Category Archives: Science

SET trust = 0.

Yup, we all have a stage when there is no trust, there is no confidence and we wonder the why part. In this, I had questions, so I asked the agency, but they did’t know, then I asked the FBI, I asked Langley and I asked Commander Andrew Richardson, they all gave the same story, there is No Such Agency, so I Googled them and Yes! There they were, complete with phone number (+1 301-677-2300) and all, yup, we got them, so now we get to their story (at https://breakingdefense-com.cdn.ampproject.org/c/s/breakingdefense.com/2021/04/nsa-about-to-release-unclassified-5g-security-guidance/amp/).

Via the BBC, we get ‘NSA About To Release Unclassified 5G Security Guidance’ and I started to read, the article makes a lot of sense. Which gave me “Noble’s speech highlighted the importance of zero-trust architecture in 5G networks”, and it got me thinking, the approach makes a lot of sense, just like SE-LINUX, the setting of ‘no-trust’ makes sense, especially in a world where Microsoft keeps on fumbling the ball, not merely their exchange servers, but the (what I personally see as greed driven) push towards Azure, it comes with all kinds of triggers and dangers, especially as they are ready to cater to as many people as possible, the no-trust rule is pretty much the only one that makes sense at present. I have written about the dangers more than enough. So when we are given “it’s reasonable to expect that future NSA 5G security recommendations will emphasise zero trust as a key component”, I believe that the approach has a lot of benefits, especially when such a setting can be added to anti viral and Google apps, it could increase safety to well over 34% overnight, and option never achieved before and we should all applaud such a benefit. There are a few thoughts on “NSA has characterised zero trust as “a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy.” It’s a “data-center centric” approach to security, which assumes the worst — that an organisation is already breached or will be breached.” A choice that is logical and sets the cleaning directly at servers and ISP’s, and they are the backbone in some cases to close to 75% of all connections, so to set a barricade on those places makes sense, there is no debating, the choice of calling themselves No Such Agency wasn’t their best idea, but this is a game changer. 

I have been critical of the US government in all kinds of ways for years and on a few topics, yet I have to admit that this is an excellent approach to prevent things going from bad to worse, moreover, there is every chance that it will make things better for a lot of us overnight as such a system deploys, it will have a trickle down effect, making more and more systems secure. 

That one thing
Yup there is always one thing and we see the dangers when we consider Solarwinds and Microsoft (their mail server), the one part is when we rely on rollbacks and we see rollback after rollback creating a hole and optionally a backdoor, the most dangerous system is the one deemed to be safe, ask Microsoft, or their exchange server. When you believe all is safe, that is when the most damage can be made. And as the article looks at 4 parts, we see ‘Improved network resiliency and redundancy’, yes it makes sense, but rollback efforts are possibly out of that equation and when we get some people tinkering there, there is a chance that the solarwinds paradox returns, yet this time with a dangerous seal of approval by the No Such Agency, it will be the one part all criminal minds are hoping for, in this I personally hope they fail, but these buggers can be resilient, tenacious and creative, the triangle that even the Bermuda Triangle fears and that is saying something.

Leave a comment

Filed under IT, Military, Science

Feel free to lose control

Yup, we all have that. You, me, pretty much everyone. Even the Catholic cleric in [censored], should you doubt that, ask any choir boy there. So when the BBC gave us ‘Facebook sued for ‘losing control’ of users’ data’, I merely shrugged and went ‘Meh’. You see, it is not about “the case against the technology giant, expected to last for at least three years, will argue a “loss of control” over users’ personal data warrants individual compensation”, which is hypocrite on a few levels, we see people handing over data and fact to complete strangers in Facebook and plenty of other social media paths. We laugh at “Coolum resident Essena O’Neill, 19, said she was paid up to $2,000 for the posts, which show her posing with products and often in revealing positions. With more than 600,000 followers on Instagram and 260,000 on YouTube, Ms O’Neill has deleted many of her original photos and re-captioned others with more honest descriptions” (ABC, 2015). We also get (two weeks ago) ““I accidentally posted a picture on Instagram of my wine glass and I was naked,” she said whilst nervously laughing. Then, she went on to explain that you could actually see her naked body in the reflection of the wine glass”, is anyone buying this? Social media has been used on a huge number of settings revealing ‘accidentally’ facts that normally do not get to see the light of day, and in all this we are given ““loss of control” over users’ personal data”? Go cry me a river! In the mean time, did anyone see Alexander Nix, Julian Wheatland, Rebekah Mercer, or Steve Bannon in the dock of a courtroom in any of the hit countries? In this the quote “harvesting of Facebook users’ personal information by third-party apps was at the centre of the Cambridge Analytica privacy scandal” applies, a third party app, was there any documented agreement, or documented acceptance of the harvesting of personal data? I do not see Microsoft in the dock in court over their exchange failure that had hit 250,000 businesses, so why not? And when we see “Cambridge Analytica’s app on Facebook had harvested the data of people who interacted with it – and that of friends who had not given consent” did anyone consider putting the board of directors of Cambridge Analytica in prison? I wonder how far we have strayed from the flock of convictions to go after the money and not the transgressors. I do get it, it is a rule or Torts, the mere “go where the money is” is not a wrong setting, but in this setting all the blame on Facebook seems wrong. They are not without fault, I get that, but to see a reference to Journalist Peter Jukes giving us “leading the action, claims his data was compromised”, so how was his data compromised? What evidence is there? In turn I have equal issues with “The Information Commissioner’s Office investigation into these issues, which included seizing and interrogating Cambridge Analytica’s servers, found no evidence that any UK or EU users’ data was transferred by [app developer] Dr [Aleksandr] Kogan to Cambridge Analytica”, I wonder how far backup investigation went, in turn the setting of ‘no evidence that any UK or EU users’ data was transferred’ is almost preposterous, the data was collected, as such it went somewhere, the fact that the Information Commissioner’s Office couldn’t find that part is mere icing on the cake of Cambridge Analytica. In addition, when we see “Mr Jukes told BBC News it was not about “where the data went” but rather “that Facebook didn’t care”. “They didn’t look after it,” he said.” Can this be proven? ‘Didn’t care’ is subjective and presumptive, we can agree that security measures failed, yet ‘They didn’t look after it’ is equally unproven, and these people are not going after the people of Cambridge Analytica as THEY transgressed on the data. As such as we look at Eton boy Alexander Nix, in the setting of “Nix agreed to a disqualifying undertaking prohibiting him from running U.K. limited companies for seven years after permitting companies to offer potentially unethical services, while denying any wrongdoing”, he got a mere slap on the hand, with a mandatory 7 year vacation all whilst we are told ‘denying any wrongdoing’, in addition there is “agreeing to delete previously obtained data”, a 2019 agreement, so where was the data all this time? Let’s be clear, Facebook has made blunders, huge ones, yet in light of the fact that Microsoft gets a mere fine and the issues is closed after that, why keep on going after Facebook? When we see ZDNet give us ‘Microsoft Exchange Server attacks: ‘They’re being hacked faster than we can count’, says security company’ two weeks ago (at https://www.zdnet.com/article/microsoft-exchange-server-attacks-theyre-being-hacked-faster-than-we-can-count-says-security-company/), what gives, why are they not being sued for setting a dangerous precedence on corporate information? We go after Huawei without evidence, we ignore alleged criminals and their app transgressions with our data, but it is fine to go after Facebook whilst ignoring the massive flaw that is Microsoft? So what gives?

