* Posts by Mike 137

3969 publicly visible posts • joined 10 Sep 2009

UK data watchdog having a hard time making GDPR fines stick: Marriott scores another extension, BA prepares to pay 11% of £183m penalty threat

Mike 137 Silver badge

Re: So net loss to the taxpayer

Actually, it's not any kind of loss to the taxpayer (at least not directly). The ICO is not funded from taxation (to avoid any suggestion of conflict of interest if it takes action against a government entity). Nor is it funded by fines (to avoid any suggestion of vested interest). It's funded from the registration fees, which, although not proportional, are scaled in accordance with the size of the registrant organisation.

Given this position, going after large companies has clearly nothing to do with revenue for the ICO, but it may be good for raising its profile, and that could well be necessary if the ICO wants to remain recognised by the EU. That in turn could at least unofficially affect whether or not the UK gets its adequacy decision swiftly (or indeed at all).

Mike 137 Silver badge

A non-optimal strategy

The UK Information Commissioner has publicly declared that the ICO will concentrate on going after the big offenders and aiming for large fines. This is clearly good for raising the profile of the ICO, but it has the following disadvantages:

[1] it preferentially selects those best equipped to challenge any action against them

[2] it consumes resources on a few cases that might otherwise be applied to dealing with large numbers of meritorious complaints

[3] it does not deter the majority of offenders as they consider themselves under the radar.

Only by pursuing a reasonable percentage of the majority-scale abuses will the legislation ultimately be made to stick. For example, I've been conducting research into the quality of privacy notices since May 2018, and out of hundreds I've only found literally a couple that actually comply with the requirements of the GDPR. Somewhat surprisingly, the ICO's own template privacy notice for SMBs doesn't. It requires all the statutory information, but presents it in a manner that prevents the exercise of data subject rights in respect of specific purposes and processing. This is not trivial. The privacy notice is the primary basis on which a data subject must initially rely to exercise their statutory rights. If it prevents them doing so, that is itself an offence under the principles of transparency and accountability (inter alia Articles 5 and 12).

Leaky AWS S3 buckets are so common, they're being found by the thousands now – with lots of buried secrets

Mike 137 Silver badge

Re: Outsourcing

"so why aren't people doing it?"

In my experience, because once the "cloud" is adopted, the internal folks who previously managed security are typically "let go".

One of my clients a while back actually TUPE'd its entire IT staff to the cloud provider they'd contracted with, expecting to get the same level of attention from them as when they worked exclusively for that client. Of course, my client was just another contract among many under the new arrangement.

I had the unenviable job of trying to sort the mess out, and the only way would have been to engage an on-premise tactical IT security management team to oversee the outsource. However that thwarted the purpose, which was to minimise the IT overhead on the balance sheet.

You get no more security than you deserve.

You think the UK coronavirus outbreak was bad? Just wait till winter: Study shows test-and-trace system is failing

Mike 137 Silver badge

Re: Really?

Yes AC, that's the message. But centuries of experience have shown that giving people false confidence in the face of a real threat doesn't mitigate that threat. It may even exacerbate it.

At least as late as the 1960s, high court judges carried a posy of flowers into Court. This originated in the 18th century from the mistaken idea that the scent protected against "gaol fever". It didn't. Neither did the amulets people wore protect against the great plague in the 14th century. Both gave them confidence but they died just the same.

Mike 137 Silver badge

Re: Really?

"...many spectacle-wearers steam up ..." just shows how ineffectual arbitrarily designed and fitted cloth masks are. The air (and therefore potentially the virus) is not being filtered through the mask, it's rushing in and out round the edges without being filtered.

There are numerous objective studies that show the type and the fit of a mask are crucial to whether it works or is just a complete waste of time. However the public are told not to use the types that do work, but instead to use the types that don't. This is not based on science - it's based on a desire to demonstrate to the public that the powers that be "take COVID seriously" in the face of a problem that nobody can in reality be entirely in control off. It might be better to admit that openly.

