miglmj's comments

miglmj | 4 years ago | on: Restaurant menu tricks (2020)

This is less about the practicalities of "what currency are they charging me?", which is rarely if ever a legitimate concern of a customer. This relates more to the presentation of the menu itself, where excluding the dollar sign is something posh restaurants do, and many others imitate. As for why they do so, I don't know of a reason beyond the appeal of minimalism

miglmj | 5 years ago | on: Marbles (2016)

A teacher read us this book in elementary school and I've unsuccessfully been trying to track this book for years. Such an interesting way to think about the world around us, how it will be perceived, and the degree to which we cannot be sure of the accuracy of our perceptions of the past.

miglmj | 5 years ago | on: Coinbase S-1

Only that it would have been way more profitable

miglmj | 5 years ago | on: Blur Tools for Signal

Not completely mistaken, I think you're confusing blurring with "blending", where pixels are displaced in tight irregular spirals. These images have been successfully unscrambled as part of criminal investigations into child exploitation cases.

miglmj | 6 years ago | on: The Anti-Amazon Alliance

Something like consumer trust only makes sense if compared relatively to competitors, otherwise you're making a statement about the general public rather than about Amazon.

miglmj | 6 years ago | on: Hackers acting in Turkey's interests believed to be behind recent cyberattacks

> estimating hacker provenance consists purely of modifiable and/or spoofable circumstantial evidence, including IP addresses, malware signature, and possibly timestamps/localizations within the binaries.

There's more to it than that, and often attribution is the result of the "bigger picture" of multiple clues, rather than a single smoking gun. Group operations develop patterns over time that are much greater than just a timestamp somewhere. Also, identifying a 0-day exploit somewhere often allows you to discover previous deployments of the same exploit, which have their own blast radius of evidence, contributing to these patterns that are identified over time.

>but surely a competent hacker could pull of a hack and trivially modify the evidence to implicate any nation/state who's modus operandi are known in hacking circles, no?

>Deliberately engineering your attack to mimic one from another group is an excellent way to keep people off your trail...

Yes, misdirection is the name of the game here, all bets are off and nothing is off limits. But covering your tracks leaves tracks of its own, and again, even when an attacker thinks all their bases are covered, they will never be sure there wasn't something somewhere they left behind that points back to them.

> and these are hackers we're talking about, after all.

Who do you think "hacker-hunters" are, if not hackers themselves?

miglmj | 6 years ago | on: Why New York City Stopped Building Subways (2018)

It doesn't mean you shouldn't, either. There's nuance to every situation, particularly when we're discussing the means by which some people quite literally survive, vs. luxury or leisure goods and services.

miglmj | 7 years ago | on: Nations of the Amazon are seeking “shared governance” of the .amazon TLD

We're not, actually. The "nations of the amazon" referred to in the article are "Bolivia, Brazil, Colombia, Ecuador, Guyana, Peru, Suriname and Venezuela - all members of the Amazon Cooperation Treaty Organization"

In this case, I could see AWS hosting being useful to them (maybe even something along the lines of GovCloud like AWS runs for the US Government)

page 1