Skip to main content


Showing posts from April, 2016

Greenland ice sheet melting has started early

How Sad.

From SMH:

Greenland ice sheet melting has started early: "In a year of startling data pointing to a warming world, the thin blue line in the chart below of Greenland's ice melt was initially dismissed as just too outlandish to be accurate.
Greenland is home to the world's second largest ice mass, containing enough water to lift average sea levels about seven metres if it all melted.
The early-season melting of Greenland ice has scientists worried. Photo: Daniel Beltra, via Catherine Edelman Gallery (Chicago)
So in early April, signs that the giant ice sheets were melting at least a month earlier than typical during the three decades-plus of reliable records stunned scientists at the Danish Meteorological Institute."

'via Blog this'

Microsoft sues US government over gag orders on customer data grabs

From the Sydney Morning Herald:
Good logic in this article... how is a search warrant for your house different to a search warrent for your cloud storage... in both cases you should have to be notified. Those who know me know that I am not political so this is about common sense to me not a political statement.

Microsoft sues US government over gag orders on customer data grabs:

Orders that prevent Microsoft telling their customers when they're being surveilled are becoming more common, according to Microsoft. Photo: Bloomberg Microsoft has sued the US government, arguing that a law that can be used to prohibit technology companies from telling customers when law enforcement comes looking for their data is unconstitutional. Microsoft's lawsuit is the US technology industry's latest high-profile challenge to the reach of law enforcement into cyberspace, coming a couple months after Apple fought an FBI order to disable an encryption measure on an iPhone connected to a mass s…

My best bet on the FBI iphone break in technique

The news has been speculating on how the FBI has broken into an alleged terrorists iPhone and after thinking about it a while here is my guess...

Here is what I'd do:

1. I'd take apart the iphone and make a flash copy of the memory of the iphone.
2. Then Id run up one hundred flash copies of the original image in its original state.
3. Then I'd test three of the possible 10,000 combinations on each individual image until each individual image self destructs. Thats three hundred attempts in each cycle.
4. Then I'd keep doing it until I found the combination that worked. That is only 333 cycles to try all ten thousand pin combinations.

Ahhhh, this makes me think of a way to stop this attack... I wonder if Apple is interested in a solution?
Real Time Web Analytics