NSA warns that mobile device location services constantly compromise snoops and soldiers

Mike 137 Silver badge

Open shared infrastructures are ...

Open. This is inevitable, so open shared infrastructures should not be used where their openness can lead to hazard. I would have thought this was blindingly obvious. Not for nothing was frequency hopping point to point radio invented and widely used for secure communications before the "smart phone" took over the planet.

Chinese debt collectors jailed for cyberbullying under ‘soft violence’ laws

Mike 137 Silver badge

jailed under 'soft violence' laws

Apparently only hard violence is acceptable.

University of Cambridge to decommission its homegrown email service Hermes in favour of Microsoft Exchange Online

Mike 137 Silver badge

Re: "IETF standards – at least not competently"

It's worse than that. MS mail clients don't even generate plain text parts for HTML emails properly. It obviously uses the HTML as the source and incompetently strips out the HTML tags. Incompetently because it ignores line ends that immediately follow HTML tags, leaving them in place. Consequently the plain text part includes masses of vertical white space, making it very hard to read and impossible to print without copying to an editor and reformatting.

Looks like they just do a linear search, deleting everything between '<' and '>' inclusive, but this is such a simple problem to solve: just check whether there's a CR/LF (or whatever alternative line end) immediately following the '>' tag close and if so delete that too. Might have to allow for white space between the two, but that's not hard either. They obviously haven't heard of regex (or at least they're not very good at it).

Doctor, doctor, got some sad news, there's been a bad case of hacking you: UK govt investigates email fail

Mike 137 Silver badge

Change one word for reality

"It is completely predictable that the Russian Intelligence Services are targeting those working to combat the coronavirus pandemic,"

The Russians have been messing with our (and many other nations') social, scientific, economic and political life for over 200 years. We should expect that as it's part of the culture.

Virgin Galactic pals up with Rolls-Royce to work on Mach 3 Concorde-style private jet that can carry up to 19 people

Mike 137 Silver badge

Full circle?

In the mid-eighties I worked on a project called HOTOL - a planned stratosphere capable aircraft that could operate as a jet at normal altitudes or a sort of super speed rocketty thing in a high altitude rarefied atmosphere. Lovely notion, but sadly, it never got off the ground.

'We stopped ransomware' boasts Blackbaud CEO. And by 'stopped' he means 'got insurance to pay off crooks'

Mike 137 Silver badge

Re: No consent for data sharing in the first place

"... never sought my consent to share my details [...], which is a GDPR violation"

Not necessarily. Data sharing may be performed on several alternative lawful bases, of which consent is only on unless the data falls into the Article 9 sensitive categories. Consent would only apply if that were the lawful basis declared by the data controller as being relied on for the specific purpose.

Of all the lawful bases, consent has received the lion's share of press, and therefore public, attention, resulting in a common but mistaken assumption that it is mandatory in all cases. Indeed if another lawful basis is legitimately relied on, consent can not be invoked, as only one lawful basis can be relied on for each specific purpose.

Architect of tech contractor tax fraud scheme jailed for at least five years

Mike 137 Silver badge

So much for 'umbrella' services

HMRC should take note, as contractor tax fraud is clearly not always conducted by the contractors. I guess nothing will change their position though as it's never been based on evidence.

For Apple's latest trick, the iCockroach – allowing it to survive while the smartphone sector faces a nuclear winter

Mike 137 Silver badge

Actually...

Actually it's a myth that cockroaches can survive nuclear radiation. They're protein based just like other organisms and the proteins get scrambled just like eggs. What is true is that any cockroaches that succeed in surviving (by e.g. being protected in basements &c.) will swiftly take over as [a] they're scavengers and there'll be a lot to scavenge and [b] they breed "like flies".

Burn baby burn, plastic inferno! Infosec researchers turn 3D printers into self-immolating suicide machines

Mike 137 Silver badge

For want of a nail (thermal cutout actually)

"While there was code preventing the printer head from exceeding 261°C (501.8°F), Coalfire claimed it was able to bypass it"

Relying on a software controlled thermostat alone seems fragile. When I was designing and building high temperature equipment, we always built in at least one bimetallic thermal cut-out so everything would shut down before anything caught fire. They cost no more than a couple of dollars in one-off quantities (much less in bulk). Obviously the makers didn't think of this.