So yes, we can lose control all we like, but if we hamper the courts with empty cases that are set on emotion, all whilst people like Alexander Nix, Julian Wheatland, Rebekah Mercer, and Steve Bannon are allowed to return to positions and try again? And what about Cambridge Analytica? As it was soon thereafter acquired by? The only reason I see to acquire Cambridge Analytica is because of hardware, because of software and because of data, so who is looking into that, preferably all before we lose time slapping Facebook around? I see very little after 2018, but perhaps Peter Jukes is too busy to see were his alleged compromised data optionally went. 

So whilst we giggle on statements like “I accidentally posted a picture on Instagram of my wine glass and I was naked”, we see a setting where a large group of people are using social media for all kind of things, the limelight most of all and in this we need to separate the real issues from the fictive cash cows. In this, did you wonder if the people are realising that Wired gave us a mere hour ago “collaboration platforms like Discord and Slack have taken up intimate positions in our lives, helping maintain personal ties despite physical isolation. But their increasingly integral role has also made them a powerful avenue for delivering malware to unwitting victims—sometimes in unexpected ways” (at https://www.wired.com/story/malware-discord-slack-links/) and that is a mere tip of the iceberg, a massively large one. How many apps are a gateway to YOUR system? So when we take notice of “hackers have integrated Discord into their malware for remote control of their code running on infected machines, and even to steal data from victims”, as such in that case it is not the nude reflection shot that matters, it is the wineglass porn that some people decided not to post that is out there for everyone to see. Consider the words by Stephen Fry on 2014, when he said “The best way to prevent nude pictures online, is to never pose nude”, or something according to those lines and he is right, the best social media is the boring one, where you just say hi and connect to relatives. But the limelight is for some just too appealing and to give everyone the lowdown on all your needs and that is what players like Cambridge Analytica were banking on. As such, when we add that light, that spotlight, what data of Peter Jukes was transgressed on and in light of the Exchange server issues, the Cisco issues and the larger stage of interconnecting apps, can it even be proven that it was Facebook? 

I’ll buy popcorn for that court case, it should be fun.

Leave a comment

Filed under IT, Law, Media, Science

If not, then; else, return;

How cryptic is that? It was a sentence that I used in the 80’s, I sounded clever and cryptic at the same time, yet it was not for that, it was the stage where some had no idea how some things worked in IT programming (Clipper), the use of Boolean variables wasn’t alien to them, but it was close to the unknown and just now, the idea hit that in all these stages of ‘showing’ things, I wonder how many have shown the stage of choices, Boolean choices?

A stage overlooked for such a long time and why was it overlooked? The people who need it are in a stage of wondering things out, now for the most it does not matter, but what happens when the dataset you are looking at is a few million cases?

As such as you look at this small triangle, can you answer the 4 results? And this is a setting with merely 3 variables, and merely 2 Booleans used. When that list grows in variables and Booleans, it becomes a larger scene of people wondering if they missed anything, wouldn’t it be nice to see an answer there? In an age of dashboard people whose Business intelligence setting is absent of a degree in advanced mathematics, statistics is the best we can hope for, at least in this setting someone can give them a better tool? What do you think?

When we look at the stage of larger datasets, do you think such a tool is less needed or more needed? And when IT makes these people the 14th export, will they agree with the assessment?

I will leave it up to you, gee, another day another set of ideas added, in an age where marketing hands iteration over and calls it innovation. I wonder how many software solutions have this option at present.

Leave a comment

Filed under IT, Science

The stage is the play

Famous words given to us by William Shakespeare, but are they actually true? I am not debating the insight or wisdom in this, but in a stage with Alien life, how far does it apply?

