Category Archives: IT

Speculative design

Many do this at times. We look at something and we think ‘What if we move part N to location X?’ It is a perfectly valid idea and it keeps a brain active and in creative mode, which tends to be good for several reasons. So I was busy thinking things out, in one it is the side of pushing another IP towards public domain, it is too soon, but not by much. So the mind started to wander. The first part was the new trojan that the NSO group is suspected off (see previous story), the second was a line in the West Wing (which I am watching again during the lockdown plus curfew. There we hear about a pen designed for NASA that works upside down, one mentions that Russia solved it by using a pencil. You might not think it, but it is actually an important part. So as these elements rolled in my mind, I wondered on adding a setting (just to piss off the Iranians) in a stage to get two for the price of one, they do use Russian hardware. As such I thought that we need a few clever boffins and as such the people should call on the NSA (No Such Agency). What if we find a way to introduce a hippocampus to the hardware? A hippocampus is a trojan that is submerged (in this case) into the firing solutions. You see at some point a target needs to be setup and that moment the link becomes a weak link. You see not all systems have additional redundant systems and I am willing to bet that Iran has the latest hardware, but not every internal system is up to the latest standard. Implying that we can add something. So what if these missiles would then automatically start to be set to point X plus 1-10 miles? A submerged trojan horse might pull that off. There are a few questions that require me to have a lot more firing system knowledge. Yet when we consider the elements rocket-firing solution-guidance, we might see that the firing solution will be the easiest transgression and these systems do require to get to a base. A solution  that will hit EVERY firing system by infecting all the systems and the infection stays where it is until it fires and then it becomes a nice 4th July showtime. And there is a nice secondary part, the person firing is the one hitting ones self. Passive aggression in full view. 

So is my view realistic? I do not know, I do not care. I merely try to design a way to stop players like Iran and I will use any way possible. All whilst politicians make claims to do something and after spending truckloads on funds on long exclusive trips that tends to include a few 5 star hotels, I on the other hand, sitting on my sofa came up with ideas that had no cost, merely a few dimes of electricity. One works in whatever way the brain gets to be (more) creative. It was the same path I followed when I designed a way to push a  meltdown in the Iranian nuclear plants. OK, I also engineered two additional valve ideas and when I file for these I might get a few additional dollars as well. I do know that these solutions are pure concept, there is no guarantee it will work. But it keeps my brain busy and if it doesn’t work, it might make for a nice additional part to some TV series or movie. The creative brain can come up with a dozen ideas, just be ready that it ends up where it was not expected to go. You might find that funny and it is, but when you consider how books, games and movies got an infusion of brilliance. You merely have to consider how they got to be. Games like Ultima 3 became inspirations to a lot more RPG games (made by other makers). The EA game ShadowCaster was by way too many overlooked, yet when you see “the 49th best computer game of all time, calling it “an admirable attempt to show that RPGs don’t have to be boring””, so why was this game not remastered and redesigned for consoles and streamings? In that same light we can review all kinds of neglected hardware and see just how creative we could get with it. Everyone is so busy in making things not work that they overlook the option to make it hurt the activator and not the target. Perhaps we need to instil the need for people who work for no such agency to get better acquainted with gaming. You might not realise it but games have been on the fringe of hardware for at least 3 decades, optionally even longer and even as some ‘embrace’ that nowadays games are more advanced, people forget that the CBM-64 and Atari ST allowed for games that were often not possible, yet the game makers found a way around their limitations. Consider a game like Impossible mission (Epyx) and the fact that this game can still be enjoyed on an 8 bit system by any number of gamers today, and they got that done on a system with a mere 38KB, it can equal a game that requires an 8GB system, so there!

There are of course a few more ideas, but it is about the concept of working with limits. I ned not explain this to programmers, but some of them will grab an Azure SDK and start from there. We forget that that same company gave us the Microsoft Assembler. Azure solutions start at 765 kilo bits, whilst assembly gives us one of the smallest useful programs for a mere 4 bytes. It is not merely what solution is used, it is about what limitations can be used to our advantage and as a snow-globe gave me the idea to meltdown a reactor, an assembly program used to overcome some security on an EA game (8 bytes) might be the path to set the firing point of the Qiam-1 to the destination point as firing point + 10000 if the destination is measured in metres. At times we forget that having more space does not work, it requires limitations to give us the creativity we required to get it done.

Just my 2 bytes on the matter.

