DanJ’s Techdirt Profile

danj

About DanJ Techdirt Insider




DanJ’s Comments comment rss

  • Apr 30th, 2019 @ 12:31pm

    Re:

    A documented Telnet capability with documented default account credentials isn't a backdoor. An undocumented default account or an undocumented Telnet capability, particularly one that isn't visible or obvious in the default GUI configuration tool, is a back door. The existence of a backdoor doesn't mean it was either intentional or nefarious. It might very well be a mistake. Bloomberg's accusation looks to be premature and overwrought, but Vodaphone's response is something of a non-sequitur. There's also nothing about the telnet protocol that makes it inaccessible from the internet, and it's absolutely possible to use the telnet protocol as a backdoor. Without additional details - was telnet ONLY enabled on internal interfaces, was there undocumented accounts, etc. - it's not possible to know what was going on here.

  • Dec 18th, 2017 @ 1:02pm

    Re: Re: Who owns the Superchargers? (as Dan J.)

    Yep. You're absolutely right and I'm well aware of it. What Tesla did absolutely should NOT be illegal. But that doesn't change the fact that Tesla artificially limited what the vehicle was capable of doing for no good reason in my book. They couldn't get get enough 60KwH batteries? Guess what, customer, you got lucky and got extra range due to our problems with our supply chain! That would be the decent thing to do. What Tesla chose to do instead was scummy and reflects poorly on them in my view, even if they were allowed to do it.

  • Dec 18th, 2017 @ 12:29pm

    Who owns the Superchargers? (as Dan J.)

    I don't have an issue with this one. Tesla isn't controlling what you can do with the car you bought. They're controlling what you can do with THEIR Superchargers. Big difference. The other issue - giving extended range - I find much more troubling. First, it's completely absurd that they can update your car without asking your permission. Second, the fact that they're artificially limiting the range is equally absurd.

  • Apr 26th, 2017 @ 10:13am

    Re: When Google started, it was the little guy (as Dan J.)

    Largely agree with you but have to pick one nit: Google didn't have a better idea. They had a better implementation of the same idea. Ideas are cheap and worthless. Implementation is the difference between success and failure.

  • Apr 20th, 2016 @ 5:34am

    Re: (as Dan J.)

    I think one of the things missing from the discussion is how shallow the relationships are. If you base your relationships on how someone looks rather than who they are, then you will be sorely disappointed at some point as they get old and ugly, like just about everyone does.

    The discussion doesn't say that the relationship is based entirely or even largely on physical appearance. It simply says that the physical attractiveness within the relationships tend to be symmetrical. In order to develop a deep relationship based on something other than physicality, you have to get to know someone. But before you can get to know someone, you have to meet them. And if everyone you meet (off the dating site) is reasonably close to your own attractiveness, then the only people you have a chance to develop a relationship with are inevitably going to be similar in attractiveness to you.

  • Apr 15th, 2016 @ 9:02am

    Clinton and Obama (as Dan J.)

    Why do you think the government agents in the know were pushing so hard for Obama and Hillary Clinton to get rid of their Blackberrys?

  • Jan 13th, 2016 @ 7:37am

    Re: Easy (as Dan J.)

    ANY SMARTPHONE THAT IS MANUFACTURED ON OR AFTER JANUARY FIRST, TWO THOUSAND SIXTEEN, AND SOLD OR LEASED IN NEW YORK, SHALL BE CAPABLE OF BEING DECRYPTED AND UNLOCKED BY ITS MANUFACTURER OR ITS OPERATING SYSTEM PROVIDER.

    Apple could now commence selling smartphone kits.

    The user then becomes the manufacturer and so is thus only one who must be able to decrypt it.


    What the hell does it mean to "decrypt and unlock" a cellphone? What if I can install a 3rd party app that securely encrypts my data. Is that phone still illegal? If so, then isn't ANY cell phone illegal to sell?

