It’s a genre
It’s a genre
So I put a “man shrugging” emoji in my last post; it shows up strangely in RSS as displayed by NetNewsWire, showing “woman shrugging”, the “mars zodiac” sign and a bar code. No idea. Chaos, emergent.
This post has spoilers for Rogue One, and also Return of the Jedi.
Then the Death Star is tested, destroying Jedah, where they’re mining the crystals. Note that both times its fired, they give the order “single reactor ignition.” Are they testing the reactors and power systems, or conserving kyber crystal?
Really, how much “ammo” did the original Death Star have on board? How many times could they fire the main gun?
Was ten or fifteen shots considered sufficient, because after a demonstration, fear will keep the local systems in line? Where did they find enought kyber crystal for the second Death Star?
There’s some really interesting leaked photos and analysis by Charles Goodman. “Leaked photos from the Rogue One sequel (Mainly Speculation – Possible Spoilers).”
In September, we shared the news that for its 50th year, the people of Gävle paid an extra $100,000 to secure the goat.
Sadly, it seems to have not helped. Today, the goat tweeted: Oh no, such a short amount of time with you my friends.
The obvious lesson is that the Swedes have a ransomware problem, and the goat should stop clicking on links in email.
I moved to MacOS X because it offers both a unix command line and graphical interfaces, and I almost exclusively use the command line as I switch between tasks. If you use a terminal and aren’t familiar with the open command, I urge you to take a look.
I tend to open documents with open ~/Do[tab]… I wanted a way to open more things like this. I wanted to treat every app as if it were a command. I did this a little while back, and recently had to use a Mac without these little aliases and it was annoying! (We know that mousing was objectively faster and cognitively slower than keyboard use.
So I thought I’d share. This works great in a .tcshrc. I spent a minute translating into bash, but the escaping escaped me. Also, I suppose there might be a more elegant approach to the MS apps, but it was easier to write 5 specific aliases than to figure it out.
Anyway, here’s the code:
foreach f (/Applications/*.app /Applications/Utilities/*.app) set t=`basename -a $f` # Does not work if your app has a shell metachar in the name. Lookin' at you, superduper! set w=`echo $t | sed -e 's/ //g' -e 's/.app$//' | tr '[A-Z]' '[a-z]'` alias $w open -a \""$f"\" end alias excel open -a "/Applications/Microsoft\ Office\ 2011/Microsoft\ Excel.app" alias word open -a "/Applications/Microsoft\ Office\ 2011/Microsoft\ Word.app" alias powerpoint open -a "/Applications/Microsoft\ Office\ 2011/Microsoft\ PowerPoint.app" alias ppt powerpoint alias xls excel
(Previously: Adding emacs keybindings to Word.)
“We’ll have more guards. We’re going to try to have a ‘goat guarantee’ the first weekend,” deputy council chief Helene Åkerlind, representing the local branch of the Liberal Party, told newspaper Gefle Dagblad.
“It is really important that it stays standing in its 50th year,” she added to Arbetarbladet.
Gävle Council has decided to allocate an extra 850,000 kronor ($98,908) to the goat’s grand birthday party, bringing the town’s Christmas celebrations budget up to 2.3 million kronor this year. (“Swedes rally to protect arson-prone yule goat“_
Obviously, what you need to free up that budget is more burning goats. Or perhaps its a credible plan on why spending it will reduce risk. I’m never quite sure.
Image: The goat’s mortal remains, immortalized in 2011 by Lasse Halvarsson.
“My father likes to keep some anonymity. It’s who he is. It’s who he is as a person,” Eric Trump said.
It should have been obvious.
(Quote from Washington Post, July 6, 2016).
Offered up without comment:
I was irked to see a tweet “Learned a new word! Pseudoarboricity: the number of pseudoforests needed to cover a graph. Yes, it is actually a word and so is pseudoforest.” The idea that some letter combinations are “actual words” implies that others are “not actual words,” and thus, that there is some authority who may tell me what letter combinations I am allowed to use or understand.
Balderdash. Adorkable balderdash, but balderdash nonetheless.
