Quote of the day—Patrick J. LoPresti

When I log into my Xenix system with my 110 baud teletype, both vi *and* Emacs are just too damn slow.  They print useless messages like, ‘C-h for help’ and ‘”foo” File is read only’.  So I use the editor that doesn’t waste my VALUABLE time.

Ed, man!  !man ed

ED(1)               UNIX Programmer’s Manual                ED(1)

NAME
ed – text editor

SYNOPSIS
ed [ – ] [ -x ] [ name ]
DESCRIPTION
Ed is the standard text editor.

Computer Scientists love ed, not just because it comes first alphabetically, but because it’s the standard.  Everyone else loves ed because it’s ED!

“Ed is the standard text editor.”

And ed doesn’t waste space on my Timex Sinclair.  Just look:

-rwxr-xr-x  1 root          24 Oct 29  1929 /bin/ed
-rwxr-xr-t  4 root     1310720 Jan  1  1970 /usr/ucb/vi
-rwxr-xr-x  1 root  5.89824e37 Oct 22  1990 /usr/bin/emacs

Of course, on the system *I* administrate, vi is symlinked to ed. Emacs has been replaced by a shell script which 1) Generates a syslog message at level LOG_EMERG; 2) reduces the user’s disk quota by 100K; and 3) RUNS ED!!!!!!

“Ed is the standard text editor.”

Let’s look at a typical novice’s session with the mighty ed:

golem> ed

?
help
?
?
?
quit
?
exit
?
bye
?
hello?
?
eat flaming death
?
^C
?
^C
?
^D
?


Note the consistent user interface and error reportage.  Ed is
generous enough to flag errors, yet prudent enough not to overwhelm
the novice with verbosity.

Patrick J. LoPresti
July 11, 1991
The True Path in alt.religion.emacs
[There is more but this should give you enough of a hint to get you to read the whole thing—assuming you GET OFF OF MY LAWN!

This remarkable piece of enlightenment is just as valid today as it was when it was originally posted 22 years ago today.

And as I was telling Ry the other day, not only would I rather not be running Windows 8, I still harbor some resentment DOS was replaced with Windows 95.—Joe]

And you still use Android?

Via a Tweet from Ry we have still more info on the security issues with Android (emphasis in the original):

The Bluebox Security research team – Bluebox Labs – recently discovered a vulnerability in Android’s security model that allows a hacker to modify APK code without breaking an application’s cryptographic signature, to turn any legitimate application into a malicious Trojan, completely unnoticed by the app store, the phone, or the end user. The implications are huge! This vulnerability, around at least since the release of Android 1.6 (codename: “Donut” ), could affect any Android phone released in the last 4 years1 – or nearly 900 million devices2– and depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet.

While the risk to the individual and the enterprise is great (a malicious app can access individual data, or gain entry into an enterprise), this risk is compounded when you consider applications developed by the device manufacturers (e.g. HTC, Samsung, Motorola, LG) or third-parties that work in cooperation with the device manufacturer (e.g. Cisco with AnyConnect VPN) – that are granted special elevated privileges within Android – specifically System UID access.

Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these “zombie” mobile devices to create a botnet.

I’ve known there were lots of security issues with Android but this is much bigger than I imagined. If you were concerned about various three letter agencies sucking up data about you (or even your snail mail) then you should be even more concerned that just about anyone that is technologically competent can take complete control of your Android phone.

A little over two years ago I purchased a Android phone with thought of developing apps for it. I never got around to it and after releasing Field Ballistics for Windows Phone I gave it further consideration. I decided not do pursue Android as an alternate platform. I’m glad I made that decision. Would you want everyone and their brother looking at the map on your phone showing your location and the location of your next target? At Boomershoot that would be an invitation to have “your” target poached.

Random thought of the day

In my hand I have a computer with nearly the human computational power of an entire planet of people. It has proximity, light, sound, acceleration, magnetic field, and location sensors. It is in near constant contact with a network of hundreds of millions of other computers most of which are far more powerful than it. You can buy one for about a day’s pay.

With all that power, data, and sensor input available what appears one of the easiest paths to fame and fortune with it is to program it to make fart sounds*.

