TG Payments, TDSL, Fiber, SSDP, pdqsort, Wi-Fi, TLP, Auto Vehicles, DR, 2FA

  • Telegram payments - Telegram Bot integrated payments. Nice, I can see many useful cases for that too. AFAIK, it's better to integrate using a common platform, than launching a bloat app for every single use case. Tested ShopBot and it seems to be working nicely. No disputes, nice and easy.
  • Terabit DSL (TDSL) [pdf] -Just wondering how fast DSL can get. Yet this specific DSL mode requires it's own cabling. I'm just wondering if these techniques could be used over cat 5e, cat 6 or cat 6A cabling. I guess cat3 is out in this case. Let's see when category 8 cabling will be out. (PON, cat5e, cat6, cat6a, cat7, cat8, Ethernet, standard, cabling). That previous article also told some interesting other facts. When they talk about 1 Gbit/s (Gbps) fiber, that's not all. They claim that Fiber speeds are around 100 Gbps and can go probably up to 500 Tbit/s (Tbps). Which is quite neat speed. DSL connections are doing well. I've checked out the standard earlier, which provides higher and higher speeds over cat3. Utilizing waveguide and Mu-MIMO with cabling. Very-high speed TDSL. Massive-MIMO. Digital Signal Processing (DSP)
  • In Finland copper-removal is in full process. Copper wires are dug out and replaced with optic fiber or in rural areas with wireless connectivity. That's in full swing, operators just say, that they won't be supporting copper infrastructure anymore. But I'm sure there are areas, countries, buildings, etc. Which happen to be suitable use cases for TDSL. For the residential building where I'm living, we've a long time ago installed single mode fibers. Which provide easily 10 Gbit/s internet connection without any problems.
  • Cloudflare Apps - Hmm, so they're moving into kind of front-end hosting with simplified setup. Interesting. Drift OAuth. Interesting, why some places say Drift and others say Drift. For this kind of Apps, Google App Engine (GAE), Heroku or AWS Lambda will be awesome.
  • Stupidly Simple DDoS Protocol (SSDP) @ Cloudflare - Reflection DDoS Attack 100 Gbps. Seems to be quite typical issue. Nothing to add. We did it, it works. Let's not worry about anything case.
  • Pattern-defeating quicksort - Nice. Yet I usually prefer Stable sort with my use cases. But if that's not required, then this could be really quick way to sort things. Usually I'll prefer using Timsort.
  • CIA uses tool to target and locate Wi-Fi networks - Hardly surprising? This is one of the first things which is obvious when you start to look for a location of specific system. If you can gain access to it, just scan for Bluetooth and Wi-Fi (WLAN) networks to get pretty good understanding where it is. kw: ELSA
  • Good old Traffic Light Protocol. Yet some organizations are using different scoping. But it's till basically similar. Confidential (Only separately identified and named persons), Group, Company, Public. As you can see, the basic concept is very similar. When information is highly confidential, usually it's only encrypted for key recipients personal OpenPGP keys. Which makes it pretty obvious who the authorized recipient(s) are.
  • Autonomous car / Autonomous Vehicles - Re-read the article to remind my self about progress being made. I'm still waiting for one. There's clear demand for the product class in the market.
  • Had a really long talk with a group of friends about personal DR plan. I've got one. And it's almost overkill. But hey, that's what required if you want to keep your data safe. Not just a single copy on a cheap SSD, which can be destroyed at anytime by hardware, software, hackers or administrative failure.
  • Someone said that 2FA via mail is awesome. Ehh. How about verifying against the national identity database. No need to second guess identity / address, etc. Isn't that exactly why we've got strong identity, that it's very easy to validate it. I wonder why some services use all kind of pseudo methods, when there are strong and proven methods available. Also postcard is bad, because it's not registered mail, where recipient identity is verified. Some businesses do use that. But it's still worse than using online id.