April 17, 2015

SJWs pop an artery

BoingBoing posted this picture on Twitter:

/images/08214.jpg

And the response was ferocious.

How many SJWs does it take to change a light bulb?

UPDATE:

/images/08215.jpg

Who are you calling "Kitty kitty kitty"?

Posted by: Steven Den Beste in Weird World at 11:07 AM | Comments (4) | Add Comment
Post contains 34 words, total size 1 kb.

April 16, 2015

Mundanes will believe anything

Someone in the UK is under the impression that underboob blue ribbons are a new fashion trend in Japan.

Which of course is baloney. The only place it'll show up is Hestia cosplay.

It's interesting going through something like Yandere (NSFW) to see what characters have, and have not, caught on with fan artists. And based on what I saw just now, Hestia is a hit. Dunno about the show, but the artists love her.

Fino Bloodstone whiffed entirely; there are only 11 (NSFW). Hestia already has 72 (NSFW) and that show has only been out for a couple of weeks.

UPDATE: Having said that, I'm sure the ribbon is part of the reason why Hestia is so popular so far, and it was a stroke of genius by the character designer.

UPDATE: Here are some others (without links):

Louise 567
Misaka Mikoto 738
Super Sonico 317
Sonsaku Hakufu 155
Rias Gremory 120
Millhiore F. Biscoti 128
Lucy Heartfilia 47
Eris 56
Sento Isuzu 218
Haramura Nodoka 185
Maka Albarn 131
Ishiki Akane 66

The popularity of Railgun is a bit of a surprise.

/images/08213.jpg

Posted by: Steven Den Beste in Weird World at 01:36 PM | Comments (5) | Add Comment
Post contains 188 words, total size 2 kb.

April 12, 2015

How to start a riot

I wonder what would happen if someone attended a leftist demonstration carrying a sign that said, "Execute Mumia"?

(Which won't happen. The governor commuted his sentence from "death" to "life without parole". But we can still dream.)

Posted by: Steven Den Beste in Weird World at 08:21 AM | No Comments | Add Comment
Post contains 42 words, total size 1 kb.

March 25, 2015

You don't want a war, but the war wants you...

It's beginning to look like the crash in the Alps was deliberate. One of the black boxes was recovered and it was the cockpit voice recorder. What they found when they played it back was that one of the pilots left the cockpit, and the door was locked after him. He tried to get back in and couldn't, beginning by knocking and ending by trying to break the door down.

The other black box hasn't been found yet, but we have records from air traffic control telling us that the jet went into a shallow dive which ended with lithobraking.

Some people are trying to say that the cockpit depressurized, leaving a dead or unconscious hand at the controls, but that doesn't explain why one guy left the cockpit, nor does it explain why the plane went into a dive.

As Ace says, "What was this pilot's name?"

For the time being, we don't know which one left the cockpit, but I can't see any reason for not releasing both names (unless they are still trying to reach family members with the news).

I know what ethnicity I'd put my wager on...

UPDATE: Looks like it was the copilot, who did it deliberately. But I was wrong about the ethnicity.

We may never know why he did it.

UPDATE: Oh, boy. There are rumors that the copilot recently converted to Islam.

Posted by: Steven Den Beste in Weird World at 04:17 PM | Comments (12) | Add Comment
Post contains 241 words, total size 2 kb.

March 24, 2015

Not the right way

If you rent and hate your landlord, this is not the way to get revenge.

I hate to think about how many felonies they committed. Start with Attempted Murder, Attempted Arson, 9 kinds of Conspiracy, and keep going from there. If they get caught (and I'm sure they will be) they're going away for a long, long time.

Posted by: Steven Den Beste in Weird World at 10:43 PM | Comments (3) | Add Comment
Post contains 62 words, total size 1 kb.

March 22, 2015

Jeff Jacoby wins the web today

"True Fact: Liberals once believed people shouldn't be valued for the color of their skin." -- Jeff Jacoby

Posted by: Steven Den Beste in Weird World at 02:19 PM | No Comments | Add Comment
Post contains 24 words, total size 1 kb.

