• Risks Digest 32.33 (1/2)

    From RISKS List Owner@21:1/5 to All on Sun Oct 25 00:59:11 2020
    RISKS-LIST: Risks-Forum Digest Saturday 24 October 2020 Volume 32 : Issue 33

    ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator

    ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as
    <http://catless.ncl.ac.uk/Risks/32.33>
    The current issue can also be found at
    <http://www.csl.sri.com/users/risko/risks.txt>

    Contents:
    Air Force updates code on plane mid-flight (The Aviationist)
    Alexa Causes Evacuation Panic in Boulder County, Colorado
    (William Kucharski)
    Experts: Florida Voting Machines Ripe for Foreign Hackers (John Pacenti)
    FDA Hid Names of Dietary Supplements Linked to Hundreds of Reports of Harm
    (Consumer Reports)
    Censorship or Sensibility? (The Intercept)
    Six Russians Tied to Hacks Aroound Globe (NYTimes)
    "We've collected tens of millions of posts to underground crime forums
    (Ross Anderson)
    Exponential growth in DDoS attack volumes (Google)
    The Contest to Protect Almost Everything on the Internet (Sara Castellanos) Researchers find huge, sophisticated black market for trade in online
    'fingerprints' (techxplore.com)
    Annoying-as-hell ransomware attack in Finland (mikko)
    Adblockers installed 300,000 times are malicious and should be removed now
    (Ars Technica)
    POTUS Twitter account reportedly hacked by Dutch whitehat (Volkskrant)
    A shadowy AI service has transformed thousands of women's photos into fake
    nudes: ``Make fantasy a reality'' (WashPost)
    The AI that spots Alzheimer's from cookie drawing (bbc.com)
    Twitter is currently down, perhaps globally (Lauren Weinstein)
    How does Google's monopoly hurt you? (WashPost)
    DHS, USCIS to Modernize, Define the Collection of Biometrics (THomas Kuhn)
    Sony PS5 enables voice recording (The Verge)
    Paleontologists See Stars as Software Bleeps Scientific Terms (NYTimes) Ailments in Covid-19 Trials Raise Questions About Vaccine Method (Bloomberg) Networking Theory and Superspreader Events (Rob Slade)
    Some notes on publishing (Rob Slade)
    Cochlear and bone conduction implants to mitigate hearing (Richard Stein) 'E.T.' 1982 Atari Game: The True Story Behind the Worst Video Game Ever
    (MelMagazine)
    Re: Fifth of countries at risk of ecosystem collapse (Richard Stein)
    Re: Why cars are more "fragile": more technology has reduced robustness
    (Wol)
    Re: SpaceX Is Building a Military Rocket to Ship Weapons Anywhere in the
    World in 1 hour (David Alexander, Erling Kristiansen)
    Re: A different way the news is dividing America (John Levine,
    Richard Stein, John R. Levine, Steve Bacher)
    Re: Continuous glucose monitoring/insulin dosing systems (Richard Stein) Abridged info on RISKS (comp.risks)

    ----------------------------------------------------------------------

    Date: Tue, 20 Oct 2020 13:14:38 -0400
    From: Steve Klein <steven@klein.us>
    Subject: Air Force updates code on plane mid-flight (The Aviationist)

    U.S. Air Force Performs First Ever Code Change On A Flying U-2 Spyplane
    Running Kubernetes

    Story: https://theaviationist.com/2020/10/19/u-s-air-force-performs-first-ever-code-change-on-a-flying-u-2-spyplane-running-kubernetes/

    Comment: What could possibly go wrong?

    ------------------------------

    Date: Mon, 19 Oct 2020 03:25:19 -0600
    From: William Kucharski <kucharsk@mac.com>
    Subject: Alexa Causes Evacuation Panic in Boulder County, Colorado

    Due to a wildfire, the Boulder County, CO Office of Emergency Management
    issued an evacuation order for a region and, to reach people who may have
    not had power, they also had the NWS issue a civil evacuation message via
    NOAA All Hazards Radio (typically used by NWS for severe weather, but its charter includes dissemination of all official Government warning messages.)

    However, the WRSAME codes used to encode location data on AHR can only be delineated down to a county or portion of county.