First rule of Ransomware Club is do not pay the ransom, but it looks like Carlson Wagonlit Travel didn't get the memo

Mike 137 Silver badge

<sarc>Nice precise guidance</sarc>

"... If it's likely that there will be a risk then you must notify the ICO ..."

What a muddle! Of course there's always a risk - the real question is what the level of risk is. And of course likelihood is one of the two parameters of risk - the other being consequence, so "likelihood of risk" is both specious and tautological.

Official guidance should be neither, so why does the guidance not say something like "if there is a high likelihood of significant harm to the rights and freedoms of data subjects..."?

Maybe because the use of the term "risk" in the vernacular has always been utterly sloppy and even risk professionals in general don't seem to use a consistent definition of it. It's about time we did.

Amazon and Google: Trust us, our smart-speaker apps are carefully policed. Boffins: Yes, well, about that...

Mike 137 Silver badge

No surprise there

I remember a public presentation by a well known data protection consultant, who said "your privacy policy is PR". And so it seems for almost every Europe relevant privacy policy we've examined in the course of a couple of years of research. Less than 0.5% have been even broadly compliant with the GDPR and literally only a couple have essentially been fully compliant.

No wonder Brit universities report hacks so often: Half of staff have had zero infosec training, apparently

Mike 137 Silver badge

part of normal induction

Making it part of normal induction probably wouldn't help that much as normal induction is generally a perfunctory exercise run from a checklist. One time training won't stick either. Unless the entire corporate culture is security aware, nothing will really help. A lax culture breeds lax habits, and most corporate cultures I've encountered in a couple of decades of risk consulting are lax. Even "standards compliance" is rarely more than a paper exercise to satisfy periodic audit.

Just for example, "don't click on links" doesn't work where the Board regularly circulate emails containing links to documents "all staff must familiarise themselves with". Expecting a busy non-technical staffer to be able to distinguish between a genuine email from the CEO and a bogus one is pie in the sky.

However it shouldn't be possible for malicious code run at a user's workstation to spread throughout the infrastructure. Setting up and managing your infrastructure so it contains breaches locally rather than letting them spread globally is not beyond the realms of possibility. But this is rarely done, witness Equifax among many others. The fundamental problem is not expert adversaries, but inadequate defenders.

Reply-All storm flares as email announcing privacy policy puts 500 addresses in the 'To' field, not 'BCC'

Mike 137 Silver badge

Actually ...

A well known international standards organisation does this all the time, and I'm certain that they're not using a manual process. The big problem seems in general to be that marketing and "communications" folks don't get (probably don't ask for) technical support for mass mailings, they just treat them the same as internal communications because nobody gets training in using email clients so they don't know what they're actually doing technically, or its implications.

New Zealand government to explain its algorithms to stop robo-bias warping policy

Mike 137 Silver badge

strange notion?

It's a weird notion that an algorithm is something [a] conceptually new, [b] necessarily complicated, and [c] impossible to explain.

Every single piece of code ever written is a realisation of some algorithm (even Turing's machine). The fundamental question is whether the algorithm is understandable. if not, it's a bad one. Implementing things you don't understand is dangerous.

Google allowed to remember search results to news articles it was asked to forget. Good

Mike 137 Silver badge

Suing the wrong party

"The pair sued Google to prevent online searches that included their names from displaying links to the article and images."

It would be more effective and rational to sue the host of the relevant article in order to get it taken down. The GDPR "right to be forgotten" (Article 17) is legitimately exercised against the Data Controller, and it is highly questionable whether Google is the Data Controller in such cases as this, as it's the content that is being objected to, not the listing per se.

Article 17.2 states:"Where the controller has made the personal data public and is obliged pursuant to paragraph 1 to erase the personal data, the controller,[...] shall take reasonable steps, [...] to inform controllers which are processing the personal data that the data subject has requested the erasure by such controllers of any links to, or copy or replication of, those personal data."