Leave a comment

Filed under Gaming, IT, Military, Science

As questions rise

The BBC gave us the rundown late yesterday (at https://www.bbc.com/news/business-58540936) where we are given ‘Apple rushes to block ‘zero-click’ iPhone spyware’. A setting that comes at times and this is not against Apple, yet the article left me with questions. I get that there is initial finger pointing, as such pointing to the best in the field makes perfect sense to me and it is done with “it had high confidence that the Israeli hacker-for-hire firm, NSO Group, was behind that attack”, I do admit that the term ‘hacker-for-hire’ will be one that requires more precise explaining. Bill Marczak from the University of Toronto’s Citizen which first highlighted the issue gives us “we previously found evidence of zero-click spyware, but “this is the first one where the exploit has been captured so we can find out how it works,”” and this got me thinking. 

Where is the timeline? With what version of iOS does it start? Version 14, version 14.5, version 13? So how long was this in play? It is not the fault of the BBC and it is the first issue.

We then get “the security issue was exploited to plant spyware on a Saudi activist’s iPhone”, so how many activists are monitored? When was the transgression detected? How was the transgression detected? At least two of these questions require investigation and the BBC did not go there. We can argue whether they were required to do so. 

So whilst we are lulled to sleep with “Security experts have said that although the discovery is significant, most users of Apple devices should not be overly concerned as such attacks are usually highly targeted” which could be an absolute truth, we see the setting that Apple is protected. So why was the weakness there in the first place? The answer might be extremely valid, no system is truly secure, we have seen that for a long time. Yet in the moments where I saw this article I phrased a few questions that I have not seen anywhere else (as far as I could tell). And of all the people who could be infected, we get the mention of ‘Saudi activist’? The article was set to certain measures and without proper and a clear explanation there is every chance that additional questions will be asked from the University of Toronto as well. This is not against them and I have nothing against Bill Marczak (I do not know anything about him), but the stage was set in a few measures and that makes for a worrisome setting. A BBC article absent of a few facts and the insertion of a few innuendo’s. All whilst there optionally might be questions from the NSO Group. A stage where we see a setting where (in my personal opinion) someone was standing of the axial of a seesaw to keep the almost in balance. And as the NSO Group, Saudi Arabia and Apple where alternating on the seesaw, the man in the middle offset the balance by just enough to make is wonder, to make us lay blame. Yet all that happened with several facts missing and the smallest mention of “continue to provide intelligence and law enforcement agencies around the world with life-saving technologies to fight terror and crime”.

We all need to do what we need to do, yet I wonder if the BBC (and Reuters) did enough here.

Leave a comment

Filed under IT, Science

The accusations begin

The BBC (and a few others) give visibility to a danger that has been around for some time. Yes, they alert us to what is happening and the BBC is not to blame. Yet when we see ‘Fake Walmart news release claimed it would accept cryptocurrency’ (at https://www.bbc.com/news/technology-58545944) we need to wonder about a few things. It might be “The release, published through a legitimate press channel, claimed that Walmart would accept the currency through all its digital stores. Walmart later told US media outlets the announcement was “inauthentic”. By that time, several major news websites and press agencies had spread the supposed news. It is not clear how the announcement made it on to Global Newswire, a service widely used to distribute press material from companies.” And it is an important side. I merely wonder how soon we will get some carefully phrased denial spiced with “there was a miscommunication”, I  will have questions on how thorough the investigation will be, which stakeholders were involved and how Global Newswire got the news in the first place. 

As I expected for some time, there is a larger flaw on vetting information and who is allowed to vet it all. At some point a situation was created where a group of people made $50 per coin where no profit existed and even as we get loud claims on a few sides I expect that nothing will come from it, the exploitation stage is set and it is high time that the media gets a massive overhaul. Even now we can find the Google search on global News, but the link no longer works. Not a clear retraction, the article was merely removed, as I personally see it a stage of manipulation. Over the 17 hours, we see no news on WHO delivered that news to Global News, we see no news (from anyone) on HOW it was delivered. 

I get additional questions when I see ‘Litecoin back to the drawing board as LTC rally culminates’ (at https://www.fxstreet.com/cryptocurrencies/news/litecoin-back-to-the-drawing-board-as-ltc-rally-culminates-202108261526) we also get “On August 16 and again on August 23, Litecoin (LTC) tried to reach the 200-day Simple Moving Average (SMA). Both tests failed and what followed each time was a quick reversal”, as well as “A return to the bandwidth between $135 and $156 looks like the sanest move to attract buyers again” a simple search gave me this info and in this we see a setting where SOMEONE spiced it with fake news. In all this there was no vetting of any decent kind. As I was able to find what I found within 5 minutes, yet Global News spread the news. So whilst the BBC gives us “It is not clear who was behind the fake release, or how they managed to publish it.” It seems clear that Global News needs to get ready for some serious FBI investigations, it might be a Canadian news station and it will go via the Royal Canadian Mounted Police and optionally the CSIS will get involved, but the FBI will take the US side and neither of the three will be played for as fool. The FBI has no real choice in the matter. This is merely part of the larger stage that real media lacks the same credibility that fake news has and that is important, as it will change the stage of News agencies everywhere. When the news becomes nothing more than an exploitation tool the entire Litecoin issue will not be the only one and it will not be the last one. And in all this, there will be a seperate stage for the connected stakeholders. 