    Normally this isn't an issue as the accompanying voice message broadcast on NOAA AHR gives further information as to the nature of the hazard and the actions required.

    However, third-party services like Amazon's Alexa only parse the geographic area and the type of alert from the data header. This normally results in people in the county being alerted there is a Tornado Warning, for example.

    However, this time this resulted in Boulder County residents as a whole
    being warned by their Alexa devices that they needed to evacuate their
    homes, causing confusion, fear and some panic.

    It's hard to know how this could be fixed in the future without inserting a human into the loop to listen to or read the actual message sent and
    intervene accordingly.

    https://www.boulderoem.com/issue-with-noaa-weather-radio-alert/

    ------------------------------

    Date: Wed, 21 Oct 2020 12:05:06 -0400 (EDT)
    From: ACM TechNews <technews-editor@acm.org>
    Subject: Experts: Florida Voting Machines Ripe for Foreign Hackers
    (John Pacenti)

    via ACM TechNews, Wednesday, October 21, 2020

    Experts: Florida Voting Machines Ripe for Foreign Hackers
    Government Technology (10/16/20) John Pacenti

    Computer scientists have expressed concerns about the security of voting machines used in 49 Florida counties. Although election officials claim the machines are not vulnerable to remote hacking because they are never
    connected to the Internet, the DS200 voting tabulator uses a wireless connection to transmit results. Finnish computer scientist Harri Hursti said the machine features software that operates like a cellphone and uses
    Internet Protocol when connecting to the wireless network. Princeton University's Andrew Appel said a hacker could penetrate a border router from the Internet or by walking near a polling place with a Stingray, a portable device that can capture data by mimicking a cellphone tower.

    https://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-279a2x225bc1x066052&

    ------------------------------

    Date: Sat, 17 Oct 2020 19:44:07 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: FDA Hid Names of Dietary Supplements Linked to Hundreds of Reports
    of Harm (Consumer Reports)

    https://www.consumerreports.org/dietary-supplements/fda-hid-names-of-dietary-supplements-linked-to-hundreds-of-reports-of-harm/

    ------------------------------

    Date: Mon, 19 Oct 2020 11:48:13 PDT
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: Censorship or Sensibility? (The Intercept)

    Just weeks before the election, the tech giants unite to block access to incriminating reporting about their preferred candidate. [...]

    https://theintercept.com/2020/10/15/facebook-and-twitter-cross-a-line-far-more-dangerous-than-what-they-censor/

    ------------------------------

    Date: Tue, 20 Oct 2020 12:52:31 PDT
    From: "Peter G. Neumann" <neumann@csl.sri.com>
    Subject: Six Russians Tied to Hacks Aroound Globe (NYTimes)

    Michael S. Schmidt and Nicole Perlroth, *The New York Times*, 20 Oct 2020
    (front page, National Edition)

    This article consiers the charges that have just been unsealed relating to
    "an aggressive worldwide hacking campaign that caused mass disruption and
    cost billions of dollars attaching targets like a French presidential
    election, the electricity grid in Ukraine and Internet access to the 2018 Winter Olympics."

    John Demers (Asst AG for national security) is quoted: "Their cyberattack combined the emotional maturity of a petulant child with the resources of a nation-state."

    ------------------------------

    Date: Fri, 16 Oct 2020 13:32:19 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: We've collected tens of millions of posts to underground crime
    forums (Ross Anderson)

    They're not just an amazing resource for research in cybersecurity and criminology, but also for natural language processing: https://www.lightbluetouchpaper.org/2020/10/15/three-paper-thursday-applying-natural-language-processing-to-underground-forums/
    via https://twitter.com/rossjanderson/status/1317070576696123393

    ------------------------------

    Date: Fri, 16 Oct 2020 13:27:49 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Exponential growth in DDoS attack volumes (Google)

    Security threats such as distributed denial-of-service (DDoS) attacks
    disrupt businesses of all sizes, leading to outages, and worse, loss of
    user trust. These threats are a big reason why at Google we put a premium
    on service reliability that's built on the foundation of a rugged network.