March 17, 2015

Text Message Spam

I used to work on cell phone design. But that was 15 years ago, and I was working on hardware drivers and never really spent any time on any of the high level protocols. What we were building back then would be by modern standards considered a "dumb phone". The display was dot matrix, and the keyboard was a standard phone keyboard. We didn't support things like SMS.

Since I left the industry things have changed a lot. Like really A Lot.

My phone, which is two and a half years old by now, still fills me with amazement. It's a "smartphone" (a Droid DNA, which is a proprietary Verizon version of the HTC Butterfly) and it has a touch screen over a 1920*1080 color display, among other astounding things. And, of course, it does all the modern stuff like send and receive messages.

I don't use that feature much. Actually, I don't use the phone much. I got it as a solution to the "I've fallen and I can't get up" problem after my stroke, and thankfully so far I haven't needed it. (I'm proud to say that I haven't lost my balance and fallen even once since my stroke. Not even a single time.)

But I do get text messages occasionally. Two or three times a year I get text message spam. I got one this afternoon.

They've been porn come-ons, naturally enough. But what I don't understand is why I'm not getting several of those a day, or at the very least a few per week.. Does Verizon have an extremely active and effective spam filter running, and what I've received is the extremely rare ones who slip past the filter?

It isn't any secret which banks of phone numbers belong to each of the wireless phone companies, after all, and it ain't that tough to send an SMS to every phone number in the block. If you can send one, you can send 10,000. (Can't you?)

I don't for a moment believe the spammers are practicing self control. (As if.) So I assume that they are sending millions of spam messages per year to Verizon, and that nearly all of those are going into the bit bucket. Is so?

Posted by: Steven Den Beste in Weird World at 06:29 PM | Comments (4) | Add Comment
Post contains 376 words, total size 2 kb.

March 16, 2015

Where was Vlad?

Vlad Putin vanished from public sight for a week and a half, leading some to speculate that he was dead, or dying, or imprisoned by a pending coup, or visiting a woman in Switzerland, or...

Well, he's back again today, and the speculation is getting rampant. Here's my idea: The Russians downloaded his mind from his biological brain into a cybernetic brain in an android. The process takes about a week, and then the person takes a few days to get comfortable in their new body. In other words, Putin is now a robot.

Posted by: Steven Den Beste in Weird World at 12:32 PM | Comments (2) | Add Comment
Post contains 97 words, total size 1 kb.

March 15, 2015

Who're you? How can I be sure?

Yahoo sees 'end to end' email encryption by year-end

Maybe, if both of them are using Yahoo for their mail host.

But as a general problem it runs into the same issue as everything else: What key do you use for encryption, and how does the receiver get it without anyone else getting it?

Approximate answer: everyone publishes a public key. If you want to send email to someone, you use his public key to encipher a session key, used to encrypt the email. The encrypted session key is included in the email message.

When he receives it, he uses his private key to decrypt the session key, then uses that to read the email message.

All well and good, except for one thing: How do you get his public key, and how can you be sure you got the right one? That's where this all breaks down. One way or another, no matter how you design this part of it, there's a low/no security transaction which can be snooped or faked by someone bad (or NSA).

End-to-end encryption works better if you exchange a lot of emails with one person and can manually and reliably set up the keys at the beginning of the relationship.

But for a general n-to-n system, to support hundreds of millions of people, and allow encryption of messages sent to abitrary receivers for the first time, there is no way to get there from here.

Posted by: Steven Den Beste in Weird World at 08:12 PM | Comments (9) | Add Comment
Post contains 248 words, total size 2 kb.

March 14, 2015

3/14/15 9:26

Well, it is...

Posted by: Steven Den Beste in Weird World at 08:26 AM | Comments (6) | Add Comment
Post contains 5 words, total size 1 kb.

<< Page 1 of 82 >>
48kb generated in CPU 0.05, elapsed 0.1085 seconds.
46 queries taking 0.0721 seconds, 122 records returned.
Powered by Minx 1.1.6c-pink.