And it will not end there, we can accept that Global News acted in good faith, and we can accept that. But it also means that Global News will have to dig deep into its bowels and find out how this was possible in the first place. There are also more questions that Walmart has to answer, yet I wonder if it will get us anywhere. From all parties Global News is the first station of investigation, and I wonder how much interference some parties will throw up and that might be seen in the media over the next few days and that will lead to several questions, none of them good.

 

Leave a comment

Filed under IT, Media

Missing hardware

This train had been on route for a while, and there are a few reasons for that. In the first my mind took the easy road, but as I pondered the stage again and again, my mind was trying to view another road, even if I remained unaware, I try to not look into the back of my mind. It is a messy place and covered with corpses. We all revere the idea’s we complete, but the others not that much, in this I am just like anyone else. There is no excuse, like a good IT person, I can be as lazy as the next person. 

The new hardware (of course a free idea for Sony and independent Sony Playstation and Amazon Luna makers is set in two parts (I’ll get to them soon enough). The thoughts came more clear as I was finishing the last Harry Potter movie. In the back was also an idea that Peter Molyneux had in Black and White, the gesture system. But it is one of the few times that it was employed. Harry I Potter games are a natural thought and Someone made it a harry potter game as well (Book of Spells), I never played it, but the wand was ugly as hell, It was a mere sign of the times. 

Now consider the image below, a wand we can buy and they are there for nearly any Harry Potter character, now consider that in the next batch onwards it was two small compartments, each for a cylinder that is no more then 3mm thick and 11-17mm long. One at the tip and one at the handle with two small metal points that connect to the inside, so that it can be charged without opening your wand all the time. 

Now consider that the first part is like the observer, like what the Nintendo Wii had, but not in one part, in two parts. One goes to the middle of the upper or lower side of the TV, the other to the middle part of the left or right side of the TV, two parts so that the scan will be much more accurate (even thought the Wii was pretty accurate), the second one, the locators are in this case in the wand, or perhaps a steering wheel, a sword, a bow and arrow and we can go on from there. 

Locator

These locators can be ordered per 2 and are relatively cheap. Yet what is more interesting is that a gamer can now get ‘almost authentic’ wands of choice, the gamer gets to choose and as we see the market bounce back, we see a much larger stage, because who wouldn’t want something almost geeky alike whatever they love? The steering wheel of Steve McQueen (GTA V), The sword of Viggo Mortensen’s Anduril (Lord of the Rings), you name it we tend to get overly enthusiastic on some movie and some special item, the Lord of the rings gets to hundreds of millions, Harry Potter Merchandise is well over 20 billion and that is a mere two movies. What happens when we add the Fast and Furious steering wheel that Dominic Toretto uses? And there is an upside, you can go as expensive, or keep it as cheap as possible, the steering wheel would merely need to two small hidden compartments with the two small connectors for charging. The generic locators would do the work with the scanners on the other side, and as the group of games expands over more devices, the gamers can consider buying two more locators, I reckon that a gamer will end up with 3-5 locator sets, they’ll start with one and buy another one when they get the two games they always wanted. After that they will exchange the locators to their new device of their game of choice, yet a steering wheel can optionally be used in nearly all racing games. The sword in plenty of games and as we see this grow we see a more complete engagement in gaming, something all game designers hope for and by setting the premise of a steer or anything to be as cheap or as realistic as possible will open new markets as well. Yes for the younger players that thing that case with the Book of Spells will suffice, but when that 9 year old turns 15-16, they want something more alike and those wands are anything between $9 and $90, it will be open to the gamer to decide what they spend on, we merely need to add the hardware to allow for that and as their choice of gaming adjusts, the locators can be moved from one to the other. 

A new stage where some will chose the cheap plastic sword and some will go for the Weta Workshop originals (or is that near originals?) It is up to you to choose, but we need the hardware makers to consider that there are parts of any choice that rely on the decision of the gamer. That is how the market rolls and we need to adhere to that because if gaming cannot lead the way the other markets are pretty screwed from the word go. That is a clear sign we have seen over the last 20 years.

Is it an option? I believe so, I believe that the markets are ready to show us that they can offer something new, is it enough? Time will tell.