Both Marvin and I have good cause to be depressed.


*Ry pointed this out to me last week. “Thank you” Ry.

What gets prosecuted

Next time someone says they are OK with the NSA spying because they are “keeping us safe” and “if you do nothing wrong, you have nothing to fear” or some such fantasy, here’s something to consider. According to this, the most commonly crime prosecuted in the former East Germany in the five years before the unification was failure to report a crime you knew about. When the state knows everything, then NOT being a rat becomes more dangerous than being a criminal giving the police a cut of the action for protection, because you have no leverage. That thought should terrify folks when they realize what it really means.

(BTW – I think the Judge likely believes what he says when he reports that, but I do not have an independent verification of his reported fact- anyone know for sure the stats on that? Even if it’s not the number one “crime,” if it’s anywhere in the top hundred it is bad.)

(Later Edit: How big a step is it from “see something, say something” to “see something, you are required to say something” with some sort of nebulous protections that may, or may not, protect you if you do say something?)

Quote of the day—Gregory Morris

I played with it some… took me a minute to figure out how to position the shooter/target spots on the map… but then I found the elevation tool, and… whoa, totally cool.

Top notch stuff here.

Gregory Morris
June 28, 2013
Comment to the blog post Field Ballistic about my app for Windows Phone.
[I have nothing to add.—Joe]

Field Ballistics is “Top Paid”

I found this surprising*. Very pleasing, but surprising:

WindowsPhoneTopPaidSports

Field Ballistics on Windows Phone is in the list of “Top paid” sports apps after being out for only a week.

See my announcement here. Purchase it (or get a free trial version) here.


*Assuming no inflation, sales remain constant, and I saved and invested every penny then in another 1000 years I might be able to retire on the proceeds.

In my other life I am also a mechanic

I started repairing musical instruments in the 1970s. My hippie days. Started a business doing that when I was 19. Taxes and red tape slowly turned me, or helped turn me, into a conservative, if by conservative we mean someone who believes that people should stay the hell out of other people’s business.

Anyway it’s difficult to get away from the musical instruments completely. Below is a Yamaha 894– solid silver body and keys, and this one has a custom headjoint made by Drelinger in White Plains, NY. The Japanese have been making some fine instruments and this one is no exception. Each key is like a piece of jewelry, not in the sense that certain guns are said to be “jewelry” but literally.

Every key is fit to its pivots or shaft to perfection. Any tighter and it would bind with temperature changes. One key can have a half dozen or more parts, silver soldered together in a jig and hand polished. The soft pad each key holds must produce an air-tight seal with a light touch to the tone hole, it must do it quietly, and it must usually do it in mechanical combination with one or more other keys, so there is a fair amount of regulation of each key, and more regulation between keys.

image

The soft pads are leveled to the tone holes by use of paper shims of various thicknesses. I work with .001″, .002″ and .003″ shims mostly. Mark, remove the pad, cut a shim, paste it on the back of the pad, reinsert the pad, and try. Repeat as necessary, which can be many times per pad. You can see the punches, of which I’ve made several to fit various pad cup sizes, and bits of round shims, and a razor blade for cutting them into pieces. Sometimes you use whole shims to increase the effective thickness of the pad.

If you’re not already crazy it can drive you there. Many, many attempts, by many people (myself included) have been made over the decades to come up with a pad that’s more or less self-leveling and that can still hold up to moisture and all the rest, without sticking or making more noise, and so far it’s still the old felt and bladder skin pad that’s generally preferred.

It takes hours and hours, but I love it when it all comes together and the instrument finally becomes a “single thing” again, rather than the many parts I’ve been working on separately. You could even say it’s music to the ears. Lately though I’m given pause, wondering what good any of this does for anyone.

This flute is one of several owned by the principal flutist in a Northwestern U.S. orchestra, and yes; she knows that her flute is being worked on by a gun accessory corporation president. We’ve known each other for decades. She’s also a university professor and so it is safe to say that our world views differ somewhat. Two worlds. We get along very well all the same.

Field Ballistics is available on Windows Phone

I just received notification that Field Ballistics for Windows Phone has passed the Microsoft certification tests and is now available in the store. It may take a day or two before you can search for it in the store but you can install it now using this link.