I have been working on Keno Diastima again and a few things were bothering me, well bothering is not really the right word, or the right sentiment. The stage became debatable, or perhaps shallow was the better definition. I needed a larger stage and the stage became the play. SO I decided to look back at some of the earliest original writings. There was Sun Tsu (the art of war) at 490 BC and the two works by Julius Caesar at 60BC, they are important because there was pretty much nothing of that calibre before that in their fields and their dome of influence. For me I focussed on Bellum Gallicum and on Bellum Civile. I wanted to avoid an intersection of ‘oriental thinking’. They are original as they were all ahead of their time and they set a stage that is still used today, the works were that good. It was an important stage because in any alien encounter we need to know where THEY are at and it is not some kind of wisdom puzzle, when we get visitors from the Sombrero galaxy it is not for mere tea and crumpets, there is a larger stage and that is what I needed to focus on.

I will not divulge too much, or set the stage too open, because it might still be a work of art to some stage (book, movie, TV series, etc), as such I cannot reveal my entire hand, but consider the use of Caesar, the fact that he wrote the two books in an age where writings were utterly rare and the idea that he was heading the battle in Thessalia, in a stage where the cavalry of Pompeii vastly outnumbered the one Julius Caesar had, all whilst the infantries were close to equally matched, still Pompeii missed out and lost that decisive battle, numbers matter, especially in a stage where two generals are grounded experienced veterans, in a stage when communication between parties was set in hours, not minutes or seconds. That part matters too, even as we look at our not so smart phones and forget that part altogether. 

My mind remained in brooding mode and I was starting to think things through, I was aware of the reasoning of the other side (trust me, you do not want to go there), but how and why are we reacting? Is it wishful thinking that they like tea and crumpets? It is not completely unrelated though, especially when you consider the building that once was in a place now known as Islam Abad (Iran) I think, if the right satellite looks in a proper way, they would see something that is odd, the evidence should still be there, even now 5500 years later, the evidence is still there, and I am covering that in something else, but that I keep under wraps for now, when I realised what I had found, when my mind perceived a stage that is almost undeniable I started to work on one part and in the back of my mind, my brain started to work on Keno Diastima, even the Greek part has meaning in ways that boggles the mind (well, at least to some degree). 

So as we consider the stage, the stage we are shown, what happens when it all goes topsy turvy? What happens when we become (have been for a long time) our own worst enemy, how will others react? How can we see the failings of us when we ignore what was in front of us the entire time? That is the stage I am digging through, because in all that mud a few nuggets can be found and I want to find them, they need not be there, but the mind can create them and as they are close enough to some presumptive truth, I am on the right track to create actual nuggets, not chicken, or pyrite, but golden nuggets, hoping that I can turn them to platinum bars (complete with a coca cola on the rocks), I an not driving a vehicle, as such I can have my coke on the rocks, so there!

Yet in the back of the mind, the two stations are more and more complete and soon there is a line between us and the Sombrero galaxy. Bioware, eat your heart out! What was once written can be written again in different ways, so as we see “The greatest enemy will hide in the last place you would ever look”, as well as “Experience is the teacher of all things”, two truths that have been out there for well over 2000 years and now I am trying to set an entirely new stage to part of that, or basically, I am incorporating the stage for 16 people on a space station, and in all that, what happens when we become our own worst enemy? 

The University of Melbourne published Farrago, there we see “The space that fills the gap between us and those stars, is perceived by us to be empty. From a conceptual standpoint, this is a perfectly valid definition, yet from a scientific perspective we can do better”, they are correct in more ways then one, they cannot see beyond a certain spectral point and the equipment that we design has similar limitations, we see in frequencies, yet an event 5500 years ago showed us at one point that we are limited by ourselves, and we forgot what we experienced, so at that point, what are we not seeing? We merely observe the parts we can see or measure, yet what happens when we mis out because we are focussing on a ruler, all whilst we need to use a version of a spatial Inclinometer, one that also measures spatial radiation, we never did that, did we, because we were never there, but evidence of that still exists, yet as we reach the limit of our expanded imagination, we forgot to push those boundaries and that in part made us our own worst enemy, a stage where the play is us, the stage was not the play, it was to show us the boundaries of the play of us. 

And as we go forwards, there will be people stating the list of original writers, but that was never the issue, Thessalia was. It was the place where the play showed a shift of borders, you can read it in Bello Civili, the set stage we see is “The book was for a time lost, but was rediscovered in Italian city archives in the Middle Ages”, it was found, but parts were missing, the papal powers feared the missing passages, did no one ever wonder why? I cannot tell how much is missing, but a part was omitted and another side of Thessalia optionally shows that. It is speculation, but when we consider a commander like Pompeii, a person as veteran as Julius Gaius Caesar was, did you actually believe he had no records? A stage with two sides, two sides of coins, not the same coin, but the same currency and that is where we see the play, the stage of Keno Diastima, not one coin, not more coins, but two distinct currencies, and the second currency we forgot about, but it was here all along. You merely have to open all eyes, we need to focus not with one mind, but with at least two. 

The stage is not the play, it defines the edges of the play, it makes all the difference.

Leave a comment

Filed under movies, Science

Is it real?