Leave a comment

Filed under Gaming, IT, Science

As banks cut corners

There was news on ABC news, it was not really news, this was a stage that I saw coming a mile away and that was 5 years ago, yet the speed at which this is procreating is cause for concern. The article ‘Protecting yourself from phone porting and SIM card scams’ (at https://www.abc.net.au/everyday/protecting-yourself-from-phone-porting-and-sim-card-scams/100421586) is not just this, the entire COVID registration issues are making things worse. When we take notice of ““At 5:55pm, I got a text message from my telco. It said, ‘Hi, received your port out request for this service,'” he says. “By the time I tried to call them, my phone already went to SOS only. Before I could even react, my number was gone.””, you might think that this is an isolated case, but it is not, when we add ““They had my customer ID [for online banking], and you can do a password reset if you have the customer ID and mobile number,” he explains. “It was really professional. I had daily limit of $10,000, so they sent $10,000. They bypassed that limit by opening another account inside my account, which you can do online, and then they transferred another $10,000.”” There is. massive flaw, the banks refer to this as being customer friendly, I personally see it criminal friendly. All kinds of level of checks and balances are left out of the equation and for now we see banking party-lines that these matters are seldom, the people are protected and it can be reversed. Yet in 5G, within the next 2-3 years the costs will go beyond what the banks find reasonable and we are left with the costs, we are left with the impact and we are left outside in the cold. That is an almost given and matters are merely getting worse. 

The banks (to cut corners) are setting up more and more to be done online, all whilst proper security is lagging and there is a whole range of actions that will not and should not be allowed. I had to check and make sure that online banking was DISABLED, it makes a few issues a bit more hassle, but compared to the damage I could face 2-5 times a year it is a no-brainer. This is a mere beginning when we consider “If I want to change providers, before the [new] standard was put in place, I just had to give my name, my date of birth and my address,”, all whilst the increased made “scammers ask a victim’s existing telco to switch the number to a new SIM”, the effect is the same and because some players are cutting corners the consumer is left with the hardship. There is no easy way here and I get that, yet there is a larger stage of checks and balances missing all whilst cost cutting parties make ‘customer friendly’ needs, whilst parses of verification needs to be at the centre of this all and it is getting worse. 

Why is it getting worse?
Well, There were 5 attempts to scam me in the last 8 weeks, 2 of them were so good that I could not find anything wrong with the information and sources given, more importantly in one case I had to make a separate call to PayPal to make checks to make sure, they had become that good and I know what to look for, yet I have an ace up my sleeve (which I will not reveal here), it stopped numerous scams from being completed.

The first is that YOU NEVER EVER USE A LINK GIVEN! You find the number, the generic number of for example PayPal and you reference the numbers that you write down, they were ready to tell me that no such activity exists. If you click on any link you are causing damage to yourself. But the two (including PayPal) were so well done that finding the differences were close to impossible and I know what to look for. A consumer will have little to no chance at all. 

And matters are getting worse, because 5G will enable the scammers to approach well over 500% in the same time, their revenue goes up and at some point it will cost us, insurances will soon stop paying out and then it will become a much larger problem. You either pay an annual fee, or lose your money. I feel that this is where it is going. 

So whilst we see “to enable to SIM port or swap, scammers will need personal information, like your name, address, and date of birth” COVID give them the name and phone number, the phone number can in some cases link to an address and then only the date of birth is missing and with all these transgressed data bases. Now consider all these places that got hacked, which have a birthdate? Which have a phone number? And the image below completes the picture. 

We see three sources required to get all the data they need and they keep on adding data, data you freely give away in apps, data they captured, data from hacks on the dark web and it is BIG BUSINESS, in the example it is one person with the $10,000 target, now consider 750,000 in the UK alone, 500,000 in Australia, 35,000,000 in the US and consider that $10,000 was a small jab, even smaller would work for them, like a mere $500, with these numbers these criminals become billionaires within a month and these actions need to be done fast. They have per nation 3-4 days at the most, so within 2 weeks they are looking at millions and with 5G they can get more and they can get there faster. Do you still think I am kidding? Take a good look at what data you entered in ANY app or any website, now consider that these people are doing nothing more but to add data as much as they can, at some point (within a dozen sources) they have enough data to port you, to capture your bank accounts and to make changes to your life. They merely needed some time, a $2500 computer and a decent internet connection, the pay off would be a 7 figure number and with the speed they are tracked they would be living large in another country with nothing attached to them. That is the current reality and the level of checks and balances that are missing is just too unbelievable for words.