Some of the cool features are illustrated with the following screen shots:

ScreenShotMap

The shooter and targets are placed on a map. The program automatically computes the range to the targets. It also automatically computes the direction of the wind relative to the bullet flight path. This means that if the wind is from the west and you are shooting at a target to the south you will get the correction the full value of wind drift. But if you then choose a target directly east (or west) of you the wind correction will be zero. Of course all the trigonometry is done to correct for shooting in all directions.

At the bottom of the screen are two columns. The left column is the ballistics solution to make the shot at the selected target. In the right column is data about the target and the bullet when it arrives at that target. Of particular note is that in the case above the bullet velocity is in red (the theme color of the phone). This means the bullet velocity is below the minimum you have specified in the settings. This is particularly important for Boomershooters because the targets won’t detonate if the bullets are going too slow.

Tapping the ‘S’ or ‘T’ icons at the bottom of the screen moves the center of the map to the shooter or the selected target. The down arrow icon moves the selected target (or the shooter if it was selected) to the location of the phone using the phone GPS. This means that you can set up multiple targets on the map, then the shooter can “run and gun” and get ballistic solutions quickly. By using the GPS to get the current location of the shooter the distances and wind corrections are automatically update for each position the shooter wishes to shoot from.

ScreenShotTargets

You can add as many targets as you wish* and give them user friendly names. If you tap the “Measure” button you can use the phone camera and accelerometer to determine the incline to the target from your current location.

ScreenShotIncline

This is the incline measurement screen using the camera. You put the crosshairs on the target and tap “Done” to capture the incline of the phone for this target. You can also zoom in or out and refocus the camera.

[Please note this is only to illustrate the incline measurement feature, not to advocate shooting in cities.]

ScreenShotConditions

The automatic weather conditions are obtained from the current location of the shooter. This doesn’t mean the physical location of the phone. You can position the shooter in another state and the nearest weather station to the designated shooter location will be used. When you define your own conditions you can even use the phone GPS to capture your altitude.

ScreenShotCartridges

Black Hills and Federal match ammo are predefined. Add as many of your own cartridges* as you desire.

ScreenShotRifles

Some predefined rifles are included but you can add as many of your own rifles* as desired.

ScreenShotHelp

There are pages and pages of easily accessible help on the phone.


*The trial version only allows one target and one each of user defined conditions, cartridges, and rifles.

Field Ballistics failed certification testing

This afternoon I received an email from Microsoft telling me my new phone app failed the certification testing.

There were two errors. In the first case I didn’t have a clue I was violating the policy. In the second case I was careless. Both are easily fixed.

Test failure 1:

Test: Content that is offensive in any country/region to which your app is targeted is not allowed. Content may be considered offensive in certain countries/regions because of local laws or cultural norms. Examples of potentially offensive content in certain countries/regions include, but are not limited to, the following:

Group 1: China
Prohibited Sexual Content
Disputed territory or region references
Providing or enabling access to content or services that are illegal under applicable local law

Comments: Result: Fail
Your application uses the Bing Maps Silverlight Control for Windows Phone. Bing Maps is not supported for Group 1 countries at this time. You may resubmit your application and deselect the Group 1 countries.

Test failure 2:

Test: Screenshots must only contain app graphics, and must not include any emulator chrome, frame rate counters or debug information.

Comments: The application screenshots contain frame rate counters and debug information.

Three out of the eight screenshots had the frame rate counters and debug information in them. I knew better and just wasn’t paying close enough attention in my rush to get the app submitted.

It will take 30 minutes or so to fix it and resubmit. I’ll get to that sometime tonight after visiting my son and his family.

More on Metadata

This has been passed around for a while now, and it’s fascinating.

A certain cyber spook who shall remain nameless at this juncture told me about this sort of data analysis many years ago. It was just one or two little sentences along the lines of, “You would be AMAZED at the sort of things “they” can find out about you.” As I say; that was many years ago, and orders of magnitude in increased capability have been achieved since. As a merchant having done installment sales for more than a decade at that time, I had a database of my own, consisting of thousands of accounts, and immediately could see the power of what on the surface would seem like rather mundane and mostly useless points of information.