Yes, that is the question we all ask at times, in my case it is something my mind is working out, or at least trying to work out. The idea that my mind is forming is “Is it the image of a vision, or is it a vision of an image”, one is highly useful, the other a little less so. The mind is using all kinds of ideas to collaborate in this, as such, I wonder what is. The first is a jigsaw, consider a jigsaw, even as the image is different, the pieces are often less so different, one could argue that hundreds of jigsaws have interchangeable pieces, we merely do not consider them as the image is different and for the most, how many jigsaws have you ever owned? With this in the back of the mind what happens when we have data snippets, a data template, with several connectors, the specific id of the data and then we have the connector which indicates where the data comes from, both with date and time stamps. But like any jigsaw, what if we have hundreds of jigsaws and the pieces are interchangeable? What is the data system is a loom that holds all the data, but the loom reflects on the image of the tapestry, what happens, when we see all the looms, all the tapestries and we identify the fibres as the individual users? What happens when we create new tapestries that are founded on the users? We think it is meaning less and useless, but is it? What if data centres have the ability to make new frameworks, to stage a setting that identifies the user and their actions? We talk about doing this, we claim to make such efforts, but are we? You see, as IBM completed its first Quantum computer, and it has now a grasp on shallow circuits, the stage comes closer to having Ann actual AI in play, not the one that IT marketing claims to have, and salespeople states is in play, but an actual AI that can look into the matter, as this comes into play we will need a new foundation of data and a new setting to store and retrieve data, everything that is now is done for the convenience of revenue, a hierarchic system decades old, even if the carriers of such systems are in denial, the thinking requires us to thwart their silliness and think of the data of tomorrow, because the data of today will not suffice, no matter how blue Microsoft Italy claims it is, it just won’t do, we need tomorrows thinking cap on and we need to start considering that an actual new data system requires us to go back to square one and throw out all we have, it is the only way.

In this, we need to see data as blood cells, billions individual snippets of data, with a shell, connectors and a core. All that data in veins (computers) and it needs to be able to move from place to place. To be used by the body where the specific need is, an if bioteq goes to places we have not considered, data will move too and for now the systems are not ready, they are nowhere near ready and as such my mind was spinning in silence as it is considering a new data setup. A stage we will all need to address in the next 3-5 years, and if the energy stage evolves we need to set a different path on a few levels and there we will need a new data setup as well, it is merely part of a larger system and data is at the centre of that, as such if we want smaller systems, some might listen to Microsoft and their blue (Azure) system, but a smurf like that will only serve what Microsoft wants it to smurf, we need to look beyond that, beyond what makers consider of use, and consider what the user actually needs.

Consider an app, a really useful app when you are in real estate, there is Trulia, it is great for all the right reasons, but it made connections, as it has. So what happens when the user of this app wants another view around the apartment or house that is not defined by Yelp? What happens when we want another voice? For now we need to take a collection of steps hoping that it will show results, but in the new setting with the new snippets, there is a larger option to see a loom of connections in that location, around that place we investigate and more important, there is a lot more that Trulia envisioned, why? Because it was not their mission statement to look at sports bars, grocery stores and so on, they rely on the Yelp link and some want a local link, some want the local link that the local newspapers give. That level of freedom requires a new thinking of data, it requires a completely new form of data model and in 5G and later in 6G it will be everything, because in 4G it was ‘Wherever I am’, in 5G it will become ‘Whenever I want it, and the user always wants it now. In that place some blue data system by laundry detergent Soft with Micro just does not cut it. It needs actual nextgen data and such a system is not here yet. So if I speculate on 6G (pure speculation mind you), it will become ‘However I need it’ and when you consider that, the data systems of today and those claiming it has the data system of tomorrow, they are nowhere near ready, and that is fine. It is not their fault (optionally we can blame their board of directors), but we are looking at a new edge of technology and that is not always a clear stage, as such my mind was mulling a few things over and this is the initial setting my mind is looking at. 

So, as such we need to think what we actually need in 5 years, because if the apps we create are our future, the need to ponder what data we embrace matters whether we have any future at all.

Well, have a great easter and plenty of chocolate eggs.

Leave a comment

Filed under IT, Science

Right & wrong, 2 multi-dimensional sides

There was an article at the BBC a few hours ago and I had to sit down and ponder for a moment. I can revisit my view again and again, but the BBC gave a very specific side and it stopped me. As I see it loot boxes are not gambling, but the article ‘Loot boxes linked to problem gambling in new research’ gave an additional side, and it matters.

The article (at https://www.bbc.com/news/technology-56614281) gives a lot of the same, including the view of “About 5% of gamers generate half the entire revenue from the boxes”, which is an optional valid view, my emphasis is on ‘optional’. You see, even as we are given “Loot boxes are a video game feature involving a sealed mystery “box” – sometimes earned through playing the game and sometimes paid for with real money – which can be opened for a random collection of in-game items such as weapons or cosmetic costumes”, I noticed ‘sometimes earned through playing the game’ before, I got most of all gear in NHL19 without ever paying a cent! This is important, and there is a stage where we need to recognise the games that offer loot boxes as a reward from within the game. It is “The upcoming Gambling Act review is set to look at the question, with the UK’s House of Lords already having weighed in to say that loot boxes should be firmly regulated as “games of chance”” that made me pause, loot boxes are not gambling, but when it is stated that they are ‘games of chance’ I do not disagree. We can argue in all manner that EA games took loot boxes in FIFA and went overboard, I will not disagree on that. Consider that FIFA21 “In FUT, there are more than 16,000 Day 1 cards, corresponding to as many players”, as such, if there are 1,000 it would be a low estimate, 2,500 would be more likely, but I have no official numbers. This implies that to have them all you would have to buy a minimum of 2,500 packs, if each pack has only one rare, that is just insane. 