Enjoy your bank account (for as long as you still have it)

2 Comments

Filed under Finance, IT

Turmoil of doubt

We all have it, at times and some more often we doubt. Whenever I see such doubt I think back to a story that I heard in primary school. It was about Lakshmi and the greedy beggar. You might have guessed it, or perhaps you know the story. The beggar just wants in the end one coin more and ends up with nothing. This is a setting we know where it goes, but now let’s change the premise. I could end up with $3.7 billion over 3-5 years of Google, Amazon or Huawei buys my IP. I could optionally make $250,000 if I publish an idea of intrusion I have. An idea they all overlooked and could give a certain wall street player the insight on certain patents that would be accepted within 30 days. With this method I speculatively could make another 3 million, yet that would also mean that I can no longer rely on the larger amount to ever become mine. What would you do? The small amount now or hoping for the best? I am not breaking any laws, because I am showing a flaw, two actually and the law has close to no chance of finding substantiative evidence. So I am basically in the clear. So what to do?

Well, I am also a story teller, so here goes (it was a simple riddle).

Between a larger technology firm and a patent office is a link, they mail and they take all the precautions. The messages go from router 1 to router 2 via what some might know a router table. Now no matter what the path is, at some point it will go via router N1. That is how the beans take the high or low road. So I got the idea to place a listener to ANY router one jump away from Router N1, so it could be almost anywhere. That place we call Router X0, it was my idea for the Hop+1 solution. There is a second part, this part means we need to get to that router somehow, whether it is internal solutions of intrusion. The idea was to replace the CF card in that router with an identical one, but there is one difference, it might state 64MB, but it has 256GB and one small internal component sets the 64MB apart and the rest is a floating drive. The floating drive has its own dynamic and it installs a small program in the memory of Router N1, that program will copy EVERY packet directed to Router 2 towards Router X0. There is almost no chance to detect it, when someone resets it, the program is gone, the evidence is gone. The memory card will unless dissected not show anything and there too is nothing to show what is going on, the CF card will know when it can forward packets to the end station when it can hide in other traffic, unless a System administrator reads the ENTIRE log, there is nothing to see. The receiver now has a collection of packets of traffic from Router 1 to Router 2, which also includes a message that Patent acceptance was achieved, the Wall Street Firm now has an advantage to place the right options and stock ahead of all the others and when the rest catches on the larger profits are raked in. 

A setting of not so speculative anticipation of profit and when the deed is done, both routers are reset and the evidence is gone forever. There is one remaining part, that is the CF card, yet id that went to an empty mobile station that might not be the problem, the only issue is getting the card back, leave no evidence behind. These System administrators are often underpaid, so that might not be an issue either. 

An idea that I had when I was wondering how Sony was transgressed upon, because there was no way that North Korea had that level of know how. In this setting it was an internal setting, optionally a disgruntled employee, but it was all speculative from my side, it felt more realistic than North Korea with its lack of technology. 

So will I doubt? Yup, I will remain hopeful the three true innovators will take my IP, if not, ah well. Still time to make it all public domain, what Wall Street tends to call pubic domain, not sure why but there you have it. Have a great Monday!

Leave a comment

Filed under Finance, IT, Science

When one and one remains one

Two things crossed my path, as perhaps a lot of you too. They are not related, but they gave me food for thought. The first are the floods all over NY city. I looked at a lot of YouTube videos and I agree, we have never seen this before, will we see more of that? Time will tell. Yes, it could be due to global warming, but it is not a given. We have tornado’s and we have storms and this one went towards New York. Now, I am not stating that it isn’t due to global warming, but to point the finger from the start is not a good idea. I do believe that global warming is part of the storm surge and as global warming continues there will be more storms. There is no denying that. One can lead to the other, but one is not the definite cause of the other. That setting is here too. So whilst those with a sub-level apartment, they now have a swimming pool. I am not making fun of them, that would be wrong, but it is important to consider that New York has never dealt with this before and it is now August. It will take months to dry, so we are in a setting with thousands of a basement apartments and when the frost sets in, these houses will become death traps. November and December will be close to unbearable and in January if the frost sets in these apartments will be a different setting. It is also a more important setting, if snowfall comes early this December, thousands of places to live will become close to unsurvivable and New York better get ready for that stage, it could kill a lot of people. Is it a given? No, it is not, but the floods are clearly visible, if the subway is flooded, how will these houses fare? And that is only the start, the water brought all kinds of mud and other health threats, so cleaning these places will be an almost titanic task. Then we get to the damaged electrical systems, and all this is before we realise that plumbing and  water will take a while to become decently reliable again. A stage we saw in part, but how much of these dangers did the people see?