BUT, when you ask the right questions, and can sort by multiple data fields, WOW! We used it to make buying decisions, which were extremely important and had to done months in advance of peak selling seasons, and so it involved recent history and long term trends. It was also extremely useful in predicting patterns and indicators of contract violations. If I told you half of that stuff I’d be branded a scumbag, a bigot and a general son of a bitch. Its one and only purpose though was to avoid going bankrupt– You make the wrong decisions and you’re stuck with major inventory you can’t pay for, or you get it out the door and don’t get paid for it, and so you can’t pay for it.

So yes; we profiled in a very big way, you could say. At one time the default rate was so bad that we required a credit check of every prospective customer, but with analysis of a large enough database were able to do far better by asking for only a few simple bits of information.

Learning important things doesn’t need to come from positive data either. That is to say, what isn’t there can be as useful as what is there, when forming the kinds of association tables in the link, or plotting behavior patterns. For example; knowing those times when someone is unaccounted for (enter the Smart Grid, to know when someone is not at home), when compared to certain events, over time, can tell you a whole lot.

So I now wonder what a look at the metadata in the time and place of Jesus (arguably one of the most influential people in human civilization) would show. How about Bedford Falls of “It’s a Wonderful Life” (thoughbeit a fictional town)? In that story, you could say that Clarence showed George Bailey where he fit in the metadata analysis.

The Soviets, using infiltrators, both of the overt and the covert kind, were able to come up with their various arrest and kill lists in much the same manner.

That brings us to another issue, that being the concept of the inception i.e. a planted idea– The tiny seed of an idea that can germinate in the minds of people, multiply and grow into something large. The looks into associations in the link are all very interesting, but being able to predict or pinpoint inception sources is also very interesting.

Reading about the various groups and group associations in the link got me to thinking about the modern version of the 1700s pub. You’re looking at it. Sort of, but it’s much more open to the world.

I was also struck by the modern lack of such clubs and associations. We’re a much more fragmented society. We don’t meet with our neighbors much at all anymore, whereas it used to be common. We often don’t know anything about them.

But your government sure as hell can find out.

And I submit that this is by design. It’s either by the design of mere mindsets, which will reflexively respond in predictable ways, or by some mastermind scheme. I say it’s a combination of both, each nourished by the other.

Call it a leap into Crazyland if you like (I’ll be quick to say I told you so, later) but looking at the data points over my lifetime, things make a lot more sense if one assumes that our government is in a full-on war against the ideals and principles, the foundation of the U.S. and has been for decades. When other people are saying “W. T. F.!???” and getting all exasperated and confused, I’m saying, “Well sure. It fits perfectly don’t you know.”

Try it. Ask yourself what institutions, traditions and associations would be under attack or already under control if our own government were at war against the American founding principles and the American economy. What groups would be funded worldwide, which ones given a pass, and what groups would be targeted for degradation, intimidation or destruction. What industries would be targeted for nationalization? Yup. Gotcha. On all counts.

So accept it. Then you won’t be surprised or confused anymore. The specific organization of this war isn’t so important, not so much as that you realize it’s a war. And we’re losing, mainly because we’ve not been willing to face up to it’s full import. It’s too crazy. Too horrible. We can’t go there. We’re cowards. Look and listen to the pundits. Any of them, no matter how great you think they are. They’re giving you data points that they themselves are unwilling to connect. We’re all afraid and so we’re very easy to distract. Oh look! Gays!

Field Ballistics for Windows Phone

I just submitted my exterior ballistics app, Field Ballistics, to the Microsoft store for Windows Phone. It will be a few days until it is published. In a day or so I’ll give more details but here is some of what I submitted:

Field Ballistics is a revolutionary exterior ballistics application. Previous ballistics app are little more than glorified pieces of paper with ballistic tables. Field Ballistics uses the phones high tech capabilities to give ballistic solutions for multiple targets.

Place push pins on a map for each target automatically computing the distance from shooter to target, use the camera and accelerometer to measure the incline, use the Internet to automatically get up to date environmental conditions from the closest weather station. Select a target on the map and see the exact scope settings needed and information such as the time of flight and bullet velocity at impact.