This effectively means that the party that might be expected approach Google to remove the listing is not the Data Subject but the host of the disputed content pursuant to the exercise of the Data Subject's right under Article 17. In any case, if the content were taken down, Google's listing would probably quite soon get purged by its bots failing to find it any more.

Class move, Java. Coding language slips to third place behind Python in latest popularity contest

Mike 137 Silver badge

Questionable statistics?

I'm always very dubious about these statistical reports drawn from unavoidably self-selected sources. For validity, it should be qualified by "among those submitting to github or posting on stack overflow...". Both represent a very small sample of the entire population of software development, quite apart from which the two are not comparable. Github primarily represents professional grade open source development, but stack overflow is primarily populated by often quite elementary questions from relatively inexperienced coders, and answers thereto from similar responders. There is of course also the question of the development target. Online and cloud development is typically performed using different languages than native application development. The first four entries in this list strongly suggest a web development bias.

A parallel survey of languages used internally by closed source development houses for mainstream products would be an interesting comparison.

Microsoft runs a data centre on hydrogen for 48 whole hours, reckons it could kick hydrocarbon habit by 2030

Mike 137 Silver badge

Re: Hydrogen is not the answer

Sounds like a seriously wasteful energy cycle:

[1] use solar generated electricity to electrolyse hydrogen from water

[2] compress hydrogen using (very likely) electric power

[3] use hydrogen fuel cells to generate electricity

WTF is cloud-tethered compute? We're not sure either, but it just made a hype cycle for the first time

Mike 137 Silver badge

Re: cloud-tethered compute

"... the kids that relearn everything every 20 years"

and learn less well at each cycle. Whatever the buzz phrase technology, we can be sure the implementation will be more fragile and bug ridden each time it comes round.

Congrats, First American Title Insurance, you've made technology history. For all the wrong reasons

Mike 137 Silver badge

The RFC 2616 GET (anything you want) method

The use of GET without sanitisation, validation or authentication is so appallingly common that this is just another example. Brilliant that it's being prosecuted though even if only at state level. Interesting that it's under "cybersecurty" and not "data protection" or "privacy". Maybe we in the UK would do well to follow this lead, seeing how toothless our data protection regulation seems to be (and it can only get worse from 2021 on).

Ubiquiti, go write on the board 100 times, 'I must validate input data before using it'... Update silently breaks IDS/IPS

Mike 137 Silver badge

"This is a beta service for [their security] products"

Two points:

[1] a beta security service operating live?

[2] just shows what we all guessed - security appliance software development is as sloppy as it is for everything else.

So much for "cyber security".

VMware to stop describing hardware as ‘male’ and ‘female’ in new terminology guide

Mike 137 Silver badge

Re: @aberglas - You had better take these seriously

They don't have to be Marxists. What we're dealing with is authoritarianism regardless of lateral positioning. It's a burgeoning force worldwide right now and it's darned dangerous - see this for example.

Mike 137 Silver badge

Who is Shirley? did you and the previous poster mean "surely"?

UK surveillance laws tightened up as most spying demands to be subject to warrants

Mike 137 Silver badge

"must now get the permission of your telco or postal service"

I wonder how hard that will be - most likely "roll over and hand over"

Ex-boss of ICANN shifts from 'advisor' to co-CEO of private equity biz that tried to buy .org for $1bn+

Mike 137 Silver badge

"Ethos Capital refused to divulge who all the directors of those companies actually were"

Only in the USA could this be taken as a normal state of affairs. In most countries there are laws mandating disclosure of directorships. Yes, there's a lot of fiddling (witness some of the more interesting entries in the UK companies register), but the principle stands and mostly works.

UK intel committee on Russia: Social media firms should remove state disinformation. What was that, MI5? ████████?

Mike 137 Silver badge

Interestingly ...

The only place you can download this report from seems to be goooooogledocs, which requires you to run a shitload of potentially snoopy javascript in order to get at it.

