Julian is awesome, but I'm going to disagree. Instead, I propose it's an insult to serious thought to pretend that anyone who disagrees with you is automatically a toxic hero worshiping Trumpist. There are other reasons to disagree.
2/ There are many kinds of people in Trump's camp. Sure, some are the toxic MAGA types. Others, though, dislike Trump, but prefer him to the alternative (Clinton). Still others are just holding their heads low waiting for this time to pass. Then there are vocal #NeverTrumpers.
3/ Moreover, just because your toxic MAGA opponent is wrong doesn't automatically mean you are right. Trump avowed policy to target children is evil, but all the viral tweets I see on this are wrong, usually pointing to Obama era policies.
4/ For example, the photographer who took the iconic crying child picture admits the child was not separated from its mother at that time, and the father says the child is still with its mother. So this iconic picture is wrong.
5/ No matter how much we justifiably hate Trump's policy targeting children, truth still matters. We should be able to discuss the truthfulness of such things without automatically being labeled a toxic Trumpist.
6/ It's Trump and his disciples who have a disregard for truth, cherry picking and defending anything that seems to support them. Are we hating Trump's lies because we hate lies, or because we hate Trump??
• • •
Missing some Tweet in this thread? You can try to
force a refresh
So Schneier has a book on how IoT will doom us based on the same reasoning why Windows was going to doom us all ten years ago. Yet, Windows didn't doom us, and neither will IoT.
It's like Paul Ehrlich's book "Population Bomb": all his predictions have spectacularly failed to come to pass, yet this doesn't stop True Believers, because it's Moral Truth.
IoT is secure. You don't believe it because of your religious faith, but mathematically, it's true. There's 10 billion IoT devices in the world but only tiny problems due to this.
It's amazing watching Bloomberg doubling down on its bad hardware hacking story. Instead of addressing the bad reporting pointed out in the original story, it continues with the bad reporting in new stories.
This is technical gibberish, telling techies nothing. Is it one MAC address or two? Or two IP addresses on one MAC address? Networking isn't so complex that you have to avoid sufficient details.
Vagueness and confusion in such simple technical details is an indication the journalist or the source is fudging them.
So this New Yorker story quotes me as the lone dissenter on the Trump-Alpha scandal. At least it gets some details correct, like how the server in question is located in rural Pennsylvania and not Trump Tower. newyorker.com/magazine/2018/…
To clarify my position: the DNS lookups may be evidence of some sort of relationship, some extraneous artifact of some other communications, but are not themselves part of a covert communications channel.
The Trump Organization had no control over the server. The server is just a bulk spam/marketing email sender and had no ability to communicate otherwise. The DNS lookups lead to nowhere.
1/ So in today's sermon, I thought I'd point that you are wrong obsessing about the three-way-handshake in establishing TCP connections. How connections are closed is far more important than how they are opened.
2/ You can see this in the TCP state diagram. There's 4 states for opening a connection, and 7 (almost double) for closing a connection. The reason you like the three-way-handshake is because you understand it, but don't really understand how they are closed.
3/ One thing missing from this diagram is the 'shutdown(fd,SHUT_WR)' system call that closes only one side of the connection. It sends a FIN to the remote side, which ACKs it, but that only closes that direction. Data can flow in the other direction, until a FIN happens there.
In case you were wondering, the "baseband managment controller" is a wholly separate computer inside your computer, either layered on top of your existing Ethernet controller, or even with it's own separate Ethernet port. supermicro.com/products/nfo/I…
It runs it's own operating system, often Linux. Putting your own flash chip, or even updating the correct flash chip with your own image, allows you to subvert the code and install your own malware/virus into the computer, regardless of the "real" operating system installed.
Thus, your BMC "virus" can then contact a C&C server on the Internet and download more interesting things to the server. This more complex code can first check the "real" operating system installed.
2/ Not only is Bloomberg overly relying upon anonymous sources, they aren't even first hand sources, or secondhand, but people vaguely "brief" on the subject. At this point, it's rumor in the intelligence community they are passing along.
3/ What's important about this is that whenever you pass technical details through multiple layers of non-techies, they get garbled. There may be something true about this story that's still unrelated to translated version in the story.