When the shooter moves to a new location the ballistic solution for each target is automatically updated. Range and wind direction are automatically corrected using the new shooter location and information from the nearest weather station. You just enter in the new scope settings and take the shot.

Select from any of Federal or BlackHills match ammo or add your own. Input chronograph velocities and Field Ballistics corrects for the distance from the chronograph to the muzzle.

Field Ballistics is more than a glorified piece of paper. It uses the full power of your phone to give you ballistic solutions to multi-target problems.

ScreenShotMap ScreenShotConditions

I started seriously working on this about a year and a half ago. It feels really good to get it out the door.

Update:

In response to this comment from Ray what follows is the exact text of the privacy policy stated in the app:

Requests for map and location information from Bing and other Microsoft services are made by this application and may include the current location of your device. This application uses the Microsoft location service for some actions.

These actions will cause the location of your device to be stored on the device. This information, and all other data for this app, can be deleted by using the ‘reset’ menu item. The use of the location services can be disabled by using the ‘disable use of location services’ menu item.

If ‘Auto’ shooting conditions are used then requests for current weather conditions at the shooters location are made from wunderground.com.

Other than as disclosed above, no information of any type is ever sent by this application to any other device, user, application, or web site for any purpose.

Interesting, but not quite there

InteliScope has an interesting product:

product-hero

The further say:

The on-screen, heads-up display of the Inteliscope app is packed with features including:

  • Intuitive User Interface
  • Custom Crosshairs
  • 5X Digital Zoom
  • Video Recording from the Shooter’s Perspective
  • Ballistics and Firearm Data
  • Built-in Compass
  • GPS Position
  • Local Prevailing Winds
  • Shot Timer
  • Flashlight and Strobe using Built-in LED

This device is limited by camera optics and is intended for short range tactical use.

Not recommended for calibers larger than .223 or 5.56mm.

You are supposed to use your iPhone directly as a sighting system?

Am I overlooking something here?

Sorry. I don’t think it is going to work that well for the following reasons:

  • Display brightness: With direct sunlight on the display you aren’t going to be able to see any detail, and maybe not anything at all.
  • Repeatability of the mount and even the camera stability inside the iPhone case is going to make it a 5 or 10 MOA system.
  • At short ranges, a limitation they admit, wind and ballistic calculations are so minimal that the repeatability of the mount is going to be the dominant factor. So you haven’t gained anything with the computing power you are bringing to the party.
  • Battery life: How long is your battery good for when you have the camera and CPU running?

I think it would be better if you could connect the camera through a real scope that won’t have the problems with repeatability and you get long range capability. You still have problems with bright backlighting but you have addressed two out of the three big issues.

Okay. It would be cool to have video of the target as you hit them but you can get that with something like GoPro or video glasses while using a real sighting system.

It’s a bird. No, it’s a drone!

Found on Drudge. And “this is just the beginning” they say. Of what? I ask.

For some reason I’m reminded of the “Hunter-Seekers” (or were they “Hunter-Killers”? It’s been several decades since I read the series) of Frank Herbert’s Dune. They were tiny, silent, flying assassination drones that could get into your house or pretty much anywhere else. I wonder if the IRS is looking into drone technology, but then; who isn’t?

Plastic guns are easy, try paper!

Via an email from Paul K. we have instructions on how to make a working gun out of paper. I have duplicated the instructions here for archival purposes.

I really, really, have serious concerns about using one of these. I can see where the radial strength might be adequate when using a small gauge shotshell but the recoil could still be a problem. There is no breachface and stock to prevent the shot shell from pushing the nail (firing pin) and perhaps the case-head into/through your hand.

Use at your own risk and remember that the extent of my obligation should this result in you or a friend of yours dying an unnatural death is to nominate you for a Darwin Award. If, and only if, I am in a generous mood when I learn of your date with fate.

Interview with Defense Distributed’s Cody Wilson.

(of 3D printed gun fame)

On theBlaze TV last night. You can watch the video at the link there.

Of course, if you were a Blaze TV subscriber you’d have seen it, and much more, Monday night.