It is not gambling! You see, to have that premise, that needs to be a setting that buying one pack gets you one cards stating ‘Thank You’, that is not the case, you always get a set configuration of common, uncommon and 1 rare card. But the House of Lords goes with ‘games of chance’, which is the seemingly the case and even more, it has an exploitative side, I never denied that, and there is a difference, I opted in the past for an alternative. It is what is called ‘A factory set’ a set with every card, the set is not tradable and has no value as you cannot trade them, but you would have all the cards and to offer that set in the last quarter of the game might be an option. 

My issue with the article was “The link between gaming loot boxes and problem gambling has been “robustly verified”, according to a new report”, I have issues with that straight of the bat and I would want to see that full report and its data before giving it any validity. You see, in the last 6-12 months I have noticed that gambling and in game advertising that is pro gambling has been popping up all over iOS and Android, Google’s own YouTube now has an increasing amount of gambling advertisements, so the setting is as I personally see it rigged.

This included advertisements on how to win at gambling, a stage that in my mind has nowhere to go and shouldn’t be allowed in any advertisement setting of Google. I wonder if that factor was considered in that report, was it even investigated? Let’s take a look!

A stage that is on a sliding slope, as we see more and more pagers on the internet all set to the stage where you can win real money playing games, so the game is already rigged and it has nothing to do (as far as I can see it) with loot boxes. And the report by the GambleAware charity is off to the wrong start with “Loot boxes are purchasable video game content with randomised rewards. Due to structural and psychological similarities with gambling, they have come under increasing media, academic and legal scrutiny. The UK government is currently reviewing evidence on loot boxes, which will be considered in the forthcoming review of the Gambling Act 2005”, you see plenty of games allows you to win these boxes by playing, Mass Effect 3, NHL 19 and several others, some give several packs a day, you only have to enter the game to get them. The report (at https://www.begambleaware.org/sites/default/files/2021-03/Gaming_and_Gambling_Report_Final.pdf) has more. “relationships between loot box engagement and problem gambling have been robustly verified in around a dozen studies”, I have an issue with that statement, but lets continue for now. When we see “Participants also purchased loot boxes because of a ‘fear of missing out’” I wonder how this was proven, you see, when we see on page 6, ‘A game will offer loot boxes for free. Encouraging later real-money purchases’ it is an assumption, a speculation. I never spend money on NHL19 and I have all the jerseys, all the goalie masks and all the arena’s. In addition, Mass Effect never pushed for spending money, you can get it all by merely playing. That is a setting of two games straight of the bat. Yes, it was possible to spend money, but it was never needed. The research then give us Overwatch which is a free to play and loot boxes are their only revenue, but what is there?

The report gives Fortnite a pass on a few settings, yet the Verge gives us ‘Epic Games will settle Fortnite loot box lawsuits in V-Bucks’ with the additional “The class action settlement also provides an additional $26 million in benefits” (at https://www.theverge.com/2021/2/22/22295676/epic-games-fortnite-loot-box-lawsuit-settlement-rocket-league-v-bucks), as such the report already has a few sides I find debatable and optional rejectable. When we are treated to “the game’s cooperative survival mode, “Save the World,” did — at least until 2019 when Epic changed its loot box system to allow players to see the item inside prior to purchase”, so why did that report not contain the part that gives us ‘when Epic changed its loot box system’, and all whilst another source gives us regarding Ubisoft “The Division 2 has both microtransactions and loot boxes and we said that Ubisoft didn’t go overboard with recurring revenue”, this was given to us in 2019, so why is a 2 billion dollar company excluded from this research? Is this EA games bashing?

There is more, and as gambling influences on other fields that the same group finds itself, the setting is as I personally see it rigged.

The report has some conclusions that make sense, they do have some grasp of the issue and as I personally see it, there needs to be a larger stage here, one that is beyond ‘self-regulating’, in this EA Games made several massive blunders on the stage and that Needs to be acknowledged too. I am all for the full disclosure of odds as well as a FULL LIST (including rarity) of all cards that can be obtained. I believe that a factory set, one that cannot be used for trading and optionally not for playing either, it might lower the ‘Pokemon’ impact (gotta catch them all) of those spending cards on it, some do want to have them all, merely for the having. Anyone who ever collected Football, Hockey or Basketball cards will get that part. A stage that will evolve over time and one that could reset the barriers we have now.

So yes, I feel I was right, loot boxes are not gambling, but they are a game of chance, even as every pack has the same dimensions, they tend to have 1 rare card and in case of EA’s FIFA that will not do, not in a game with 16,000 playable characters. There are several solutions, but it is up to EA to steer their ship to one of the solutions that gamers can live with, I for one think that the EA NHL solution is one that should limit damage, yet with 16,000 characters, the packs should be 500% larger, including at least 5 rare cards, but that is merely my initial view.

I have a few issues with the report, but it does give us a view that is not entirely wrong and it also gives us a few sides that matter. As for the BBC article, loot boxes might to some degree correlate to problem gambling, but that stage is a lot bigger than the report gives. And it starts in both the Android and the Apple store with their collection of free games that offer in-app purchases, the fact that these makers set the game up to mandatory show one advertisement EVERY level is a larger stage, and the oversight of that makes it an issue, if gambling is a factor, these influences should be looked at as well, as well as the deceptive conduct that we see in the advertisements with increasing amounts. 