    To help ensure reliability, we've devised some innovative ways to
    defend against advanced attacks. In this post, we'll take a deep
    dive into DDoS threats, showing the trends we're seeing and
    describing how we prepare for multi-terabit attacks, so your sites stay up
    and running.

    Taxonomy of attacker capabilities

    With a DDoS attack, an adversary hopes to disrupt their victim's service
    with a flood of useless traffic. While this attack doesn't expose user data
    and doesn't lead to a compromise, it can result in an outage and loss of
    user trust if not quickly mitigated.

    Attackers are constantly developing new techniques to disrupt systems. They give their attacks fanciful names, like Smurf, Tsunami, XMAS tree, HULK, Slowloris, cache bust, TCP amplification, javascript injection, and a dozen variants of reflected attacks. Meanwhile, the defender must consider every possible target of a DDoS attack, from the network layer (routers/switches
    and link capacity) to the application layer (web, DNS, and mail servers).
    Some attacks may not even focus on a specific target, but instead attack
    every IP in a network. Multiplying the dozens of attack types by the
    diversity of infrastructure that must be defended leads to endless possibilities.

    So, how can we simplify the problem to make it manageable? Rather than
    focus on attack methods, Google groups volumetric attacks into a handful of
    key metrics:

    - bps network bits per second: attacks targeting network links
    - pps network packets per second: attacks targeting network equipment
    or DNS servers
    - rps HTTP(S) requests per second: attacks targeting application servers

    This way, we can focus our efforts on ensuring each system has sufficient capacity to withstand attacks, as measured by the relevant metrics. Trends
    in DDoS attack volumes. [...] https://cloud.google.com/blog/products/identity-security/identifying-and-protecting-against-the-largest-ddos-attacks

    ------------------------------

    Date: Mon, 19 Oct 2020 12:04:59 -0400 (EDT)
    From: ACM TechNews <technews-editor@acm.org>
    Subject: The Contest to Protect Almost Everything on the Internet
    (Sara Castellanos)

    Sara Castellanos, *The Wall Street Journal(, 7 Oct 2020, via ACM TechNews,
    19 Oct 2020

    Hundreds of the world's leading cryptographers are participating in a competition overseen by the U.S. National Institute of Standards and
    Technology to develop new encryption standards for protecting online data against classical and quantum-computing cyberattacks. The contest aims to replace commonly used public-key cryptography methods by 2023, including the popular RSA approach, whose basis on integer factorization makes it
    vulnerable to quantum computers. Cryptographers warn that hackers could
    already be harvesting massive amounts of data to decrypt, in anticipation of quantum computers. Among the most promising contest submissions are
    algorithms based on mathematical lattices, which can resemble geometric
    shapes with more than 1,000 dimensions. https://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_6-27924x225a4fx066851&

    ------------------------------

    Date: Sat, 24 Oct 2020 09:28:14 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: Researchers find huge, sophisticated black market for trade in
    online 'fingerprints' (techxplore.com)

    https://techxplore.com/news/2020-10-huge-sophisticated-black-online-fingerprints.html

    "Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale" @ https://arxiv.org/pdf/2009.04344.pdf details "evidence of an emerging
    criminal infrastructure enabling impersonation attacks at
    scale. Impersonation-as-a-Service (IMPaaS) allows attackers to
    systematically collect and enforce user profiles (consisting of user credentials, cookies, device and behavioural fingerprints, and other
    metadata) to circumvent risk-based authentication system and effectively
    bypass multi-factor authentication mechanisms."

    The authors attribute leaked credentials, phishing kits, and malware as key attack strategies contributing to IMPaaS operations.

    Excellent detective and research reveals the scope and sophistication of
    this criminal enterprise, a worrisome synthesis of technical skills and motivation to rake profit from targeted individuals. The IMPaaS business
    model and life cycle is explored in substantial detail.