I wonder why this report is not available from the parliamentary web site via a simple hyperlink. Might they be trying to discourage security conscious members of the public from reading it? Or are the brains just turned off as usual?

Nominet shakes up system for expiring .uk domains, just happens to choose one that will make it £millions. Again

Mike 137 Silver badge

The real problem

The way .uk domains are sold to third parties is not the real problem. That is trade mark infringement. A domain name that replicates a trade mark should not be saleable by any means to anyone except the trade mark holder. And that should not apply solely to registered trade marks, but should also apply to unregistered trade marks that have become established by use. The new TLD will in most cases not differentiate sufficiently to eliminate the public confusion wrt a trade mark, so any such conflicting domain names should be available exclusively to the trade mark holder. Sorry about the loss of revenue, but for Nominet to aid and abet trade mark infringement can only bring it further into disrepute, and ultimately might land it in the dock if right were right. Unfortunately it doesn't seem to be when there are bucks to grab.

Capita's bespoke British Army recruiting IT cost military 25k applicants after switch-on

Mike 137 Silver badge

"it must still pay maintenance fees to Capita for the upkeep of the software"

"Upkeep"? You mean "so they might finally get it working properly"?

I'm still amazed everyone just accepts that software will always be delivered in a crap state and require constant fixing until it goes obsolete. Try the same with real estate and see what reaction you get.

If you can read this, your Windows 10 2004 PC really is connected to the internet no matter what the OS claims

Mike 137 Silver badge

Thank you TheresaJayne

you may have solved our problem (see post above).

Mike 137 Silver badge

Bad but not so bad as ...

I have two Win7 professional laptops of different brands. Each periodically stops connecting to the network (even the local network) and then mysteriously reconnects a few restarts later. being connected but misinformed is a minor irritation by comparison.

India drops the bar on e-commerce seller's listings: You want to sell it? Tell us where it came from from then

Mike 137 Silver badge

An excellent move

Something we could well adopt here in Blighty, but it should go even further. Even trade supplier of goods price at several grand commonly present a photo of the item discreetly labelled "for illustration only" or in one notable case "representative or range" where the "range" encompasses devices with a five to one price range. At the low end we get statements such as "goods supplied may not always match description/illustration".

This used to be called buying a pig in a poke and it was in the past considered fraudulent to try selling like that. Now it's the norm.

The volcanoes on Venus aren't dead, say astroboffins, they're merely resting, pining for the planet's lava fjords

Mike 137 Silver badge

"they're merely resting, pining for the planet's lava fjords"

but are they blue?

UK formally abandons Europe’s Unified Patent Court, Germany plans to move forward nevertheless

Mike 137 Silver badge

Patents are a complete mess worldwide, so ...

This may not make much difference to the actual protection afforded intellectual property as for international protection you have to take out patents in so many countries anyway and the rules are multifarious. The US tops the bill though as first filing allows patenting of a competitor's unpatented product even if it's already on sale, and most patents seem to be granted without much scrutiny. There seems to be a general assumption that post-grant litigation will sort out any resulting mess. Of course it can, but only if the offended litigant can afford to pursue it. Oh the joys of unregulated markets.

Networking boffins detect wide abuse of IPv4 addresses bought on secondary market

Mike 137 Silver badge

Unfortunate but not unexpected

This is not specific to IPv4 addresses. Whenever there's a slackening off of governance there are opportunities for fraud, and such opportunities are soon spotted and exploited by opportunist fraudsters. Where's the surprise in that?

Germany bans Tesla from claiming its Autopilot software is potentially autonomous

Mike 137 Silver badge

"prepared to take over at any momen"

A complete failure to understand human psychology. Reaction time is many times longer when task switching, so a "driver" using Tesla "autopilot" is never going to be prepared to take over - they're always going to be unprepared.

Lock down your data – or get the cheque book out: ICO privacy violation fines are rising, say lawyers

Mike 137 Silver badge

Observant!

