DreamSpinner | 4 years ago | on: USA Today resists FBI subpoena seeking IP addresses of readers of a story
DreamSpinner's comments
DreamSpinner | 4 years ago | on: USA Today resists FBI subpoena seeking IP addresses of readers of a story
It suggests that there's something they're specifically looking to match against - but if that was the case, I would think that specific IP addresses could be provided in the request - e.g. Did any one of these 10 IP addresses view the article in the time period. Much more specific and likely easier to justify.
I'd rampantly speculate that perhaps that time matches to the link being posted in a pedophilia related forum (with the forum behind TOR) - and the FBI would like to get a list of who might have followed it there.
DreamSpinner | 5 years ago | on: Microservices – architecture nihilism in minimalism's clothes
The although both words have the same last two letters - "le", the third last letters are different. This produces a different syllable when pronounced.
DreamSpinner | 5 years ago | on: GardaWorld lost track of millions
https://www.theage.com.au/national/mint-worker-filled-his-bo...
A man smuggled half a tonne of $2 coins out of the Royal Australian Mint in his boots and lunch box and kept notes of when he exchanged the money, a court has been told.
DreamSpinner | 5 years ago | on: 179 Arrested in Global Dark Web Takedown
Here in Australia, you can buy Asthma Inhalers "over the counter" (no prespcription) from pharmacies (Salbutamol). They sometimes do ask if you're seeing a doctor for your asthma, but that's about it. (I take a regular treatment for it)
DreamSpinner | 5 years ago | on: Uber backup driver indicted in 2018 self-driving crash that killed woman
DreamSpinner | 6 years ago | on: Ask HN: Was the Y2K crisis real?
Keep in mind that it was also used as a significant contributing factor to replace a lot of major legacy IT systems (especially accounting systems) at big organisations (a lot of SAP rollouts in the late 90s had Y2K as part of the cost justifications).
The company I worked for ran a Y2K Remediation "Factory" for mainframe software - going through and change to 4 digits, checking for leap year issues, confirming various calculations still worked.
I worked on a full system replacement that was partially justified on the basis of (roughly) we can spend 0.3x and do y2k patches, or spend X and get a new system using more recent technologies and UIs.
There were still problems, but they were generally in less critical systems as likely major systems had been tested, and were remediated or replaced.
Keep in mind that there was often much more processing that occurred on desktop computers (traditional fat client) - so lots of effort was also expended on check desktop date rollover behaviour. Once place I worked at had to manually run test software on every computer they had (10's of thousands) because it needed reboots and remote management was more primitive (and less adopted) at the time.
DreamSpinner | 6 years ago | on: Why Walking Meetings Work
DreamSpinner | 6 years ago | on: WHO Director: "Covid-19 does not transmit as efficiently as influenza"
I'm not sure what to make of it. It might be pure paranoia on my part - but it is an interesting change in the welcome statements that are otherwise generally similar.
https://www.who.int/dg/speeches/detail/who-director-general-...
DreamSpinner | 6 years ago | on: Project Svalbard, Have I Been Pwned and its ongoing independence
In some of his articles discussing various breaches, he mentions reaching out to selected (potential) victims to verify some of the details.
Doing that does require a fair amount of trust by various victims of the people asking to verify.
If I was randomly contacted to verify some details in a breach, I'd be skeptical it was a phishing scheme.
If I was randomly contacted by Troy Hunt / HIBP - then I'd look at it much more seriously.
DreamSpinner | 6 years ago | on: Facebook cancels in-person portion of F8 due to Coronavirus
If there is a non-trivial outbreak, then could it effectively be (for the US), not just a mass virus management exercise - but be followed by a mass-bankrupting due to medical expenses (which are already a big deal just for "normal" life events)
DreamSpinner | 6 years ago | on: Japan's PM to ask all schools to temporarily close
If you're in a service related industry - do you want staff coming to work if they are (or recently) suffering from digestive illnesses? How would an outbreak of people getting sick after being at your facility look? It could potentially result in very very bad publicity - to the point of destroying your business.
If you're running a smaller business / facility - do you want an employee coming in and spreading the illness to your other workers in the early stages of being sick (and then later taking time off)? This could result in your business lacking sufficient staff to open if you can't use labor hire staff.
The reason why it might be good for businesses to provide an incentive (like sick pay) not to work when sick is that it reduces the risk of negative outcomes to the business.
DreamSpinner | 6 years ago | on: Ask HN: Strategy for changing your primary email?
My approach was to use IMAP integration with my provider to copy all the emails down to my laptop.
I then used VBA in Outlook to create a list of source email addresses and counts - then I could update places using those emails.
In your case, i'd do something similar.
Analyse your existing emails to get a list of emails by source address (or domain).
Use that list to figure out what places you need to get updated.
Then (per Sydney1's suggestion) - forward old emails to the new address. Preferably tag it somehow so you know that it means there are other places that need to be updated.
DreamSpinner | 6 years ago | on: Warrantless encryption is a first amendment issue
There's already ample historic precedence for requiring suppliers of goods and services to include side door access for law enforcement.
CALEA comes to mind - it requires communications system providers to include third party listening capabilities.
There are probably (not a lawyer) arguments that could be made that software is speech - and the difference between an "Information Service" vs "Communication Service".
Also, I do wonder how OSS communications software (XMMP etc) might differ under some aspects against commercial software - like Cisco Jabber (which is also XMMP).
Or OSS software written by a private company/startup. Or someone wanting to move their hobby OSS software into a startup.
* https://en.wikipedia.org/wiki/Communications_Assistance_for_...
DreamSpinner | 6 years ago | on: Rubber concrete that self-seals and is cheaper and more environmentally friendly
https://en.wikipedia.org/wiki/Autoclaved_aerated_concrete https://en.wikipedia.org/wiki/Foam_concrete
DreamSpinner | 6 years ago | on: The Saudis Are Lying About Their Oil Production?
DreamSpinner | 6 years ago | on: SpaceX Refused to Move Satellite at Risk of Collision with a European Satellite
DreamSpinner | 6 years ago | on: Some items from my “reliability list”
DreamSpinner | 6 years ago | on: Amazon can be held liable for third-party seller products: U.S. appeals court
In its opinion, the Pennsylvania Supreme Court made clear that courts later tasked with determining whether an actor is a “seller” should consider whether the following four factors apply:
(1) Whether the actor is the “only member of the marketing chain available to the injured plaintiff for redress”;
(2) Whether “imposition of strict liability upon the [actor] serves as an incentive to safety”;
(3) Whether the actor is “in a better position than the consumer to prevent the circulation of defective products”; and
(4) Whether “[t]he [actor] can distribute the cost of compensating for injuries resulting from defects by charging for it in his business, i.e., by adjustment of the rental terms.”
DreamSpinner | 6 years ago | on: “It’s hard to take risks if you don’t have a safety net”
I've never used TOR so I didn't realise that this would apply (and it makes perfect sense it would work that way).
It may be that whoever requested the data knows as little about it as I do (or more likely, they know a lot more about what they want and my speculation is completely wrong).