    ------------------------------

    Date: Sat, 24 Oct 2020 19:09:29 +0000 ()
    From: danny burstein <dannyb@panix.com>
    Subject: Annoying-as-hell ransomware attack in Finland (mikko)

    Highly unusual ransom case underway here in Finland: a private psychotherapy clinic was hacked, and the therapist notes for maybe even 40,000 patients
    were stolen. Now the attacker has emailed the victims, asking each for 200 [euro's] ransom in Bitcoin.

    rest (thread, some in Finnish): https://twitter.com/mikko/status/1320061214647439360

    ------------------------------

    Date: Tue, 20 Oct 2020 20:44:23 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Adblockers installed 300,000 times are malicious and should be
    removed now (Ars Technica)

    https://arstechnica.com/information-technology/2020/10/popular-chromium-ad-blockers-caught-stealing-user-data-and-accessing-accounts/

    ------------------------------

    Date: Thu, 22 Oct 2020 11:10:58 -0400
    From: Richard Forno <rforno@infowarrior.org>
    Subject: POTUS Twitter account reportedly hacked by Dutch whitehat
    (Volkskrant)

    Dutch Ethical Hacker Logs into Trump's Twitter Account https://www.volkskrant.nl/nieuws-achtergrond/dutch-ethical-hacker-logs-into-trump-s-twitter-account~badaa815/

    Last week a Dutch security researcher succeeded in logging into the Twitter account of the American President Donald Trump. Trump, an active Twitterer
    with 87 million followers, had an extremely weak and easy to guess password
    and had according to the researcher, not applied two-step verification.

    On Friday morning, almost absentmindedly, Gevers tries a number of passwords and their variations. On the fifth attempt: bingo! He tries `maga2020'
    (short for make America great again) and suddenly finds himself in the
    Twitter account of the American President. He is flabbergasted. Gevers: ``I expected to be blocked after four failed attempts. Or at least would be
    asked to provide additional information.'' None of that.

    On that Friday morning, Gevers has access to what is perhaps the most
    important Twitter account in the world and is in a position to send a
    message to 87 million people, the attentive world press, and government leaders. Gevers: ``I did think: Here we go again.''

    [This item needs some verification. A screenshot is provided.]

    ------------------------------

    Date: Tue, 20 Oct 2020 17:46:39 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: A shadowy AI service has transformed thousands of women's photos
    into fake nudes: ``Make fantasy a reality'' (WashPost)

    More than 100,000 photos of women have had their clothing removed by the software, including of girls younger than 18. ``Would a lab not
    dominated by men have been so cavalier and so careless about the
    risks?â''

    https://www.washingtonpost.com/technology/2020/10/20/deep-fake-nudes/

    ------------------------------

    Date: Fri, 23 Oct 2020 10:34:22 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: The AI that spots Alzheimer's from cookie drawing (bbc.com)

    https://www.bbc.com/news/technology-54538228

    "The AI model, developed by IBM Research and pharmaceutical giant Pfizer,
    uses natural language processing to analyse short excerpts of speech taken
    from the Cookie Theft cognitive test. The test, used for many years in the diagnosis of dementia and other cognitive illnesses, asks people to describe what they see in the picture.

    "The AI spotted subtle changes to language, such as grammatical errors and different sentence structure, which indicate cognitive decline."

    https://www.researchgate.net/publication/332061806_Describing_the_Cookie_Theft_picture_Sources_of_breakdown_in_Alzheimer's_dementia
    explains Cookie Theft test merit and apparent success: "Speech-language pathologists routinely use picture description tasks to assess expository discourse in clients with disorders such as aphasia and dementia."

    https://catless.ncl.ac.uk/Risks/search?query=speech+recognition&evol=1&lvol=32 reveals 37 prior comp.risks submission and replies.

    Speech can be used as a bio-marker to assist neurological health
    assessment. See https://en.wikipedia.org/wiki/Speech_disorder.

    Automated speech recognition has at least a 5% false positive/false negative conversion-to-text error rate.

    Applying this technology to indicate dementia or Alzheimer's risks appears convenient, especially if there's a deficit of specialized and qualified personnel. As a definitive diagnostic tool, there's much to improve. The
    essay acknowledges deficiencies.