The second is not related, but it had my attention. Reuters (at https://www.reuters.com/article/amazon-tv-usa/amazon-to-roll-out-its-own-tv-in-u-s-by-october-business-insider-idUSKBN2FZ00D) gives us ‘Amazon to roll out its own TV in U.S. by October’, this implies that there is another statin on US minds, Amazon will have more than Amazon Prime Video, they are now setting the stage to TV and there is no attack, there is no issue. Yet the stage of them offering  TV with a twist is not out of the question. It is a clever move from Amazon, they have the option to take advertising to a whole new level and it is THEIR TV channel, so the essential attacks on Amazon will not be as effective as the attacks that Apple and Google are facing. But is that what it is about? No, it is not merely the TV part, it is the shifting economy that Amazon gets to push for. This is not meant in a negative way, but consider that thousands will be dislodged, thousands will need a job, a home and Amazon who is out to hire 55,000 tech jobs and that news is a mere 22 hours old. People have relocated for a lot less and that gives Amazon more than a leg up, it gives them a furlong head start in 2-3 venues and in this setting of bad news they become a shining light and optionally a larger staged beneficial noise to a lot of people. The part that New York might not like is that there is a setting where (depending on Amazon choices) 20-30 thousand people vacate for sunnier shores and in light of what happened in the last few days, with the added workforce taking a step in an optional other direction. We will see a larger stage of the economy changing in New York, one New York never anticipated before. So we see the tech jobs, TV and a lot more and Amazon is at the heart of that. These events are not connected, yet the stage of a larger change becomes apparent, or perhaps I need to say ‘speculatively apparent’. because it is speculation from my side. A stage where Amazon gets to promote their jobs, their positions, their TV, their goods at base pries is an advantage that few ever have and thousands are looking for jobs and that advantage is likely to increase over time. I am merely looking at the pharmaceutical side, the retail side and the job side and there we see Amazon having an advantage thrice over. And as I see it, they are not doing anything wrong. They merely take a versatile set in a post covid era and they are decently ahead of the rest. 

So consider what I write, consider what you think and see where you can prosper, because someone who hires 55,000 tech jobs has a larger plan in place and that is not something you should ignore, especially when Amazon takes that setting on an international level. It gives them a larger advantage over several players who aren’t even close to doing what Amazon is claiming to start over the next 4 weeks.

Leave a comment

Filed under Finance, IT, Media

Two weird moments

This just happened, the second weird moment can onto me, I got woken up from it as someone called me, but it is still shaking me. It started the night earlier, I do not know what set it iff and I did not realise why it happened, so I pushed it away, yet with what just happened, the previous event also plays and now I need to find the words.

Day 1
In day one, I faced some initiation, it was all about a mine-cart (like in Indiana Jones 2) and I was would be taken through a tunnel, pulled on one side, after the corridor, which was made with the use of pallets and smeared with clay and dirt, covered in some writing to the other side, it was about trusting the boss. Yet the boss was setting the stage as the person in the kart would be fed to a massively large snake (not an Anaconda), yet he believed that the snake was related to a snake god (yes, people are that crazy, just look at anti-vaxxers if you doubt me), so as I was unaware I went into the cart, the journey would be around 300 meters and there was a bend, but no track change was possible. As my journey started I saw the writing, the symbolism and I also seemingly saw the imagery change, and as the journey took me past the bend, the massive python like snake attacked and it took its non-poisonous teeth deep into my left shoulder. The pain was hard, but the fear of seeing the snake just over the left shoulder shook me to my core. I woke up and I had to change the sheets, they were drenched in sweat. It was only 6 degrees, but I was sweating like it was a 40 degree sunny day. I woke up and shrugged it away, but oddly enough my shoulder was still hurting this morning, so I actually had to take a pain killer. 

Day 2
Only hours away, it was time for another team building exercise. This time it was against 3 fellow employees and the track which we had to do wearing our Virtual Reality goggles, the rules were simple, never take off the goggles, it would be an automated fail and the winners, the two highest would be in line for management promotion. So as we started at the bottom we had to run up, we had to follow the path and the tunnels and stairs were where the normal stairs would have been, and over the track we were filmed. We saw the tracks change from down to up, to up to down and as we followed the course the land changed to meadow, fog filled meadow with lights. We were on a track that would take almost 30 minutes, and there I was, exhausted at position two. The person in front of me was on her knees and it was the last part, I looked over the ridge and the building was below me, close to 2000 feet below me, the note was clear “fall from here, but do NOT jump”, I had given up, I would rather be dead than lose and I rolled over the ledge falling to my death, I no longer cared and that is when I felt a rush and a slowing fall, it was the virtual reality, I fell into a net from 4 stories high, not thousands of feet, I saw the boss who was walking up to me and then the phone rang. That was it, or was it?

