cultural reviewer and dabbler in stylistic premonitions

  • 31 Posts
  • 138 Comments
Joined 3 years ago
cake
Cake day: January 17th, 2022

help-circle
  • Copying my comment from another thread about this:

    They’re going to be “sovereign” over the whole archipelago, but only as long as they don’t exercise their sovereignty over the largest island in it which constitutes more than half of its total land area (30 km2 of 56.13 km2).

    From today’s Joint statement between the governments of the Republic of Mauritius and the United Kingdom of Great Britain and Northern Ireland concerning the Chagos Archipelago, including Diego Garcia:

    Today’s political agreement is subject to the finalisation of a treaty and supporting legal instruments, which both sides have committed to complete as quickly as possible. Under the terms of this treaty the United Kingdom will agree that Mauritius is sovereign over the Chagos Archipelago, including Diego Garcia. At the same time, both our countries are committed to the need, and will agree in the treaty, to ensure the long-term, secure and effective operation of the existing base on Diego Garcia which plays a vital role in regional and global security. For an initial period of 99 years, the United Kingdom will be authorised to exercise with respect to Diego Garcia the sovereign rights and authorities of Mauritius required to ensure the continued operation of the base well into the next century.

    The treaty will address wrongs of the past and demonstrate the commitment of both parties to support the welfare of Chagossians. Mauritius will now be free to implement a programme of resettlement on the islands of the Chagos Archipelago, other than Diego Garcia, and the UK will capitalise a new trust fund, as well as separately provide other support, for the benefit of Chagossians.

    It will also herald a new era of economic, security and environmental partnership between our two nations. To enable this partnership the UK will provide a package of financial support to Mauritius. This will include an indexed annual payment for the duration of the agreement and the establishment of a transformational infrastructure partnership, underpinned by UK grant funding, to deliver strategic projects generating meaningful change for ordinary Mauritians and boosting economic development across the country. More broadly, the UK and Mauritius will cooperate on environmental protection, maritime security, combating illegal fishing, irregular migration and drug and people trafficking within the Chagos Archipelago, with the shared objective of securing and protecting one of the world’s most important marine environments. This will include the establishment of a Mauritian Marine Protected Area.

    Nice touch making a new “Marine Protected Area” in the process; the current “Chagos Marine Protected Area” was created entirely to, well… lets let this 2009 US diplomatic cable published by WikiLeaks explain:

    1. (C/NF) Summary. HMG would like to establish a “marine park” or “reserve” providing comprehensive environmental protection to the reefs and waters of the British Indian Ocean Territory (BIOT), a senior Foreign and Commonwealth Office (FCO) official informed Polcouns on May 12. The official insisted that the establishment of a marine park – the world’s largest – would in no way impinge on USG use of the BIOT, including Diego Garcia, for military purposes. He agreed that the UK and U.S. should carefully negotiate the details of the marine reserve to assure that U.S. interests were safeguarded and the strategic value of BIOT was upheld. He said that the BIOT’s former inhabitants would find it difficult, if not impossible, to pursue their claim for resettlement on the islands if the entire Chagos Archipelago were a marine reserve. End Summary.

    I wonder how the “treaty will address wrongs of the past”; somehow I doubt it will involve any mention of the CIA torture site there.








  • This video is full of jarring edits which initially made me wonder if someone had cut out words or phrases to create an abbreviated version. But, then I realized there are way too many of them to have been done manually. I checked the full original video and from the few edits i manually checked it seems like it is just inconsequential pauses etc that were removed: for instance, when Linus says “the other side of that picture” in the original there is an extra “p” sound which is removed here.

    Yet another irritating and unnecessary application of neural networks, I guess.





  • Upload bandwidth doesn’t magically turn into download bandwidth

    Actually, it does. Various Cable and DSL standards involve splitting up a big (eg, measured in MHz) band of the spectrum into many small (eg, around 4 or 8 kHz wide) channels which are each used unidirectionally. By allocating more of these channels to one direction, it is possible to (literally) devote more band width - both the kinds measured in kilohertz and megabits - to one of the directions than is possible in a symmetric configuration.

    Of course, since the combined up and down maximum throughput configured to be allowed for most plans is nowhere near the limit of what is physically available, the cynical answer that it is actually just capitalism doing value-based pricing to maximize revenue is also a correct explanation.






  • If copyright holders want to take action, their complaints will go to the ISP subscriber.

    So, that would either be the entity operating the public wifi, or yourself (if your mobile data plan is associated with your name).

    If you’re in a country where downloading copyrighted material can have legal consequences (eg, the USA and many EU countries), in my opinion doing it on public wifi can be rather anti-social: if it’s a small business offering you free wifi, you risk causing them actual harm, and if it is a big business with open wifi you could be contributing to them deciding to stop having open wifi in the future.

    So, use a VPN, or use wifi provided by a large entity you don’t mind causing potential legal hassles for.

    Note that if your name is somehow associated with your use of a wifi network, that can come back to haunt you: for example, at big hotels it is common that each customer gets a unique password; in cases like that your copyright-infringing network activity could potentially be linked to you even months or years later.

    Note also that for more serious privacy threat models than copyright enforcement, your other network activities on even a completely open network can also be linked to identify you, but for the copyright case you probably don’t need to worry about that (currently).











  • xzbot from Anthony Weems enables to patch the corrupted liblzma to change the private key used to compare it to the signed ssh certificate, so adding this to your instructions might enable me to demonstrate sshing into the VM :)

    Fun :)

    Btw, instead of installing individual vulnerable debs as those kali instructions I linked to earlier suggest, you could also point debootstrap at the snapshot service so that you get a complete system with everything as it would’ve been in late March and then run that in a VM… or in a container. You can find various instructions for creating containers and VMs using debootstrap (eg, this one which tells you how to run a container with systemd-nspawn; but you could also do it with podman or docker or lxc). When the instructions tell you to run debootstrap, you just want to specify a snapshot URL like https://snapshot.debian.org/archive/debian/20240325T212344Z/ in place of the usual Debian repository url (typically https://deb.debian.org/debian/).


  • A daily ISO of Debian testing or Ubuntu 24.04 (noble) beta from prior to the first week of April would be easiest, but those aren’t archived anywhere that I know of. It didn’t make it in to any stable releases of any Debian-based distros.

    But even when you have a vulnerable system running sshd in a vulnerable configuration, you can’t fully demo the backdoor because it requires the attacker to authenticate with their private key (which has not been revealed).

    But, if you just want to run it and observe the sshd slowness that caused the backdoor to be discovered, here are instructions for installing the vulnerable liblzma deb from snapshot.debian.org.