    ------------------------------

    Date: Thu, 15 Oct 2020 15:04:13 -0700
    From: Lauren Weinstein <lauren@vortex.com>
    Subject: Twitter is currently down, perhaps globally

    Twitter is currently down, perhaps globally

    ------------------------------

    Date: Tue, 20 Oct 2020 01:17:52 -0400
    From: Gabe Goldberg <gabe@gabegold.com>
    Subject: How does Google's monopoly hurt you? (WashPost)

    Right under our noses, the Internet's most-used website has been getting
    worse.

    https://www.washingtonpost.com/technology/2020/10/19/google-search-results-monopoly/

    ------------------------------

    Date: Sat, 17 Oct 2020 15:05:02 -0400
    From: Thomson Kuhn <tmk000@gmail.com>
    Subject: DHS, USCIS to Modernize, Define the Collection of Biometrics

    [Unfortunately, the comment period has closed.]

    *The proposed rule would authorize biometrics collection for identity verification in addition to new techniques. Voice, iris and facial
    recognition technologies are fast, accurate ways to confirm the identity of
    an applicant that don't require physical contact. The proposed rule also authorizes DHS to collect DNA or DNA test results to verify a claimed
    genetic relationship when the applicant or petitioner is unable to provide sufficient documentary evidence to establish the claimed relationship. Using DNA or DNA test results to help establish *family units* would help
    petitioners and DHS verify claims of genetic relationships and keep adults
    who are in custody from misrepresenting themselves as biological parents of minors who are not related to them. By using DNA or DNA tests to establish bona-fide genetic relationship between adults and minors in DHS custody, DHS can better protect the well-being of children.*

    https://www.dhs.gov/news/2020/09/01/dhs-uscis-modernize-define-collection-biometrics

    ------------------------------

    Date: Sat, 17 Oct 2020 14:44:56 -0700
    From: Henry Baker <hbaker1@pipeline.com>
    Subject: Sony PS5 enables voice recording (The Verge)

    "Anything you say in a voice chat *could* be sent to Sony without your
    explicit consent"
    "It doesn't seem as if Sony is actively listening to *all* of your
    conversations you're having with your pals"

    Is it just me, or do others think that this 'feature' may run afoul of many *state laws* regarding the consents necessary for the recording of conversations?

    Jay Peters@jaypeters, *The Verge*, 14 Oct 2020
    Sony will let PS5 owners record their voice chats and snitch on fellow players The perhaps unwelcome feature arrived as part of the PS4's 8.0 update https://www.theverge.com/2020/10/14/21516928/sony-ps5-playstation-5-owners-record-listen-voice-chats-moderation-4-8-0-software-update

    Some PlayStation 4 users who downloaded the latest 8.0 update got an
    unwelcome surprise this morning: their console informed them that Sony had
    the right to record their voice for moderation purposes.

    Here are some examples:

    Not only did sony break every ps4 due to how bad the update was,
    they're even recording us #PS4 pic.twitter.com/006eQznRdf

    -- Mini (@_Minii17) October 14, 2020

    So apparently, in case y'all didn't know this beforehand. But
    apparently the newest Sony update to the PS4 and will continue onto 5
    will be recording your voice while in party chat. pic.twitter.com/T0VIbwIpZe

    -- TSN | Ittarra BooOda : Still recovering (@IttarraOda) October 14, 2020

    Initially, the update's release notes contained no mention of voice
    recordings. But at some point today, Sony clarified what the messages meant
    in an update to its official blog post.

    Here is Sony's exact language:

    Following this update, users are seeing a notification about Party Safety
    and that voice chats in parties may be recorded. Voice chat recording for moderation is a feature that will be available on PS5 when it launches, and will enable users to record their voice chats on PS5 and submit them for moderation review. The pop up you're seeing on PS4 right now is to let you
    know that when you participate in a chat with a PS5 user (post-launch), they may submit those recordings from their PS5 console to SIE.

    To translate that statement, it seems that by joining a voice chat, even
    with the older PlayStation 4, your voice can be recorded and submitted to
    Sony for moderation by another user. This could certainly be invasive -- in theory, anything you say in a voice chat could be sent to Sony without your explicit consent. But the feature could also be a useful tool to help people report bad party members that may be harassing them.

    Based on Sony's language, it doesn't seem as if Sony is actively listening
    to all of your conversations you're having with your pals during your latest rounds of Fall Guys.

    The 8.0 software also changes the way parties and messages work and adds new avatars, parental communication controls, and support for authenticator apps for two-factor authentication.

