Saturday, April 2, 2016

An Inconvenient Truth

Something has been bothering me about people who promote the idea that humans are causing climate change that will destroy the ecosystem of earth. These people fly around and give talks about how the actions of humans are destroying the planet. I have finally figured out what was bothering me. These people are flying around discussing how we are destroying the planet by burning too much fossil fuels. The are flying around. They are flying. Flying uses the most fossil fuel per kilometer travelled. That is what is bothering me. They are saying the most import issue is climate change and how we are causing that by burning fossil fuels but they travel using a machine that is the most inefficient with respect to fossil fuels. If the people who are saying we should reduce fossil fuels cannot reduce their consumption of fossil fuels because it is inconvenient why should we? I think people who promote the idea that we are destroying the planet by burning too much fossil fuels should pledge to never fly again and instead use teleprescence. Otherwise there claims cannot be respected. They cannot be thought leaders without be action leaders.

Friday, April 1, 2016

Why government backdoors in computer don't work

Computers need to be told everything. They cannot work without being told exactly what to do. Every detail must be present. In order to put a backdoor in a computer you need to tell the computer how the backdoor works. Exactly how it works. In particular you need to tell the computer what password the people accessing the backdoor will use. That is needed so when people access the backdoor the computer can compare the provided password with the password that is expected. That means that for every computer you ship, the 'secret' password is encoded in the computer. That means that the bad guys can buy the computer and take it apart and analyze the code to find the password. Then the bad guys know the password and can use the backdoor. Calling the backdoor, 'The Government Backdoor', does not prevent anyone from accessing the backdoor. The name is a false name and causes people to have assumptions about the back doors that is not true.

** I have simplified this slightly since backdoors can be implemented with more sophisticated algorithms than passcode because that is more understandable. The other approaches suffer the same problems but describing them in that terms obscures the key point.