    If not, then what if Apple (or anyone else) sells a cell phone with a minimal OS that includes no encryption at all, and, after the purchase is complete, offers a downloadable upgrade that installs a highly robust encryption feature? For that matter, they could provide a service to upgrade the phone at the Apple store as soon as the cash register ring echo dies away.

  • Feb 25th, 2015 @ 7:24am

    Re: Having Been Hacked (as Dan J.)

    To be clear, Gemal is claiming that the SIM keys were not compromised. They say that the hacking was of their office network and that the sim keys were not stored on that network at all, and that there is no evidence that the hackers breached the internal network where the keys are stored. They may very well be lying, but their claim is not that someone else having the data is harmless; they're saying no one else has the data.

  • Jan 24th, 2015 @ 11:25am

    Re: Re: (as Dan J.)

    Either way, the state gets to keep the assets of a citizen. What about that doesn't smack of asset forfeiture?

    What doesn't smack of asset forfeiture? Pretty much everything. I'm not in favor of this specific change to the law but there's a HUGE difference between this and asset forfeiture. If you're driving without insurance, you're breaking the law, and it is, in principle, a reasonable law. If you cause a wreck and have no insurance, someone else gets to pay for the consequences of your bad decision. The law is intended to protect the innocent victim. I have no heartburn with the general principle of having a law requiring automobile insurance if you're driving on a public road and with having reasonable consequences for breaking that law. If you're caught speeding, you get fined. You pay the fine and guess what - the state gets to keep your assets. That's how fines work. It's the inherent nature of a fine. The problem with asset forfeiture is that you don't even have to be breaking the law, and there is no reasonable way for you to contest the issue. If asset forfeiture laws required that you be charged and convicted with a crime before your property was permanently confiscated and that the relationship between the assets being forfeited and the crime was reasonable (ie you don't forfeit your house for selling a dime bag), then I'd have much less heartburn with asset forfeiture.

  • Jan 20th, 2015 @ 12:00pm

    Moral equivalence? (as Dan J.)

    The very thing that was attacked in France is now being attacked by France, though obviously with litigious weapons instead of firearms. This isn't to suggest any moral equivalence between the two, of course, only that free speech is one of those areas where you're either for or against.

    Why wouldn't you suggest a moral equivalence? In both cases, the assailant uses force to impose silence on the victim, justified by the claim that they're specially privileged in being authorized to use said force. One claims a special disposition from a deity, the other is a member of a group (government) which they claim has special disposition. Granted, one tends to use deadly force a bit quicker but I'd call that a difference in degree of application, not a fundamental difference in kind.

  • Jan 13th, 2015 @ 6:15am

    Re: dog poop.. way to go guys... (as Dan J.)

    Obviously, stuff like this will come in the future, but the focus that novelty / "dumb" applications like changing the smell of your dog's shit make me weep for humanity.

    I think that's kind of like saying "This computer stuff will change the world but thinking of the focus being on applications like 'Flappy Bird' makes me weep for humanity."

    It's not like the technology will be in limited supply. There's no reason it can't be used to make dog shit smell like key lime pie and to cure muscular dystrophy at the same time.

  • Jan 13th, 2015 @ 4:17am

    Draw the Line? (as Dan J.)

    Where -- and how -- do we draw the line here?

    I think a better question would be are we even able to draw the line? The only way I can see of drawing the line is a nightmare scenario of outlawing any research coupled with draconian enforcement and even that's almost certain to fail. The technology will be developed, information about it will spread, and it will become easy and cheap enough that individuals or small groups will be able to put their own lab together in secret if desired. How the hell do you draw a line around that?

  • Dec 30th, 2014 @ 7:43am

    Re: Re: Re: (as Dan J.)