    And in another move to prepare for the PS5's launch, Sony has rebranded the
    PS4 Remote Play mobile, Mac, and PC apps to PS Remote Play, and you'll be
    able to use the app to connect to a PlayStation 5 when the new console
    launches next month.

    ------------------------------

    Date: Mon, 19 Oct 2020 05:42:34 -0400
    From: Jan Wolitzky <jan.wolitzky@gmail.com>
    Subject: Paleontologists See Stars as Software Bleeps Scientific Terms
    (NYTimes)

    https://www.nytimes.com/2020/10/18/science/paleontology-banned-words-convey.html

    ------------------------------

    Date: Sat, 17 Oct 2020 19:43:23 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Ailments in Covid-19 Trials Raise Questions About Vaccine Method
    (Bloomberg)

    https://www.bloomberg.com/news/articles/2020-10-17/ailments-in-covid-19-trials-raise-questions-about-vaccine-method
    or https://www.msn.com/en-us/health/medical/ailments-in-covid-19-trials-raise-questions-about-vaccine-method/ar-BB1a7yuE

    ------------------------------

    Date: Sat, 17 Oct 2020 11:23:18 -0700
    From: Rob Slade <rmslade@shaw.ca>
    Subject: Networking Theory and Superspreader Events

    Recently there has been a great deal of concern about the exact
    interpretation of rules about how many people you can have at your dinner party, or wedding, or funeral, or school classroom (or funeral following a dinner party). Journalists are tasking medical experts for precise numbers. People are saying they won't follow *the rules* because they aren't clear. That's kind of like saying that you won't wear warm clothes when you go out because the weather forecast is predicting five to thirty millimetres of
    rain, and that isn't explicit enough.

    Very few people understand formal, mathematical, networking theory,
    including many of those who work in the field of networking. This seems to
    be the basis of a great deal of the misunderstanding or objection to limitations on gathering numbers.

    First of all, the more people you are in contact with, the greater your risk
    of getting this (or any other communicable) disease. The closer the
    contact, the greater the risk. The longer the contact, the greater the
    risk. This is basic. Location, duration, relation.

    In regard to numbers, *the rules* are different in different places. And
    they are *best guess* advice. Nobody can say that a dinner party of six is safe, but a dinner party of seven will result in someone getting CoVID. However, let's take six as an example. You can have a dinner party with
    five other people. That's probably OK. But if you then have another five people over for dinner the next night, and then five more over the night
    after that, by the end of two weeks (which is a good period to consider
    because it is widely acknowledged as the rough estimate of when most people will be infectious) you will have had dinner with seventy people. Six
    people might be relatively safe. Seventy people is definitely getting dangerous. Keeping your individual party small is not terribly safe if you keep having a lot of different parties.

    And that's just basic numbers, even before we start to add in the real networking aspects. If you have five people over for dinner, were each of
    them out to dinner with five other people the night before? You now have indirect contact with twenty-five people with your small dinner party. And
    if we go back to the day before that, you then have third-party contact with one hundred and twenty-five people. (By the time we get back two weeks, you are almost exceeding the population of the planet.) In terms of sexually transmitted infections, it is often said that whenever you have sex with someone, you have sex with everyone they ever had sex with. That is the way
    to think about how safe your small party is.

    And that's just dinner. If anyone in any of those circles plays football,
    that adds contact with twenty-five more people, closely, and breathing very heavily, for every practice, and fifty for every game. Where do any of
    those people work? And, if still working, does their work environment
    involve people/not many people, masks/no masks, partitions/no partitions?

    And then there are the *bubbles*. Originally, bubbles referred to your household, and the people you couldn't avoid having contact with. Then
    people started to talk about expanding the bubbles, so that you could pick
    one other family, or household, to bubble with, to safely (and even that's questionable) expand your social circle. After all, if you are taking precautions, and the one other family is taking precautions, then it should
    be reasonably safe.

    The thing is, when talking about expanding the bubbles, people immediately forgot that *one other* aspect. One other family might be safe. It's manageable. You know what's going on in that one other family. But as soon
    as you get beyond one other, all bets are off. If you bubble with only two other bubbles, and each of them bubbles with two others, then indirectly you are connected with four other bubbles. And if each of them is doing two bubbles, then at third hand ...