It is a little later and my mind is working things out, you see, Augmented reality and Virtual Reality can dupe the mind, as long as it can acclimatise to the new settings it can be fooled and it can be done so a lot easier then when you are alert in the normal world. So what happens when this becomes an interrogation and torture device? You see, we tend to fear the extremists and their suicide approach. But in Virtual Reality they are a lot more easily pliable. Their conservative values can fall under VR faster than in the normal world, a lot faster and I think that my mind is telling me that this could optionally make for a nice movie. Consider movies like Truth or Dare, and Nerve. We have similar settings where we entice the audience to accept hat is there, yet in VR it is all fake and the mind cannot completely deal with it and as long as no real boundaries are broken, the mind adjusts. So what happens when that becomes a case, it is seemingly small but it is in the core of us and there the small change flips an entirely new track, one we have never seen before and the brain changes from decider to spectator and there the intelligence required is up for the taking. Now 2-3 years ago it would be some sloppy wannabe kiss, yet with the evolutions in VR, Quantum computers (IBM) and deeper learning it becomes a new ball game. We can get the suicide bomber in a stage where he feels to press the button, but it is an augmented VR button, and after that whatever he sees is fake, but in that stage he will divulge EVERYTHING, he accomplished his goals. And now we get the rundown on what we needed to know and this has the option to be one hell of a rollercoaster movie. Even in my sleep my creativity continues and now that this is written, I can look at some information that ABC has for us all, it is all about doubters, but that does not matter.

Leave a comment

Filed under IT, Science

And the mystery is?


It is one of those ‘I told you so moments’. I am not happy or proud, but the profound sadness that hits me when I see the way it is reported on is just staggering. A few are reporting on it, but the larger stage is likely to be found in places like the Verge soon enough. The people who get it will soon understand that it will be worse and that my 90% of cloud transgressions was no joke. Yet to see part of that nightmare, you need to realise that the Microsoft Azure cloud has been in existence since October 2008, almost 13 years. Now it took the business to grow its customer base. Yet consider that the article at Reuters ‘Microsoft warns thousands of cloud customers of exposed databases’ (at https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/) gives us “A research team at security company Wiz discovered it was able to access keys that control access to databases held by thousands of companies” Now we can only speculate how long that flaw was there, or perhaps that design error. Yet the damage is enormous. With “Microsoft agreed to pay Wiz $40,000 for finding the flaw and reporting it, according to an email it sent to Wiz” we might think it is trivial because it only costed $40,000, but it is not. Thousands of firms with BILLIONS in IP values and other values have been in danger for years, at the most 3 years, yet the article does not really reflect on that (which is not the fault of the BBC or Reuters). And when we are told “We fixed this issue immediately to keep our customers safe and protected. We thank the security researchers for working under coordinated vulnerability disclosure”, I wonder just how bad it is. Now, I get it, it might be fixed but if that was an easy fix, it might equally mean that it could have been easily prevented. 

So when we get to “This is the worst cloud vulnerability you can imagine. It is a long-lasting secret. This is the central database of Azure, and we were able to get access to any customer database that we wanted.” We get to see that Wiz Chief Technology Officer Ami Luttwak (a former Microsoft employee) now working at Adallom LTD and Wiz. Now we get it bugs happen, yet one would think that proper testing would be done and this bug whilst not proven to be transgressed upon went undetected for no one nows how long until an external group decided to test Microsoft access (optionally on Microsoft orders). So whilst some might think that “Microsoft only told customers whose keys were visible this month, when Wiz was working on the issue” passes the mustard, but it does not, mainly because the length of the transgression enabled time is still unknown, and that is not all. When we consider “The company was breached by the same suspected Russian government hackers that infiltrated SolarWinds”, as well as “a wide number of hackers broke into Exchange email servers while a patch was being developed” with the cherry on top of “A recent fix for a printer flaw that allowed computer takeovers had to be redone repeatedly” a well as “Another Exchange flaw last week prompted an urgent U.S. government warning that customers need to install patches issued months ago because ransomware gangs are now exploiting it”, as such one might speculate that they need to adjust their marketing vision, with the first optional change being “We advertise the most powerful console because the other stuff is buggered” and it seems that Microsoft has all kinds of testing and investigation flaws, that is merely my speculated view, yet for the customers who feel threatened by this, consider looking at Open office (at https://www.openoffice.org), I cannot guarantee it is more secure, but it is free and you are now paying for all the transgressions in a multitude of ways (including an annual fee) so you can at least negate one factor. 

So whilst some feel sorry for that multibillion company and how sad things are, consider that Azure is an issue, especially when you realise “Microsoft and outside security experts have been pushing companies to abandon most of their own infrastructure and rely on the cloud for more security”, when that comes to the surface, we see that Microsoft seemingly embraces ‘sharing is caring’ and with everything people have in that cloud sharing everything with EVERYONE, we might see Microsoft as the most caring behemoth in the universe, but I reckon the customers who pay a pretty penny for that ‘privilege’ will see this differently. But there is light at the end of the tunnel (well not really). Compare the logos of Microsoft and the olympics, now consider that only the black elements (the hackers) were not yet represented, but it seems that Microsoft gave them an internal challenge and so far the hackers are leading three to nil, which is the larger danger. 