As any student of Orwell shall recall, the test of language is its comprehensibility, not its adhesion to some standard. As an author, I sometimes hear from people who believe themselves to be authorities, or who believe that they may select for me authorities as to the meanings of words, and who wish to tell me that my use of the word “threat” threatens their understanding, that the preface’s explicit discussion of the many plain meanings of the word is insufficient, or that my sentences are too long, comma-filled, dash deficient or otherwise Oxfordless in a way which seems to cause them to feel superior to me in a way they wish to, at some length, convey.
In fact, on occasion, they are irked. I recommend to them, and to you, “You Are What You Speak.”
I wish them the best, and fall back, if you’ll so allow, to a comment from another master of language, speaking through one of his characters:
‘When I use a word,’ Humpty Dumpty said, in rather a scornful tone, ‘it means just what I choose it to mean — neither more nor less.’
‘The question is,’ said Alice, ‘whether you can make words mean so many different things.’
‘The question is,’ said Humpty Dumpty, ‘which is to be master — that’s all.’
Looking for something festive, holiday-like and chaotic for the blog, I came across color-changing cats. The history of color-changing cats is a fascinating one, involving Carl Sagan and accurate predictions of unfathomable chaos over the next ten thousand years. Because while we don’t know what life will be like that far in the future, consider how much the world has changed in the last hundred, and square that.
Of course, 10,000 years matters because it’s both substantially longer than meaningfully recorded history (or even a meaning for meaningful recording of history), and because it’s a good approximation for how long certain radioactive isotopes will remain dangerous.
So the US government, producer of said isotopes in its nuclear weapons programs, has convened panels of the great and clever to consider how to ensure that those isotopes are protected. Solutions were proposed including a skull and crossbones and giant spikes surrounding the site.
Read or listen to “Ten Thousand Years ” on 99% Invisible to see why those won’t work. One fascinating solution involves the creation of both color-changing cats and songs about them, such as:
One of the few things that’s for certain, over the next ten thousand years, assuming people are around, some will continue to ache for control they cannot achieve, and produce crap like a DRM-enabled litter box.
I fell victim to an interesting attack, which I am recounting here so that others may avoid it.
In a nutshell, I fell victim to a trojan, which the malefactor was able to place in a trusted location in my search path. A wrapper obscured the malicious payload. Additionally, a second line of defense did not catch the substitution. I believe the attackers were not out to harm me, but that this trojan was put in place partially for lulz, and partially to allow a more-important attack on the systems RBAC mechanisms to succeed.
I was attempting to purchase a six pack of New Belgium Rampant IPA, shown immediately below.
I obtained the six pack from the canonical location in the system – a reach-in refrigerator in the supermarket’s liquor aisle. I proceeded to the cashier, who rang up my purchase, bagged it, and accepted payment.
I realized upon arrival home, that this was a trojan six pack, as seen below:
Clearly, the attacker to care to make his payload look legitimate. What I noticed later, was the subtle difference I zoom in on below
Yes, the attacker had substituted root beer for real beer.
Needless to say, this was a devious denial of service, which the perpetrators undoubtedly laughed about. However, this was likely not just “for the lulz”. I think this was the work of juvenile attackers, whose motives were to defeat the RBAC (real beer access control) system. Knowing that a purchase of real beer would be scrutinized closely, I believe they exfiltrated the target beer by hiding it in a root beer package.
Mitigations put in place by the system did not catch this error – the cashier/reference monitor allowed the purchase (and likely, the offsetting real beer as root beer purchase).
The keys to this attack were that the trojan was in the right place in the search path, and that it appeared legitimate. Obviously, this location must be readable by all, since items need to be fetched from it. However, allowing items to be placed in it by untrusted users is a definite risk. Technical constraints make the obvious countermeasure — allowing only privileged stocking, while permitting “world” fetching — presents serious usability concerns, and increases system cost, since the privileged stocker must be paid.
Nonetheless, such countermeasures are in place for certain other items, notably where the cost to the system — as opposed to the user — of an illicit item substitution is quite high.
Ultimately, system usability and cost tradeoffs put the onus on the end-user. Before taking a non-idempotent step, inspect the objects closely!
Two quick comments. First, the goat survived longer this year than usual. Second, I think it illustrates something. I’m not sure what. But my yule would be incomplete without a giant straw goat set ablaze.
Here’s a Friday Star Wars video for you.
As Austin Hill tweeted, “Conspiracy revealed! 7 min video that will change the way you think about one of the important events of our lifetime”