    Most of us humans aren't good at numbers. We can usually “see” seven
    items. Anything more than that is just “a lot,” and we have only a
    vague idea of how big anything is beyond that. By dint of practice, we
    learn arithmetic, but, aside from a relative few, it never really comes naturally to us. And exponential growth in numbers is something that seems
    to be beyond our immediate comprehension. This becomes very dangerous when
    we are faced with having to make decisions, literally life and death
    decisions, about how big of a network, and how many contacts, are safe, when every additional contact increases the risk. That is why public health agencies try to provides rules with specific numbers. The thing is, those numbers are estimates. They are not perfect. That's why there is so little agreement between them. And each jurisdiction has slight differences in environment and situation, which also modifies the numbers. So many people think that, if the numbers don't agree, then you can just ignore the rules.

    The thing is, the public health agencies, and their calculations, may not be perfect. But they are based on work, and facts, and study, and expertise
    that the agencies have, and you don't. Their guesses may be guesses, but
    they are better than yours. Follow the rules. Look for accommodation, not loopholes.

    Now go wash your hands.

    ------------------------------

    Date: Wed, 21 Oct 2020 12:25:33 -0700
    From: Rob Slade <rmslade@shaw.ca>
    Subject: Some notes on publishing

    Well, I finished and turned in the text of my latest book at the end of
    August. (As I always say to those who want advice on getting published,
    that's the easy part done.) It won't actually be available in hard copy for about another four months now, but. shortly thereafter, I did a search on Amazon (using the title, "Cybersecurity Lessons from CoVID-19") and found
    that the publisher had already announced it, and even given it an ISBN. It
    was (unsurprisingly) the first item that popped up when I searched using the title.

    (A note on titles: the title is not my fault. It's the publisher who gets
    the final say on titles.)

    So, in the ongoing process of getting to print, I got the galley proofs yesterday. (I have to answer questions, check that they haven't added any errors, and do the index.) An error reminded me to check on Amazon again,
    and see if the error was reproduced there.

    I searched on the title again, and the results were quite different. A
    number of titles have had SEO (Search Engine Optimization) done on them in
    the month or so since I first checked, and a number of titles having nothing
    to do with security and CoVID popped up, even before mine. In addition, someone has produced a pamphlet entitled "Cybersecurity Lessons From the COVID-19 Pandemic," which seems to be merely a "stay safe online" article.

    There's more than one type of plagiarism in the publishing world these days ...

    ------------------------------

    Date: Fri, 16 Oct 2020 11:34:12 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: Cochlear and bone conduction implants to mitigate hearing

    This RISKS submission summarizes product problems and patient medical device reports for cochlear and bone conduction implants extracted from the FDA's Total Product Lifecycle (TPLC) reporting system.

    Cochlear hearing-assist devices are implanted in a patient's middle ear, connecting amplified audio output to the ear's bone structure. Battery
    powered, they require periodic servicing. An overview of these devices can found here: https://en.wikipedia.org/wiki/Cochlear_implant. Digital signal processors comprise part of these devices.

    CI reprogramming via telehealth engagement: https://www.yalemedicine.org/stories/remote-cochlear-implants/
    Bone-conduction implantation: https://www.earscience.org.au/clinic/hearing-implants/bone-conduction-implants

    The FDA product code classification scheme allocates several product codes
    to categorize hearing assist devices. The product codes classify device regulatory scope, and are used for reporting purposes (recalls, premarket approvals, device reports, etc.).

    These seven (7) hearing-assist device product codes yield comparatively few retrieved TPLC records: OSM, PLK, QDD, EWD, EWE, OAF, and PGQ. The product codes yielding the largest record counts of product device issues and
    medical device reports (MDRs) extracted from TPLC are: MCM -- cochlear implants, and MAH, LXB -- bone conduction implant devices.

    To learn the apparent advantages/disadvantages of each: https://www.aarp.org/health/conditions-treatments/info-2015/implanted-hearing-devices.html

    Product device problems and MDRs comprise two TPLC categories. Both
    categories, and their TPLC search yield, are directly correlated. The MDRs

    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)