Group Key

    The problem with your approach tho is that if you had, say, a group of 50 people, this would mean you'd have to encrypt a single message 49 times, once for each member (apart from yourself).

    Encryption is quite an expensive process, running encryption across say a 1MB jpeg 49 times would be very expensive.

    Having a unique encryption key just for that group chat, with each group member having a copy, means a single encryption process for every member to receive an encrypted message.

  • Mar 21st, 2016 @ 4:58pm


    Crude, very crude.

More comments from Eldakka >>