    That depends on what you mean by "breakable." Many of the current algorithms are essentially unbreakable in that if you had every computer in existence working on them it would still take longer than the existence of the universe to brute force them. Whether this results in absolute security, however, depends upon a large enough key, the key being random, the software implementation of the algorithm not containing exploitable bugs, etc. Those are mighty big assumptions. But if you're reasonably smart about crypto and use reasonable practices, you can encrypt things now and through the foreseeable future which neither the NSA nor anyone else will be able to read by breaking the encryption. That doesn't mean the NSA won't get your communications, however. A key can get compromised. In order for your recipient to read the message, they have to decrypt it and the system doing the decryption can be compromised and the plain text exposed. Etc. In other words, there are many avenues of attack other than just breaking the encryption and the NSA is quite good at all of them. So if you're saying that any communication can conceivably be compromised, then yes, I agree. But if you're saying that any method of encryption can be directly broken given enough computer horsepower, then I'd strongly believe that to be incorrect. If it IS correct, then the NSA has made some startling and revolutionary advances in the field of mathematics which would shock the world.

  • Dec 30th, 2014 @ 4:05am

    Re: (as Dan J.)

    For whatever it's worth, I'm a network engineer who's set up a large number of IPSec connections and I strongly concur. Additionally, I'm really curious as to the details of cracking SSH. I'd be willing to wager that the sessions they're able to crack use small key sizes.

  • Dec 23rd, 2014 @ 4:53am

    Not the negotiators (as Dan J.)

    The NFL's lawyers in particular appear to have been muzzled by whoever in the league is negotiating with broadcast partners, because ESPN's mark is just begging for opposition.

    My bet isn't that they were muzzled by the negotiators but that they really don't want to set a precedent. If the NFL challenged the trademark, anything they say to argue against that trademark would almost certainly be brought up in any lawsuits against their own ridiculous trademarks. They don't want to rock the boat.

  • Dec 20th, 2014 @ 11:22am

    Re: Victims (as Dan J.)

    The only thing I'd add to this is that a civilian who's involved in an incident with the police should be able to obtain a copy of the video without having to hire an attorney and seek a court order. There will be little or no deterent to police violence if they know I have to jump through all sorts of legal hoops to get the video if they boot me in the head. Many of the victims of police violence can't afford to pursue the issue if it takes even a minimal outlay of money.

  • Dec 18th, 2014 @ 9:40am

    The Children! (as Dan J.)

    But you have to think of the children! Oh, wait, I'm sorry. No, don't, don't think of the children!

  • Dec 17th, 2014 @ 10:55am

    Re: Re: Re: Re: A Rose by Any other Name (as Dan J.)

    Have you dug into how this works at all? The CDNs are "embedded Open Connect Appliances." The exist ON the ISPs network. That's what "embedded" means. You say "There's nothing preventing you from [building your own cdn]." But how likely is BigCellCompany to allow me to install an appliance inside their network?

  • Dec 16th, 2014 @ 4:46am

    Re: (as Dan J.)

    Mike may or may not hate IP law but he's clearly biased against kale. "Tasteless leaves?" Kale is certainly not tasteless and if the dish served is in fact tasteless that's clearly an issue with the cook preparing the dish, not an inherent issue with kale. Let's put the blame where it properly belong and leave personal biases and prejudices out of the discussion.

  • Dec 16th, 2014 @ 4:42am

    Re: Re: A Rose by Any other Name (as Dan J.)

    I was coming here to say much the same thing. The whole concept of what constitutes "net neutrality" is a bit slippery, as was noted on a recent article here. But one of the major complaints against violations of net neutrality is that they lead to an unlevel playing field. If BigCellCompany Video Service gets a last-mile fast lane and Netflix does not, Netflix is at a competitive disadvantage - their services are slower and less reliable than BigCell's and so less desirable to the customer, all other things being equal. Doesn't the same apply here? If I start Dan's Video Service and my video has to traverse the Internet while Netflix has a CDN sitting at the ISP edge, they have a huge advantage over my service in terms of speed and reliability.

More comments from DanJ >>