'"This suggests that the ICO is being selective about its enforcement targets," said Richard Breavington'

You don't need a law degree to spot this. However a basic principle has escaped everyone concerned. If you don't nip abuses in the bud they become ingrained and accepted as normal practice. As data protection consultants, since the GDPR came into force we've only found a couple of privacy "policies" that actually comply with the law. Indeed, the last time I looked, the ICO's own template "policy" for SMEs didn't. It requires all the statutory information, but not in a manner that allows the data subject to exercise their rights (which is what "transparency" actually means).

Anyone for a round of Ging Gang Goolie? Solar Orbiter probe snaps little 'campfires' flickering on Sun's surface

Mike 137 Silver badge

Fascinating

Also one hell of a piece of engineering! On the radio news this morning they were talking about temperatures of hundreds of degrees on the heat shield through which this telescope peeks.

Privacy Shield binned after EU court rules transatlantic data protection arrangements 'inadequate'

Mike 137 Silver badge

"... the standard contractual clauses remain a valid tool ..."

"The Court of Justice declared the Privacy Shield decision invalid, but also confirmed that the standard contractual clauses remain a valid tool for the transfer of personal data to processors established in third countries."

Which is jolly funny as it was pointed out a couple of years back that the standard contractual clauses don't entirely comply with the GDPR. Not really surprising as they were defined in 2001, 2004 and 2010.

The UK ICO wasn't interested when we pointed this out either. Yet another example of "compliance" in quotes?

As internet governance meetings go virtual, compromise becomes harder to reach

Mike 137 Silver badge

Re: "The lack of corridor diplomacy affects participants’ ability to network"

Yes Pascal

However you still won't have the body language/subliminal signalling that drive effective conversation for those who are perceptive enough.

The online presentation simply can't reproduce this. For those not perceptive enough, that will make no difference, but their interactions are by definition less effective anyway. We all know colleagues who never seem to be listening (even when they're not interrupting). But if you can't sense whether they're listening or not, your presentation will suffer even if they are.

Mike 137 Silver badge

Entirely valid if not entirely unforeseen

Compromise is not the only thing that's hard to reach. Productivity an quality can also suffer.

Any form of discussion that eliminates spontaneous interaction is inefficient, as fast feedback contributes a lot to clarity and relevance. Online, one person at a time gets to hold the floor.

As an extreme case of this, I contribute to standards development, the mechanism for which is isolated parties independently commenting on drafts, the accumulated comments being then filtered and summarised by editors. The results of this process are slow progress, mixed messages and inaccuracies. Elsewhere, I have participated in design meetings where ideas are interactively thrashed out, and these by comparison are efficient and effective.

Companies toiling away the most on LibreOffice code complain ecosystem is 'beyond utterly broken'

Mike 137 Silver badge

Re: This...

I entirely agree. The primary benefit of SaaS is the subscription required to keep using it, and that's not a user benefit. And "cloud" is increasingly frequently breaking down, preventing work being done on time.

The biggest problem with Libre Office (and previously Open Office) is still incompatibility with MS. I still can't create a slide presentation on LO and be assured it won't break when presented on PowerPoint at my speaking venue. If such problems were assuredly fixed, there'd be little question that LO would largely take over from MS office.

But as to funding development, there should be a way for TDF to channel donations to developers. Many charities here in the UK have commercial side-services that don't jeopardise their charitable status.

Report: CIA runs secret cyberwar with little oversight after Trump gave the OK, say US government officials

Mike 137 Silver badge

A question

Question: when does "national security" precipitate international insecurity?

Answer: as soon as you remove the oversight.

To quote Geoffrey Pelt (The Hunt for Red October) "wars have begun that way..."

AMD pushes 64-core 4.2GHz Ryzen Threadripper Pro workstation processors

Mike 137 Silver badge

Questions

Given 2 TB of RAM, wonder how long it will take for software bloat to eat up this performance.

It also seems to me as an engineer that 2 TB of RAM is a huge target for transient bit errors, so I wonder what the long run time reliability will be.