Leave a comment

Filed under Gaming, Law, Media, Politics, Science

The joke is on us (all)

Reuters gave light (again) to an article that I wrote earlier, 2 days ago (at https://lawlordtobe.com/2021/03/30/an-almost-funny-thing/) I wrote ‘An almost funny thing’, I got it from the BBC and I feel certain that some official people were already already on the ball, being a mere 2 years late. I reckon that some figured out that the growing cash flow these people ended up with will count against certain players, if not a lot more. Some people might have gotten additional considerations with “In the OSI model, we see layers 3-7 (layer 8 is the user). So as some have seen the issues from Cisco, Microsoft and optionally Zoom, we see a link of issues from layer 3 through to layer 7 ALL setting a dangerous stage. Individually there is no real blame and their lawyers will happily confirm that, but when we see security flaw upon security flaw, there is a larger stage of danger and we need to take notice” and that is the tip of the iceberg. So when Reuters gives us ‘Ransomware tops U.S. cyber priorities, Homeland secretary says’ this morning, we might not get the entire field in view and that is not on Reuters. And as Alejandro Mayorkas gives us “ransomware was “a particularly egregious type of malicious cyber activity” and listed it as the first of several top priorities that his department would tackle in the online sphere” we are not getting the entire story and we are happily giving the Department of Homeland Security that as they have other consideration as well. Yet I personally believe (speculatively) that some programmers working in specific places got handed libraries to make more, but also got a setting where they created software that opened a backdoor, so that all parties have an excuse and any investigation will end up going nowhere. You see there are plenty of real option givers that start as ‘Top 9 Python Frameworks For Game Development’, and that is where it starts. Consider the following scenario: as some developers become better they seemingly need shortcuts and would you believe it, some knows someone on the darkweb and they will hand the developer an option, two actually, one is free, the other one is $19.99, but is ‘presented’ as a lot more secure and it has documentation, that is all that they need and as the library is linked, the trap is set. The game maker does the right thing and enhances his program with either version (both have the flaw), and now, with a passive backdoor is passive (gaming is required), it passes through a whole range of systems and as the game is offered free with ‘in-app purchases’ the people behind the screens suddenly have 100K+ stations for all kinds of use. So whilst some are trivialising “No one really knows the size of the dark web, but most estimates put it at around 5% of the total internet. Again, not all the dark web is used for illicit purposes despite its ominous-sounding name”, we see, ohh not all is illicit, but consider that this software would be in the open internet if it was all on the up and up. The indie developer (many companies of one) has that ‘special feeling’ as he was introduced and others were not, but they all were and some were offered similar links in the end all linking to the same package, and that is the game, so when we we see greed driven idiots like Epic games (and a few others) setting the stage to avoid the Google and Apple store, we will see a much larger shift, one that gives free reign to criminal minded people to infect a massive amount of systems. So when you think that players like DHS is ready for these assaults, the people will soon learn the hard way that they were not and from there it will go from bad to worse.

And this is not about Epic games, even as some will herald “Cesium will be available for free for all creators on the Unreal Engine Marketplace. It’s an open-source plugin for the engine that unlocks global 3D data and geospatial technology. This means that games that use it will be able to discover in real time the location of a player in a given 3D space, using accurate real-world 3D content captured from cameras, sensors, drones, and smart machines” (source: venture beat), we think it is all for the good of us, and it is not, it is good for the pockets of Epic Games, but what happens when other elements get a hold of the saved data linked to geospatial technology? What happens, when foundational advantages that were (for the most) in the hands of players like CIA and GCHQ; what happens when cyber criminals get THAT level of precise data and THOSE cluster data groups? Did you think of that? So whilst some laugh away “games that use it will be able to discover in real time the location of a player in a given 3D space, using accurate real-world 3D content captured from cameras, sensors, drones, and smart machines”, the data will go a lot further, it will optionally end up not merely showing those systems, but the locations of all systems they link to as well. It is a hidden version of what I called the ‘Hop+1’ intrusion malware (thought up by yours truly) that made much of the CIA counter software close to useless, someone took that idea and made a corporate version with some version of a backdoor, in that stage the internet will end up being as dangerous as walking the dog (not the ‘M’ word), in a minefield. Letting the dog have a shit will be the last thing you did that day for a very long time to come.

As such, some might applaud the DHS (they actually did nothing wrong) as we see “a DHS official said the reference was to underground forums that help cybercriminals franchise out their malicious campaigns.” Yet under these situations, finding blame is close to impossible and the mistrusting developers end up helping cyber criminals in the process, and that is if there is ever any prosecutable connection found. 4 stages not directly linked will make prosecution close to impossible. So how is that for size? And whilst we take notice of “He said the agency would “quarterback” the U.S. government’s digital defences and serve as a “trusted interlocutor” between business executives and public servants” we see that their heart is in the right place, but the people they are hunting are heartless, devious, better funded and technologically more up to speed. It is a race many politically governmental intelligence organisations cannot win, not now, and optionally not ever. What a fine mess some corporations got us into.

Leave a comment

Filed under Gaming, IT, Law, Military, Politics, Science

And so it begins

To be honest, yesterday was a little whack. I came up with the foundation of a new Star Trek movie (a story covering two movies), but I will not set it here as it is founded on Star Trek materials already in existence and as such, it is not mine, that and the fact that the people at Paramount should be ahead of me, if I can come up with the goods and they cannot, you can draw your own conclusions on that. The second part was a new idea on something that might be seen as either a sequel or a prequel. I am not much of a horror fan, never was but I sometimes go see one. There was Poltergeist, the Relic, Grave Encounters (one and two), and then it happened. The idea got into me and these movies gave way to the paving of the idea, they are important (somehow). I remembered a ride in a Dutch theme park named ‘the Efteling’, the ride is called ‘Villa Volta’ and it refers to a legend called ‘de Bokkenrijders’ (the Goat riders). The story goes back to a book written in 1779, the book and the gang actually referred back to 

  • Gabriël Brühl – sentenced to death by hanging, 10 September 1743.
  • Geerling Daniels – died of two self-inflicted stab wounds, 28 January 1751.
  • Joseph Kirchhoffs – sentenced to death by hanging, 11 May 1772.
  • Joannes Arnold van de Wal (“Nolleke van Geleen”) – sentenced to death by hanging, 21 September 1789.

