Solipsism Gradient

Rainer Brockerhoff’s blog

Browsing Posts published in August, 2005

Blogroll updated

No comments

I’ve been remiss in updating my blogroll here, but it’s finally done. I’ve had to cut down severely on my RSS feed reading, so some links had to be taken out – I hasten to add that, with very few exceptions, this should not be taken as a negative judgment. Currently I’m updating the feeds once a day and read about half of them immediately, and the rest if and when I have the time.

I’ve been following news about the evolution vs. creationism/ID debate with fascinated/horrified disbelief… until a few years ago I wouldn’t have believed that it’s even an issue!

Anyway, I think the best thing to come out of this whole mess is the flying spaghetti monster and its worshippers, the Pastafarians. Here’s my favorite logo for the FSM so far, designed for boing boing by Jim Leftwich:

Let’s hope that the FSM creation theory is given due attention as a perfectly valid alternative to other “creation theories”. RAmen.

Magazine meme

No comments

The Presurfer (and several others) pointed at this nice “make your own magazine” facility. So here we go:

The image is by jvzeuss73, by the way. Great photo.

Posted by Nando:

Rainer Brockerhoff wrote:

But I said “it’s funny” because, of course, most of these hackers assume that everybody at Apple is clueless and retarded, which is definitely wrong. icon_wink.gif

That could be the start of a fairly amazing story on creating an “un-hackeable” system. Microsoft hasn’t done it so far after so many atempts, and Apple has never needed a protection system like that until now. What amazes me is not how fast the hackers are working their way inside this, but how slow Apple is responding to all of this.

I’ve read on MacBidoule that they received a very aggressive letter by Apple asking the site owners to remove links and comments on the videos and texts that described methods of hacking the Tiger x86 Developer Preview. The timing was perfect. It was enough for the hackers to get their copies and methods right, and also the exact amount of time a company needs to build a base of arguments to require the removal of any illegal content from their sites.

This leaves Apple at a very ambiguous position, it is hadr to tell if they have let it all happen, or if it just slipped between their fingers. icon_cool.gif

Rafael Fischmann wrote:

… and then the hackers brake it again and again and again. Instead of breaking the code in 12 hours, maybe it’ll take a couple of days for the final version…

It took at least two weeks, maybe more. Should they decide to use strong encryption you’ll be looking at more than “a couple of days”.

But I said “it’s funny” because, of course, most of these hackers assume that everybody at Apple is clueless and retarded, which is definitely wrong. icon_wink.gif

Posted by Rafael Fischmann:

Rainer Brockerhoff wrote:

What I find somewhat funny about the situation is that certainly Apple is following these exploits very carefully and is, in effect, using these people to define and refine the protection technology that will be used in the final product. These are truly interesting times.

So what? Every software or O.S. developer do that… and then the hackers brake it again and again and again. Instead of breaking the code in 12 hours, maybe it’ll take a couple of days for the final version. It’s just a funny game.

By now, many reports point to actual, verifiable instances of “hacked” Mac OS X running on more-or-less standard PCs. I wrote a few days ago:
Rainer Brockerhoff wrote:

…However, from what I’ve read on the net, the Mac OS X boot process checks for the presence of the TPM chip and later on uses it to verify, or decrypt, some parts of its own object code

It therefore appears that – at least in the current, very preliminary version used – they’re simply verifying, not decrypting.

What I find somewhat funny about the situation is that certainly Apple is following these exploits very carefully and is, in effect, using these people to define and refine the protection technology that will be used in the final product. These are truly interesting times.

Posted by Nando:
Quite impressive blog you have going on here Rainer. And, as expected, marvelous articles and texts. I will add a link to this Weblog on my site, if you don’t mind.

Photos licensed by Creative Commons license. Unless otherwise noted, content © 2002-2017 by Rainer Brockerhoff. Iravan child theme by Rainer Brockerhoff, based on Arjuna-X, a WordPress Theme by SRS Solutions. jQuery UI based on Aristo.