Can’t stop the signal with crypto hashes

Following the lead of Robb and Barron I’m hosting the files to produce firearms on a 3-D printer.

One of the risks to “the signal that cannot be stopped” is that the signal could be subtly corrupted without the possessor knowing. Therefore I am computing and including the hashes of the files so that you can verify it has not been corrupted. Of course someone could corrupt the hashes posted on this blog post to match the corrupted files but I have saved copies of the hashes in a secure location for later comparison. Contact me if there is a concern the hashes have been tampered.

To compute and verify the hashes I used File Checksum Tools (free and quite functional).

The Defense Distributed file pack is here. Hashes:

  • MD5: F4784E3C4C6B6D851C3F2CFD8579B2A6
  • SHA-1: 3B733B62D8D3B08DE9BFFB94CDD308C18BF09BB0
  • SHA-256: 8B3247FE5145E87ABA5B91A6DFCA26193E5472C60AF279223CE5A92611A24D31

The Liberator is here (removed upon the advice of My Lawyer). Hashes:

  • MD5: 26DE1E830AC58C078650B69C4D34602E
  • SHA-1: AA33BC73264B80B87D21FF8D56DE02EAECDA3574
  • SHA-256: 763927D34CE89B550A118E3522181FC434632D6D6188CB82E1612096A613C4AA

Random thought of the day

Ry stopped by my office this afternoon and shared this bit of knowledge with me:

When you are shooting into a fire a red dot sight is totally worthless.

It’s obvious in hindsight but neither he nor I thought of it ahead of time.

Stuff I didn’t know

Double action, pre Civil War design percussion revolver. It has a fully enclosed cylinder, i.e. a top strap. What I don’t get at the moment is why there are twice as many cylinder notches as there are chambers.

This is the sort of thing I’d like to own, and yet I can give no practical reason for it whatsoever.

ETA; I think I figured out the cylinder notch thing. It must be a safety system. Colt’s, Remington and others had similar features, pins or notches in the back of the cylinder to engage the hammer, that more or less locked the cylinder half way between chambers, so the hammer could rest safely between chambers, allowing the carrier to have all chambers loaded rather than resting the hammer on an empty chamber. This revolver is simply using the existing bolt (cylinder lock) for that purpose, methinks, hence the “in between” cylinder notches.

Quote of the day—Matt Brian

Google users have blasted the company for focusing on its April Fools antics, arguing that the time invested in polishing its gags might have been better spent keeping Google Reader alive.

Matt Brian
April 1, 2013
Google and Microsoft trade insults for April Fools
[Add me to the list of Google Reader users that is annoyed they are discontinuing it.—Joe]

More on communication

When I was a boy, out working the fields alone on my grandparents’ farm, I heard voices wafting in from the distance. Two men were standing next to a tractor, its engine running, and so they were shouting at each other to be heard over the engine noise. Two to three hundred yards away, I could hear nearly every word they were saying.

“Ah Hah! Unlike addition and multiplication, communication over a noise source can be asymetrical, or one way.” YOU may be able to hear ME just fine, but it may be utterly impossible for me you hear you, or vice versa. I knew that there was no possible way I could ever shout loud enough for those two men near the tractor to hear me, though I could hear them pretty well.

I’ve used this as an example on several occasions, trying to explain this as the reason why the frustrated fool on the other end of the conversation cannot get through to me. My wife, for example, has never understood this, and she will get angry when I tell her I can’t understand her as I’m washing my hands at the sink. SHE thinks I’M the dumb one, see.

Same goes for radio communication, when someone hears you booming in on a 100 watt repeater, but can’t understand why he isn’t being heard from his 3 watt handy-talkie (then he shouts into the microphone, which makes it worse, because his over modulation [FM} spreads out his three watts over more bandwidth, out toward the edges of the receive passband).

Then there are those who, when wearing ear muffs or headphones and you’re not, and you’re standing right next to them, will shout at you.

And we won’t even get in to the subject of those “low talkers” – those who will talk under their breath apparently as a means of irritating you or for some bizzare reason they want to use it as a means of feeling superior to you, because you’re struggling to hear them while they can hear you perfectly well, and so what’s wrong with you, Chump?