When we consider these parts, we see the foundation of an excellent horror movie, one with references to the past, consider that the area ‘the Kempen’ was not the most illuminated one and also largely absent of lighting, we see a larger stage, with the robbing of churches, people and devil worship that the stage for something nicely haunting can be made. A stage that includes parochial corruption, envy based corruption and superstition all whilst there was an actual danger of cutthroat robbers does tend to lend a hand in setting nerves on fire as we contemplate what is behind the three doors, it might help to realise that it is not the doors leading to the living room, the street or the cupboard door to the bed (people slept in cupboards in those days). A stage that was determined not by law (even as they claimed it) but by fear and by the hands of the church, yes, those were the days.

So as I was setting the field to all kinds of creativity, the US government changes the timeline I had in mind initially (at https://lawlordtobe.com/2020/12/03/trillion-dollar-musk/  where I wrote ‘Trillion dollar Musk’, the stage where I predicted “I stated before that in the next 3-4 years his value will increase to roughly $1.2 trillion dollars, or in a less shorthand version $1,200,000,000,000, yes that is where he is heading and he already has most of the IP in his possession to do so”, now we see that Reuter gives us ‘Biden proposal: $174 billion for EVs, new funds for renewable power’, a stage where we are told “The White House said the new EV funds will result in more U.S. production of EV components and batteries and fund new consumer rebates and tax incentives “to buy American-made EVs, while ensuring that these vehicles are affordable for all families and manufactured by workers with good jobs” and that is the beginning for Elon Musk to chisel in stone the setting that gets him a trillion dollar plus member and he already has most of the IP to do so, the little he is missing was in one of my articles and likely his team already has the stage in place to get started, I reckon (speculatively) that Elon Musk and his Musk-wares will optionally be a household name within the decade, equalling, optionally surpassing Google, Apple and Microsoft in the process. It is the power of innovation and the sooner the iterative flaccid minds take notice, the better the world becomes. 

And so it begins, the stage for a new technology driven economy comes into play and when 5G deploys all over the world, the old people (Arvind Krishna, Satya Nadella, Larry Ellison et al) see what happens next, they will race, they will cry needs and they will object to all kinds of things, but the world is changing and unfortunately for them, Elon Musk seemingly has the goods.

It will not make changes overnight but it will make larger changes. He will not do it alone, there are larger players who will be part of all this, but not the three mentioned and if they do not adjust the need of their shareholders to actual innovative jumps they will become obsolete. Yes and it includes Microsoft, who has the good fortune to be reduced to a user facilitator. The innovative will also push us into directions we are not completely ready for, but that is the foundation of innovation. You see Ren Zhengfei was initially part of that, but the Wall Street players saw what they were missing out on and their anti-Huawei rhetoric is playing against them, now the US will miss out on a lot more, the question is will the change of direction go towards the EU, or will there be another direction? I actually do not know, but to cater to these changes proper 5G was required and in the speed section, we see (according to statista.com) that Saudi Arabia is at the head of that speed setting, yet both Canada and Australia have more than the minimum speed requirement (America does not), as such they do have a larger advantage at present and that matter, because the developer that fits the bill will have an easy mark raking in revenue in whatever direction innovation pushes. I cannot tell what direction it is in, because I simply do not know, but the earlier step (the Elon Musk deal) will also push domotics and smart devices and they are optionally now all driven by Musk technology. 

So here in the beginning of new technology, we see players, but not the players that hoped to be in charge and that drives them to all kind of directions, it is THEIR personal horror story, and they fear to be non-essential, the rich fear that as much as a direct loss of wealth, because when their status as essential captain of industry goes, so do their automatic revenue renewal programs, and it seems like we get to see the impact of those changes earlier than I expected.

Leave a comment

Filed under Finance, IT, Politics, Science

An almost funny thing

I saw an article at the BBC and I will get to that in a moment, but it reminded me of a situation that happened in 2010. I needed a new laptop and I was looking in a shop at their Collection of laptops. A man came to me and was trying to convince me just how amazing this laptop was. My inner demon was grinning, I get it, the man was enthusiastic, he was giving the numbers, but in all this, did he realise what he was saying? I am not doubting the man’s skills, he was doing a good job, I was however in IT and had been there for 30 years, so I have pretty much seen it all, and there it was, my little demon, on my right shoulder calling me ‘pussy’. So as the man stated ‘this laptop has a one terabyte hard-drive, can you even imagine ho much that is?’, I could not resist and my response was ‘Yup, that would fit roughly 10% of my porn collection’, his jaw dropped to the ground, his eyes almost popped, the demon inside me stated ‘Nice!’ Actually, it was not quite true, it would only fit a rough 0.32114%. It was the impact of the shock factor. You see, there is a hidden agenda there, when you (appropriately) use the technique, you get to see the real salesperson and that was what I needed. He was thrown, but he recomposed and continued giving me the goods on the laptop, I bought that laptop roughly 132 seconds later.