And that larger danger is given to us at the very end with “But though cloud attacks are more rare, they can be more devastating when they occur. What’s more, some are never publicised. A federally contracted research lab tracks all known security flaws in software and rates them by severity. But there is no equivalent system for holes in cloud architecture, so many critical vulnerabilities remain undisclosed to users, Luttwak said”. 

So it is here that some might realise that 

  1. Some cloud transgressions are never shown the light of day.
  2. Many critical vulnerabilities remain undisclosed.
  3. (Speculated) The makers might not even be aware of some vulnerabilities.

That is the stage that cloud customers are exposing themselves to and in this, with too many corporations reducing their IT security staff and relying on the security of the cloud, how much is this costing the Fortune 500 who created that erroneous overly simple mindset? It was never a mystery to me, I have written about these kind of dangers since 2017, so if people are just now waking up, good morning and enjoy the coffee you have, you’ll need it.

Leave a comment

Filed under Finance, IT

Blame Canada

Yup, the award nominated song from South Park, the title will forever reverberate in my mind, and in this case Canada was on my mind for a week. The reason? I will get to that, but first we will need to take you through some essential comparisons. In the first Canada is almost the size of the USA, it is a little smaller, but not much. The second part is that it has 10% of the population that the USA has. So nature rules in Canada on a few fronts, including the small fact that most Canadian women are a lot more beautiful than the American ones (A.J. Cook, Laura Vandevoort, Alison Pill, Ana Golja, Annie Clark, Nanci Chambers, Erica Cerra and hundreds more) have graced the screens large and small and they are a fine example of the Canadian women. Yet, this is not about the women it is about nature. You see, we see apps and games on hunting and survival, yet it is always set to a set of parameters, so what if we take that away? What if we create a map from satellites, real and decently accurate map sizing 1000 by 500 Km stretching from British Colombia to Saskatchewan? In this map you get dumped and from there on it will be about TRUE survival. There will be settings like starter, amateur and pro and those three rings will determine hunger, thirst, hypothermia and hostile nature. The program would set all the elements are faithful as possible, giving the people a real taste of survival without harming ones self. The amateur gets a few lives, but the rest is hardcore, one life and that is it. So how long could you survive in a game where everything matters. You see, it dawned on me that it started a little further back when I heard someone claim in a games shop that survival is simple, you merely have to understand what the game needs. That started the entire progress and as I learned more about Canada, I saw the options that they could give a gamer. More interestingly that same map could be used to spawn stories and cultural history on the First Nation, the stories of a collection of ghost towns, the call of the wild and hunting lessons, a game that gives people a decently real taste of that life without killing the animals, or (more importantly) getting killed by them. 

So why did I mention the women?
You can go into the wild just on your own, or for a reason, one reason is that your family (one of the actresses fictively being your wife) has gone down in Canada and a rough location is know. You are dropped off by chopper and with a radio and a backpack of goods, so can you find her? Can you safe them all (if the program allows for that)? A setting where survival is taken on a hype and to be honest there is no place like Canada to test it, it is one of the most rugged places on earth (if we ignore Russia). A stage that could be larger, because if you remember yesterday, the map is merely one side and we can fill it or better stated overlay it with other games. And if it takes a lifetime to explore a map that size, consider what gaming challenges could be added to that map, or perhaps better stated the challenges that a game has and it uses the same map. 

Does it matter?
Not really, but gaming can only evolve when you push the boundaries and we cannot rely on the consoles or streamers to push, they are for the most in a holding pattern until 5G grows up and that will take another 2 years, just as I foresaw and it gives another side. China can do pretty much exactly the same, they have similar settings and they have the space, but they also have 1.4 billion people and a lot more roads. In all this I have always believed that coming first gives you an edge and with IP on mobiles and other sources growing that space for options is diminishing, as such Canada only has a real advantage whilst China does not go that way, will they? I have no idea, yet so far none of the other players have taken their map to such a degree and that opens options as well as opportunities. 

As we see what we have, we need to look at where we could go, not where we should go. This is because nearly everyone does that and as such we get a dozen flavours of the same ice-cream. But at some point someone will figure out that borders need to be crossed and when they do it when 5G does become a solid reality they will be late for well over a year. So why Canada? There are two reasons, they have the space, they have a lot of the knowledge and they have a dozen local software developers, so they are almost ready to get started. They merely need the information from NRCAN to get the map data (and it helps to smile politely at the lost boys of the CSIS). When the map is done they have the largest component for several games, all set to multiple systems. 

Leave a comment

Filed under Gaming, IT, Science