So today I saw ‘The Rise of extortionware’ (at https://www.bbc.com/news/technology-56570862), here I notice “where hackers embarrass victims into paying a ransom”, it is not new, it is not even novel. I will also give you the second game after the people involved get arrested, they will demand anonymity and any bleeding heart judge will comply. I state that these people will be handed the limelight so that the people that faced ransomware attacks can take their frustration out of these people. But that remains wishful thinking. So next we get “Experts say the trend towards ransoming sensitive private information could affect companies not just operationally but through reputation damage. It comes as hackers bragged after discovering an IT Director’s secret porn collection.” I have the question was it a private or a company computer? You see, sone focus on the boobies, just what the advertisers on Twitter hope for, they want the click bitches, it makes them money. It is time that we set the larger stage, you see the entire mess would be smaller if Cisco and Microsoft had done a proper job. OK, I apologise, Cisco does a proper job, but some things slip through and in combination with Microsoft exchange servers it is not slipping through, it is a cyber hole the size an iceberg created on the Titanic and we need to set a much larger stage. So when we see “Thanks God for [named IT Director]. While he was [masturbating] we downloaded several hundred gigabytes of private information about his company’s customers. God bless his hairy palms, Amen!”, it seemingly answers that he might keep it on a corporate computer, or he uses his private computer for company stuff. Yet in that same light the hacker should not be allowed any anonymity, we all get to see who the hacker is. If there is something to be learned it is see with “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts” There are two sides

  1. The station of ALWAYS ONLINE needs to change, there needs to be an evolving gateway of anti hack procedures and a stage of evolving anti hack routers and monitoring software. You think that Zoom is an option?
    Tom’s Guide gave us less than 2 weeks ago “More than a dozen security and privacy problems have been found in Zoom”, as well as “Zoom’s ease of use has made it easy for troublemakers to “bomb” open Zoom meetings. Information-security professionals say Zoom’s security has had a lot of holes, although most have been fixed over the past few year”, so whilst you contemplate ‘most have been fixed’, consider that not all are fixed and that is where the problem goes from somewhat to enormous. Well over 20% of the workforce works at home, has zoom meetings and that is how cyber criminals get the upper hand (as well as through disgruntled employees), a change in mindset is only a first station.
  2. Remember that Australian? (Julian Assange) We were told that soon there would be some leaks on issues on banks (Wall Street) then it suddenly became silent, now some will say that it is a bluff, but in light of the meltdown in 2008, I am not so certain, I reckon that some have ways to show the hackers who they are and they profit by not doing that. Can I prove this? Absolutely not. It is speculation, but when you look at the timeline, my speculation makes sense. 
  3. The third side is optionally the second side as the second side might not be a real side. When we see “Hackers are now actually searching the data for information that can be weaponised. If they find anything that is incriminating or embarrassing, they’ll use it to leverage a larger pay-out. These incidents are no longer simply cyber-attacks about data, they are full-out extortion attempts”, the underlying station is ‘information that can be weaponised’ and the IT sector is helping them.

How did I get there? The cloud is not as secure as some state, and the salespeople need to take notice. Business Insider gave us about 6 months ago “70% of Companies Storing Data With Cloud Companies Hacked or Breached”, see the link we are now slowly getting presented? 

In the OSI model, we see layers 3-7 (layer 8 is the user). So as some have seen the issues from Cisco, Microsoft and optionally Zoom, we see a link of issues from layer 3 through to layer 7 ALL setting a dangerous stage. Individually there is no real blame and their lawyers will happily confirm that, but when we see security flaw upon security flaw, there is a larger stage of dangers and we need to take notice. And here the dangers become a lot more interesting when we consider the Guardian yesterday when we saw “Intelligence value of SolarWinds hacking of then acting secretary Chad Wolf is not publicly known”, what else is not publicly known? How many media outlets ignored the Cisco matter, how come ZDNet is one of the few giving us “it’s not releasing patches for some of the affected devices that reached end of life” less than 8 weeks ago. Again I say Cisco did the right thing by informing its customers close to immediately, yet when we see “More than 247,000 Microsoft Exchange servers are yet to be patched against the CVE-2020-0688 post-auth remote code execution (RCE) vulnerability impacting all Exchange Server versions under support” (source: bleepingcomputers.com) as far as I can see, a lot of the media ignored it, but they will shout and repeat the dangers of Huawei, without being shown actual evidence, and I state here, that unless we make larger changes, the extortion path will evolve and become a lot larger. With 70% of cloud systems getting hacked or breached, a large chunk of the Fortune 500 will pay too much to keep quiet and who gets to pay for that? There is a rough 99.867765% chance that its board members will not, it might be speculatively, so please prove me wrong.

A stage where the needs of the consumers changes in a stage where the corporations are not ready to adjust and all whilst the IT salespeople have that golden calf that does everything and make you coffee as well. Adjustments are needed, massive adjustments are needed and we need to make them now before the cybercriminals are in control of our IT needs and that is not mere speculation, when you see flaw after flaw and too little is done as too many are the victim of its impact is a serious breach and it has been going on for some time, but now it is seemingly out in the light and too many are doing too little and as we laugh at “God bless his hairy palms, Amen!” Consider that stage, and now consider that they invade a financial institution, these are clever criminals, they do not empty your account, they merely take $1, perhaps $1 every other month, this implies that they are looking at a $16,000,000 every two months. And this is merely one bank, one in a thousand banks, some a lot bigger than the Australian Commonwealth bank and lets face it, the fact that layer 3 to layer 7 is leaky in hundreds of thousands of customers, do you really think that banks are off-limits? Do you really think that this is a simple hick-up or that the scenery is changing this quickly by people claiming that it will be fixed in no-time? 

We need massive changes and we need them a lot sooner than we think.

1 Comment

Filed under IT, Law, Media, Science